Presentation is loading. Please wait.

Presentation is loading. Please wait.

Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.

Similar presentations


Presentation on theme: "Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014."— Presentation transcript:

1

2 Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014 Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. |

3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Internal/Restricted/Highly Restricted3

4 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Oracle Solution Chevron Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted4 Agenda 5

5 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | The Extended Enterprise 80 % OF USER ACCESS WILL BE MOBILE BY % OF ORGANIZATIONS PLAN TO SOCIAL ENABLE APPLICATIONS CLOUD COMPUTING WILL BECOME THE BULK OF NEW IT SPEND BY 2016 THERE WILL BE 26 BILLION CONNECTED DEVICES BY 2020 Unique Identity Requirements for Each Platform

6 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Trends 81.9% of companies across the globe believe BYOD is an appropriate strategy for their business Three Top barriers to mobility: 1.Security controls 2.Legacy systems 3.Multiple OS’s Future Mobile Focus: 38% external customers 26% employees 23% senior managers 6 Source: CIO SurveyySource: Citrix Source: Current Analysis Global workforce will be mobile by 2016 Source: Gartner 40 %

7 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Challenges Time spent on mobile security projects Multiple point solutions 93 % Concerned with data loss and other mobile breaches 113 phones stolen/min in US Malware rose by 197% Store credentials on the device 10% store password in clear text Use Personal Devices at work 50% Without Permission of Employers 90% not “fully aware” of devices connected to network 7 Source: Mobile Business Statistics, CSO Online 2014 Source: Information Week 2011 Source: CIO Survey 2014, Insight Crime 2014Source: Triangle Research Survey /3 76 % 89 %

8 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Monolithic & Fragmented Proprietary & Inconsistent Un-auditable & Un-reportable Costly & Complex State of Mobile Security Today

9 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Identity Fragmentation Disparate User stores Inconsistent Access Policies Reduced User Experience Risk-prone Custom Integrations Costly Compliance Enforcement User Mgt SSO Federation App Embedded Identities SSO, Adaptive Access & Provisioning Federated Cloud Apps LDAP Custom Integrations Mobile Device Management LDAP Mobile Application Management

10 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Oracle Solution Chevron Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted10 Agenda 5

11 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Strategies for the New Digital Economy Identify the right solution Separate personal and corporate data Extend corporate identity to mobile apps Mitigate threats pre-emptively Simplify user experience Restore IT control while maintaining user privacy Mobile Security

12 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted12 Lock down the phone and treat it as a corporate asset – no personal data Purpose built, company owned, shared devices Determine the right solution based on your needs Device Management, Application Management or Hybrid Create a secure container that separates corporate data and apps from personal data and apps. Company Owned Personally Enabled (COPE), BYOD Control Mobile Device Management Mobile Application Management

13 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Separate Personal and Corporate Data Separate, protect and wipe corporate applications and data on mobile devices Enforce policies to restrict data movement Enable “Business Desktop” for access to apps, applications, files and Encrypt data-at-rest, in-transit and in-use Monitor exceptions and remediate violations Enforce controls without coding for security Secure Container

14 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Leverage Identity Platform for Mobile Enforce Consistent Policies Access Directory Location Data Centralized Auth Device & User Data Access Single-Sign On AuthN protocols Strong AuthN Mobile Mobile Device Mgmt Mobile App Mgmt Mobile Access Mgmt

15 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Mitigate threats pre-emptively by becoming context aware Trust but Verify POINT Location aware Device aware Time aware Risk aware Historical behavior

16 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Simplify user experience without compromising security Social & Single sign-on Trust Risk REST API OAuth iOS Android

17 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Improve Scale by Simplifying Administration Know Your Users, their Devices and Privileges – Restore Control Administrators Applications Cart Access on demand Unified console Simplify deployment Reduce audit exposure Improve visibility

18 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Oracle Solution Chevron Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted18 Agenda 5

19 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management Mobile Security Access Management Governance Access Request Access Governance Automated Provisioning Privileged Account Management Directory Enterprise Directory Cloud/Mobile App Directory Virtual Directory Authentication Authorization Audit Federation Mobile App Management Mobile Device Management Mobile Access Management Open, Integrated and Best of Breed

20 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted20 Device Management Application Management Secure Container Secure Communication Oracle Mobile Security Solution Comprehensive Enterprise Mobility Management Web and Native App SSO Corporate App Store Productivity Apps Unified Self-Service Console Secure Data & Access Simplify User Experience Restore Control Governance & Compliance Strong Authentication API Security RESTful Identity Services

21 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Oracle Solution Chevron Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted21 Agenda 5

22 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Oracle Solution Chevron Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted22 Agenda 5

23 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 2014 ORACLE FUSION MIDDLEWARE INNOVATION ORACLE FUSION MIDDLEWARE: CELEBRATE THIS YEAR'S MOST INNOVATIVE CUSTOMER SOLUTIONS Innovation Awards Ceremony set for: Tuesday, September 30, :00-5:45pm in the LAM Research Theater (Session ID: CON7029)

24 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted24 Complimentary eBook Register Now

25 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted25 Join the Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle IdM Website oracle.com/Identity

26 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted26

27


Download ppt "Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014."

Similar presentations


Ads by Google