Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Oracle Enhances Identity Governance Solution

Software giant Oracle said on Wednesday that it now offers a “complete Identity Governance solution” that lets organizations balance the objectives of access, security, and compliance, while enabling user self services to reduce total cost of ownership.

Software giant Oracle said on Wednesday that it now offers a “complete Identity Governance solution” that lets organizations balance the objectives of access, security, and compliance, while enabling user self services to reduce total cost of ownership.

In the latest release of its Identity and Access Management solution, Oracle brings enhancements to Oracle Identity Governance (PDF), a governance solution that combines provisioning, analytics and privileged account management into one. According to Oracle, this integrated solution can reduce the time to certify accounts by 30 percent when compared with running separate tools.

Oracle Logo“When it comes to governance, organizations need to provide users with quick and easy access to the systems they need to perform their jobs while also managing its risk and compliance obligation to ensure such access is as restrictive as possible,” the company explained. “To achieve this balance, organizations need to deliver intuitive ways for users to request and provision access to systems and applications, appropriate policies and processes to approve such access, simplify ways for managers to confirm that such access is appropriate and check and certify that access is properly assigned.”

The latest version of Oracle Identity Governance Suite now includes:

Identity Auditor: A single, integrated tool that provides governance so organizations can have the latest entitlement data in the review process, avoiding pitfalls of stale data. It combines provisioning data store and the certification data store into a single repository so real time provisioning changes are always updated in the certification campaigns.

Improved UI: Improvements in the Oracle Identity Governor User Interface and Lifecycle Management capabilities, giving customers greater flexibility to customize the look and feel of the business facing interface; additionally it includes performance improvements.

Access Request Catalogue: Customers can now leverage the Access Request Catalogue to manage fine grained application access, and enforce it using XACML-compliant policies; through Identity Auditor enterprises can then certify that access allowing them to secure systems, such as content management systems like Microsoft SharePoint.

The Oracle Identity Governance Suite has also been certified on both Oracle Weblogic and IBM WebSphere, the company said.

Advertisement. Scroll to continue reading.

“All of the new enhancements in the latest release of Oracle Identity and Access Management are further proof points to Oracle’s platform approach to identity management where organizations can reduce cost, reduce audit exposure and improve responsiveness,” said Marc Boroditsky, vice president of Identity Management at Oracle. “By rationalizing the architecture, we have removed gaps that would have required integration, enabling these components to be interoperable.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.