Enterprise Security: Overview

Managing access to information and applications scattered across internal and external systems for identities, both inside and outside the organization.

Organizations are facing major concerns in collating segregated identities with the access roles/rights and managing identity lifecycle. Silos of administration remain across applications, geographies, departments, and multiple lines of business. Managing internal and external identities in real time is therefore putting an unprecedented strain on the already strained business resources.
The need of the hour is to build a powerful integrated enterprise security solution to address the 360 degree requirements of the enterprise

Rolta has leveraged its years of experience and domain expertise in designing an enterprise security solution which provides high levels of security by integrating several layers of protection. The Enterprise Security Management Solution (SMS) is built using the ROLTA iPerspective framework. Rolta iPerspective™ is a path-breaking framework which enables organizations to create out-of the-box domain specific solutions, predictive analytics, process management etc., thereby reducing the complexity of managing IT applications. This solution includes the iPerspective platform as well as the individual iPerspective products like the Security Manager, Audit Manager, and Process Manager.

This enterprise security solution provides high levels of security by integrating several layers of protection: Oracle Identity Manger enables user life cycle management; Oracle Access Manager determines what functions and data users are allowed to use; iPerspective Security Manager provides role based, fine grained access control at the database level, allowing enterprise to control data access at the source, the Unified Management Data (UMD).

Solution Features:

• Centralized Identity and Access Management framework to address Enterprise security System Integration for applications like ERP, SharePoint, Portal, ArcGIS etc.
• Federated Authentication & Authorization across diverse technology applications, directories, databases, etc.
• Fine Grained Access Control for filtering at row & column level, time-based filtering, geo-fencing for spatial data etc.
• Strong Access Control at Application & Data Levels with Simplified and Unified administration Interface.
• GUI-based multi-level Audit Framework, which besides Security provides a unique mechanism for assessing, mapping, and improving business processes and applications
• User Identities synchronized across various repositories enabling Managing/Automating complete User Lifecycle.
• Seamless Access across participating Applications using SSO.
• Secure Meta-Data Management
• Business Process Automation using workflow.
• Substantially Reduced Helpdesk Overheads.
• Simplified communication across diverse applications using SAML 2.0
• Integrated event-driven alerts and warnings
• Confidentiality and Integrity of payloads through Message-level Security (via Username Encrypted Password Token, .x509 based Token, SAML) supporting open standards, e.g., WS-Security
• Transport-level Security via latest Secure Sockets Layer (SSL) standards to securely handle data transformation, exchange across networking elements.