+ All Categories
Home > Technology > A better waytosecureapps-finalv1

A better waytosecureapps-finalv1

Date post: 16-Jan-2015
Category:
Upload: oracleidm
View: 2,721 times
Download: 1 times
Share this document with a friend
Description:
 
17
<Insert Picture Here> Amit Jasuja Group Vice President, Identity Management, Oracle Better Way to Secure Financial Services Applications
Transcript
Page 1: A better waytosecureapps-finalv1

<Insert Picture Here>

Amit JasujaGroup Vice President, Identity Management, Oracle

Better Way to Secure Financial Services Applications

Page 2: A better waytosecureapps-finalv1

This document is for informational purposes.  It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions.  The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle.  This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle.  This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle.   This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Page 3: A better waytosecureapps-finalv1

Agenda

• The Oracle Lens

• Application Security Value Chain

• A Platform Approach

Page 4: A better waytosecureapps-finalv1

Hardcoded Security

No Role Structure

Brittle Access Control

No Policy Visibility

Complex Certification

Costly Compliance

Financial Service Applications Risks

Unauthorized Trading

Internal Fraud

Limited Forensics

48%Fraud Caused By Insiders

86%Of hacking involves compromised credentials

2010 Data Breach Investigations Report

Page 5: A better waytosecureapps-finalv1

Authorization Policy

Entitlements And Policies The Rights to Application Data & Transactions

Entitlement

Transaction Data Forms

IT VIEW: CAN A TRADER SUBMIT A TRADE OF A CERTAIN SIZE AT A SPECIFC TIME OF DAY

BUSINESS VIEW: WHAT IS THE AUDIT OBJECTIVE AND THE ASSOCIATED RISK

Page 6: A better waytosecureapps-finalv1

Inflexible authorization increases complexity, reduces agility

Application Security is Fragmented

MultipleEntitlement Catalogs

Brittle Access Control

Hardcoded Authorization

Page 7: A better waytosecureapps-finalv1

The Challenge is Scale

MillionsOf

Entitlements

100’s of Thousands

of Users

10’sThousands

of Apps

Focused on Reducing Risk

Driven to Reduce Cost

Rolling or Monthly Attestation

Thousands of

Systems

• A Few App Administrators

• Handful of Audit Staff

Page 8: A better waytosecureapps-finalv1

Encrypt Mask

Risk Remediation

Context External Az

Search Provision

Entitlements Policies

What is Entitlements Management?Application Security Value Chain

DefineCatalog

AccessRequest

Audit Certify

Monitor Enforce

SecureData

DefineCatalog

AccessRequest

EnforceMonitor

AuditCertify

SecureData

Page 9: A better waytosecureapps-finalv1

Define & Catalog

Entitlements, Roles & Policies

• Common Data Model

• Catalog Entitlements

• Enrich Meta-data

• Define Roles & SoD

Enterprise Roles

Page 10: A better waytosecureapps-finalv1

Enforce and MonitorContext and Dynamic Authorization

Audit & Risk Application OwnersDevelopers

Application Security Platform

Time Location Device

CustomApps

COTSApps

Page 11: A better waytosecureapps-finalv1

Audit & Certify

Reduce Remediation Time to Minutes Instead of Days or Weeks

Entitlement

Review Auto-Remediate

Entitlement

Report• Active Conflict Analysis

• Simulation

• Risk Aggregation

• 360 Degree Visibility

• Closed Loop

SOD Checking

Aggregate

Risk Score

Page 12: A better waytosecureapps-finalv1

Secure Application Data

At The Application In The Database

Mask Encrypt Audit

Authorize Externalize Centralize

Page 13: A better waytosecureapps-finalv1

Monitor SQL

Block Attacks

Audit User Activity

Compliance Reports

Encrypt Data

Mask Test Data

Control Privileged

Users

Enforce SoD

Oracle Databases

Non-Oracle Databases

Cloud

Defense in Depth

Authentication

Authorization

Encryption & Masking

Auditing

Database Firewall

Comprehensive Database Security

Page 14: A better waytosecureapps-finalv1

Access

The Identity PlatformComplete, Innovative and Integrated

Directory

• Location Data • Centralized Auth• Device & User Data

Access• Fraud Detection• Single-Sign On• Mobile, Social Intg

Identity Governance

• User Lifecycle• Access Provisioning• Delegated Admin

• Risk Analytics• Access Certification• Role Management

Page 15: A better waytosecureapps-finalv1

Platform Reduces Cost vs. Point Solutions

46%

Cost Savings

Source: Aberdeen “Analyzing point solutions vs. platform” 2011

BenefitsOracle IAM Suite

Advantage

Increased End-User Productivity

• Emergency Access

• End-user Self Service

• 11% faster

• 30% faster

Reduced Risk • Suspend/revoke/de-provision end user access

• 46% faster

Enhanced Agility • Integrate a new app faster with the IAM infrastructure

• Integrate a new end user role faster into the solution

• 64% faster

• 73% faster

Enhanced Security and Compliance

• Reduces unauthorized access

• Reduces audit deficiencies

• 14% fewer

• 35% fewer

Reduced Total Cost • Reduces total cost of IAM initiatives

• 48% lower

48%More Responsive

35% Fewer Audit Deficiencies

Page 16: A better waytosecureapps-finalv1

Take a Security Inside Out Approach

• Reduce the risk

• Reduce the cost of application security

• Secure access to the “crown jewels”

• Simplify administration

Page 17: A better waytosecureapps-finalv1

We Can Help Develop a Strategy

Setup Free Workshop

Schedule aDemonstration

Develop an ROIAnalysis

Speak with References


Recommended