Monday May 05, 2014

Identity Enabling Mobile Security

Authored by Suresh Sridharan, Business Manager, Security

Smart Connected Device Growth: The growth of smartphones and tablet devices has been phenomenal over the past 4 years. Global smartphone shipments have grown extensively from approximately 100m units in 2010 to 725m units in 2012, reaching 1b devices in January 2014. Simultaneously, tablet shipments have grown from 5m units in 2010 to approximately 125m units in 2012. Tablet numbers are likely to touch 400m units by 2017.

This explosion in the shipment of smart connected devices has also led to a significant change in users’ behavior and expectations.

In a corporate environment, the phenomenon of Bring Your Own Device (BYOD) is gaining momentum. Gartner predicts that 38% of all organizations will have an “all BYOD” policy by 2016, up from 6% today (2014). If the same device is being used for both personal and work purposes, users will expect the same experience across corporate and personal apps. Further, employees regularly use similar apps for both business and personal purposes examples include: WhatsApp, Skype and Facebook..

Mobile devices present benefits both for organizations and for individuals. Surveys show that a BYOD policy helps employee gain an extra 37 minutes of productive time every week. To increase sales productivity, some of our customers are mobile-enabling sales teams to ensure that they have access to the latest information when they meet with customers.

Security is one of the most significant mobile device challenges both for consumers and for enterprises. Although mobile-commerce is growing rapidly (to $25b in the US alone), 60% all retail transactions that get to the checkout stage are abandoned with security as one of the main causes, according to recent data.

As corporate data on the device co-mingles with user data on a personal device, it becomes challenging for enterprises to impose restrictions on the use of devices. About 40% of adults do not protect their smartphones with a passcode, with married adults that number goes up to 45%.
In order to address security challenges, IT should be able to define and enforce policies that meet security and privacy standards to protect intellectual property, other corporate assets and optionally, personal employee data.

There are three things to consider while implementing security in the new mobile age:

  1. Implement a strong identity management system that allows one to manage users and ensure that they are able to access information based on the principle of least privilege to carry out the necessary tasks.
  2. Implement an access management solution to secure data based on who is accessing it and the risk profile of that specific transaction.
  3. Implement a mobile security solution that will help secure data on the device and ensure corporate security policies are enforced on the device from which assets are being accessed.

In essence, organizations need to ensure that application data is secured based on the user accessing it and the device and location from which it is being secured. Securing the device and the user identity, in isolation, is not sufficient.

Interested in following security blog more closely, check out the Oracle Identity Management blog here

Tuesday Oct 15, 2013

Unleashing Your Mobile Workforce

Author: Kevin Moulton, Oracle

Your employees use their smartphones and tablets in every aspect of their lives. The days of carrying a second mobile device for corporate calls and emails are over. They don't want to carry multiple devices to do the same job, and they sure don't want to have to go to the office or go back to their desk just to access some corporate application. They want mobile access!

Sure, you have to deal with the challenges of BYOD, but that's for another day. Today, let's talk about how to get your employees what they are demanding. In other words, how do you unleash your mobile workforce?

There are many advantages. Think of your employees out in the field, in the showroom with your customers, or on your manufacturing floor, with all of the data they need to answer questions, make decisions, or write proposals right at their fingertips. Think about the efficiency of your business processes when your employees can complete their workflow tasks anytime, and from anywhere.

Developing Mobile Apps

Oracle ADF Mobile allows you to quickly develop applications using your existing HTML, CSS and Java skills that can be deployed to iOS and Android. There is no need to train or hire staff to write native mobile OS code.  ADF Mobile uses HTML5 for displaying content and Java for business logic. Write the code once, and you have an app that will work on the Apple and Android smartphones and tablets that your employees own and carry. ADF Mobile will render the content appropriately for whatever device the content need be displayed on. In this way, ADF mobile gives you the flexibility of a mobile web app combined with the control of the device capabilities of a native app, such as camera control, location services, and contacts. It is truly the best of both worlds.

Connecting to Back-End Data

The key to a successful mobile workforce is access to applications and data. You want your employees to have access to what they need to get their jobs done without having to go back to the office or back to their desks. Most mobile apps will connect to an application server in order to retrieve, create, and modify data. With ADF Mobile and Weblogic, you can connect to your back-end data with REST-based web services. Weblogic Server supports the WebSocket protocol, included in the HTML5 standard, which allows the client and the server to send data independently of one another over a single connection.

While REST and JSON can be used to connect your mobile apps to your back-end data, enterprise applications are generally not built using these technologies. You need a translator to mediate the changes in protocol and data formats between the mobile apps and your back-end applications. Oracle Service Bus is that mediator. 

Oracle Service Bus can provide a connection via many protocols, including REST, SOAP, HTTP, JMS, RMI, and FTP. Adapters are available for numerous applications, including E-Business Suite, PeopleSoft, Siebel, and SAP.

Business Process Management

Human interaction is often required to complete a business process. For example, expense reports must be approved by managers, tasks need to be routed through different departments, and purchases need to be requested, approved, and fulfilled. With your mobile workforce, your employees will demand the ability to complete their workflow tasks on their smartphones and tablets.  Oracle Business Process Management (BPM) can accomplish your workflow needs, and BPM includes a task list application for iPad, iPhone, and Android.


The pressure to provide mobile access to enterprise applications is growing by the day.  Oracle Fusion Middleware provides all of the components you need to build mobile apps and give them access to your back end applications and data.

Oracle provides a complete solution to unleash your mobile workforce.

About the Writer:

Kevin Moulton has been in the IT industry for more than 25 years, and with Oracle for 7 years. Kevin is responsible for facilitating technology discussions on social and mobile technologies. He is also a Distinguished Toastmaster. Follow Kevin on Twitter at, where he sometimes tweets about technology, but might also tweet about running, beer, food, baseball, football, good books, or whatever else grabs his attention. Kevin is a regular contributor to this blog so stay tuned for more posts from him.


Get the latest on all things Middleware. Join Oracle's Middleware Community today.

Find Us on facebook Follow us on twitter Catch Us on YouTube 


« November 2015