securing mobile device access

24
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1 Securing Mobile Device Access Artur Alves Solution Architect - IAM EMEA Presales Specialists Group

Upload: artur-alves

Post on 11-May-2015

539 views

Category:

Technology


0 download

DESCRIPTION

OracleDay PT 2013 - Securing Mobile Device Access by Artur Alves

TRANSCRIPT

Page 1: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.1

Securing Mobile Device Access

Artur AlvesSolution Architect - IAMEMEA Presales Specialists Group

Page 2: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

Page 3: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3

AGENDA

The New Experience

More Devices Than We Can Predict

New Requirements

Case Studies

A Mobile Identity Architecture

Page 4: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4

Page 5: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5

Page 6: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6

The Internet of things

Page 7: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7

The Internet of things

Page 8: Securing Mobile Device Access

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.8

IntegrationInternalUsers Only

Not Scaleable

Proprietary

MaintenancePoint 2 Point Fragmentation

Cu

stom

Inflexible

Brittle

RigidLegacy

First Generation

VPN Based

Hard Coded

Status Quo

Slow

Client Server

Expensive

Page 9: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9

CHANGING MOBILE APPLICATION DEMANDS

EMPLOYEEOWNED DEVICES

LIMITED POWER & STORAGE

DESIGNED FOR WIRELESS & 3G

Page 10: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10

CHALLENGES for MOBILE APPLICATIONS

Page 11: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11

76% 10%

Page 12: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.12

Page 13: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.13

Page 14: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.14

Situation: Increasing productivity and providing store managers with better business analytics on the go.

Challenge: Providing access on IPads to 2200 store managers across North America

Solution: Deploy Oracle Access Management 11g R2 to provide access management for apps deployed on IPads.

Result: Improved manager satisfaction, Improved productivity by providing application access anytime and anywhere.

Reduce Cost & Increase Security

SuperValu Deploys 2,200 Pads with Oracle Identity

Page 15: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.15

VIRGIN MEDIA CASE STUDY VIDEO

Page 16: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.16

Using enterprise SSO accountUsing social network account (OAuth)

Page 17: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.17

Page 18: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.18

Page 19: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.19

Page 20: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.20

IDENTITY

PASSWORD RESET

PASSWORD VAULT

ACCESS REQUEST

PROVISIONING

ROLE MINING

ATTESTATION

SEPARATION OF DUTIES

ACCESS

WEB SSO

MOBILE,SOCIAL

EXTERNAL AUTH

SOA SECURITY

INTEGRATED SSO

TOKEN SERVICES

API GATEWAY

DIRECTORY

LDAP STORAGE

VIRTUAL DIRECTORY

META DIRECTORY

PLATFORM SECURITY SERVICES

SECURING THE NEW DIGITAL EXPERIENCE

Page 21: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.21

46%Cost Savings

Source: Aberdeen “Analyzing point solutions vs. platform” 2011

48%More Responsive

35% Fewer Audit Deficiencies

Page 22: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.22

Page 23: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.23

FOR MORE INFORMATION

OracleIDMOracleIDM OracleIDMOracleIDMblogs.oracle.com/blogs.oracle.com/

OracleIDMOracleIDM OracleIDMOracleIDM YouTube/OracleYouTube/Oracle

Visit us at: oracle.com/identity

Page 24: Securing Mobile Device Access

Copyright © 2013, Oracle and/or its affiliates. All rights reserved.24

Thank you :-)