Securing Corporate Applications and Data on Personal DevicesOracle Mobile Oracle Mobile Security Strategy Security Strategy and Overviewand OverviewOracle Mobile Oracle Mobile Security Strategy Security Strategy and Overviewand Overview
Khanh LeEnterprise Security Sales Manager
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Apr, 2015
Securing Corporate Applications and Data on Personal Devices
and Overviewand Overviewand Overviewand Overview
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 3
Program Agenda
1 New Mobile Security Requirements
2
3
New Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
New Mobile Security RequirementsNew Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 4
Program Agenda with Highlight
1 New Mobile Security Requirements
2
3
New Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Program Agenda with Highlight
New Mobile Security RequirementsNew Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 5
113 PHONES STOLEN113 PHONES STOLENEvery minute in the US
50%Robberies
SFO
40%Robberies
NYC
28%Robberies
London40%RobberiesEcuador
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Huffington Post Oct 2014
14M phones stolenEcuador, Bolivia,Colombia, Peru
GSMA 2014
Insight Crime 2014
$30B113 PHONES STOLEN113 PHONES STOLEN
Every minute in the US
SMARTPHONE
BLACK MARKET
$30B
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
5 0 % W I T H O U T
USE PERSONAL DEVICES FOR WORK
Of Employers
CSO Online May 11 2014
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
W I T H O U T P E R M I S S I O N
USE PERSONAL DEVICES FOR WORK
Reported fake link & phishing scams 31%
Mobile Malware and Fraud
31%
2014155%
Norton Cybercrime report 2014
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
2014155%
MOBILE MALWARE GROWTHMobile Threat report 2014
fake link & phishing scams on mobile devices
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
2014614%
MOBILE MALWARE GROWTH
NEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTS
• BYOD
• Device management
• Identity management
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014, Oracle and/or its affiliates. All rights reserved.
• Secure container
• Sign-on
NEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTS
• Application management
• Fraud detection
• Device provisioning
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
• Multi-user devices
• Lost & stolen devices
Program Agenda with Highlight
1 New Mobile Security Requirements
2
3
New Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Program Agenda with Highlight
New Mobile Security RequirementsNew Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 10
CONTAINER CONTROL
Oracle’s Mobile Security Suite Strategy
Isolate corporate data, support remote wipe, restrict data transfer
Secure applications & communication, corporate
application store
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |11
restrict data transfer application store
MOBILE SECURITY MOBILE SECURITY
EXPERIENCECONTROL
Oracle’s Mobile Security Suite Strategy
Secure applications & communication, corporate
application store
Role based access, self service request, sign-on,
fraud detection
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
application store fraud detection
MOBILE SECURITY MOBILE SECURITY SUITESUITE
SECURE
Container Applications
SECUREBROWSER
WHITEPAGES
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
THIRD PARTY APPLICATIONS
FILE DOCUMENTFILEMANAGER
DOCUMENTEDITOR
MAILMANAGER(ADD ON)
APPLICATIONCATALOG
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
(ADD ON)
+MORE
CORPORATE
DELETEDELETECONTAINER
REMOTE
WIPE
CORPORATE
PERSONAL
PRESERVEPRESERVE
CONTAINER
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
PERSONAL& MESSAGES
CORPORATE DATA, APPLICATIONS & EMAIL
DELETEDELETECORPORATE DATA, APPLICATIONS & EMAIL
PERSONAL APPLICATIONS, PICTURES, EMAIL
PRESERVEPRESERVE
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
PERSONAL APPLICATIONS, PICTURES, EMAIL & MESSAGES
COPY/PASTE
PRINTING
COPY/PASTE
AIRDROP/DROPBOX
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
DATA DATA LEAK LEAK PREVENTIONPREVENTION
AIRDROP/DROPBOX
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
PREVENTIONPREVENTION
LOCATION TIME DEVICE
50+ Policy Parameters
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
DEVICE USER/GROUP DATA
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
IDENTITY GOVERNANCE
ENTERPRISE &MOBILE & SOCIAL
SIGN-ON
ACCESS REQUEST
Integrated Platform
GOVERNANCE
OPERATING SYSTEMS
DIRECTORYSERVICES
APPS
APPLICATIONS
COMMON REPOSITORY
DATABASES SINGLE USERVIEW
REQUEST
ENTITLEMENTCATALOG PRIVILEGED
ACCOUNTMANAGEMENT
ACCESS CERTIFICATION
PRIVILIGEDACCOUNTS
USERPROVISIONING
CERTIFICATIONREVIEW
ACCESSREQUEST
APPLICATION STORE
FRAUD
APPS APP
S APPS APP
MOBILE SECURITY
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
FRAUD DETECTION
S APPS
MOBILE SECURITY SUITE
SELF SERVICE
ACCESS MANAGEMENT
IDENTITYFEDERATION
EXTERNALAUTHORIZATION
ENTERPRISE &WEB SINGLE
SIGN-ON
FRAUDDETECTION
EMPLOYEESCONTRACTORS& PARTNERS
CUSTOMERS& PROSPECTS
USERAUTHENTICATION
LOCATIONDATA
EXTREMESCALE
LOWTCO
INTEGRATEDINTEROPERABLE
DEVICEAUTHN
NAMING SERVICES
HOST ACCESSCONTROL
APP
THOUSANDS MILLIONS BILLIONS 10s of BILLIONS
VIRTUALDIRECTORY
METADIRECTORY
LDAPDIRECTORY
DATA LEAKPREVENTION
SECUREWORKSPACE
MOBILE SECURITY
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
DIRECTORY SERVICESMOBILE SECURITY SUITE
SINGLE SIGN ON
APP
SIGN ON
Cost Savings48% TAKING A
46%Cost Savings48%More Responsive
35% Fewer Audit Deficiencies
REDUCES
INCREASES
IMPROVES
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
35%
TAKING A
REDUCES
INCREASES
IMPROVES
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Program Agenda with Highlight
1 New Mobile Security Requirements
2
3
New Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Program Agenda with Highlight
New Mobile Security RequirementsNew Mobile Security Requirements
Oracle Mobile Security Suite
Product Demonstration
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 18
Demo: User ExperienceiPad BYOD
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Secure ContainerLog-in Screen
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Secure ContainerContainer Home Screen
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Secure Email ClientActive-Sync Clinet
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Access On-Premise SharePointWith String Authentication
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Premise SharePoint
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Built-in CatalogInstall corporate-apps, links to docs, web apps
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Admin Control panelAdmin View
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
PoliciesAuthentication
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
PoliciesContainer Policies
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
For More Information
Twitter Facebook BlogsTwitter Facebook Blogs
Visit: http://www.oracle.com/mobile
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Visit: http://www.oracle.com/mobile
Blogs LinkedIn YouTubeBlogs LinkedIn YouTube
http://www.oracle.com/mobile
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
http://www.oracle.com/mobile
28