SlideShare a Scribd company logo
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
CON 8810 Who Should Have
Access to What – Better Risk
Management with Identity
Governance
Neil Gandhi
Product Manager
Oracle Identity Governance

2

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decision. The development, release, and timing of any features or

functionality described for Oracle’s products remains at the sole
discretion of Oracle.

3

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Session Goals
 Understand the current market trends regarding Access Compliance

and Risk Management
 Realize the benefits of an Identity Governance platform and how it can
help meet your everyday Compliance and Risk Management
challenges
 Hear from and engage with customers regarding their experiences with
managing Risk by implementing an Identity Governance solution

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Program Agenda
 Market Trends
 Risk Management & Compliance with Oracle Identity

Governance
 Panel Discussion
 Q&A

5

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Market Trends

6

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Explosion of Scale

• Few Administrators
• Handful of Audit Staff
• Too many privileged accounts
7

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Getting the right access is hard

8

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Market Trends
Compliance Requires Business User Participation
 Increasing volume and frequency of

employee access certifications
 Business Users do not understand what

they are attesting to
 IT and Compliance teams struggle with

“Who should have access to what”

9

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Enterprise Certification Requirements
Who’s who & what can they do?
Extract
Entitlement
s
Ad Hoc

10

Review
Entitlement
s
Complex

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Correlate
Results

Remediate
Access

Un-auditable

Non-verifiable
Market Trends
Scale requirements are increasing

Corp PCs
400M
Enterprise

Facebook
800M
Social

China
1.3B
Citizen

Cell Phones
5B +
Mobile

Moving from employee to massive scale for even small companies.

11

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Risk Management &
Compliance with Oracle
Identity Governance

12

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Governance
Governance Platform

Connectors

Provision

De-Provision

Grant User Access

Monitor User Access

Privileged
Account
Request

Access
Request

Role
Lifecycle
Management

Roles

Check-in/
Checkout

Identity
Certifications

Access Catalog

IT Audit
Monitoring

Rogue
Detection &
Reconciliation

Ownership, Risk & Audit Objectives

Entitlements
Accounts
Glossaries

13

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Reporting &
Privileged
Access
Monitoring

Catalog Management
Oracle Identity Governance
Access Catalog

Harvesting

Catalog
Definition

Catalog
Enrichment

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Manager
Provisioning with Preventative SOD Controls

15

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
A Smarter Approach to Identity Compliance
Reduce
Cost, Time & Risk

$
Identity
Warehouse

Aggregating
Information &
Building a
Catalog

16

Prioritizing &
Automating
Certification

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Closed-Loop
Feedback &
Remediation

Simplified User
Experience &
Reporting
Automate Identity Based Controls
1

Set Up
Periodic
Review

2

Reviewer Is Notified
Goes to Self Service

3

Automated Action

is taken based on
Periodic Review

4

Report Built
And Results

Stored in DB

Reviewer Selections
What Is
Reviewed?

Certify

Reject

Who Reviews
It?

Decline

Email Result
to User

Automatically
Terminate User via
Closed Loop
Remediation

Notify the
Process Owner

Archive
Delegate

Start When?
How Often?

17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Notify Delegated
Reviewer

Attested Data
Attestation Actions
Delegation Paths

Comments
Oracle Identity Manager 11g R2
Provisioning Context with Identity Auditor

18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Focusing on What (Who) Matters Most

High Risk
 Leverage data collected to streamline access certification
 Prioritize certifications based on user risk profiles
 Aggregate risk profile over the ENTIRE lifecycle

19

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Risk Based Certification
Identity Warehouse

Applications

Risk Factors
Identity Data
Sources
DB
Roles

Certification
History

Entitlements

Mainframe

Provisioning
Events

Resources

Risk Aggregation

Low Risk User
Bulk Certify

High Risk User
Cert360

Approve
Reject
Focused
Sign-off

20

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Policy
Violations
Automate The Remediation
Entitlement
Report

Entitlement
Review
AutoRemediate

21

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

• Focus Loop Remediation
Close on Large Scale
• Quick Extract Desk Volume
Reduce Help Transform Load
• Rolling Certifications
Complete Audit Trail
• Rolling Data Import
Increase Throughput
• Large Volume Remediation
Customer Panel Discussion

22

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Customer Panel

Patrick Landry

23

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

David Mathias

Robert House
Demo Pods
Moscone South

Oracle Identity
Governance Suite:
Managing
Privileged Accounts
from Your Identity
Platform

24

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Moscone South

Oracle Identity
Governance Suite:
Complete Identity
Lifecycle
Management

Moscone South

Identity
Management
Monitoring with
Oracle Enterprise
Manager
Sessions Not to Miss
Tuesday
10:30 am – 11:30am

• CON8811: Converged Identity
Governance for Speeding up Business
and Reducing Cost

Moscone West, Room 2018

• Justifying and Planning a Successful
Identity Management Upgrade

Moscone West, Room 2018

Wednesday
1.15 pm – 2.15 pm

25

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Join the Oracle Community
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Oracle Blogs
Blogs.oracle.com/OracleIDM

Oracle.com/Identity

26

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Innovation Awards
18 Winners Across Eight Categories

Lam Research Theater (Next to Moscone North)
Session ID: CON8082
Session Title: Oracle Fusion Middleware: Meet This
Year’s Most Impressive Innovators
Venue / Room: YBCA - Lam Research Theater
Date and Time: Monday Sep 23, 4:45 - 5:45 p.m.

27

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

28

Cloud Application
Foundation

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise
Management

 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
29

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
30

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

More Related Content

PDF
Hitachi ID Identity and Access Management Suite
PDF
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
PDF
Identity and Access Management Tools
PDF
Hexnode Identity and Access Management solution
PPTX
Cloud identity access management market
PDF
AWS Identity Access Management
PDF
Large Scale User Provisioning with Hitachi ID Identity Manager
PPTX
Intel IT's Identity and Access Management Journey
Hitachi ID Identity and Access Management Suite
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Identity and Access Management Tools
Hexnode Identity and Access Management solution
Cloud identity access management market
AWS Identity Access Management
Large Scale User Provisioning with Hitachi ID Identity Manager
Intel IT's Identity and Access Management Journey

What's hot (19)

PPTX
Identity and Access Management (IAM)
PPTX
Identity & access management
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PPTX
Identity and Access Management Introduction
PDF
IdM Reference Architecture
PPTX
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
PDF
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
PDF
Cloud computing identity management summary
PPTX
Identiverse 2021 enterprise identity: What foundations
PDF
Identity Management for the 21st Century IT Mission
PDF
IDENTITY ACCESS MANAGEMENT
PDF
Identity and Access Management (IAM)
PPTX
5 reasons your iam solution will fail
PPTX
Identity and Access Management (IAM): Benefits and Best Practices 
PPTX
Tuebora Self Driven IAM
PDF
Mt26 identity management as a service
PDF
Intelligence Driven Identity and Access Management
 
PDF
Identity & Access Management by K. K. Mookhey
Identity and Access Management (IAM)
Identity & access management
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Identity and Access Management Introduction
IdM Reference Architecture
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
Cloud computing identity management summary
Identiverse 2021 enterprise identity: What foundations
Identity Management for the 21st Century IT Mission
IDENTITY ACCESS MANAGEMENT
Identity and Access Management (IAM)
5 reasons your iam solution will fail
Identity and Access Management (IAM): Benefits and Best Practices 
Tuebora Self Driven IAM
Mt26 identity management as a service
Intelligence Driven Identity and Access Management
 
Identity & Access Management by K. K. Mookhey
Ad

Viewers also liked (20)

PDF
The Implementation of CSR in European Football by Geoff Walters
PDF
Indias gift to_the_world_2_epdf
PPT
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
DOCX
Guión ingles
PDF
World Renaissance Nov 2011
PDF
Our GBU bioepistemological educational project (BEEMP)
PDF
Nltrv55
PDF
Imperia esfera gurgaon 37 c Imperia 7428424386
PDF
affTA03 - BAB III
PDF
affTA00 - Cover dan Daftar
PPT
PPTX
Early national literature
KEY
PPT
SEO再入門
PPTX
Post new korean cinema
PPTX
Middle Ages/Canterbury Tales
PPTX
Mff715 w1 2_generating_researchideas_fall11
PPS
философия возраста
PPTX
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
PDF
Celiac disease from gut to brain
The Implementation of CSR in European Football by Geoff Walters
Indias gift to_the_world_2_epdf
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
Guión ingles
World Renaissance Nov 2011
Our GBU bioepistemological educational project (BEEMP)
Nltrv55
Imperia esfera gurgaon 37 c Imperia 7428424386
affTA03 - BAB III
affTA00 - Cover dan Daftar
Early national literature
SEO再入門
Post new korean cinema
Middle Ages/Canterbury Tales
Mff715 w1 2_generating_researchideas_fall11
философия возраста
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Celiac disease from gut to brain
Ad

Similar to Con 8810 who should have access to what - final (20)

PPTX
Con8811 converged identity governance for speeding up business and reducing c...
PDF
Self Service Access Control - Help Yourself to More Productivity
PPTX
Oracle Identity Governance - Customer Presentation
PPTX
Con8828 justifying and planning a successful identity management upgrade final
PDF
Oracle Identity & Access Management
PPTX
Con8808 enabling business growth in the new economy final
PPTX
Overview of Oracle Identity Management - Customer Presentation
PPTX
Con8819 context and risk aware access control any device any where - final
PPTX
Round table guide
PDF
ING webcast platform
PPTX
Con8837 leverage authorization to monetize content and media subscriptions ...
PDF
Oracle Identity Governance Technical Overview - 11gR2PS3
PDF
Integrating Enterprise Controls with the Cloud
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPT
Iam suite introduction
PDF
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
PPTX
IDSA at Charlotte IAM Meetup
PDF
B4 the identity of things-securing the internet of everything
PPTX
Oracle Access Management - Customer presentation
PDF
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
Con8811 converged identity governance for speeding up business and reducing c...
Self Service Access Control - Help Yourself to More Productivity
Oracle Identity Governance - Customer Presentation
Con8828 justifying and planning a successful identity management upgrade final
Oracle Identity & Access Management
Con8808 enabling business growth in the new economy final
Overview of Oracle Identity Management - Customer Presentation
Con8819 context and risk aware access control any device any where - final
Round table guide
ING webcast platform
Con8837 leverage authorization to monetize content and media subscriptions ...
Oracle Identity Governance Technical Overview - 11gR2PS3
Integrating Enterprise Controls with the Cloud
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Iam suite introduction
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
IDSA at Charlotte IAM Meetup
B4 the identity of things-securing the internet of everything
Oracle Access Management - Customer presentation
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance

More from OracleIDM (20)

PPTX
Con9573 managing the oim platform with oracle enterprise manager
PPTX
Con9024 next generation optimized directory - oracle unified directory - final
PPTX
Con8902 developing secure mobile applications-final
PPTX
Con8896 securely enabling mobile access for business transformation - final
PPTX
Con8836 leveraging the cloud to simplify your identity management implement...
PPTX
Con8834 bring your own identity - final
PPTX
Con8833 access at scale for hundreds of millions of users final
PPTX
Con8823 access management for the internet of things-final
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
PPTX
Opening remarks-dave-profozichv2
PPTX
Innovations dbsec-12c-pub
PPTX
Identityofthings amitjasuj av10
PDF
Identityofthings amitjasuj av10
PDF
Sun2 oracle avea's identity management platform transformation
PPT
Healthcare it consolidated
PPTX
Trends gartner iam-amit12-4-12-v1
PPTX
Trends gartner iam-amit12-4-12
PPTX
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
PPTX
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Con9573 managing the oim platform with oracle enterprise manager
Con9024 next generation optimized directory - oracle unified directory - final
Con8902 developing secure mobile applications-final
Con8896 securely enabling mobile access for business transformation - final
Con8836 leveraging the cloud to simplify your identity management implement...
Con8834 bring your own identity - final
Con8833 access at scale for hundreds of millions of users final
Con8823 access management for the internet of things-final
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8813 securing privileged accounts with an integrated idm solution - final
Opening remarks-dave-profozichv2
Innovations dbsec-12c-pub
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
Sun2 oracle avea's identity management platform transformation
Healthcare it consolidated
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy

Recently uploaded (20)

PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
GamePlan Trading System Review: Professional Trader's Honest Take
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx

Con 8810 who should have access to what - final

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 2. CON 8810 Who Should Have Access to What – Better Risk Management with Identity Governance Neil Gandhi Product Manager Oracle Identity Governance 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 3. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Session Goals  Understand the current market trends regarding Access Compliance and Risk Management  Realize the benefits of an Identity Governance platform and how it can help meet your everyday Compliance and Risk Management challenges  Hear from and engage with customers regarding their experiences with managing Risk by implementing an Identity Governance solution 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. Program Agenda  Market Trends  Risk Management & Compliance with Oracle Identity Governance  Panel Discussion  Q&A 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. Market Trends 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 7. Explosion of Scale • Few Administrators • Handful of Audit Staff • Too many privileged accounts 7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 8. Getting the right access is hard 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 9. Market Trends Compliance Requires Business User Participation  Increasing volume and frequency of employee access certifications  Business Users do not understand what they are attesting to  IT and Compliance teams struggle with “Who should have access to what” 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 10. Enterprise Certification Requirements Who’s who & what can they do? Extract Entitlement s Ad Hoc 10 Review Entitlement s Complex Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Correlate Results Remediate Access Un-auditable Non-verifiable
  • 11. Market Trends Scale requirements are increasing Corp PCs 400M Enterprise Facebook 800M Social China 1.3B Citizen Cell Phones 5B + Mobile Moving from employee to massive scale for even small companies. 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 12. Risk Management & Compliance with Oracle Identity Governance 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 13. Oracle Identity Governance Governance Platform Connectors Provision De-Provision Grant User Access Monitor User Access Privileged Account Request Access Request Role Lifecycle Management Roles Check-in/ Checkout Identity Certifications Access Catalog IT Audit Monitoring Rogue Detection & Reconciliation Ownership, Risk & Audit Objectives Entitlements Accounts Glossaries 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Reporting & Privileged Access Monitoring Catalog Management
  • 14. Oracle Identity Governance Access Catalog Harvesting Catalog Definition Catalog Enrichment 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 15. Oracle Identity Manager Provisioning with Preventative SOD Controls 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 16. A Smarter Approach to Identity Compliance Reduce Cost, Time & Risk $ Identity Warehouse Aggregating Information & Building a Catalog 16 Prioritizing & Automating Certification Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Closed-Loop Feedback & Remediation Simplified User Experience & Reporting
  • 17. Automate Identity Based Controls 1 Set Up Periodic Review 2 Reviewer Is Notified Goes to Self Service 3 Automated Action is taken based on Periodic Review 4 Report Built And Results Stored in DB Reviewer Selections What Is Reviewed? Certify Reject Who Reviews It? Decline Email Result to User Automatically Terminate User via Closed Loop Remediation Notify the Process Owner Archive Delegate Start When? How Often? 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Notify Delegated Reviewer Attested Data Attestation Actions Delegation Paths Comments
  • 18. Oracle Identity Manager 11g R2 Provisioning Context with Identity Auditor 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 19. Focusing on What (Who) Matters Most High Risk  Leverage data collected to streamline access certification  Prioritize certifications based on user risk profiles  Aggregate risk profile over the ENTIRE lifecycle 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 20. Risk Based Certification Identity Warehouse Applications Risk Factors Identity Data Sources DB Roles Certification History Entitlements Mainframe Provisioning Events Resources Risk Aggregation Low Risk User Bulk Certify High Risk User Cert360 Approve Reject Focused Sign-off 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Policy Violations
  • 21. Automate The Remediation Entitlement Report Entitlement Review AutoRemediate 21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • Focus Loop Remediation Close on Large Scale • Quick Extract Desk Volume Reduce Help Transform Load • Rolling Certifications Complete Audit Trail • Rolling Data Import Increase Throughput • Large Volume Remediation
  • 22. Customer Panel Discussion 22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 23. Customer Panel Patrick Landry 23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. David Mathias Robert House
  • 24. Demo Pods Moscone South Oracle Identity Governance Suite: Managing Privileged Accounts from Your Identity Platform 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Moscone South Oracle Identity Governance Suite: Complete Identity Lifecycle Management Moscone South Identity Management Monitoring with Oracle Enterprise Manager
  • 25. Sessions Not to Miss Tuesday 10:30 am – 11:30am • CON8811: Converged Identity Governance for Speeding up Business and Reducing Cost Moscone West, Room 2018 • Justifying and Planning a Successful Identity Management Upgrade Moscone West, Room 2018 Wednesday 1.15 pm – 2.15 pm 25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 26. Join the Oracle Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle.com/Identity 26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 27. Innovation Awards 18 Winners Across Eight Categories Lam Research Theater (Next to Moscone North) Session ID: CON8082 Session Title: Oracle Fusion Middleware: Meet This Year’s Most Impressive Innovators Venue / Room: YBCA - Lam Research Theater Date and Time: Monday Sep 23, 4:45 - 5:45 p.m. 27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 28. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 28 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 29. 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 30. 30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Editor's Notes

  • #11: Notes:Extract Entitlements
  • #29: With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.