Security as a business enabler not a bottleneck

  • Time for safety to be notion of as an enabler and a commercial enterprise differentiator
  • Customers need safety, but they don’t want protection to be the bottleneck

Security as a business enabler, not a bottleneckFOR many companies, security is set restricting access to, and putting up partitions around, touchy records and systems.

But for carriers in the identity management area, supplying the proper form of get admission to to the right type of records to the proper human beings honestly opens up commercial enterprise possibilities – for example, the visiting salesman who can get stock records from his corporate network quickly to seal a deal.

“It is time for safety to be notion of as an enabler and a business differentiator,” says Kenneth Hee, Asia Pacific director of Business Development Enterprise Security at Oracle Corp, touting this as the design philosophy at the back of Oracle Identity Management 11g Release 2, the brand new iteration of the Oracle Identity Management platform first delivered in 2009.

Hee became speaking to select media simply before the Kuala Lumpur leg of an Asia Pacific series of roadshows that had seen him traveling 14 cities already to tout Release 2, which was released international on July 19.

Oracle says the new release lets in customers to include cloud, cell and social infrastructures and reach new user communities to assist further amplify and expand their businesses – with out sacrificing safety.

“Customers need protection, but they don’t need safety to be the bottleneck” when they roll out new apps or functions, says Hee.

“The way protection has been architected in a corporate surroundings is still very a good deal a case of absolutely everyone having their personal approach. For instance, I changed into in Korea talking to an car producer, and they had 20 specific apps at the Android, all evolved by means of specific departments for extraordinary uses for personnel.”

“About half of of the human beings developing those sorts of company apps have no steady implementation of security. Companies must no longer have separate remedy for their web apps and their cellular apps,” he provides.

There is enough reason for agencies to consider protection, he says, mentioning published reviews: Six million passwords stolen from social community LinkedIn, information on 12 million credit score cards stolen from Sony’s online game website; and financial institution fraud costing about US$7 billion in losses – throughout a one-year duration alone.

“It all boils down to how you secure the crown jewels of your business enterprise. If you are taking your eyes off the ball, you risk your crown jewels,” says Hee. ”Oracle’s attitude is that you have to cowl all the bases – or as we positioned it, embed security at every layer of the stack: Storage, server, digital gadget, operating gadget, database, middleware and applications.”

Security as a business enabler, not a bottleneckA key component of Oracle Fusion Middleware, Oracle Identity Management 11g Release 2 is constructed on Oracle’s open standards technique, and companies can leverage those technologies out-of-the-container with Oracle Fusion Middleware, in addition to non-Oracle applications and middleware, the business enterprise claims.

However, Hee says the stack (percent) is what publications the business enterprise’s complete studies and improvement (R&D) in this area. “In the product phase that I represent, identity management, safety must be part and parcel of the utility, not something you upload one by one.”

“In fact, all our future releases of our packages, along with the ones in our PeopleSoft and Seybold households, might be the usage of our identity management answer,” he provides.

One of the key drivers in constructing the new edition become simplicity. “Some of the comments we've got were given from Identity Management customers is that some of those solutions can be hard to navigate round,” he says.

The whole enjoy of soliciting for get entry to can be daunting for say, a advertising and marketing character, who is provided with a whole smorgasbord of options, with all these weird gadget names.

“So our purpose became to provide something as simple as Amazon’s one-click on purchasing experience,” says Hee. “Naming systems are critical, as well as how you do cataloguing or the way you present data for your person – the entire revel in has to have a purchasing-cart simplicity, together with encouraged get admission to from colleagues with the equal wishes as you.”

“Once you test out, the request may be forwarded to the applicable people for approval, and you can also tune this manner an awful lot as you will you tune your Amazon cargo, attending to see wherein precisely inside the approval degree it's miles,” he provides. “It is seamless for the person – you don’t need to go for education.”

Oracle says it also offers a complete, verified directory carrier alternative with Oracle Identity Management 11g Release 2. New features include proximity based looking and digital attributes enable frequent updates to the directory made by region based totally services to help cell and social applications.

“We have raised the bar for our software in this place, truly because the kind of utilization has changed exceptionally,” says Hee.” It’s not just about number of customers. For example, we have a patron in Singapore that is talking about near a 1,000 authentications in step with second, and we’re now not talking approximately a person using a supercomputer, simply ordinary servers.”

Privileged debts

The one issue about installing any corporation software nowadays is the sheer number of money owed that come with it. Organizations will need to modify regular as well as privileged customers (or admin money owed).

“Unfortunately, the number of admin accts has been growing rapidly, and is normally controlled in a completely unorganized manner,” says Hee.

“For instance, whilst you control a records middle, the point of interest is on operational efficiency, so it’s not unthinkable for humans to proportion accounts to get things carried out as fast as viable,” he provides. “But while some thing is going wrong, responsibility turns into an trouble. Who used this account remaining?

“Even if you keep a logbook, it’s tough to song. What we've in this release is a password vault – you don’t get a privileged account, however whilst you make a request, you’re assigned a password for that challenge or term. When you've got completed what you need to do, the system will reset the password.”

Bring your personal identity

With the convey your very own device (BYOD) trend taking hold in the company international, organizations want to rethink their safety  method.

“The way we paintings has changed – work is now not a place, however an interest. There is no physical boundary. This is a clear case of in which safety may be an enabler,” says Hee.

One of the important thing modules in Release 2 is cell identity control, which leverages on the present Oracle Identity Management platform and extends it to the mobile tool stage.

“When you want to sign up to view customer data, as an example, based totally on place (the usage of GPS for example), we can dynamically authorize them based on the person profile which you have constructed,” says Hee.

“For example, if previously you handiest accessed information from Singapore and Malaysia the use of most effective English. If you presently do it from a exceptional region, your chance profile has changed, so that would require a exclusive challenge/ response – and it gained’t be just your mom’s maiden name, but perhaps a question asking what your first process became.”

All these may be customised by using the purchaser, together with at what degree the danger profile adjustments and the ideal undertaking/ response to verify and authenticate the person. And if the consumer already knows he might be travelling, he could make a request beforehand.

“This could just be a depend of coverage-putting from the agency itself,” Hee says.

“What Oracle has done differently, is the way we authenticate a person -- we do it dynamically and in actual-time, or what we call ‘real-time adaptive authentication’ – it adapts to the actual-time scenario and formulates a proper challenge/ response.

“You don’t simply depend on a userID and password, but on other layers of authentication. It can song behavioral styles – the fashion is for dynamic authentication and authorization.

“The vintage way was that when you have been in, you bought all the get admission to accruing to that userID , however what we've got is part known as the Oracle entitlement server, which looks on the scenario and chooses the entitlement in actual-time – as an instance, a one of a kind stage of access because your danger profile has modified,” he says.

However, Release 2 nonetheless enables unmarried signal-ons.

“Another crucial piece is unmarried sign-on for cellular devices – after you sign up successfully to the Oracle piece, you get access to all of the facts you had earlier than, except when your risk profile has modified, as above,” he says, including that the cell identification control module runs each at the backend and on the patron tool.

“We consider this will give customers more self assurance in enforcing stuff like this, a clean case of enablement,” he says.

Another module is social signal-on, though Oracle recommends this best for low-assurance apps, like giving customers product records that will make a purchase decision, or product assurance registration.

“We don’t advocate it for e-banking or apps like that,” Hee says.

“According to one take a look at, when people find that they ought to check in or join up just to take part, seven out of 10 times, they simply don’t hassle. We need to give clients the selection to ‘carry your very own identity’.”
 
Related Story:

Security no longer approximately ‘no,’ but ‘realize’

Keyword(s) :
Oracle Identity Management Kenneth Hee BYOD Security Enterprise Security
Author Name :
A. Asohan

Other News

Acer’s new laptops are worth looking forward to
Acer’s new laptops are really worth looking forward to
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital reproduction of Digerati50 2018-2019

Download

Site Map

Company

Follow Us

Data Security as a Business Enabler – Not a Ball and Chain

Komentar

Postingan populer dari blog ini

Fake antivirus invading app stores: Kaspersky

Brocade names new head for South-East Asia

More than 1-in-5 households in Singapore on fiber