You are on page 1of 29

Securing Corporate Applications

and Data on Personal Devices


Oracle Mobile Security Strategy and Overview

Khanh Le
Enterprise Security Sales Manager
Apr, 2015

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Safe Harbor Statement


The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracles products remains at the sole discretion of Oracle.

Copyright 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal/Restricted/Highly Restricted

Program Agenda
1

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal/Restricted/Highly Restricted

Program Agenda with Highlight


1

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal/Restricted/Highly Restricted

113 PHONES STOLEN


Every minute in the US

50%

40%

Robberies
SFO

Robberies
NYC
40%

28%
Robberies
London

Robberies
Ecuador

Insight Crime 2014

$30B
SMARTPHONE

BLACK MARKET

14M phones stolen


Ecuador, Bolivia,
Colombia, Peru

GSMA 2014

Huffington Post Oct 2014

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

CSO Online May 11 2014

USE PERSONAL DEVICES FOR WORK

ITHOUT
50%W
Of Employers

PERMISSION

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Mobile Malware and Fraud

31%

Reported fake link & phishing scams on mobile devices

Norton Cybercrime report 2014

155%

2014

614%
Mobile Threat report 2014

2014

MOBILE MALWARE GROWTH


Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

NEW MOBILE SECURITY REQUIREMENTS


BYOD

Application management

Device management

Fraud detection

Identity management

Device provisioning

Secure container

Multi-user devices

Sign-on

Lost & stolen devices

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda with Highlight


1

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal/Restricted/Highly Restricted

10

Oracles Mobile Security Suite Strategy


CONTAINER

Isolate corporate data,


support remote wipe,
restrict data transfer

CONTROL

Secure applications &


communication, corporate
application store

EXPERIENCE

Role based access, self


service request, sign-on,
fraud detection

MOBILE SECURITY SUITE


11
Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Container Applications

SECURE
BROWSER

FILE
MANAGER

DOCUMENT
EDITOR

WHITE
PAGES

MAIL
MANAGER
(ADD ON)

APPLICATION
CATALOG

THIRD PARTY
APPLICATIONS

+MORE

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

DELETE
CONTAINER

CORPORATE DATA, APPLICATIONS & EMAIL

REMOTE

WIPE

PRESERVE
PERSONAL APPLICATIONS, PICTURES, EMAIL
& MESSAGES

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

EMAIL
COPY/PASTE
PRINTING
AIRDROP/DROPBOX

DATA LEAK PREVENTION


Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

50+ Policy Parameters


LOCATION

TIME

DEVICE

USER/GROUP

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

DATA

Integrated Platform

CONTRACTORSCUSTOMERS
EMPLOYEES& PARTNERS & PROSPECTS

ACCESS
MANAGEMENT
MOBILE & SOCIAL
SIGN-ON

IDENTITY
GOVERNANCE

ENTERPRISE &
WEB SINGLE
SIGN-ON

FRAUD
DETECTION

IDENTITY
FEDERATION

EXTERNAL
AUTHORIZATION

ACCESS
REQUEST
ACCESS
CERTIFICATION

COMMON REPOSITORY

DATABASES DIRECTORY A
P
SERVICES
ENTITLEMENT
P
APPLICATIONS
CATALOG
S
OPERATING
SYSTEMS

PRIVILIGED
ACCOUNTS

USER
PROVISIONING

MOBILE
SECURITY

SINGLE
USER
VIEW

CERTIFICATION
REVIEW

PRIVILEGED
ACCOUNT
MANAGEMENT

APPLICATION
STORE

NAMING
SERVICES

THOUSANDS

MILLIONS

VIRTUAL
DIRECTORY

S APP
S APP

META
DIRECTORY

EXTREME
SCALE

DEVICE
AUTHN

SECURE
WORKSPACE

APP
S APP

FRAUD
DETECTION

USER
AUTHENTICATION

INTEGRATED
INTEROPERABLE

AP
P

DATA LEAK
PREVENTION

ACCESS
REQUEST

LOW
TCO

HOST
ACCESS
CONTROL

BILLIONS
LDAP
DIRECTORY

SIGN ON
SINGLE SIGN ON

SELF
SERVICE

APP

MOBILE SECURITY SUITE

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

DIRECTORY
SERVICES

LOCATION
DATA

10s of BILLIONS

48%
46%
35%

Cost Savings
More Responsive

TAKING A
REDUCES
INCREASES
IMPROVES

Fewer Audit Deficiencies

Source: Aberdeen Analyzing point solutions vs. platform 2011

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Program Agenda with Highlight


1

New Mobile Security Requirements

Oracle Mobile Security Suite

Product Demonstration

Copyright 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal/Restricted/Highly Restricted

18

Demo: User Experience


iPad BYOD

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Secure Container
Log-in Screen

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Secure Container
Container Home Screen

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Secure Email Client


Active-Sync Clinet

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Access On-Premise
Premise SharePoint
With String Authentication

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Built-in Catalog
Install corporate-apps, links to
docs, web apps

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Admin Control panel


Admin View

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Policies
Authentication

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

Policies
Container Policies

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

For More Information


Twitter

Facebook

Blogs

LinkedIn

YouTube

Visit: http://www.oracle.com/mobile

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

28

Copyright 2014 Oracle and/or its affiliates. All rights reserved. |

You might also like