SlideShare a Scribd company logo
<Insert Picture Here>




Scaling Analytics to Thousands of Applications
Naresh Persaud
Director, Identity Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The
development, release, and timing of any features or functionality
described in this document remains at the sole discretion of
Oracle. This document in any form, software or printed
matter, contains proprietary information that is the exclusive property
of Oracle. This document and information contained herein may not
be disclosed, copied, reproduced or distributed to anyone outside
Oracle without prior written consent of Oracle. This document is not
part of your license agreement nor can it be incorporated into any
contractual agreement with Oracle or its subsidiaries or affiliates.
Agenda

• Enterprise Certification Requirements

• The Scale Challenge

• How to Adapt

• Learning Experience
Enterprise Certification Requirements
   Who’s who & what can they do?

  Extract        Review       Correlate      Remediate
Entitlements   Entitlements    Results        Access
   Ad Hoc        Complex      Un-auditable   Non-verifiable
The Challenge is Scale




                         • A Few Administrators
                         • Handful of Help Desk Staff
Organizations Have to Adapt

                      • Optimize The Data ETL
                      • Simplify User Experience
                         • Prioritize Based on Risk
                      • Automate Remediation
                      • Sustainable Role Management
                      • Reduce Audit Findings
Optimize and Streamline ETL Process
   10K Resources
  50K Certs per Campaign   • Focus on Large Scale

250K Business Units        • Quick Extract Transform Load
                           • Flexible Data Mapping
  2M Users
                           • Rolling Data Import
10M Entitlements           • Large Volume Remediation
Simplify User Experience
Easily Available Identity Forensics and Business Views


                                       • Risk Based Reporting
                                       • Historical Data
                                       • Persona Dashboards
                                       • Business Glossary
                                       • Approval Notes
                                       • Delegation
Automate The Remediation

     Entitlement                 • Focus Loop Remediation
                                   Close on Large Scale
       Report
                                 • Quick Extract Desk Volume
                                   Reduce Help Transform Load
                   Entitlement   • Rolling Certifications
                                   Close Loop Reporting
   Auto-             Review
 Remediate                       • Rolling Data Import
                                   Complete Audit Trail
                                 • Large Volume Remediation
                                   Increase Throughput
Sustain With Role Management
     Enterprise Roles

                        • Reduce Workload

       Identity         • Simplify Certification
      Warehouse         • Model Roles
                        • Improve Audits
                        • Accurate Reporting
Reduce Audit Exposure

       User On-
       boarding                   SOD
                                             • Active Conflict Analysis
                                Checking
                                             • Simulation
                  User Access
                    Change
                                             • Risk Aggregation
 User Off-
                                Aggregate
  board
                                Risk Score
                                             • 360 Degree Visibility
                                             • On-going Reconciliation
Identity Management Evolves
              Authoritative ID    Access Via       User Lifecycle In      Certify Access        Monitor
               with Massive      Mobile & Social    Hybrid/Cloud          for Millions of     Behavior &
                   Scale           Channels         Environments             Users &        Detect Improper
                                                                           Entitlements         Access

   Cloud/
   Mobile


 Extranet
                                                                                            Risk Management
                                                                              Audit
Enterprise                                         Administration
                                  Authentication
               Identity

             Tools               Point Solutions                       Platform                 Intelligence
Oracle Identity Management Stack
   Complete, Innovative and Integrated

   Identity Governance                    Access Management                  Directory Services

• Password Management                  • Single Sign-On & Federation    • LDAP Storage
• Self-Service Request & Approval      • Web Services Security          • Virtualized Identity Access
• Roles based User Provisioning        • Authentication & Fraud         • LDAP Synchronization
                                         Prevention
• Analytics, Policy Monitoring                                          • Next Generation (Java) Directory
                                       • Authorization & Entitlements
• Risk-based Access Certification
                                       • Access from Mobile Devices




                                    Platform Security Services
                                    Identity Services for Developers
Platform Reduces Cost vs. Point Solutions
                                                                                       Oracle IAM Suite
                                                        Benefits
                                                                                          Advantage
                                            • Emergency Access                      • 11% faster

48%
                       Increased End-
      Cost Savings    User Productivity
                                            • End-user Self Service                 • 30% faster
                       Reduced Risk         • Suspend/revoke/de-provision
                                                                                    • 46% faster

46%
                                              end user access
      More
      Responsive      Enhanced Agility      • Integrate a new app faster
                                              with the IAM infrastructure           • 64% faster
                                            • Integrate a new end user role         • 73% faster

35%   Fewer Audit
      Deficiencies   Enhanced Security
                      and Compliance
                                              faster into the solution
                                            • Reduces unauthorized access           • 14% fewer
                                            • Reduces audit deficiencies            • 35% fewer
                     Reduced Total Cost     • Reduces total cost of IAM
                                                                                    • 48% lower
                                              initiatives


                              Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Learning Experience

• Scale By Adapting
• Focus on Risk and Benchmark for Scale
• Closed Loop Remediation
• Prevent Exposure

More Related Content

PPTX
Ioug webcast entitlements in check
PPTX
Scaling identity to internet proportions
PPTX
Declarative security-oes
PPTX
Round table guide
PPT
Healthcare it consolidated
PPTX
Oracle security-formula
PDF
Od webcast-cloud-fraud final
PDF
Oracle_Cisco identity platform approach_webcast
Ioug webcast entitlements in check
Scaling identity to internet proportions
Declarative security-oes
Round table guide
Healthcare it consolidated
Oracle security-formula
Od webcast-cloud-fraud final
Oracle_Cisco identity platform approach_webcast

What's hot (17)

PDF
Cso oow12-summit-sonny-sing hv4
PPTX
A better waytosecureapps-finalv1
PDF
Manpower group idm-platform
PPTX
Platform approach-series-the oracleplatform-final
PPTX
Biz case-keynote-final copy
PDF
Sun2 oracle avea's identity management platform transformation
PDF
Platform approach-series-building a-roadmap-finalv1
PPTX
Securing access inabyod-world-final-ext
PDF
Overview of Identity and Access Management Product Line
PPTX
Df2012 securing information_assets_in_saa_s_clouds_3_0
PDF
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
PDF
The Revolution in Licensing - Cloud-Based Licensing
PDF
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
PPT
2004 10 21 Rbac At Mazda Horst Walther
PDF
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
PDF
Entitlement and Compliance Management: Trends and 2012 Vision
Cso oow12-summit-sonny-sing hv4
A better waytosecureapps-finalv1
Manpower group idm-platform
Platform approach-series-the oracleplatform-final
Biz case-keynote-final copy
Sun2 oracle avea's identity management platform transformation
Platform approach-series-building a-roadmap-finalv1
Securing access inabyod-world-final-ext
Overview of Identity and Access Management Product Line
Df2012 securing information_assets_in_saa_s_clouds_3_0
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
The Revolution in Licensing - Cloud-Based Licensing
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
2004 10 21 Rbac At Mazda Horst Walther
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
Entitlement and Compliance Management: Trends and 2012 Vision
Ad

Viewers also liked (20)

PDF
FOCUS#5
PPTX
Настоящий уровень инфляции
PDF
Investment Support Network
PPTX
Bronte, hardy
DOC
Compiler design file
PDF
affTA10 - LampiranB
ODS
Agenda robert guzman
PDF
affTA02 - BAB II
PPT
Рынок ипотеки 2011
PPTX
Story board for ancillary
PDF
World I: Module 6
PPTX
Gothic, Poe
PPTX
Маркетинговая программа "Быстрого роста 3+3"
DOCX
Setting FTP, SSH, NsLookup di linux
PDF
Smm поддержка сети магазинов КОСМО
DOC
Ayuda 1 plan matematicas oct 12
PDF
Egoera: La Economía de Bizkaia - Junio 2016 - nº23
PPTX
Antonia santos
PPTX
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
PPT
Dalla Valle Exploring opportunities and constraints for young agro entreprene...
FOCUS#5
Настоящий уровень инфляции
Investment Support Network
Bronte, hardy
Compiler design file
affTA10 - LampiranB
Agenda robert guzman
affTA02 - BAB II
Рынок ипотеки 2011
Story board for ancillary
World I: Module 6
Gothic, Poe
Маркетинговая программа "Быстрого роста 3+3"
Setting FTP, SSH, NsLookup di linux
Smm поддержка сети магазинов КОСМО
Ayuda 1 plan matematicas oct 12
Egoera: La Economía de Bizkaia - Junio 2016 - nº23
Antonia santos
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
Dalla Valle Exploring opportunities and constraints for young agro entreprene...
Ad

Similar to Gartner iam 2011-analytics-aj-orig-recordednp-final (20)

PPTX
Agilent webcast bestpractices-platformv2
PDF
Keynote oracle entitlement-driven idm
PDF
Aberdeen ppt-iam integrated-db-06 20120412
PDF
Oracle tech fmw-05-idm-neum-16.04.2010
PDF
Introducing Salesforce Identity
PPT
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
PDF
Day 2 p1 - operate simply
PDF
Day 2 p1 - operate simply
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
What's New in Novell Identity Manager 4.0
PDF
DSS ITSEC Conference 2012 - CENTRIFY
PDF
Ca partner day - bsi - milano e roma
PPTX
Building a Secure Cloud with Identity Management
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
Identity and Request Management Using Novell Identity Manager: Identity Manag...
PPTX
Information Security Cost Effective Managed Services
PDF
Avensus Corporate Presentation
PPTX
TechFuse 2012: Cloud and Mobile Computing
PDF
Intro to Identity Management
PDF
Oracle a TBIZ2011
Agilent webcast bestpractices-platformv2
Keynote oracle entitlement-driven idm
Aberdeen ppt-iam integrated-db-06 20120412
Oracle tech fmw-05-idm-neum-16.04.2010
Introducing Salesforce Identity
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Day 2 p1 - operate simply
Day 2 p1 - operate simply
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
What's New in Novell Identity Manager 4.0
DSS ITSEC Conference 2012 - CENTRIFY
Ca partner day - bsi - milano e roma
Building a Secure Cloud with Identity Management
Leveraging Identity to Manage Change and Complexity
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Information Security Cost Effective Managed Services
Avensus Corporate Presentation
TechFuse 2012: Cloud and Mobile Computing
Intro to Identity Management
Oracle a TBIZ2011

More from OracleIDM (20)

PPTX
Con9573 managing the oim platform with oracle enterprise manager
PPTX
Con9024 next generation optimized directory - oracle unified directory - final
PPTX
Con8902 developing secure mobile applications-final
PPTX
Con8896 securely enabling mobile access for business transformation - final
PPTX
Con8837 leverage authorization to monetize content and media subscriptions ...
PPTX
Con8836 leveraging the cloud to simplify your identity management implement...
PPTX
Con8834 bring your own identity - final
PPTX
Con8833 access at scale for hundreds of millions of users final
PPTX
Con8828 justifying and planning a successful identity management upgrade final
PPTX
Con8823 access management for the internet of things-final
PPTX
Con8819 context and risk aware access control any device any where - final
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
PPTX
Con8811 converged identity governance for speeding up business and reducing c...
PPTX
Con 8810 who should have access to what - final
PPTX
Opening remarks-dave-profozichv2
PPTX
Con8808 enabling business growth in the new economy final
PPTX
Innovations dbsec-12c-pub
PPTX
Identityofthings amitjasuj av10
PDF
Identityofthings amitjasuj av10
Con9573 managing the oim platform with oracle enterprise manager
Con9024 next generation optimized directory - oracle unified directory - final
Con8902 developing secure mobile applications-final
Con8896 securely enabling mobile access for business transformation - final
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8836 leveraging the cloud to simplify your identity management implement...
Con8834 bring your own identity - final
Con8833 access at scale for hundreds of millions of users final
Con8828 justifying and planning a successful identity management upgrade final
Con8823 access management for the internet of things-final
Con8819 context and risk aware access control any device any where - final
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8813 securing privileged accounts with an integrated idm solution - final
Con8811 converged identity governance for speeding up business and reducing c...
Con 8810 who should have access to what - final
Opening remarks-dave-profozichv2
Con8808 enabling business growth in the new economy final
Innovations dbsec-12c-pub
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Gartner iam 2011-analytics-aj-orig-recordednp-final

  • 1. <Insert Picture Here> Scaling Analytics to Thousands of Applications Naresh Persaud Director, Identity Management, Oracle
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. Agenda • Enterprise Certification Requirements • The Scale Challenge • How to Adapt • Learning Experience
  • 4. Enterprise Certification Requirements Who’s who & what can they do? Extract Review Correlate Remediate Entitlements Entitlements Results Access Ad Hoc Complex Un-auditable Non-verifiable
  • 5. The Challenge is Scale • A Few Administrators • Handful of Help Desk Staff
  • 6. Organizations Have to Adapt • Optimize The Data ETL • Simplify User Experience • Prioritize Based on Risk • Automate Remediation • Sustainable Role Management • Reduce Audit Findings
  • 7. Optimize and Streamline ETL Process 10K Resources 50K Certs per Campaign • Focus on Large Scale 250K Business Units • Quick Extract Transform Load • Flexible Data Mapping 2M Users • Rolling Data Import 10M Entitlements • Large Volume Remediation
  • 8. Simplify User Experience Easily Available Identity Forensics and Business Views • Risk Based Reporting • Historical Data • Persona Dashboards • Business Glossary • Approval Notes • Delegation
  • 9. Automate The Remediation Entitlement • Focus Loop Remediation Close on Large Scale Report • Quick Extract Desk Volume Reduce Help Transform Load Entitlement • Rolling Certifications Close Loop Reporting Auto- Review Remediate • Rolling Data Import Complete Audit Trail • Large Volume Remediation Increase Throughput
  • 10. Sustain With Role Management Enterprise Roles • Reduce Workload Identity • Simplify Certification Warehouse • Model Roles • Improve Audits • Accurate Reporting
  • 11. Reduce Audit Exposure User On- boarding SOD • Active Conflict Analysis Checking • Simulation User Access Change • Risk Aggregation User Off- Aggregate board Risk Score • 360 Degree Visibility • On-going Reconciliation
  • 12. Identity Management Evolves Authoritative ID Access Via User Lifecycle In Certify Access Monitor with Massive Mobile & Social Hybrid/Cloud for Millions of Behavior & Scale Channels Environments Users & Detect Improper Entitlements Access Cloud/ Mobile Extranet Risk Management Audit Enterprise Administration Authentication Identity Tools Point Solutions Platform Intelligence
  • 13. Oracle Identity Management Stack Complete, Innovative and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud • LDAP Synchronization Prevention • Analytics, Policy Monitoring • Next Generation (Java) Directory • Authorization & Entitlements • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers
  • 14. Platform Reduces Cost vs. Point Solutions Oracle IAM Suite Benefits Advantage • Emergency Access • 11% faster 48% Increased End- Cost Savings User Productivity • End-user Self Service • 30% faster Reduced Risk • Suspend/revoke/de-provision • 46% faster 46% end user access More Responsive Enhanced Agility • Integrate a new app faster with the IAM infrastructure • 64% faster • Integrate a new end user role • 73% faster 35% Fewer Audit Deficiencies Enhanced Security and Compliance faster into the solution • Reduces unauthorized access • 14% fewer • Reduces audit deficiencies • 35% fewer Reduced Total Cost • Reduces total cost of IAM • 48% lower initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 15. Learning Experience • Scale By Adapting • Focus on Risk and Benchmark for Scale • Closed Loop Remediation • Prevent Exposure

Editor's Notes

  • #2: Overview – So today the process of certifying applications and and managing enterprise roles is largely spreadsheet driven and most companies today are able to manage entitlement certification for a handful of applications but the question everyone is asking is how do we scale to thousands of apps This presentation is about how Oracle can enable businesses to make the process repeatable, sustainable. More importantly orchestrate certification review campaigns and measure progress
  • #5: Notes:To start with here is the process that companies conduct to perform access certification1. Extract Entitlements– This is typically scripted to pull from a systems like mainframes databases and ERP systems – The challenge is that it is ad-hoc – this process is done by each application owner . Because it is largely human dependent it takes lots of time and is not repeatable 2. Review Entitlements – After these entitlements are extracted into spreadsheets the data gets passes to each manager to certify their direct reports. The spreadsheets are complex and because there is often no built in data dictionary its difficult to understand . Often this is error probe – there have been cases where people have certified users who are no longer with the company.3. Correlate results – After the results are returned a central audit group typically has to take the data and correlate this. Its difficult to figure out historical information etc . And its not auditable 4. Remediate The last step is to fix any audit findings or changes that managers have and typically this is driven by an internal help desk– hard to verify what changes have been made and the delay in making changes makes this prohibitive.
  • #6: The reason this is challenging is scale The audit requirements are becoming more intrusive Where we were looking at a handful of systems – we need to now look at thousands of systems and applications – If you are an organization that only needed to look at your erp system alone that would be easy but what about your UNIX systems – what about the home grown apps sitting on relational databases Where we were primarily looking at financial apps we are not looking at the extended applications that provide data to the financial apps. In many regulated industries like healthcare and financial services we have the line of business apps to contend with. As we leverage more apps in the cloud the number of total applications that are being scrutinized is increasing At the same time – we have 100’s of thousands of users – because we are letting more people in we have more access to scrutinize At the end of this is millions of entitlements – Many organizations today that have managed access via hierarchical groups and roles have witnessed the role explosion. This feeds the number of entitlements we need to certify
  • #7: The process of adapting means scaling – and by focusing on the humanly challenging problems and simplifying the user experience we can address the problem.Optimize the ETL – instead of running scripts – we need to have a scheduled automated way of handling this and making it repeatable Simplify the user experience – We need to put our selves in the perspective of the end user and minimize the workload that the end user has to do in-order to finish a review – It has to be risk based … there are thousands of review to do which ones should come first Remediation – it should not sit on a help desk , it should be automatically fixed Aggregate your entitlements into roles – instead of certifying each entitlement we need a a managed way to produce roles which can be certified and change controlled to make sure we don’t get role explosionPreventively reduce the number of audit findings – Which means looking at the user lifecycle to prevent violations from happening – most of these audit violations can be prevented if they were caught in the provisioning cycle
  • #8: To optimize the process we have benchmarked for scale and looked at the largest deployments To Scale we look at a few things The number of resources, The number of certs per campaign , the number of business units , users and entitlements We have benchmarked these internally and focused on how you make this repeatable on a quarterly basis. This process runs on quarterly or rolling process And being able to remediate all of this in a large volume automatically. All of this produces a warehouse which provides greater intelligence than the ad hoc process we started with
  • #9: Scale requires prioritization and focus.Simplifying the user experience and providing analytics at their fingertips is another way OIA optimizes the process.Risk based reporting – When access is granted or changed during the provisioning process OIA can aggregate the risk and recognize high risk access rights – at the same time – OIA can recognize excessive access and separation of duties conflicts and flag these circumstances as high risk.Users need historical data – so with OIA – the reviewer can get a complete history of access reviews this makes reviewer’s job easy. Dashboards – To make the process of measuring results easier – we have incorporated dashboards – so that for a department or business unit we get a cumulative progress report for the entire department- Similarly an application owner can view the progress report on a per application basis To provides greater transparency of end users across certification reviews we have incorporated Approval notes to act as a journal across reviews – so the semantics of a decision does not get lost between reviewers Lastly delegation – which allows a manager to delegate the review to another manager of subordinate -
  • #10: Most of the security risk due to orphaned accounts happen within a couple weeks of employees separating the company. The media is replete with stories of employees who have separated an logged back in to perform malicious activity. Most of this happens within a short time after separation SO automated remediation is critical.We can debate the merit of starting with certification or provisioning and many of our customers start with one or the other – what they will all agree on is that combined provisioning and certification review are critical to a complete solution. In fact these two things reinforce one another. Remediation needs to be closed loop.If we do certification review alone we end up with large help desk volumes which only shifts the workload to the help desk The reporting needs to be closed loop.. We need to be able to assure administrators and managers that the remediation is complete . It has to be integrated.
  • #11: To make it work – it has to be sustainable – so as we are certifying oracle identity analytics can help build roles which aggregate entitlements to simplify the process and because OIA has a complete role lifecycle process we can avoid the role explosion problem So what OIA does is once we have streamlined the ETL process and the data is loaded into a warehouse – OIA can perform role mining on the warehouse to provide guidance on possible roles. From here the roles can be re-factored and refined. OIA also lets the security group model roles free from and do what if analysis The result is:A more simple certification review process: Because instead of certifying millions of entitlements the manager only has to certify individual roles Improves audit results – because instead of scrutinizing millions of entitlements the auditors can focus on rolesAnd we get better more accurate reporting since the roles tie more closely to job roles – auditors and managers can look at reporting at the role level instead of the system or entitlement level
  • #12: To reduce the audit exposure OIA is both preventive and detective. OIA combines with OIM so that as privileges are granted OIM can capture a risk score that is visible to OIA – example emergency access increases the risk and the reviewer needs to know that the access was granted temporarily – OIM tracks this and sends to OIA. This is also and example of being preventive.At the same time OIA and OIM combine to check SOD conflicts while access is being granted – so if a conflicting privilege is being selected in OIM the requester can see a form validation error and the system can route the request to a reviewer for approval Additionally – OIA provides 360 degree visibility – instead of looking at reporting on a single application at a time a reviewer gets a complete view of the users access across systems – This allows the reviewer to look at potential risks across several applicationsAnd to provide on-going monitoring OIA provides regular reconciliations to check for changes that are made out of band.
  • #13: Analytics is part of a larger Identity Value Chain –which drives the compliance and audit lifecycle. In order to be effective The solutions have to move from being a series tools to a platform that provides intelligence and risk management. - At the foundation we have to know who’s who across all of our applications. Providing secure authentication is next typically this is user name and password or strong authentication Slightly more sophisticated is administration because it has to be flexible to handle all of the nuances of moves adds and changes To provide compliance reporting is next in the ladder because this requires intelligence of SOD At the highest level is understanding risk- understanding patterns of behavior so we can step up authentication and authorization – and understanding what access may be risky during a certification review Finally – it has to scale to address the opportunity At the identity level – this means massive scale for numbers of users because we not only have to manage our enterprise users we have to manage our subscribers and customers. NOTE: China mobile has over 600 Million subscribers . Vodaphone in the UK has about 341 million subscribers – If we want to take advantage of opportunities in china we have to more than double our scale. So imagine if you are ATT with 100 million subscribers and you have to merge with T mobile at 34 million subscribers and you have to integrate.The authentication level – The scale is also increasing because of mobile use and social networking – with social networking I am referring to services that allow users to authenticate to get access to applications or data resources via their social networking login. Interesting stat If facebook were a country it would be the 3rd largest with double the population of the US. At the mobile level many customers are building internal application stores to provide applications to their employees. They have to be able to provide single sign on across applications. The administration has to scale to the cloudTo take advantage of the cloud – organizations have to bridge the gap between the security in the enterprise with the security in the cloud. This means delegated administration and managing moves adds and changes directly to the cloud.The audit has to scale Many customers have done their initial projects on certification review – but now need to scale the process to more applications the volume of entitlements is only increasing. Identity management has to evolve to provide
  • #15: Certification review is one part of a complete Identity and access management strategy. A recent study by Aberdeen of 160 companies world wide found that companies who adopt integrated iAM products from a single vendor as part of a strategy had better economies of scale.They saved 48% over all – were 46% more responsive and had 35% fewer audit deficiencies Read paper:http://www.oracle.com/go/?&amp;Src=7319991&amp;Act=11&amp;pcode=WWMK11053701MPP015