One of the major challenges facing every enterprise in the Bring Your Own Device (BYOD) age is how to maintain control of the devices used to access proprietary data. In this post, the second in our four-part series on BYOD and the changing mobile landscape, we’ll take a look (more...)
Every business is looking to take advantage of the new digital experience to connect with customers. This has become the new strategic imperative of companies all around the world. A recent article in the Sloan Management Review provides some insight into the barriers organizations are facing as they embrace the (more...)
Is your organization emphasizing an approach of developing privacy and security within every aspect of your application architecture? Are you a software developer struggling to understand how to merge privacy and security into your code? Are you a systems integrator working to keep up with the latest regulatory, compliance (more...)
Why do you have so many virtual identities? Most individuals currently have an internet mail identity, several social networking identities, and corporate virtual identities...and don’t really want more identities to manage.
Attract New Customers and Users by Leveraging Bring Your Own Identity (BYOI) CON8834 explores the trend of enabling (more...)
Online communication has been transformed by the advent of effective mobile computing, and more organizations are providing employee and customer access to services via mobile devices.
Securely Enabling Mobile Access for Business Transformation [CON8896] will review the security and usability concerns that are further compounded by bring your own device (more...)
If you are attending Leaders Circle this year, be sure to catch the CSO Summit. This year will feature several customer case studies and a panel discussion featuring Mary Ann Davidson, Oracle's CSO and Chris Gavin, Oracle's VP of Information Security. Below are a few links to previous CSO Summit (more...)
Enterprises deploy Information Technology (IT) applications in various ways today. They may use on-premise physical servers, virtualization, private clouds, public clouds, or a combination thereof. In all cases, the main goals include improving the ease of application deployment, increasing system performance, providing security across the enterprise, and ensuring contained costs.
Are you attending Oracle OpenWorld 2013? What are you doing to manage access to information, from any device, anytime...and from anywhere?
Customers expect consistent levels of service across laptop, tablet, and smartphone, but the very nature of mobile computing introduces a whole new range of security concerns, such (more...)
As organized cyber-attacks become sophisticated and targeted, organizations, particularly those in the financial and health sectors, have come under strict regulations. The growing security risks from internal and external sources have brought focus on both preventive and detective controls working together to protect data. In this edition of the Oracle (more...)
Deloitte is excited about the opportunity to introduce the first blog in a series of four blogs that will look at real world case studies involving Oracle Identity and Access Management (IAM). Our future blogs will expand on relevant IAM topics including: 1) Oracle Waveset to Oracle Identity Manager, 2) (more...)
Mobility, cloud-based services, healthcare reform, meaningful use, health information exchange and continued changes in privacy and security regulations has each had a profound effect on healthcare IT. To support this transformation, it is vital that an organization effectively manages how its users are able access and use information. (more...)
The Art of the Possible: Real Life Case Study in Oracle IAM 11gR2 Performance Tuning by Alex Bolante (Accenture)
In our last post, we walked through a handful of practical tips and tricks to fine tune your Oracle Identity Management 11gR2 deployment. This week we look at a real life case study, focused on Oracle Directory Services, where we applied our pragmatic approach and solutions.
Case study: a (more...)
Mobile Application Security Framework
Enterprise Mobility is rapidly expanding opportunities for companies to enhance clients' engagement levels and simplify and improve their interactions. Unfortunately, those opportunities also create significant security threats for businesses and consumers.
Pawan Yadav, Vice President and Chief Technologist from SDG (www.sdgc.com), in this very (more...)
According to a recent survey by IDG Research, 40 percent of respondents felt that a fragmented reactive approach to security left them more vulnerable. More than 35 percent felt that their organization was reactive to sensational news about security threats. To better align IT security resources with risk, organizations will (more...)
NEC Australia is back with Part 2, in their two part series with key leaders from the Oracle Identity Management product team. Host Larry Samuels of NEC Australia takes us into the topic area of "Identity Governance Key Insights". This includes key information on point-in-time audits and their use (more...)
Necessity is the mother of invention: Technical Solutions Developed in the Field by Kishan Malineni (Accenture)
As promised in last week’s post, today we will go into tuning specifics and address well proven tricks of the trade, used by IAM guru’s to maximize your solution while addressing the requirements of global organizations.< ?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
In this post we will use a specific, anonymous project example to walk (more...)
Taking the training wheels off: Accelerating the Business with Oracle IAM by Brian Mozinski (Accenture)
Today, technical requirements for IAM are evolving rapidly, and the bar is continuously raised for high performance IAM solutions as organizations look to roll out high volume use cases on the back of legacy systems. Existing solutions were often designed and architected to support offline transactions and manual processes, (more...)
Taking the Plunge – or Dipping Your Toe – into the Fluffy IAM Cloud by Paul Dhanjal (Simeio Solutions)
In our last three posts, we’ve examined the revolution that’s occurring today in identity and access management (IAM). We looked at the business drivers behind the growth of cloud-based IAM, the shortcomings of the old, last-century IAM models, and the new opportunities that federation, identity hubs and other new (more...)