Audit And Assurance Software Watch Day - Iiabel.be

Transcription

Audit and Assurance SoftwareWatch ez@oracle.com

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Joiners, Movers and LeaversTargets .Privileged Accounts ? Root Administrators Sys, Sysadmin Application AccountsAccessManagementSECURITY. SOFTWARE. COMPLETE.

Explosion of Scale Few Administrators Handful of Audit Staff Too many privileged accountsSECURITY. SOFTWARE. COMPLETE.

Oracle Identity GovernanceGovernance onGrant User AccessMonitor User ckoutIdentityCertificationsIT AuditMonitoringRogueDetection &ReconciliationAccess CatalogIT OwnershipBusinessAttributesReporting &PrivilegedAccessMonitoring

Oracle Identity Governance SuiteGovernance PlatformOracle Identity ationOracle Identity AnalyticsERP, DBand of questOracle PrivilegedAccount heck-in/Check-out

Oracle Identity GovernanceAccess CatalogHarvestingCatalogdefinitionCatalog enrichment

Oracle Identity GovernanceShopping Cart SimplicityBrowseCompare &SelectTrackReceiptConfirmation

Privileged Account ManagementComplete Lifecycle Management of High Risk ance

Oracle Identity GovernanceRole Lifecycle ManagementRole DefinitionRole ttom-UpApproachChange Mgmt Role Change ApprovalsRoleAudit, AnalyticsRole AuditGovernance Role Definition Attestation Role Versioning Role –Entitlement MappingHistory Rollbacks & Comparison Role Membership History Role Consolidation Role Change Impact Analysis Approvals History Role Mining Rule Management Role Ownership History Role Membership Attestation

A Smarter Approach to Identity ComplianceReduceCost, Time & Risk IdentityWarehouseAggregating Information & Building aCatalogPrioritizing & Automating CertificationClosed-Loop Feedback & RemediationSECURITY. SOFTWARE. COMPLETE.Simplified User Experience & Reporting

Oracle Identity GovernanceIT Audit MonitoringIT Audit PoliciesRole ExceptionsMonitoring Across Entitlements & Roles Roles Vs. Actuals 50 Reports Within Application or CrossApplications Entitlements Outside Roles Compliance Dashboards Mitigating Controls Compliance Metrics Monitoring Preventative & DetectiveRemediation Manager Signoff for AuditExceptions Historical Trend Analysis Remediation Tracking

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Oracle Audit Vault and Database FirewallDetective/Preventive Control for Oracle and Non-Oracle DatabasesDatabase ockFirewall EventsAuditorReportsAlertsSecurityManagerAudit Data!PoliciesAudit VaultOS, Directory Services, Filesystem & Custom Audit Logs

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Privileged User ControlsPreventive Control for Oracle DatabasesDatabase VaultSecurityDBA Limit DBA access to app dataProcurement Multi-factor authorizationHR Enforce enterprise datagovernance, least privilege Realms create protective zones Out-of-the-box nsselect * from finance.customersDBA

Label Based Access ControlPreventive Control for Oracle DatabasesOracle Label Security Virtual information partitioningSensitiveTransactions Apply labels to users and dataConfidentialReport Data Flexible classification labels Automatically enforced row levelaccess control Transparent to applicationsPublicReportsConfidentialSensitive

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Layered securityProtecting confidential business InformationProductionDev/Test/Acceptance/ AccessManagementAccessManagementSECURITY. SOFTWARE. COMPLETE.

Masking Data for Non-Production UsePreventive Control for Oracle DatabasesLAST NAMEOracle Data Masking Replace sensitive app 294360,000Production Referential integrity preservedTestData Redaction ? Extensible template libraryDev Automated masking policies Support for non-Oracle databasesNon-ProductionLAST BKJHHEIEDK252-34-134540,000

Layered securityProtecting confidential business InformationAccessManagementSECURITY. SOFTWARE. COMPLETE.

Why Oracle ?One Company, One Solution, One Stack Proven vendor Acquire and retain best of breed technology and talentBattle-tested for large, mission-critical applicationsReferenceable, award-winning customer deploymentsGartner, Kuppinger, The Forrester Wave, Forrester, BurtonGroup, . Most complete and integrated best-of-breed portfolio Service-Oriented Security Interoperable components Future proof investment Standards-based and hot pluggable for easy integration Established deployment best practices Large implementation ecosystem

SECURITY. SOFTWARE. COMPLETE.24

Oracle Audit Vault and Database Firewall Detective/Preventive Control for Oracle and Non-Oracle Databases OS, Directory Services, File system & Custom Audit Logs Firewall Events Users Applications Database Firewall Allow Log Alert Substitute Block Audit Data Audit Vault Reports Alerts ! Policies Auditor Security Manager . SECURITY. SOFTWARE. .