securing corp: securing-corporateorate applicationsanddata on personaldevices final

29

Upload: nguyen-ngoc-minh

Post on 14-Dec-2015

223 views

Category:

Documents


1 download

DESCRIPTION

: Securing-Corporate

TRANSCRIPT

Securing Corporate Applications and Data on Personal DevicesOracle Mobile Oracle Mobile Security Strategy Security Strategy and Overviewand OverviewOracle Mobile Oracle Mobile Security Strategy Security Strategy and Overviewand Overview

Khanh LeEnterprise Security Sales Manager

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Apr, 2015

Securing Corporate Applications and Data on Personal Devices

and Overviewand Overviewand Overviewand Overview

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Safe Harbor Statement

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 3

Program Agenda

1 New Mobile Security Requirements

2

3

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

New Mobile Security RequirementsNew Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 4

Program Agenda with Highlight

1 New Mobile Security Requirements

2

3

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda with Highlight

New Mobile Security RequirementsNew Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 5

113 PHONES STOLEN113 PHONES STOLENEvery minute in the US

50%Robberies

SFO

40%Robberies

NYC

28%Robberies

London40%RobberiesEcuador

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Huffington Post Oct 2014

14M phones stolenEcuador, Bolivia,Colombia, Peru

GSMA 2014

Insight Crime 2014

$30B113 PHONES STOLEN113 PHONES STOLEN

Every minute in the US

SMARTPHONE

BLACK MARKET

$30B

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

5 0 % W I T H O U T

USE PERSONAL DEVICES FOR WORK

Of Employers

CSO Online May 11 2014

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

W I T H O U T P E R M I S S I O N

USE PERSONAL DEVICES FOR WORK

Reported fake link & phishing scams 31%

Mobile Malware and Fraud

31%

2014155%

Norton Cybercrime report 2014

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

2014155%

MOBILE MALWARE GROWTHMobile Threat report 2014

fake link & phishing scams on mobile devices

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

2014614%

MOBILE MALWARE GROWTH

NEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTS

• BYOD

• Device management

• Identity management

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014, Oracle and/or its affiliates. All rights reserved.

• Secure container

• Sign-on

NEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTSNEW MOBILE SECURITY REQUIREMENTS

• Application management

• Fraud detection

• Device provisioning

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

• Multi-user devices

• Lost & stolen devices

Program Agenda with Highlight

1 New Mobile Security Requirements

2

3

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda with Highlight

New Mobile Security RequirementsNew Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 10

CONTAINER CONTROL

Oracle’s Mobile Security Suite Strategy

Isolate corporate data, support remote wipe, restrict data transfer

Secure applications & communication, corporate

application store

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |11

restrict data transfer application store

MOBILE SECURITY MOBILE SECURITY

EXPERIENCECONTROL

Oracle’s Mobile Security Suite Strategy

Secure applications & communication, corporate

application store

Role based access, self service request, sign-on,

fraud detection

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

application store fraud detection

MOBILE SECURITY MOBILE SECURITY SUITESUITE

SECURE

Container Applications

SECUREBROWSER

WHITEPAGES

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

THIRD PARTY APPLICATIONS

FILE DOCUMENTFILEMANAGER

DOCUMENTEDITOR

MAILMANAGER(ADD ON)

APPLICATIONCATALOG

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

(ADD ON)

+MORE

CORPORATE

DELETEDELETECONTAINER

REMOTE

WIPE

CORPORATE

PERSONAL

PRESERVEPRESERVE

CONTAINER

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PERSONAL& MESSAGES

CORPORATE DATA, APPLICATIONS & EMAIL

DELETEDELETECORPORATE DATA, APPLICATIONS & EMAIL

PERSONAL APPLICATIONS, PICTURES, EMAIL

PRESERVEPRESERVE

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PERSONAL APPLICATIONS, PICTURES, EMAIL & MESSAGES

EMAIL

COPY/PASTE

PRINTING

COPY/PASTE

AIRDROP/DROPBOX

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

DATA DATA LEAK LEAK PREVENTIONPREVENTION

AIRDROP/DROPBOX

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PREVENTIONPREVENTION

LOCATION TIME DEVICE

50+ Policy Parameters

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

DEVICE USER/GROUP DATA

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

IDENTITY GOVERNANCE

ENTERPRISE &MOBILE & SOCIAL

SIGN-ON

ACCESS REQUEST

Integrated Platform

GOVERNANCE

OPERATING SYSTEMS

DIRECTORYSERVICES

APPS

APPLICATIONS

COMMON REPOSITORY

DATABASES SINGLE USERVIEW

REQUEST

ENTITLEMENTCATALOG PRIVILEGED

ACCOUNTMANAGEMENT

ACCESS CERTIFICATION

PRIVILIGEDACCOUNTS

USERPROVISIONING

CERTIFICATIONREVIEW

ACCESSREQUEST

APPLICATION STORE

FRAUD

APPS APP

S APPS APP

MOBILE SECURITY

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

FRAUD DETECTION

S APPS

MOBILE SECURITY SUITE

SELF SERVICE

ACCESS MANAGEMENT

IDENTITYFEDERATION

EXTERNALAUTHORIZATION

ENTERPRISE &WEB SINGLE

SIGN-ON

FRAUDDETECTION

EMPLOYEESCONTRACTORS& PARTNERS

CUSTOMERS& PROSPECTS

USERAUTHENTICATION

LOCATIONDATA

EXTREMESCALE

LOWTCO

INTEGRATEDINTEROPERABLE

DEVICEAUTHN

NAMING SERVICES

HOST ACCESSCONTROL

APP

THOUSANDS MILLIONS BILLIONS 10s of BILLIONS

VIRTUALDIRECTORY

METADIRECTORY

LDAPDIRECTORY

DATA LEAKPREVENTION

SECUREWORKSPACE

MOBILE SECURITY

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

DIRECTORY SERVICESMOBILE SECURITY SUITE

SINGLE SIGN ON

APP

SIGN ON

Cost Savings48% TAKING A

46%Cost Savings48%More Responsive

35% Fewer Audit Deficiencies

REDUCES

INCREASES

IMPROVES

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

35%

TAKING A

REDUCES

INCREASES

IMPROVES

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Source: Aberdeen “Analyzing point solutions vs. platform” 2011

Program Agenda with Highlight

1 New Mobile Security Requirements

2

3

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda with Highlight

New Mobile Security RequirementsNew Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 18

Demo: User ExperienceiPad BYOD

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Secure ContainerLog-in Screen

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Secure ContainerContainer Home Screen

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Secure Email ClientActive-Sync Clinet

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Access On-Premise SharePointWith String Authentication

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Premise SharePoint

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Built-in CatalogInstall corporate-apps, links to docs, web apps

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Admin Control panelAdmin View

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PoliciesAuthentication

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

PoliciesContainer Policies

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

For More Information

Twitter Facebook BlogsTwitter Facebook Blogs

Visit: http://www.oracle.com/mobile

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Visit: http://www.oracle.com/mobile

Blogs LinkedIn YouTubeBlogs LinkedIn YouTube

http://www.oracle.com/mobile

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

http://www.oracle.com/mobile

28

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |