Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Size: px
Start display at page:

Download "Copyright 2013, Oracle and/or its affiliates. All rights reserved."

Transcription

1 1

2 Securing Privileged Accounts with an Integrated IDM Solution Product Manager, Oracle Mike Laramie Oracle Cloud for Industry Architecture Team Buddhika Kottahachchi OPAM Architect

3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 3

4 Program Agenda Introduction What is Oracle Privileged Account Manager? OPAM Integration with Oracle Identity Governance and Database Security Use Case: Oracle Cloud for Industry and OPAM Demo 4

5 Introduction 5

6 What do have these two in Common? Privileged account access Excessive access privileges Difficult to monitor shared accounts across multiple administrators 6

7 IDM Overcome Threats and Regulations to Unlock Opportunities Threats Increased Online Threat Costly Insider Fraud Compliance Tougher Regulations Greater Focus on Risk Stronger Governance Opportunities 76% Data Stolen From Servers 86% Hacking Involve Stolen Credentials 48% Caused by Insiders 17% Involved Privilege Misuse Social Media Cloud Computing Mobile Access 2011 Data Breach Investigations Report 7

8 Managing Privilege Access Is Not Well Defined SCALE Manual solutions don t scale (like managing privileged access via spreadsheets) RISK Using default system passwords is prone to risk COST Deploying point solutions can increase integration costs 8

9 Two Big Management Problems IDENTIFYING PRIVILEGED ACCOUNTS TRACKING PRIVILEGED ACCOUNTS 9

10 The Right Approach is Self-Reinforcing Reporting & Certification Access Request Auto- Provisioning Self- Reinfor cing VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY Remediation 10

11 Privileged Account Management A Platform Approach Shared Connectors Centralized Policies Workflow Integration Common Reporting Reduce Risk Improve Compliance 11

12 What is Oracle Privileged Account Manager 12

13 Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud Web Social Mobile Business Process Management Service Integration User Engagement Content Management Identity Management Business Intelligence Data Integration Complete and Integrated Best-in-class Open standards On-premise and Cloud Foundation for Oracle Fusion Applications and Oracle Cloud Development Tools Cloud Application Foundation Enterprise Management 13

14 Identity Management Securing the Social Enterprise Simplified Identity Governance Access Request Portal with Catalog and Shopping cart UI In product, durable customization of UIs, forms and work flows Privileged Account Management leverage Identity connectors, workflows, audit Complete Access Management Integrated SSO, Federation, API Management, Token Management, Granular Authorization Mobile application security with SSO, device finger printing and step up authentication Social identity log-in from popular social media sites REST, OAuth, XACML Directories that Scale OUD optimized on T4 hardware delivering 3x performance gain and 15% of set up time 14

15 Privileged Account Manager Definition of Terms Privileged Account A human accessible accounts with elevated permissions (root for UNIX, Linux, or SYS for DB) Service Account Most customers use the term service accounts when they refer to Privileged Accounts Some customers use the term service accounts when they refer to Application Accounts OPAM uses services accounts in the connector configuration End User An administrator who is accessing OPAM to check-out an account Administrator The OPAM server Administrator An Administrator who is accessing OPAM to checkout an account Application accounts Accounts that are used by application (stored in applications) to access e.g. a database Target OPAM manages account access on Targets 15

16 Privileged Account Manager Overview of Product Capabilities Secure password vault to centrally manage passwords for privileged accounts OPAM uses an Oracle DB EE instance using TDE to encrypt passwords Session Management and Auditing Session control without revealing a privileged account password Session History and searchable Session Recording Extensible Framework JAVA based for customized solutions Audit Reporting Customizable audit reports through BI Publisher Real time status available via the OPAM dashboard (charts, tables, etc.) 16

17 Privileged Account Manager Overview of Product Capabilities Integrated with Identity Governance Platform Shared Connectors and Workflow integration with OIM Centralized Policies Management via OIM and OIA Using out-of-the-box connectors, OPAM Targets can be configured for Databases, Operating Systems and LDAP Directories, and Oracle FMW applications Policy-based access to privileged accounts via grants Grants control if and when a given administrator has access to a privileged account Grants are represented as OPAM Usage Policies. Grants are typically assigned through LDAP Group Membership in the identity store Flexible Password Policies Mirror corporate password standards 17

18 Supported Clients / Targets Generic UNIX Systems Generic Database Servers Generic LDAP Directories UNIX MS SQLServer Sybase 15 18

19 Typical OPAM Use-Case User logs in as SYSTEM Adds Table to DB System out of space Return SYSTEM password Request SYSTEM password Return root password Request root password HR Application Database OPAM sets the SYSTEM password for HR App Database, based on the password policy for HR App Database Verify the OPAM User, Joe, is in the HR DBA Role User checks in passwords Database and Unix Admin (Joe) User logs in as root Adds disk space Oracle Privileged Account Manager Unix Server OPAM sets the root password for the Unix Server, based on the password policy for Unix Server. LDAP Server 19

20 OPAM Integration with Oracle Identity Governance and Database Security 20

21 OPAM and OIM - a Complete Governance Platform Request for Privileged Account Access Leverage OIM policy/role based provisioning A system admin may be provisioned to specific LDAP groups that OPAM uses for privileged account access Workflow and approval will be followed as defined 22

22 OPAM and OIM - a Complete Governance Platform Request for Privileged Account Access OIM to publish privileged account entitlements in request catalog An admin user uses access request self service, search the catalog, pick the privileged accounts he needs and submit for approval The request kicks off workflow and approval as defined The user is provisioned with group membership after approval The user can access OPAM for privileged password checkout and checkin 23

23 OPAM and OIM - a Complete Governance Platform Risk based certification Through existing OIM OPAM integration, privileged access information is made available for certification. Risk can be calculated based on its privilege status and other data such as provisioning method etc If access violation is found, it can be revoked based on OIM close-loop remediation 24

24 OPAM and Database Security Enterprise User Security allows non-privileged users to use their enterprise LDAP/AD password to connect to the database Database Vault provides stronger separation of duties for databases OPAM manages DB passwords for privileged users including SYS, SYSTEM and application accounts A complete Database Security solution from Oracle 25

25 Database User Management Complete Solution Service Description Use Existing Enterprise LDAP Passwords for End-User Passwords Supported by EUS Map Database Roles to Enterprise Roles Manage SYS/SYSTEM Passwords EUS OPAM Manage Application Passwords OPAM Manage non-oracle database passwords OPAM 26

26 Database Vault Integration Complete Solution Service Description Privileged user access control to limit access to application data Supported by DB Vault Multi-factor authorization to enforce enterprise security policies DB Vault Secure application consolidation DB Vault Manage DB Vault Privileged Accounts Passwords like user_manager, sec_admin Manage SYS/SYSTEM and other DB Privileged Accounts Passwords OPAM OPAM 27

27 Use Case: Oracle Cloud for Industry and OPAM 28

28 Oracle Cloud for Industry Overview What is OCI? An internal provider of cloud-based IaaS and PaaS services available to Oracle Global Business Units (GBUs) for the packaging of Oracle Industry Solutions to end customers. E.g. Financial Services, Healthcare, Retail 29

29 Oracle Cloud for Industry Operational Roles Different operational roles require different levels of access Server Admins Network Admins DB Admins Some groups may require access to multiple resources 30

30 Oracle Cloud for Industry Problems Disparate privileged account practices between multiple operational roles Password vault utilities Spreadsheets Minimal auditing/reporting on privileged account usage Difficulty of access Which vault is that stored in? Additional requirements driven by regulatory compliance PCI HIPAA/HITECH 31

31 Oracle Cloud for Industry Solution Implement password solution that Easy to use Supports privileged accounts from multiple teams with differing requirements Reliable Secure Auditable Meets or exceeds regulatory compliance Solution OPAM 32

32 Oracle Cloud for Industry OCI & OPAM How did OPAM help? Role based access to privileged accounts: LDAP group membership determines which privileged accounts users can access Convenient, accessible BUI Automated reporting of privileged account access and usage Centralized, secure repository Automated password management Unique passwords for each system 33

33 Oracle Cloud for Industry OCI Use Cases Unix Targets Guest VM/Hypervisor privileged accounts Database Targets Sys/System/Application LDAP Targets Service Accounts Lockbox Targets Storage appliances Application passwords Network devices 34

34 Oracle Cloud for Industry PCI & OPAM How did OPAM help with PCI Compliance? Addressed PCI DSS 2.0 Requirements: » Always change vendor supplied passwords before installing a system» Do not use group, shared, or generic accounts and passwords» Change user passwords at least every 90 days. 35

35 Oracle Cloud for Industry OPAM Flexibility Customized scripts for password aging reporting Required for Wrote custom script to retrieve data from OPAM and admins as necessary RFE submitted to include functionality in future release s BUI Daily reports of check-in/check-out activity Currently done through BI Publisher ed to security team nightly On-Demand reporting will be in future release 36

36 Case Study Overview Solution Securely stores local privileged account information in a central location Access to accounts is limited by LDAP group membership (RBAC) Reportable audit trail on account usage 37

37 OPAM Privileged Account Manager in Action 38

38 Oracle Privileged Account Manager in Action Demo Overview How OPAM lockbox is used by Oracle Cloud for Industry How does OPAM Session Management and Auditing enhances the lockbox concept to provide additional compliance data How to extend OPAM operations to enable emergency access 39

39 HOW WE DID IT 40

40 Demo Laptop Demo Server Request Privileged Access to Avitek Retail Host Oracle Identity Governance Session Manager REQUESTING PRIVILEGED ACCESS Approval via smartphone Approval workflow 41

41 Demo Laptop Command executed on Demo Server Demo Server Sending commands Oracle Identity Governance Session Manager EXECUTING COMMANDS Command recorded in Session Log 42

42 Demo Laptop Access checkout history report Oracle Identity Governance Session Manager REVIEWING THE PRIVILEGED ACCESS Session Logs /Transcripts 43

43 Looking Forward A Physical Security Demo Lockitron Internet connected lock Exposes REST interfaces Protected by an Access Token OPAM Protect Access Token in a Lockbox OPAM Plug-in Unlock/Lock as part of Checkout/Check-in (using Access Token) 44

44 Summary 45

45 OPAM Benefits Enforce internal security policies and eliminate potential security threats from privileged users Session Management and Auditing User activities (who, did what, when) Cost-effectively enforce and attest to regulatory requirements Reduce IT costs through efficient self service and common security infrastructure Extensible Java based Framework 46

46 Sessions not to miss CON8823 CON8826 CON8902 CON8836 CON 4342 CON9024 Wednesday 09/25, 5:00PM Thursday, 09/26, 3:30PM Thursday,09/26 2:00PM Thursday 09/26, 11:00AM Thursday 09/26, 12:30PM Thursday09/26, 2:00PM MosconeWest, Room 2018 MosconeWest, Room 2018 Marriot Marquis Golden Gate C3 MosconeWest, Room 2018 MosconeWest, Room 2018 MosconeWest, Room 2018 Access Management for the Internet of Things Zero Capital Investment by leveraging Identity Management as a Service Developing Secure Mobile Applications Leveraging the Cloud to simplify your Identity Management implementation Identity Services in the New GMIT Next Generation Optimized Directory - Oracle Unified Directory Kanishk Mahajan, Oracle Mike Neuenschwander, Oracle Mark Wilcox, Oracle Guru Shashikumar, Oracle GM Etienne Remillon, Oracle 47

47 Join the Oracle Community Twitter twitter.com/oracleidm Facebook facebook.com/oracleidm Oracle Blogs Blogs.oracle.com/OracleIDM Oracle.com/Identity 48

48 Further Information Oracle Privileged Account Manager Documentation Oracle Fusion Middleware 11gR2 Release ( ) Software 49

49 50

50 51

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions Access Governance in a Cloudy Environment Nabeel Nizar VP Worldwide Solutions Engineering @nabeelnizar Nabeel.Nizar@saviynt.com How do I manage multiple cloud instances from a single place? Is my sensitive

More information

Security Compliance and Data Governance: Dual problems, single solution CON8015

Security Compliance and Data Governance: Dual problems, single solution CON8015 Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13

Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13 The following is intended to outline our general product direction.

More information

The 10 Principles of Security in Modern Cloud Applications

The 10 Principles of Security in Modern Cloud Applications The 10 Principles of Security in Modern Cloud Applications Nigel King, Vice President, Oracle In-Depth Seminars D11 1 Safe Harbor Statement The following is intended to outline our general product direction.

More information

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Privileged Account Security: A Balanced Approach to Securing Unix Environments Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged

More information

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED. GDPR How we can help Solvit Networks 01.11.2017 2016 CA. ALL RIGHTS RESERVED. GDPR The facts The General Data Protection Regulation (GDPR) applies to all companies trading in the EU and processing personal

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z0-459 Title : Oracle Identity Governance Suite 11g Essentials Vendor : Oracle Version : DEMO Get Latest

More information

Oracle Privileged Account Manager

Oracle Privileged Account Manager Oracle Privileged Account Manager Disaster Recovery Deployment Considerations O R A C L E W H I T E P A P E R A U G U S T 2 0 1 5 Disclaimer The following is intended to outline our general product direction.

More information

Managing the Risk of Privileged Accounts and Passwords

Managing the Risk of Privileged Accounts and Passwords Managing the Risk of Privileged Accounts and Passwords Definition: Privileged Account Privileged Management Obviously accounts with special or elevated permissions Windows Every workstation and server

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals

Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals November 7, 2017 1 Goals and Methodology Research Goal The primary research

More information

with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle

with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle Data Privacy Enhanced Database Security with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle Security Levels for SLAs Preventive Controls Detective Controls Corrective

More information

Privileged Identity Management

Privileged Identity Management Privileged Identity Management Sven-Erik Vestergaard Certified IT specialist Security architect IBM Nordic Agenda What is Privileged Identity Management Compliance issues Steps in controlling Privileged

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager 7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap

MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap Steve Tuck Senior Director, Product Strategy Todd Blackmon Senior Director, Sales Consulting David Gengenbach Sales Consultant

More information

COMPONENTS/PRODUCTS IN OIM

COMPONENTS/PRODUCTS IN OIM info@tutionbooks.com COMPONENTS/PRODUCTS IN OIM 11.1.2.3 www.tutionbooks.com Products/Components in OIM 11.1.2.3 1. Database 12.1.0.2 and Listener 2. RCU 11.1.1.9 3. Weblogic 10.3.6 with JDK 1.7 Update

More information

Centrify Identity Services for AWS

Centrify Identity Services for AWS F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services

More information

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1 COMPLIANCE BRIEF: HOW VARONIS HELPS WITH OVERVIEW The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how firms that process credit card and other similar

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Oracle Enterprise Manager 12c Sybase ASE Database Plug-in

Oracle Enterprise Manager 12c Sybase ASE Database Plug-in Oracle Enterprise Manager 12c Sybase ASE Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

MySQL Enterprise Security

MySQL Enterprise Security MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security Oracle Audit Vault Trust-but-Verify for Enterprise Databases Tammy Bednar Sr. Principal Product Manager Oracle Database Security Agenda Business Drivers Audit Vault Overview Audit

More information

Practical Guide to Platform as a Service.

Practical Guide to Platform as a Service. Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas December 3, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards!

More information

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital

More information

Oracle Risk Management Cloud

Oracle Risk Management Cloud Oracle Risk Management Cloud Release 12 New Feature Summary December 2016 TABLE OF CONTENTS REVISION HISTORY... 3 COMMON TECHNOLOGIES... 4 APPLICATIONS SECURITY... 4 User Account Management... 5 Administrator

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

Governance, Risk, and Compliance: A Practical Guide to Points of Entry An Oracle White Paper January 2010 Governance, Risk, and Compliance: A Practical Guide to Points of Entry Disclaimer The following is intended to outline our general product direction. It is intended for

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Oracle Identity and Access Management

Oracle Identity and Access Management Oracle Identity and Access Management AGENDA Overview Features Components Customizations APIs Oracle Identity Manager Connectors High Availability Concepts High Availability Architecture OVERVIEW Identity

More information

Understanding Oracle ADF and its role in the Oracle Fusion Platform

Understanding Oracle ADF and its role in the Oracle Fusion Platform ORACLE PRODUCT LOGO Understanding Oracle ADF and its role in the Oracle Fusion Platform Dana Singleterry blogs.oracle.com/dana 2 Copyright Principal 2011, Oracle and/or its Product affiliates. All rights

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made

More information

Oracle Database Security Assessment Tool (DBSAT) Overview

Oracle Database Security Assessment Tool (DBSAT) Overview Oracle Database Security Assessment Tool (DBSAT) Overview Pedro Lopes Product Manager Oracle Database Security High-level Trends in Security Data breaches becoming bigger and bolder New targets: Data aggregators,

More information

WebLogic Security Top Ten

WebLogic Security Top Ten WebLogic Security Top Ten June 2014 Michael Miller Chief Security Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Stephen Kost Chief Technology Officer

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk Top Reasons To Audit An IAM Program Bryan Cook Focal Point Data Risk Focal Point Data Risk A New Type of Risk Management Firm THE FACTS Born from the merger of three leading security & risk management

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Identity-Powered Security

Identity-Powered Security Identity-Powered Security Innovation created a very complex environment. z / OS PL / I Public Cloud Private Cloud Internet of Things (IoT) COBOL CICS IMS Cloud How is leveraging cloud impacting risk and

More information

Database Centric Information Security. Speaker Name / Title

Database Centric Information Security. Speaker Name / Title Database Centric Information Security Speaker Name / Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Open mustard seed. Patrick Deegan, Ph.D. ID3

Open mustard seed. Patrick Deegan, Ph.D. ID3 Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal

More information

CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions

More information

SnapCenter Software 4.0 Concepts Guide

SnapCenter Software 4.0 Concepts Guide SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...

More information

Oracle DB in der Oracle Cloud Überblick und Praxis

Oracle DB in der Oracle Cloud Überblick und Praxis Oracle DB in der Oracle Cloud Überblick und Praxis Negib Marhoul Systemberater Oracle Deutschland Agenda 1 2 3 Oracle Cloud Services - Überblick Bereitstellung einer Oracle DB in der Cloud Daten in die

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT DON T USE A HAMMER MOVE BEYOND GPO FOR NEXT-LEVEL TO TURN A SCREW PRIVILEGE MANAGEMENT The first stage of privilege management Most organizations with

More information

Centralized Database User Management Using Active Directory

Centralized Database User Management Using Active Directory Centralized Database User Management Using Active Directory CON6574 Alan Williams Product Management Oracle Database Security October 2017 Presented with Copyright 2017, Oracle and/or its affiliates. All

More information

Compliance and Privileged Password Management

Compliance and Privileged Password Management Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview

More information

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING

More information

1Z Oracle Identity Governance Suite 11g PS3 Implementation Essentials Exam Summary Syllabus Questions

1Z Oracle Identity Governance Suite 11g PS3 Implementation Essentials Exam Summary Syllabus Questions 1Z0-339 Oracle Identity Governance Suite 11g PS3 Implementation Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-339 Exam on Oracle Identity Governance Suite 11g PS3 Implementation

More information

Question: 1 Which item must be enabled on the client side to allow users to complete certification in offline mode?

Question: 1 Which item must be enabled on the client side to allow users to complete certification in offline mode? Volume: 81 Questions Question: 1 Which item must be enabled on the client side to allow users to complete certification in offline mode? A. In Microsoft Excel, navigate to Excel Options >Trust Center tab

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

The Old is New Again Engineering Security in the Age of Data Access from Anywhere

The Old is New Again Engineering Security in the Age of Data Access from Anywhere The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This

More information

W H IT E P A P E R. Salesforce Security for the IT Executive

W H IT E P A P E R. Salesforce Security for the IT Executive W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login

More information

ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND

ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND Agenda Welcome & Introduction to ArcGIS Enterprise Portal for ArcGIS - Basic Configuration - Advanced Configuration - Deploying Apps

More information

SOFTWARE DEMONSTRATION

SOFTWARE DEMONSTRATION SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Oracle Audit Vault Implementation

Oracle Audit Vault Implementation Oracle Audit Vault Implementation For SHIPPING FIRM Case Study Client Company Profile It has been involved in banking for over 300 years. It operates in over 50 countries with more than 1, 47,000 employees.

More information

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built

More information

Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You

Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Özgür Yiğit Oracle Data Integration, Senior Manager, ECEMEA Safe Harbor Statement The following

More information

Oracle Identity Governance 11g R2: Develop Identity Provisioning

Oracle Identity Governance 11g R2: Develop Identity Provisioning Oracle University Contact Us: 20 (0)2 35350254 Oracle Identity Governance 11g R2: Develop Identity Provisioning Duration: 5 Days What you will learn In this intensive course, you'll learn about Oracle

More information

HIPAA Regulatory Compliance

HIPAA Regulatory Compliance Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

Oracle WebCenter Interaction: Roadmap for BEA AquaLogic User Interaction. Ajay Gandhi Sr. Director of Product Management Enterprise 2.

Oracle WebCenter Interaction: Roadmap for BEA AquaLogic User Interaction. Ajay Gandhi Sr. Director of Product Management Enterprise 2. Oracle WebCenter Interaction: Roadmap for BEA AquaLogic User Interaction Ajay Gandhi Sr. Director of Product Management Enterprise 2.0 and Portals 1 Agenda Enterprise 2.0 and Portal Product Strategy AquaLogic

More information

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS WHITE PAPER SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS The Challenges Of Securing AWS Access and How To Address Them In The Modern Enterprise Executive Summary When operating in Amazon Web Services

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

Securing an Oracle Private Cloud using Oracle Directory Suite

Securing an Oracle Private Cloud using Oracle Directory Suite Securing an Oracle Private Cloud using Oracle Directory Suite Prepared by: Eric Mader, Zirous, Inc. @zirous_eric Session ID: 266 Agenda Oracle Private Clouds and Oracle Enterprise Manager 13c Oracle Directory

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

Oracle Enterprise Manager 12c IBM DB2 Database Plug-in

Oracle Enterprise Manager 12c IBM DB2 Database Plug-in Oracle Enterprise Manager 12c IBM DB2 Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

All the resources you need to get buy-in from your team and advocate for the tools you need.

All the resources you need to get buy-in from your team and advocate for the tools you need. Top 5 Reasons The Business Case for Bomgar Privileged Access All the resources you need to get buy-in from your team and advocate for the tools you need. You already know Bomgar will help you manage and

More information

Oracle Policy Automation The modern enterprise advice platform

Oracle Policy Automation The modern enterprise advice platform Oracle Policy Automation The modern enterprise advice platform Release features and benefits (November 2017) v1.01 Program agenda 1 2 3 Overview of Oracle Policy Automation New features in release For

More information

Use Cases for Unix & Linux

Use Cases for Unix & Linux WHITE PAPER 15 Server Privilege Management PowerBroker for Unix & Linux, PowerBroker Identity Services, and PowerBroker for Sudo Table of Contents Executive Summary... 3 15 Common Use Cases... 4 1. Removing

More information

Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is

More information

McAfee Database Security

McAfee Database Security McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability

More information

Private Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy

Private Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy Private Clouds: Opportunity to Improve Data Security and Lower Costs InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy Private Clouds: Opportunity to Improve Data Security and

More information