Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.
1. Oracle Identity Governance Complete Identity Lifecycle
Management
M.Sc.Eng. Mārtiņš Orinskis,
DPA Ltd lead project manager
07.11.2013
2. About me
M.Sc.Eng. Mārtiņš Orinskis
DPA Ltd lead project manager
Value of information
Quality of service
Importance of identity
Team work
3. Our story
DPA Ltd founded in
Lithuania
Ukraine
Belarus
Georgia
Estonia
4. Our specialties
IT security policy, IT
audit, ISO 27001
Custom
development /
Business processes
streamline/
automatization
User repositories
and user
management
Product
implementation
Biometry solutions
Software licensing
5. Our experience in identity management
SSO and multi factor
authentication
Casino Face
recognition
Federated enterprise
authentication
Biometrical
physical
access
SOA and enterprise
processes
ISO 27001
IT policy development
Biometrical data
processing system
Digital identity
provisioning
8. Complete Identity Lifecycle – its a process
New employee
Change
password
Role modification
New role
Block account
Change events
Delete account
IT
infrastructu
re /
information
New account
Attribute change
Access request
IT resource change
Physical access
change
Employee leave
Partner and
client interaction
9. Vision of complete identity governance
Physical identity
Authentication and
SSO
Authorization
Federation
Account provisioning
Fraud detection
Self service
On-line auditing
On-line monitoring
Role governance
Automated requests
and approvals
Physical identity
Compliance
Reconciliation and
certification
Segregation of
duties
Software
(access and identification)
Platform security
Devices
10. 1. Get access in time - productivity
Physical access to
premises for
employees and
guests
Access to business
applications
Fast partnership /
on boarding / off
boarding
Password
management
11. 2. IT system protection from back doors and
developers - safety
Authorization AUTHZ platform
Authentication AUTHN platform
12. 3. Know who is accessing your assets
Certification
Real time auditing
Information
classification
Real time access
monitoring
13. 4. Streamline business processes
Approval and
request
management
Provisioning / deprovisioning
Delegated
administration
Trust your partners
Self service
Single sign on
14. 5. Physical access, security and surveillance
Streamline logical
and physical
security
Real-time fraud
detection unauthorized
changes
Physical person
identification security
15. 6. Protect the information
Attestation
Compliance
Risks
Segregation of
duties
Reconciliation
Role management
16. Oracle Identity Governance
Authorization
Oracle Identity
Governance products
Technology
Storage
Federation
Provisioning
De-provisioning
Identity admin
Trust
Identity services
Authentication
Role mgmt
Policy mgmt
OIM
OAAM
OIF
OAM
OES
OPSS
OIA
OWSM
SOA
BI
DB
UI
LDAP
Adapter
Custom
OVD
File
19. Every journey starts with a first steps...
Account
provisioning to
critical systems
Streamline
physical and
logical access
Implement
Biometrics
Streamline
business
processes
Improve onboarding and offboarding
Hellomynameis Martins Orinskis andI’am a leadprojekctmanagerin DPA.
Identitymanagementis a continuous process withhighsecurity risks.Identitymanagementisnotan IT issueitsmainlysolvesManagement, HR and IT securityproblems.
Inthenextslides I ‘lldescribemyvisionaboutidentitymanagemrnt.