Download presentation
Presentation is loading. Please wait.
Published byGarey Gibbs Modified over 9 years ago
2
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management CON 8025: There and Back Again – A Journey to a Successful Deployment Matt Berzinski Principle Product Manager, Identity Management October 2, 1004
3
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Internal/Restricted/Highly Restricted3
4
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Session Introduction 4 What to expect…. 15 35 45
5
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Agenda Enabling Change in the IT Infrastructure Oracle Identity Management Panel Discussion Oracle Confidential – Internal 1 2 3
6
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Agenda Oracle Confidential – Internal 1 2 3 Enabling Change in the IT Infrastructure Oracle Identity Management Panel Discussion
7
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Accelerated Pace of Change Rapidly Evolving Opportunities in Business and Society 80% OF USER ACCESS WILL BE MOBILE BY 2020 44% OF ORGANIZATIONS PLAN TO SOCIAL ENABLE APPLICATIONS CLOUD COMPUTING WILL BECOME THE BULK OF NEW IT SPEND BY 2016 THERE WILL BE 26 BILLION CONNECTED DEVICES BY 2020
8
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Accelerated Application Proliferation Unique Identity Requirements for Each Platform Mobile Apps Cloud Apps Enterprise Apps
9
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Identity Fragmentation Disconnected Identity Solutions Create Risks and Costs User Mgt SSO User Mgt SSO Access Cert Federation App Embedded Identities Basic SSO & Provisioning Access Certification Federated Cloud Apps Mobile Apps LDAP Custom Integrations
10
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Unified Identity Management Reduce Risks, Reduce Costs and Increase Agility User Mgt SSO User Mgt SSO Access Cert Federation App Embedded Identities Basic SSO & Provisioning Access Certification Federated Cloud Apps Mobile Apps LDAP 48% COST SAVINGS 46% MORE RESPONSIVE 35% FEWER AUDIT DEFCIENCIES Source: Aberdeen “Analyzing Point Solutions vs. Platform” 2011 Unified Identity Management
11
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Supporting the rapid adoption of cloud applications Securing the mobile experience Controlling and auditing access to privileged accounts and systems Reducing the number of moving parts to simplify Identity Management Identity Management Challenges
12
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Agenda Oracle Confidential – Internal 1 2 3 Enabling Change in the IT Infrastructure Oracle Identity Management Panel Discussion
13
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Scale to Support Cloud and Mobile Initiatives Prevent Audit Exposure With Complete Identity Governance Enhance User Experience with Seamless and Secure Access Basic IdM Advanced IdM Single App Multiple Cloud, Mobile and Enterprise Apps Paths to Unifying Enterprise Identity Management Provisioning Single Sign-On Directory
14
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | The New Identity Paradigm Identity Governance Access Management Directory Services
15
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management Unifying Enterprise Identity Management Modular and Unified Best of Breed Internet/Mobile Scale Open Standards Context Aware Risk Management
16
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Mobile Security – Mobile Application Management – Mobile Device Management – Mobile Access Management – API Security Identity Governance – Access Request – Access Governance – Automated Provisioning – Privileged Account Management Access Management – Authentication – Authorization – Audit – Federation – Mobile Authenticator Directory Services – Enterprise Directory – Cloud/Mobile App Directory – Virtual Directory Oracle Identity Management
17
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Agenda Oracle Confidential – Internal 1 2 3 Enabling Change in the IT Infrastructure Oracle Identity Management Panel Discussion
18
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Planning an IDM Deployment can be complicated What are the Pre-Requisites? What are my Architectural Requirements? Do I have a test Plan? Can this be done in phases? What is the desired end state? What defines success? Oracle Confidential – Internal
19
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Partner Panelists Andrew MorrisonAlex Bolante Viresh GargAaron Perry Oracle Confidential – Internal
20
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Q&A Session 20
21
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted21 Complimentary eBook Register Now www.mhprofessional.com/mobsec
22
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted22 Join the Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle IdM Website oracle.com/Identity
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.