It is true that Oracle Enterprise Single Sign-on (Oracle ESSO) started out as purely an application single sign-on tool but as we have seen in the previous articles in this series the product has matured into a suite of tools that can do more than just automated single sign-on and (more...)
In today’s interconnected world, we’re being forced to re-think what identity means and to adopt entirely new models for managing it. One thing’s for sure: it’s no longer confined to inside the walls of the enterprise. The lines between internal and external data ownership are blurring. In this, our third (more...)
Super user accounts are, unfortunately, a necessary evil. It’s just a fact of life in the IT industry that someone, somewhere, has to have the ability to make fundamental (and therefore potentially catastrophic!) changes to key systems.
One of my least favourite experiences as a consultant was gaining access (more...)
In the fall of 2012, Oracle launched a major upgrade to its IDM portfolio: the 11gR2 release. 11gR2 had four major focus areas:
- More simplified and customizable user experience
- Support for Cloud, Mobile, and Social applications
- Extreme scalability
- Clear upgrade path
For many SUN customers, the upgrade path continues (more...)
Excitement is building around an upcoming webinar hosted by Oracle Partner, AmerIndia on June 27th. Arun Mehta, Sr Consultant with @AmerIndia, and Sid Mishra from Oracle, will be speaking on the subject of Mobility in the Enterprise and the implications of BYOD has on the security postures of the organization and the steps you can (more...)
In our previous blog, we looked at the business drivers behind the growth of cloud-based Identity and Access Management (IAM). These drivers, combined with cultural and technology trends, have made cloud-based IAM more attractive – and, frankly, more necessary – than ever.
Now that business has evolved to offer more (more...)
Traditionally when a user is on-boarded into an organisation they are given a desktop password along with a whole host of other passwords to access the required business applications to enable them to do their job. Inevitably there will be numerous associated company information security policies that dictate that passwords (more...)
Embracing Mobility in the Workspace using Oracle API Gateway
“In 2013, mobile devices will pass PCs to be most common Web access tools. By 2015, over 80% of handsets in mature markets will be smart phones.”
Across the globe, corporations are embracing (more...)
One of the most significant advancements in IT in the last few years has been the shift to cloud-based Identity and Access Management (IAM). While the word “revolution” is all-too-often used in IT, arguably it’s the right word to describe the transformation that the cloud brings to identity.< ?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />
Over the (more...)
Enterprise Single Sign-On occupies an unusual position in the field of IAM. In automating the sign-on of users to their applications, it is somewhat uniquely, a client-side application. For some of our customers, the role of enterprise SSO in an IAM programme isn’t entirely clear. I’ve spoken with many security (more...)
Earlier this month I heard a customer talk about his experience with a recent Oracle API Gateway (OAG) implementation. OAG sits between your back end systems and your mobile applications to monitor and manage the messages that flow back and forth. One of the key functions of OAG is it's (more...)
Qualcomm discusses the benefits of closed loop compliance remediation and other key features of Oracle’s latest Identity Management release, that enable them to meet business objectives, manage user access attestations, and enforce compliance.
Join us in watching this short video to understand how Oracle is enabling Qualcomm to meet and (more...)
Oracle Unified Directory has set the bar for performance. Built ground up to provide elastic scale, Oracle Unified Directory (OUD) is interoperable with all directories in the Oracle Directory Services Suite.
With the Patchset 1 release OUD now combines the capabilities of Oracle Virtual Directory. With a combined directory, organizations (more...)
The growing number of business applications and services that employees need to access makes it increasingly difficult for organizations to create and remove accounts and privileges in a timely fashion, and keep track of everything for compliance purposes. Help-desk costs related to manual account administration and password reset also prove challenging.
Identity Management isn't exciting, it's not fun, in fact employees think Identity Management is downright restrictive, something to get around, something that limits productivity. What if you could hear what employees really think? I mean, hear that they REALLY think about IdM. Well now you can.
Our undercover investigative team (more...)
UPMC to Secure Access for 75,000 IT System Users at Midsize Hospitals with Robust Identity Management Suite
Committed to developing and delivering life-changing medicine, University of Pittsburgh Medical Center (UPMC) is a US$10 billion, integrated, global health enterprise and one of the leading health systems in the United States. UPMC operates more than 20 academic, community, and specialty hospitals and 400 outpatient sites; employs more than 3,200 (more...)
Author: Ricardo Diaz
Vast majority of global cyber-espionage emanates from China, report finds -Washington Post April 2013.
The economic threat of cyber crime is serious, has and will impact our daily lives and unfortunately been a threat most businesses haven't (more...)