SlideShare a Scribd company logo
Amit Jasuja
Vice President,
Identity Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
What Keeps You Up at Night ?


               Threats
                                                         Threats
                                            • More Attacks
                                            • Insider Fraud
                                            • Data Privacy
                         Opportunities
  Compliance
                                         Opportunities
What Keeps You Up at Night ?


               Threats
                                                           Threats
                                                         Compliance
                                            • More Attacks
                                              Tougher Regulations
                                            • Insider Fraud
                                              Intrusive Audits
                                            • Data Privacy
                                              Costly Reporting
                         Opportunities
  Compliance
                                         Opportunities
What Keeps You Up at Night ?


               Threats
                                                     Opportunities
                                                        Threats
                                                      Compliance
                                            • More Attacks
                                              Cloud Computing
                                              Tougher Regulations
                                            • Insider Access
                                              Mobile Fraud
                                              Intrusive Audits
                                            • Data Privacy
                                              Globalization
                                              Costly Reporting
                         Opportunities
  Compliance
                                         Opportunities
Threats are Against Applications and Data
                         Endpoint
                         Security

                                                                • How do I control insiders?

 Other
                     48% Caused
                      by Insiders               Vulnerability
                                                                • Can I report on
                   Identity
Security        ManagementRecords
                 92% Stolen
                                                Management        anomalous behavior?
                From Database Servers
                 89% Records Stolen                             • Is my data protected against SQL
                  Using SQL Injection
                  Database                                        injection attacks?
                 86% Hacking Involve
                   Security
                  Stolen Credentials
                                                                • Can I prevent intrusions?
            Email                       Network
           Security                     Security




              2010 Data Breach Investigations Report
Reduce Audit Exposure

                                                                              • Is access certification timely?

                                                                              • Is audit data collected
                                                                                and retrievable?

                                                                              • Are my security processes
                                                                                sustainable?

                                                                              • Can I remediate audit
                                                                                issues quickly & effectively?

           40%                  Of IT Budgets spent on
                                compliance mandates



Source: The Value of Corporate Secrets by Forrester Consulting (March 2010)
Security Unlocks New Opportunities

                                                   • Can I deploy new customer facing
                                                     applications ?

                                                   • Can I extend my identity
                                                     infrastructure to the cloud?

                                                   • Can employees access email &
                                                     apps on mobile devices ?

87%   Security main barrier to
      Cloud Adoption
      Source: IDC Enterprise Panel, 3Q09
                                                   • Can I consolidate my apps and run
                                                     my database in the cloud?

46%   Increase in Mobile attacks in
      2010 vs. 2009
      McAfee Threats Report: Fourth Quarter 2010
Identity Management Evolves
              Authoritative ID    Access Via       User Lifecycle In   Certify Access        Monitor
               with Massive      Mobile & Social    Hybrid/Cloud       for Millions of     Behavior &
                   Scale           Channels         Environments          Users &        Detect Improper
                                                                        Entitlements         Access

   Cloud/
   Mobile


 Extranet
                                                                                         Risk Management
                                                                                 Audit
Enterprise                                              Administration
                                    Authentication
               Identity

             Tools                 Point Solutions                     Platform                     Intelligence
Database Security Evolves

               Control     Encrypt Data        Audit User       Monitor SQL
              Privileged                        Activity
                Users        Mask Test                          Block Attacks
                               Data            Compliance
    Cloud    Enforce SoD                        Reports



Non-Oracle
 Databases
                                                                       Database Firewall
                                                            Auditing
   Oracle
Databases                            Encryption & Masking
                           Authorization
         Authentication

                                         Defense in Depth
A Patchwork of Solutions
Fragmentation Reduces Effectiveness

                        • Audit exposure
                          • Poor reporting,
                          • Limited root cause tracking
                        • Vulnerable to breaches
                          • Multiple points of failure
                        • Missed business opportunities
                          • Inability to develop and deploy
                            applications to users
Taking a Platform Approach
          Integrated Application and Information Security



       Oracle Applications                      Non-Oracle Applications
                                                                           Reduce audit exposure
                                                                           Detect and prevent threats
                Integrated Security Platform
                                                                           Grow the business
     Identity Management                       Database Security



        Oracle Databases                        Non-Oracle Databases

                       Savings with an integrated platform
 48%                   vs. point solutions
Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Oracle Identity Management Stack
   Complete, Innovative and Integrated

   Identity Governance                    Access Management                  Directory Services

• Password Management                  • Single Sign-On & Federation    • LDAP Storage
• Self-Service Request & Approval      • Web Services Security          • Virtualized Identity Access
• Roles based User Provisioning        • Authentication & Fraud         • LDAP Synchronization
                                         Prevention
• Analytics, Policy Monitoring
                                       • Authorization & Entitlements
• Risk-based Access Certification
                                       • Access from Mobile Devices




                                    Platform Security Services
                                    Identity Services for Developers
Oracle Database Security
   Complete Defense in Depth and Transparent to Applications
   Auditing, Monitoring                        Access Control                   Transparent Encryption
     and Protection                             Management                           and Masking
• Monitor database network activity     • Privileged database user controls    • Transparently encrypt
                                                                                 application data
• Accurately detect and block SQL       • Fine-grained authorization
  injection and other threats             enforce who, where, when, and        • Protect from unauthorized OS
                                          how                                    level or network access
• Consolidate audit data,
  alert, report                         • Securely consolidate databases       • Built-in key lifecycle management
• Secure configuration                  • Data classification access control   • Mask sensitive data for
  management                                                                     non-production




                                      Oracle Database Security
Oracle Security Solutions

• Complete, Open and Integrated
• Innovative, Scalable and Modernized
• Simplified and Actionable Compliance

More Related Content

What's hot (20)

PPTX
Declarative security-oes
OracleIDM
 
PPTX
Scaling identity to internet proportions
OracleIDM
 
PPTX
Biz case-keynote-final copy
OracleIDM
 
PDF
Cso oow12-summit-sonny-sing hv4
OracleIDM
 
PDF
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
PPTX
Securing access inabyod-world-final-ext
OracleIDM
 
PDF
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
PPTX
Building a Secure Cloud with Identity Management
OracleIDM
 
PDF
Building a Strong Foundation for Your Cloud with Identity Management
Nishant Kaushik
 
PDF
Overview of Identity and Access Management Product Line
Novell
 
PDF
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
PDF
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
Andris Soroka
 
PPTX
Con8833 access at scale for hundreds of millions of users final
OracleIDM
 
PPSX
ITIL - IAM (Access Management)
Josep Bardallo
 
PDF
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CloudIDSummit
 
PPTX
security and compliance in the cloud
Ajay Rathi
 
PPTX
Bridging the Cloud Sign-On Gap
OracleIDM
 
PDF
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
IBM Danmark
 
PDF
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 
PPTX
SANS Institute Product Review of Oracle Identity Manager
OracleIDM
 
Declarative security-oes
OracleIDM
 
Scaling identity to internet proportions
OracleIDM
 
Biz case-keynote-final copy
OracleIDM
 
Cso oow12-summit-sonny-sing hv4
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Securing access inabyod-world-final-ext
OracleIDM
 
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Building a Secure Cloud with Identity Management
OracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Nishant Kaushik
 
Overview of Identity and Access Management Product Line
Novell
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
Andris Soroka
 
Con8833 access at scale for hundreds of millions of users final
OracleIDM
 
ITIL - IAM (Access Management)
Josep Bardallo
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CloudIDSummit
 
security and compliance in the cloud
Ajay Rathi
 
Bridging the Cloud Sign-On Gap
OracleIDM
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
IBM Danmark
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 
SANS Institute Product Review of Oracle Identity Manager
OracleIDM
 

Viewers also liked (20)

PPTX
Wyniki badania polskiej blogosfery firmowej 2009-2012
Dominik Kaznowski
 
PPTX
G3 manageing seucrity_setupstep_final
sakpob
 
TXT
Accounting entries
Sravani Meessaraganda M
 
PPTX
Oracle Configurator Developer
Pritesh Mogane
 
DOCX
Bf.016 application setup_document_opm_process_execution_v1.0
mamdouh1707
 
PDF
Opm inv user guide
Raaj Nagulapalli
 
PDF
Top 10 Reasons to Choose Oracle ERP Cloud Financials
Liz Kensicki
 
PDF
Cost accounting for Oracle
George Faur
 
PPT
R12 Business Case Process Manufacturing
Vaddadi Anil Srinivas
 
PPT
Sla and cost acctg
Beverley Baker-Harris
 
PPT
Oracle Applications - R12 Approvals Management Engine - AME Training
Dharmalingam Kandampalayam Shanmugam
 
PPT
Standard Cost Accounting in Oracle ERP
Larry Sherrod
 
PPTX
Oracle R12.1.3 Costing Overview
Pritesh Mogane
 
PDF
Oracle Inventory Complete Implementation Setups.
Muhammad Mansoor Ali
 
PDF
Implementing Cloud Financials
NERUG
 
PDF
All inclusive логистика для интернет магазина
TOCHKA
 
PPT
Metaphor elicitation research
Don Farleo
 
PDF
Notam 05 fev 15
Carlos Carvalho
 
PPTX
The Online Academy Budget $ t-r-e-t-c-h Opportunity-v171213
Trevor E S Smith
 
PPT
Careers opportunities in finance
Shantilal Hajeri
 
Wyniki badania polskiej blogosfery firmowej 2009-2012
Dominik Kaznowski
 
G3 manageing seucrity_setupstep_final
sakpob
 
Accounting entries
Sravani Meessaraganda M
 
Oracle Configurator Developer
Pritesh Mogane
 
Bf.016 application setup_document_opm_process_execution_v1.0
mamdouh1707
 
Opm inv user guide
Raaj Nagulapalli
 
Top 10 Reasons to Choose Oracle ERP Cloud Financials
Liz Kensicki
 
Cost accounting for Oracle
George Faur
 
R12 Business Case Process Manufacturing
Vaddadi Anil Srinivas
 
Sla and cost acctg
Beverley Baker-Harris
 
Oracle Applications - R12 Approvals Management Engine - AME Training
Dharmalingam Kandampalayam Shanmugam
 
Standard Cost Accounting in Oracle ERP
Larry Sherrod
 
Oracle R12.1.3 Costing Overview
Pritesh Mogane
 
Oracle Inventory Complete Implementation Setups.
Muhammad Mansoor Ali
 
Implementing Cloud Financials
NERUG
 
All inclusive логистика для интернет магазина
TOCHKA
 
Metaphor elicitation research
Don Farleo
 
Notam 05 fev 15
Carlos Carvalho
 
The Online Academy Budget $ t-r-e-t-c-h Opportunity-v171213
Trevor E S Smith
 
Careers opportunities in finance
Shantilal Hajeri
 
Ad

Similar to Oracle security-formula (20)

PDF
Keynote oracle entitlement-driven idm
Normand Sauve
 
PPTX
Sw keynote
gueste69f645
 
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft Private Cloud
 
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
PDF
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle BH
 
PDF
Information Security Shake-Up
EMC
 
PPTX
On Demand Cloud Services Coury
Arman Sadat Hossain
 
PDF
Cloud Auditing
Jonathan Sinclair
 
PDF
Selling Data Security Technology
Flaskdata.io
 
PDF
James Beeson SOURCE Boston 2011
Source Conference
 
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
PPTX
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
 
PDF
Top 10 Database Threats
Imperva
 
PPT
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
 
PPTX
Gainful Information Security 2012 services
Cade Zvavanjanja
 
PDF
Prepare For Breaches Like a Pro
Resilient Systems
 
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
PPTX
Leveraging Identity to Manage Change and Complexity
NetIQ
 
PPTX
Information Security Cost Effective Managed Services
Jorge Sebastiao
 
PDF
Day 3 p2 - security
Lilian Schaffer
 
Keynote oracle entitlement-driven idm
Normand Sauve
 
Sw keynote
gueste69f645
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft Private Cloud
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle BH
 
Information Security Shake-Up
EMC
 
On Demand Cloud Services Coury
Arman Sadat Hossain
 
Cloud Auditing
Jonathan Sinclair
 
Selling Data Security Technology
Flaskdata.io
 
James Beeson SOURCE Boston 2011
Source Conference
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Internet Security Threat Report (ISTR) Vol. 16
Symantec APJ
 
Top 10 Database Threats
Imperva
 
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
 
Gainful Information Security 2012 services
Cade Zvavanjanja
 
Prepare For Breaches Like a Pro
Resilient Systems
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Leveraging Identity to Manage Change and Complexity
NetIQ
 
Information Security Cost Effective Managed Services
Jorge Sebastiao
 
Day 3 p2 - security
Lilian Schaffer
 
Ad

More from OracleIDM (20)

PPTX
Con9573 managing the oim platform with oracle enterprise manager
OracleIDM
 
PPTX
Con9024 next generation optimized directory - oracle unified directory - final
OracleIDM
 
PPTX
Con8902 developing secure mobile applications-final
OracleIDM
 
PPTX
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
PPTX
Con8837 leverage authorization to monetize content and media subscriptions ...
OracleIDM
 
PPTX
Con8836 leveraging the cloud to simplify your identity management implement...
OracleIDM
 
PPTX
Con8834 bring your own identity - final
OracleIDM
 
PPTX
Con8828 justifying and planning a successful identity management upgrade final
OracleIDM
 
PPTX
Con8823 access management for the internet of things-final
OracleIDM
 
PPTX
Con8819 context and risk aware access control any device any where - final
OracleIDM
 
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
OracleIDM
 
PPTX
Con8811 converged identity governance for speeding up business and reducing c...
OracleIDM
 
PPTX
Con 8810 who should have access to what - final
OracleIDM
 
PPTX
Opening remarks-dave-profozichv2
OracleIDM
 
PPTX
Con8808 enabling business growth in the new economy final
OracleIDM
 
PPTX
Innovations dbsec-12c-pub
OracleIDM
 
PPTX
Identityofthings amitjasuj av10
OracleIDM
 
PDF
Identityofthings amitjasuj av10
OracleIDM
 
PPTX
Trends gartner iam-amit12-4-12-v1
OracleIDM
 
Con9573 managing the oim platform with oracle enterprise manager
OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
OracleIDM
 
Con8902 developing secure mobile applications-final
OracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
OracleIDM
 
Con8834 bring your own identity - final
OracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
OracleIDM
 
Con8823 access management for the internet of things-final
OracleIDM
 
Con8819 context and risk aware access control any device any where - final
OracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
OracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
OracleIDM
 
Con 8810 who should have access to what - final
OracleIDM
 
Opening remarks-dave-profozichv2
OracleIDM
 
Con8808 enabling business growth in the new economy final
OracleIDM
 
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
OracleIDM
 
Trends gartner iam-amit12-4-12-v1
OracleIDM
 

Recently uploaded (20)

PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 

Oracle security-formula

  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. What Keeps You Up at Night ? Threats Threats • More Attacks • Insider Fraud • Data Privacy Opportunities Compliance Opportunities
  • 4. What Keeps You Up at Night ? Threats Threats Compliance • More Attacks Tougher Regulations • Insider Fraud Intrusive Audits • Data Privacy Costly Reporting Opportunities Compliance Opportunities
  • 5. What Keeps You Up at Night ? Threats Opportunities Threats Compliance • More Attacks Cloud Computing Tougher Regulations • Insider Access Mobile Fraud Intrusive Audits • Data Privacy Globalization Costly Reporting Opportunities Compliance Opportunities
  • 6. Threats are Against Applications and Data Endpoint Security • How do I control insiders? Other 48% Caused by Insiders Vulnerability • Can I report on Identity Security ManagementRecords 92% Stolen Management anomalous behavior? From Database Servers 89% Records Stolen • Is my data protected against SQL Using SQL Injection Database injection attacks? 86% Hacking Involve Security Stolen Credentials • Can I prevent intrusions? Email Network Security Security 2010 Data Breach Investigations Report
  • 7. Reduce Audit Exposure • Is access certification timely? • Is audit data collected and retrievable? • Are my security processes sustainable? • Can I remediate audit issues quickly & effectively? 40% Of IT Budgets spent on compliance mandates Source: The Value of Corporate Secrets by Forrester Consulting (March 2010)
  • 8. Security Unlocks New Opportunities • Can I deploy new customer facing applications ? • Can I extend my identity infrastructure to the cloud? • Can employees access email & apps on mobile devices ? 87% Security main barrier to Cloud Adoption Source: IDC Enterprise Panel, 3Q09 • Can I consolidate my apps and run my database in the cloud? 46% Increase in Mobile attacks in 2010 vs. 2009 McAfee Threats Report: Fourth Quarter 2010
  • 9. Identity Management Evolves Authoritative ID Access Via User Lifecycle In Certify Access Monitor with Massive Mobile & Social Hybrid/Cloud for Millions of Behavior & Scale Channels Environments Users & Detect Improper Entitlements Access Cloud/ Mobile Extranet Risk Management Audit Enterprise Administration Authentication Identity Tools Point Solutions Platform Intelligence
  • 10. Database Security Evolves Control Encrypt Data Audit User Monitor SQL Privileged Activity Users Mask Test Block Attacks Data Compliance Cloud Enforce SoD Reports Non-Oracle Databases Database Firewall Auditing Oracle Databases Encryption & Masking Authorization Authentication Defense in Depth
  • 11. A Patchwork of Solutions Fragmentation Reduces Effectiveness • Audit exposure • Poor reporting, • Limited root cause tracking • Vulnerable to breaches • Multiple points of failure • Missed business opportunities • Inability to develop and deploy applications to users
  • 12. Taking a Platform Approach Integrated Application and Information Security Oracle Applications Non-Oracle Applications  Reduce audit exposure  Detect and prevent threats Integrated Security Platform  Grow the business Identity Management Database Security Oracle Databases Non-Oracle Databases Savings with an integrated platform 48% vs. point solutions Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 13. Oracle Identity Management Stack Complete, Innovative and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud • LDAP Synchronization Prevention • Analytics, Policy Monitoring • Authorization & Entitlements • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers
  • 14. Oracle Database Security Complete Defense in Depth and Transparent to Applications Auditing, Monitoring Access Control Transparent Encryption and Protection Management and Masking • Monitor database network activity • Privileged database user controls • Transparently encrypt application data • Accurately detect and block SQL • Fine-grained authorization injection and other threats enforce who, where, when, and • Protect from unauthorized OS how level or network access • Consolidate audit data, alert, report • Securely consolidate databases • Built-in key lifecycle management • Secure configuration • Data classification access control • Mask sensitive data for management non-production Oracle Database Security
  • 15. Oracle Security Solutions • Complete, Open and Integrated • Innovative, Scalable and Modernized • Simplified and Actionable Compliance

Editor's Notes

  • #7: The Oracle Lens:First I want to start with some observations about security and place and Oracle Lens on how we see security – Today there are lots of different tools people are deploying to address security. Lots of end point security laptops and we have lots of solutions looking at email security and DLP. We have deployed lots of network scanning and ways of monitoring what’s happening in the enterprise .. ( CLICK THE BUILD) but when we examine what’s actually happening most of the threats are against the applications and the data . In fact 48% of the breaches were caused by insiders – so with all the monitoring 48% of breaches were caused by people who had either excessive access or even legitimate access to the data. 92% of stolen records are from database servers, 89% of records were stolen with simple SQL injection attacks And a whopping 86% of attacks were due to lost or stolen credentials –SO THE ORACLE LENS IS ITS ALL ABOUT THE DATA AND APPLICATIONSWhat does this mean:While this does not mean we should neglect our perimeter or remove our endpoint security – it means that the last mile is about really taking control of access in the enterprise. While we can’t dramatically lower the number of hackers externally we can control and manage user access internally and that would reduce 48% of the problem. Your applications have most of your mission critical data and your private data.So instead of only monitoring the network for attacks – I need to also check that my database is protected from SQL injection attacks and be able to check for anomalous behavior from insiders because remember 48% of it is internalInstead of only using email security to protect data – Look at how I can provide greater access control of insiders . In most cases when we look at breaches by insiders the problem is excessive access.Story We were doing an interesting POC at a healthcare organization – looking for clinicians accessing patient data they were not supposed to have access to and within the first 10 minutes found a clinician who had accessed the data of a family member. The Oracle Lens is – Its about your data and applications and its about Access –Our Security Solutions are focused on Identity management and Database security.
  • #8: Security is not the same as compliance At the same time – Security is not the same as compliance – And we have to go through lengthy exercises to provide proof of compliance and it can be a barrier to business opportunities because of the legal liability and effort involved. A whopping 40% of IT budgets are spent on compliance and as we try to use IT strategically to reach customers and new markets the compliance becomes a burden.For CSO’s to be effective we have to reduce the cost with automation We can’t afford to continue spending the current amounts on security. – we have to be able to provide proof of compliance continuously and in a repeatable manner. The process has to be sustainable because we have to be able to scale it across the business. If my CEO wants to acquire a new company … )which we do a lot of at Oracle) I have to be able to integrate the new company’s compliance processes into my business quickly and provide reporting in a timely fashion and provide immediate access to resources. If I need to a launch a new application for customers, I need to be able to secure the customer data and provide audit-ability and traceability.To be strategic and Mission Critical – reporting has to be timely and we have to fix or remediate the problem quickly. If we find an excessive access issue or someone separates from the company we can’t wait 3 weeks while the help desk ticket gets processed to remove the access. It has to be immediate. We can’t afford to spend man months certifying user access. We have to find better more intelligent ways of assessing risk.Its About Brand and Reputation – Prevention is the best Cure.With the increasing visibility of the CSO role – security is becoming a question of brand and reputation. When a breach happens or data is lost the CSO is involved in the crisis response. When Sony was breached – the organization had to respond quickly with a new security architecture that would address the gaps and restore confidence. The best approach is to prevent it before it happens. -
  • #9: The CSO has to be the hero of cloud, mobile and social computing Its about providing convenient access that optimizes the business interactions with the customer and employees. Every Business has to adapt and Security is the Enabler --- Every business wants to take advantage of Cloud computing, mobile computing and social networking – but in order to unlock the opportunity the CSO will have to be the hero. 87% of IT professionals feel security is the key barrier to cloud adoption – most companies have only scratched the surface of cloud potential. While we have made great technical advances in virtualization and multi-tenancy – we can’t put our mission critical LOB apps in the cloud unless we can provide the security forensics, the compliance reporting that goes along with it. As I talk to customers I hear many stories about cloud computing projects that fail because they could not pass the audit burden, Again the opportunity is about the data and the applications If I can consolidate my apps and run my database in the cloud – I can protect all of the data in one place.If I can provision users from the enterprise into my new hybrid cloud then users can be productive If my sales team can access their customer data and generate quotes from their IPADS I can reduce my sales cycle by weeks If my employees can access email on mobile devices then I can be more responsive to customers and improve my Quality of service.I can’t do any of these things without setting the right foundation in place.
  • #10: The slide shows identity management requirements at different levels of sophistication- At the foundation we have to know who’s who across all of our applications. Providing secure authentication is next typically this is user name and password or strong authentication Slightly more sophisticated is administration because it has to be flexible to handle all of the nuances of moves adds and changes To provide compliance reporting is next in the ladder because this requires intelligence of SOD At the highest level is understanding risk- understanding patterns of behavior so we can step up authentication and authorization – and understanding what access may be risky during a certification review Finally – it has to scale to address the opportunity At the identity level – this means massive scale for numbers of users because we not only have to manage our enterprise users we have to manage our subscribers and customers. NOTE: China mobile has over 600 Million subscribers . Vodaphone in the UK has about 341 million subscribers – If we want to take advantage of opportunities in china we have to more than double our scale. So imagine if you are ATT with 100 million subscribers and you have to merge with T mobile at 34 million subscribers and you have to integrate.The authentication level – The scale is also increasing because of mobile use and social networking – with social networking I am referring to services that allow users to authenticate to get access to applications or data resources via their social networking login. Interesting stat If facebook were a country it would be the 3rd largest with double the population of the US. At the mobile level many customers are building internal application stores to provide applications to their employees. They have to be able to provide single sign on across applications. The administration has to scale to the cloudTo take advantage of the cloud – organizations have to bridge the gap between the security in the enterprise with the security in the cloud. This means delegated administration and managing moves adds and changes directly to the cloud.The audit has to scale Many customers have done their initial projects on certification review – but now need to scale the process to more applications the volume of entitlements is only increasing. Identity management has to evolve to provide
  • #11: Database security has to evolve as well to become a layered solution with a defense in depth which means multiple overlapping controls Prevent access by non-database users for data at rest, in motion, and storageIncrease database user identity assuranceStrict access control to application data even from privileged usersEnforce multi-factor authorizationAudit database activity, and create reportsMonitor database traffic and prevent threats from reaching the databaseEnsure database production environment is secure and prevent driftMask sensitive data in non-production environments
  • #12: The problem with Application and Data Security is that it is fragmented:As an example - many organizations will try to lock down root access at the OS level while at the same time granting SQL DBA privileges to developers to access the data base. Most of the audit issues and excessive access is caused by many systems and no automated way to propagate access changes across systems.Example:Lots of first generation identity management solutions or home grown solutions that have stalled or not providing enough coverage. The result is: Poor Reporting and Audit Exposure. It becomes impossible to reconcile who has access to what data and applications without a way to reconcile the information. It hurts forensics since we cant tell which accounts belong to specific users. It Makes the enterprise more vulnerable to breaches Two examples: 1. In the Wiki Leaks Scandal when they examined Bradley Manning’s access they found that his access was excessive and if regular certification reviews were done the excessive access would have been detected.2. Security is about latency of changing access consistently and quickly – and Fragmentation increases the latency of changing access. Most organizations rely on help desks to change access which can take weeks. The UBS banking fraud case describes a rogue inside trader who uses his excessive access to his advantage.The Impact is Missed Opportunities * Without a grasp on security and compliance new business initiatives stall. In many organizations new business initiatives are slowed because they can’t overcome the compliance burdens.