Monday Oct 29, 2012

SANS Mobility Policy Survey Webcast follow up

Hello Everyone!  If you missed the SANS mobility survey webcast on October 23 - here is a link to the replay and to the slides: [Warning -  you have to register to see the replay and to get the slides]

The webcast had a lot of great information about how organizations are setting up and managing their mobile access policies.  Here are a couple of key takeaways:

1.  Who is most concerned about mobile access policy?

Security Analysts >> CISOs >> CIOs - the focus is coming from the risk and security office - so what does that mean for the IT teams?

2. How important is mobile policy?

77% said "Critical" or "Extremely Important" - so this means mobile access policies will get a lot of attention.

 3. When asked about the state of their mobile policies:

Over 35% said they didn't have a mobile access policy and another 35% said they simply ask their employees to sign a usage agreement.  So basically ~70% of the respondents were not actively managing or monitoring mobile access.

Be sure to watch the webcast replay for all of the details.

Box, Oracle and RSA were all co-sponsors of the survey and webcast and all were invited to give a brief presentation at the end.

Friday Oct 26, 2012

Globe Trotters: Asian Healthcare CIOs need ‘Security Inside Out’ Approach

In our second edition of Globe trotters, wanted to share a feature article that was recently published in Enterprise Innovation., part of Questex Media Group, is Asia's premier business and technology publication.

The article featured MOH Holdings (a holding company of Singapore’s Public Healthcare Institutions) and highlighted the project around National Electronic Health Record (NEHR) system currently being deployed within Singapore.  According to the feature, the NEHR system was built to facilitate seamless exchanges of medical information as patients move across different healthcare settings and to give healthcare providers more timely access to patient’s healthcare records in Singapore. The NEHR consolidates all clinically relevant information from patients’ visits across the healthcare system throughout their lives and pulls them in as a single record. It allows for data sharing, making it accessible to authorized healthcare providers, across the continuum of care throughout the country.

In healthcare, patient data privacy is critical as is the need to avoid unauthorized access to the electronic medical records. As Alan Dawson, director for infrastructure and operations at MOH Holdings is quoted in the feature, “Protecting the perimeter is no longer enough. Healthcare CIOs today need to adopt a ‘security inside out’ approach that protects information assets all the way from databases to end points.”

Oracle has long advocated the ‘Security Inside Out’ approach. From operating systems, infrastructure to databases, middleware all the way to applications, organizations need to build in security at every layer and between these layers. This comprehensive approach to security has never been as important as it is today in the social, mobile, cloud (SoMoClo) world.

To learn more about Oracle’s Security Inside Out approach, visit our Security page. And for more information on how to prevent unauthorized access, streamline user administration, bolster security and enforce compliance in healthcare, learn more about Oracle Identity Management.

Wednesday Oct 24, 2012

UPMC Picks Oracle Identity Management

UPMC, a $10-billion integrated global health enterprise, has selected Oracle as a key technology partner in UPMC’s $100-million analytics initiative designed to help “unlock the secrets of human health and disease” by consolidating and analyzing data from 200 separate sources across UPMC’s far-flung network.As part of the project UPMC also selected Oracle Identity Management to secure the interaction and insure regulatory compliance. Read complete article here.

As healthcare organizations create new services on-line to provide better care Identity Management can provide a foundation for collaboration.

Oracle at Information Security and Risk Management Conference (ISACA Conferences)

The North America Information Security and Risk Management (ISRM) Conference hosted by ISACA will be held this year from November 14 - 16 in Las Vegas, Nevada and Oracle is a platinum sponsor.

The ISRM / IT GRC event is not only designed to meet the exact needs of information security, governance, compliance and risk management professionals like you, but also gives you the tools you need to solve the issues you currently face. The event builds on and includes the key elements of information security, governance, compliance and risk management practices, and offers a fresh perspective on current and future trends.

As a Platinum Sponsor Oracle will not only have an opportunity to demonstrate but talk through our strategic roadmap and support to ensure all organizations understand our key role within the industry to ensure corporate data and information remains safe.

Join us at the Lunch and Learn to learn more about the latest advances in Oracle Identity Management.

Lunch and Learn Session: Trends in Identity Management
Speaker: Mike Neuenschwander, Senior Product Development Director, Oracle Identity Management
Thursday, November 15, Bermuda A, 11:45 a.m. - 1:00 p.m.

As enterprises embrace mobile and social applications, security and audit have moved into the foreground. The way we work and connect with our customers is changing dramatically and this means, re-thinking how we secure the interaction and enable the experience. Work is an activity not a place - mobile access enables employees to work from any device anywhere and anytime. Organizations are utilizing "flash teams" - instead of a dedicated group to solve problems, organizations utilize more cross-functional teams. Work is now social - email collaboration will be replaced by dynamic social media style interaction. In this session, we will examine these three secular trends and discuss how organizations can secure the work experience and adapt audit controls to address the "new work order".

We also recommend you bookmark the following session:

T1 Session 301: Gone in 60 Seconds: Mitigating Database Security Risk
Friday, November 16, 8:30 am – 9:30 am

And, do be sure to stop by our booth, # 100 & #102, to not only network with our Product Development Team, but also get an onsite demonstration of Oracle Security Solutions.

See you there?

November 14 – 16, 2012
Mirage Casino-Hotel
3400 Las Vegas Boulevard South
Las Vegas, NV, 89109

Monday Oct 22, 2012

Free SANS Mobility Policy Survey Webcast - October 23rd @10:00 am PST

Join us for a free webcast tomorrow, October 23 @ 10:00 am PST as SANS presents the findings from their mobility policy survey.

-- Register here for Part 1:

This is a great opportunity to see where companies are with respect to mobile access policies and overall mobile application management.

This first part is entitled: BYOD Wish Lists and Policies.  Part 2 will be run on October 25th and is entitled: BYOD security practices.

-- Register here for Part 2:

Friday Oct 19, 2012

Oracle presentations at the CIPS ICE Conference, November 5 - 7, Edmonton, Alberta, Canada

Oracle will be presenting at the CIPS ICE conference the last week of October in Calgary and the first week of November in Edmonton.

Here is a list of the presentations for Edmonton: SHAW Conference Centre

• Session Title: Identity and Access Management Integrated; Analyzing the Platform vs Point Solution Approach
• Speaker: Darin Pendergraft
• Monday, November 5th @ 10:45 AM - 12:00 PM

• Session Title: Is Your IT Security Strategy Putting Your Institution at Risk?
• Speaker: Spiros Angelopoulos
• Monday, November 5th @ 1:45 PM - 3:00 PM

Three sessions under the TRAIN: Practical Knowledge Track

• Monday, November 5th @ 10:45 AM, 1:45 PM, 3:30 PM
• Title: What's new in the Java Platform
   Presenter: Donald Smith
• Title: Java Enterprise Edition 6
   Presenter: Shaun Smith
• Title: The Road Ahead for Java SE, JavaFX and Java EE
   Presenters: Donald Smith and Shaun Smith

To learn more about the conference, and to see the other sessions go to the conference website.

Wednesday Oct 17, 2012

Oracle on Oracle: How Oracle IT uses Oracle IDM

Sometimes, the toughest customers are your own employees.  Chirag Andani runs the Product Development Security IT Group - which means that his group is responsible for internal Identity Management and Security inside Oracle.

Like a lot of large, global companies, Oracle has a complicated and dynamic IT infrastructure which continues to change as the company grows and acquires companies.

I caught up with Chirag and asked him what kinds of problems his team faces, and asked him what he thinks about Oracle IDM, and 11gR2 in particular.

Listen to the podcast interview here: podcast link and check out his presentation below.


Tuesday Oct 16, 2012

IDC's Sally Hudson on Securing Mobile Access

After the launch of Identity Management 11g R2, Oracle Magazine writer David Baum sat down with Sally Hudson, research director of security products at International Data Corporation (IDC) to get her perspective on securing mobile access.  Below is an excerpt from the interview. The complete article can be found here.

"We’re seeing a much more diverse landscape of devices, computing habits, and access methods from outside of the corporate network. This trend necessitates a total security picture with different layers and end-point controls. It used to be just about keeping people out. Now, you have to let people in. Most organizations are looking toward multifaceted authentication—beyond the password—by using biometrics, soft tokens, and so forth to do this securely. Corporate IT strategies have evolved beyond just identity and access management to encompass a layered security approach that extends from the end point to the data center. It involves multiple technologies and touch points and coordination, with different layers of security from the internals of the database to the edge of the network." ( Sally Hudson, Oracle Mag Sept/Oct 2012)

As the landscape changes you can find out how to adapt by reading Oracle's strategy paper on providing identity services at Internet scale

ICAM Webcast Replay and slides

On October 10, 2012 Derrick Harcey and I co-presented on how Oracle IDM helps customers address the guidelines of Identity Credential Access Management, from a Federal (FICAM) and a State (SICAM) perspective.

If you missed the webcast, here is a link to the replay:  webcast replay link.

Derrick did a nice job reviewing the various ICAM components and architectures, and then invited me to provide additional detail on the Oracle technology stack.  He then closed by mapping the ICAM architectures to various components of the Oracle IDM platform.

The next webcast in the Secure Government Training Series, Safeguarding Government Cyberspace will be held Wednesday, November 28th.

Monday Oct 15, 2012

Identity R2 in London Oct 24th with Amit Jasuja

Join Amit Jasuja, Senior Vice President Identity Management and Security, Oracle, and Peter Boyle, Head of Identity Services, BT in London on 24th October 2012 for the UK launch of Oracle Identity Management 11gR2. You’ll learn more about the evolution of this exceptional business solution and get the unique opportunity to network with existing Oracle customers and speak directly with Oracle product experts

The agenda includes:

  • An overview of capabilities
  • Product demonstrations
  • Customer presentations
  • An interactive panel discussion

Amit Jasuja will also be available for 1:1 meetings. Please email to request a meeting with Amit.

Click here to Register. 

Friday Oct 12, 2012

Mobile Identity Management at SuperValu

While organizations are fast embracing BYOD (Bring Your Own Device) culture to attract and retain best talent, improve productivity, bring agility and drive down costs, SuperValu coined their own term (and trend): TYDH – Take Your Device Home.

Yes, SuperValu, a Minn based, 18,000 employees strong, food retailer handed out 2,200 iPads to store directors at locations across the country. The motivation behind this reverse trend? Phillip Black, Director of Identity & Access Management at SuperValu, shared the reasoning behind this trend in his talk at last week’s Oracle OpenWorld 2012. "It gives them productivity tools to better manage their store," says Black.

Intrigued? Find out more in this recently published news article. And learn more about Oracle Identity Management 11gR2 mobile- and social- ready sign-on features today.

Additional Resources:

Press Release: Oracle announces Identity Management 11g Release 2

On-Demand webcast: Identity Management 11gR2 Launch

Oracle Magazine: Security on the Move

Website: Oracle Identity Management

Blog Post: Mobile and Social Sign-on with Oracle Access Management

Thursday Oct 11, 2012

Guest Blog: Secure your applications based on your business model, not your application architecture, by Yaldah Hakim

Today’s businesses are looking for new ways to engage their customers, embrace mobile applications, while staying in compliance, improving security and driving down costs.  For many, the solution to that problem is to host their applications with a Cloud Services provider, but concerns that a hosted application will be less secure continue to cause doubt.

Oracle is recognized by Gartner as a leader in the User Provisioning and Identity and Access Governance magic quadrants, and has helped thousands of companies worldwide to secure their enterprise applications and identities.  Now those same world class IDM capabilities are available as a managed service, both for enterprise applications, as well has Oracle hosted applications.

--- Listen to our IDM in the cloud podcast to hear Yvonne Wilson, Director of the IDM Practice in Cloud Service, explain how Oracle Managed Services provides IDM as a service ---

Selecting OracleManaged Cloud Services to deploy and manage Oracle Identity Management Services is a smart business decision for a variety of reasons.

Oracle hosted Identity Management infrastructure is deployed securely, resilient to failures, and supported by Oracle experts. In addition, Oracle  Managed Cloud Services monitors customer solutions from several perspectives to ensure they continue to work smoothly over time. Customers gain the benefit of Oracle Identity Management expertise to achieve predictable and effective results for their organization.

Customers can select Oracle to host and manage any number of Oracle IDM products as a service as well as other Oracle’s security products, providing a flexible, cost effective alternative to onsite hardware and software costs.

Security is a major concern for all organizations- making it increasingly important to partner with a company like Oracle to ensure consistency and a layered approach to security and compliance when selecting a cloud provider.  Oracle Cloud Service makes this possible for our customers by taking away the headache and complexity of managing Identity management infrastructure and other security solutions.

For more information:


Facebook -

Wednesday Oct 10, 2012

Brazil Identity Customer Forum a Huge Success

As we continue to execute on the global Identity Management 11gR2 launch event series, if the success of the Brazil event is any indication, the London event coming up on October 24th will be a blowout! These events provide a unique opportunity to hear directly from and network with existing (and successful) Oracle Identity Manaagement customers, as well as connect directly with product & technology experts. The Identity Forum agenda includes presentation from product experts on the latest release of Oracle Identity Management, followed by live product demonstration and local customer presentations or panel discussions with both customers and implementation partners.

The very successful launch event in Brazil concluded yesterday. Here are some pictures from the event.

Want to be part of the identity Customer Forum? Then do connect with your local Oracle representative or let us know via this blog or @oracleidm. We hope to see you soon at an event near you.


Webcast Replay : SANS Institute Product Review of Oracle Identity Manager

Thanks to everyone who attended the SANS Institute webinar covering the product review of Oracle Identity Manager. And a special thanks to our guest speakers from SuperValu - Phillip Black and Patrick Abreo.

If you missed the webcast, you can catch a replay here 

And here are the slides that were used in the webcast. 

There were many questions that we could not answer as we ran out of time. We have captured some of the questions with responses below.

Is Oracle Identity Analytics still offered as a separate product or is it part of Oracle Identity Manager?

Oracle Identity Manager and Oracle Identity Analytics are now offered as part of Oracle Identity Governance Suite. OIA and OIM share a common UI architecture, common data model and common support for connected and disconnected resources. 

When requesting new access/entitlements is there an approval process?

Yes. We leverage SOA BPEL-based workflows for approvals 

Are the identity self service capabilities based on Oracle ADF?

Yes they are completely based on Oracle ADF 

Can you give some examples of personalization and customization with Oracle Identity Manager 11gR2?

With the new UI config framework we can enable different levels of UI customization. Customers now have the ability to Point & click to customize; or drag and drop customization without any need for coding. So users can easily personalize the interface of their application within the browser. For example, they can change the logo, Rearrange, hide Home Page regions; regularly searched items can be saved and re-used; Searchable & search results columns can be configured; Sorting preferences are remembered and so on. For more sophisticated customization, Customers can also edit the standard JSF within the page to alter business rules, modify page flows, page layouts and other items.

Can you explain the role of sandboxes in customization?

Customers can make their custom changes within a sandbox so that it doesn’t impact their production environment. They can make their changes, validate those changes, stage and then commit those changes without affecting production users. This is similar to how source code control systems like perforce work

To watch a replay of the webcast, click here

Friday Oct 05, 2012

This Week in Pictures: Oracle OpenWorld 2012

Here's a snapshot of the week that pictures!

Oracle OpenWorld 2012 was bigger and better than ever.

Security and Identity Management had quite a presence at the conference.

Both inside the sessions and outside, there were plenty of networking opportunities.

Captured some shots yourself? Do share your pictures from the conference...

Most Innovative IDM Projects: Awards at OpenWorld

On Tuesday at Oracle OpenWorld 2012, Oracle recognized the winners of Innovation Awards 2012 at a ceremony presided over by Hasan Rizvi, Executive Vice President at Oracle.

Oracle Fusion Middleware Innovation Awards recognize customers for achieving significant business value through innovative uses of Oracle Fusion Middleware offerings. Winners are selected based on the uniqueness of their business case, business benefits, level of impact relative to the size of the organization, complexity and magnitude of implementation, and the originality of architecture.

This year’s Award honors customers for their cutting-edge solutions driving business innovation and IT modernization using Oracle Fusion Middleware. The program has grown over the past 6 years, receiving a record number of nominations from customers around the globe. The winners were selected by a panel of judges that ranked each nomination across multiple different scoring categories.

Congratulations to both Avea and ETS for winning this year’s Innovation Award for Identity Management.

Identity Management Innovation Award 2012 Winner – Avea

Company: Founded in 2004, AveA is the sole GSM 1800 mobile operator of Turkey and has reached a nationwide customer base of 12.8 million as of the end of 2011

Region: Turkey (EMEA)

Products: Oracle Identity Manager, Oracle Identity Analytics, Oracle Access Management Suite

Business Drivers:

·         To manage the agility and scale required for GSM Operations and enable call center efficiency by enabling agents to change their identity profiles (accounts and entitlements) rapidly based on call load.

·         Enhance user productivity and call center efficiency with self service password resets

·         Enforce compliance and audit reporting

·         Seamless identity management between AveA and parent company Turk Telecom

Innovation and Results:

·         One of the first Sun2Oracle identity management migrations designed for high performance provisioning and trusted reconciliation built with connectors developed on the ICF architecture that provides custom user interfaces for  dynamic and rapid management of roles and entitlements along with entitlement level attestation using closed loop remediation between Oracle Identity Manager and Oracle Identity Analytics.

·         Dramatic reduction in identity administration and call center password reset tasks leading to 20% reduction in administration costs and 95% reduction in password related calls.

·         Enhanced user productivity by up to 25% to date

·         Enforced enterprise security and reduced risk

·         Cost-effective compliance management

·         Looking to seamlessly integrate with parent and sister companies’ infrastructure securely.

Identity Management Innovation Award 2012 Winner – Education Testing Service (ETS)

      Company: ETS is a private nonprofit organization devoted to educational measurement and research, primarily through testing.

Region: U.S.A (North America)

Products: Oracle Access Manager, Oracle Identity Federation, Oracle Identity Manager

Business Drivers: ETS develops and administers more than 50 million achievement and admissions tests each year in more than 180 countries, at more than 9,000 locations worldwide.  As the business becomes more globally based, having a robust solution to security and user management issues becomes paramount. The organizations was looking for:

·         Simplified user experience for over 3000 company users and more than 6 million dynamic student and staff population

·         Infrastructure and administration cost reduction

·         Managing security risk by controlling 3rd party access to ETS systems

·         Enforce compliance and manage audit reporting

·         Automate on-boarding and decommissioning of user account to improve security, reduce administration costs and enhance user productivity

·         Improve user experience with simplified sign-on and user self service

Innovation and Results:

1.    Manage Risk

·         Centralized system to control user access

·         Provided secure way of accessing service providers' application using federated SSO.

·         Provides reporting capability for auditing, governance and compliance.

2.    Improve efficiency

·         Real-Time provisioning to target systems

·         Centralized provisioning system for user management and access controls.

·         Enabling user self services.

3.    Reduce cost

·         Re-using common shared services for provisioning, SSO, Access by application reducing development cost and time.

·         Reducing infrastructure and maintenance cost by decommissioning legacy/redundant IDM services.

·         Reducing time and effort to implement security functionality in business applications (“onboard” instead of new development).

ETS was able to fold in new and evolving requirement in addition to the initial stated goals realizing quick ROI and successfully meeting business objectives.

Congratulations to the winners once again. We will be sure to bring you more from these Innovation Award winners over the next few months.

Thursday Oct 04, 2012

2012 Oracle Fusion Middleware Innovation Awards Announced

Guest Contributor: Margaret Harrist. Originally posted on Oracle NewsCentral

Companies from around the world were honored Tuesday for their innovative solutions using Oracle Fusion Middleware. This year’s 27 award winners, representing 11 countries and a wide span of industries, wowed the judges with a range of projects across eight product categories.

A panel of judges scored each entry across multiple categories, including the uniqueness of their business case, business benefits, level of impact relative to the size of the organization, complexity and magnitude of implementation, and the architecture’s originality.

In a general session just before the award presentation, Oracle Executive Vice President Hasan Rizvi highlighted a few of the winners’ original implementations, including Nike, Los Angeles Department of Water and Power, and Nintendo of America.

Congratulations to the 2012 winners:

  • Oracle Exalogic: Netshoes, Claro, UL, and Ingersoll Rand
  • Oracle Cloud Application Foundation: Mazda Motor Corporation, HOTELBEDS Technology, Globalia, Nike, and Comcast Corporation
  • Oracle SOA and Oracle BPM: NTT Docomo, Schneider National, Amadeus, and Motability
  • Oracle WebCenter: News Limited, University of Louisville, China Mobile Jiangsu, Life Technologies
  • Oracle Identity Management: Education Testing Service and Avea
  • Oracle Data Integration: Raymond James and William Morrison Supermarkets
  • Oracle Application Development Framework and Oracle Fusion Development: Qualcomm, Micros Systems, and Marfin Egnatia Bank
  • Business Analytics (Oracle BI, Oracle EPM, Oracle Exalytics): INC Research, Experian, and Hologic

Thursday at OpenWorld: Identity Management

Before you know it, we are at the last day at Oracle OpenWorld. But just the same, Thursday is packed with informational, educational and networking opportunities.

Here’s what is in store for you today:

Thursday, October 4, 2012

CON5749: Solutions for Migration of Oracle Waveset to Oracle Identity Manager
11:15 a.m. – 12:15 p.m., Moscone West 3008

Many customers of Oracle Waveset (formerly Sun Identity Manager) are planning a migration to the strategic provisioning product Oracle Identity Manager. There are several approaches to migrating to Oracle Identity Manager. Presented by Hub City Media and Oracle, this session covers these various approaches to help you select the optimum choice for your implementation.

CON9640: Evolving Identity Management
12:45 p.m. – 1:45 p.m., Moscone West 3008

Identity management requirements have evolved and are continuing to evolve as organizations seek to secure cloud and mobile access.  Customers are seeing good success reducing costs and supporting business growth with by embracing a service-oriented, platform approach to addressing identity management requirements.  This session will explore these emerging requirements and share best practices for evolving your implementation.

CON9662: Securing Oracle Applications with the Oracle Enterprise Identity Management Platform
2:15 p.m. – 3:15 p.m., Moscone West 3008

Oracle Enterprise Identity Management solutions are designed to secure access and simplify compliance to Oracle Applications.  Whether you are an EBS customer looking to upgrade from Oracle Single Sign-on or a Fusion Application customer seeking to leverage the Identity instance as an enterprise security platform, this session with Qualcomm and Oracle will help you understand how to get the most out of your investment.

HOL10479: Integrated Identity Governance
12:45 p.m. – 1:45 p.m., Marriott Marquis – Salon 1/2

This hands-on lab demonstrates Oracle’s integrated and self-service-oriented identity governance solution, which includes simple access request, business-user-friendly access certification, closed-loop remediation, and both standard and privileged accounts.

For a complete listing, refer to the Focus on Identity Management document. And as always, you can find us on @oracleidm on twitter and FaceBook. Use #oow and #idm to join in the conversation.

Wednesday Oct 03, 2012

America The Vulnerable

At the Executive Edge this week, Joel Brenner shared his perspective on the state of cyber-security. Today our most critical military and corporate secrets are under attack. In his presentation, Joel shared his perspective on how organizations can can better prepare for the changing security climate.

The amount of state sponsored espionage has highlighted weaknesses in our national security infrastructure. The Internet was primarily intended to provide a means of collaboration for non-commercial entities. Today it is the backbone of our digital commerce and digital experience and it was not designed to secure the activities and data we share today. 

Check out "America The Vulnerable" and learn more. 

The Threats are Outside the Risks are Inside

In the past few years we have seen the threats against the enterprise increase dramatically. The number of attacks originating externally have outpaced the number of attacks driven by insiders. During the CSO Summit at Open World, Sonny Singh examined the phenomenon and shared Oracle's security story. While the threats are largely external, the risks are largely inside.

Criminals are going after our sensitive customer data. In some cases the attacks are advanced. In most cases the attacks are very simple. Taking a security inside out approach can provide a cost effective way to secure an organization's most valuable assets.

Today @ OOW: Identity Management for the SoMoClo world

Today at OpenWord, we have a very interesting lineup of Identity Management sessions that discuss how to extend identity management securrley to cloud, mobile and social ecosystems.

Here are 3 of the can’t miss identity management sessions today:

Identity Management and the Cloud: Security is regularly identified as the #1 barrier to cloud service adoption. Oracle Identity Management is designed to help customers extend and connect core identity services to SaaS applications and systems. This session explores how organizations are using Oracle Identity Management with cloud services and how some customers are offering identity management as a cloud service.

Real-time External Authorization for Applications, Middleware and Databases: Externalization of authorization is key to manageability and audit. This session covers enterprise wide authorization solution deployment best practices and real-world examples of using Oracle Entitlements Server—the one-stop standards-compliant authorization solution—for middleware, applications, and data.

Delivering Secure WiFi on the Tube as an Olympics Legacy from London 2012: In this session, Virgin Media, the U.K.’s first combined provider of broadband, TV, mobile, and home phone services, shares how it is providing free secure Wi-Fi services to the London Underground, using Oracle Virtual Directory and Oracle Entitlements Server, leveraging back-end legacy systems that were never designed to be externalized. As an Olympics 2012 legacy, the Oracle architecture will form a platform to be consumed by other Virgin Media services such as video on demand.

Here is the complete lineup of Identity Management sessions today at OOW.

Wednesday at OpenWorld: Identity Management

Divide and conquer! Yes, divide and conquer today at Oracle OpenWorld with your colleagues to make the most of all things Identity Management since there’s a lot going on.

Here’ the line-up for today:

Wednesday, October 3, 2012

CON9458: End End-User-Managed Passwords and Increase Security with Oracle Enterprise Single Sign-On Plus
10:15 a.m. – 11:15 a.m., Moscone West 3008

Most customers have a broad variety of applications (internal, external, web, client server, host etc) and single sign-on systems that extend to some, but not all systems. This session will focus on how customers are using enterprise single sign-on can help extend single sign-on to virtually any application, without costly application modification while laying a foundation that will enable integration with a broader identity management platform.

CON9494: Sun2Oracle: Identity Management Platform Transformation
11:45 a.m. – 12:45 p.m., Moscone West 3008

Sun customers are actively defining strategies for how they will modernize their identity deployments. Learn how customers like Avea and SuperValu are leveraging their Sun investment, evaluating areas of expansion/improvement and building momentum.

CON9631: Entitlement-centric Access to SOA and Cloud Services
11:45 a.m. – 12:45 p.m., Marriott Marquis, Salon 7

How do you enforce that a junior trader can submit 10 trades/day, with a total value of $5M, if market volatility is low? How can hide sensitive patient information from clerical workers but make it visible to specialists as long as consent has been given or there is an emergency? In this session, Uberether and HerbaLife take the stage with Oracle to demonstrate how you can enforce such entitlements on a service not just within your intranet but also right at the perimeter.

CON3957 - Delivering Secure Wi-Fi on the Tube as an Olympics Legacy from London 2012
11:45 a.m. – 12:45 p.m., Moscone West 3003

In this session, Virgin Media, the U.K.’s first combined provider of broadband, TV, mobile, and home phone services, shares how it is providing free secure Wi-Fi services to the London Underground, using Oracle Virtual Directory and Oracle Entitlements Server, leveraging back-end legacy systems that were never designed to be externalized. As an Olympics 2012 legacy, the Oracle architecture will form a platform to be consumed by other Virgin Media services such as video on demand.

CON9493: Identity Management and the Cloud
1:15 p.m. – 2:15 p.m., Moscone West 3008

Security is the number one barrier to cloud service adoption.  Not so for industry leading companies like SaskTel, ConAgra foods and UPMC. This session will explore how these organizations are using Oracle Identity with cloud services and how some are offering identity management as a cloud service.

CON9624: Real-Time External Authorization for Middleware, Applications, and Databases
3:30 p.m. – 4:30 p.m., Moscone West 3008

As organizations seek to grant access to broader and more diverse user populations, the importance of centrally defined and applied authorization policies become critical; both to identify who has access to what and to improve the end user experience.  This session will explore how customers are using attribute and role-based access to achieve these goals.

CON9625: Taking Control of WebCenter Security
5:00 p.m. – 6:00 p.m., Moscone West 3008

Many organizations are extending WebCenter in a business to business scenario requiring secure identification and authorization of business partners and their users. Leveraging LADWP’s use case, this session will focus on how customers are leveraging, securing and providing access control to Oracle WebCenter portal and mobile solutions.


Identity Management Customer Advisory Board
2:30 p.m. – 3:30 p.m., Four Seasons – Yerba Buena Room

This invitation-only event is designed exclusively for Customer Advisory Board (CAB) members to provide product strategy and roadmap updates.

Identity Management Meet & Greet Networking Event
3:30 p.m. – 4:30 p.m., Meeting Session
4:30 p.m. – 5:30 p.m., Cocktail Reception
Yerba Buena Room, Four Seasons Hotel, 757 Market Street, San Francisco

The CAB meeting will be immediately followed by an open Meet & Greet event hosted by Oracle Identity Management executives and product management team. Do take this opportunity to network with your peers and connect with the Identity Management customers.

For a complete listing, refer to the Focus on Identity Management document. And as always, you can find us on @oracleidm on twitter and FaceBook. Use #oow and #idm to join in the conversation.

Tuesday Oct 02, 2012

Identity Management: The New Olympic Sport

How Virgin Media Lit Up the London Tube for the Olympics with Oracle

If you are at Open World and have an interest in Identity Management, this promises to be an exciting session.

Wed, October 3rd
Session CON3957: Delivering Secure Wi-Fi on the Tube as an Olympics Legacy from London 2012
Session Time: 11:45am-12:45pm
Session Location: Moscone West L3, Room 3003
Speakers: Perry Banton - IT Architect, Virgin Media
                   Ben Bulpett - Director, aurionPro SENA

In this session, Virgin Media, the U.K.'s first combined provider of broadband, TV, mobile, and home phone services, shares how it is providing free secure Wi-Fi services to the London Underground, using Oracle Virtual Directory and Oracle Entitlements Server, leveraging back-end legacy systems that were never designed to be externalized. As an Olympics 2012 legacy, the Oracle architecture will form a platform to be consumed by other Virgin Media services such as video on demand. Click here for more information.

Executive Edge: It's the end of work as we know it

If you are at Oracle Open World, it has been an exciting couple of days from Larry's keynote to the events at the Executive Edge. The CSO Summit was included as a program within the Executive Edge this year. The day started with a great presentation from Joel Brenner, author of "America The Vulnerable", as he discussed the impact of state sponsored espionage on businesses. The opportunity for every business is to turn security into a business advantage. As we enter an in-hospitable security climate, every business has to adapt to the security climate change. 

Amit Jasuja's presentation focused on how customers can secure the new digital experience. As every sector of the economy transforms to adapt to changing global economic pressures, every business has to adapt. For IT organizations, the biggest transformation will involve cloud, mobile and social. Organizations that can get security right in the "new work order" will have an advantage. It is truly the end of work as we know it.  The "new work order" means working anytime and anywhere. The office is anywhere we want it to be because work is not a place it is an activity. Below is a copy of Amit Jasuja's presentation.

News from OpenWorld: Innovation Across Fusion Middleware Product Portfolio

Oracle today announced that it continues to drive innovation across its Oracle Fusion Middleware product suite and extend industry’s #1 business innovation platform for the enterprise and the cloud.  

Innovations across Oracle Fusion Middleware product portfolio help customers and partners to innovate, cut costs, and reduce complexity. Oracle Fusion Middleware components include  Oracle SOA Suite, Oracle WebLogic Server, Oracle WebCenter, Oracle Business Intelligence, Oracle Identity Management and Oracle Data Integration.

Additional Resources:

Press Release: Oracle announces Identity Management 11g Release 2

Press Release: Oracle announces Oracle Identity Governance Suite

Press Release: Oracle announces Oracle Privileged Account Manager

Website: Oracle Identity Management

On-Demand webcast: Identity Management 11gR2 Launch

Oracle Magazine: Security on the Move


Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.


« October 2012 »