Today at Oracle OpenWorld, Oracle announced the release of Oracle Identity Governance Suite, an important component of Oracle Identity Management 11g Release 2, which was unveiled in July 2012.
The database software giant says its Identity Governance Suite delivers a simple out-of-the-box user experience coupled with a drag-and-drop user interface and work flow customization to enable organizations to address their compliance, governance and security objectives.
By using Oracle’s Identity Governance Suite, organizations can provide user self-service, simplify account administration, and streamline audit tasks, something the company says leads to lower overall total cost of ownership for managing identities.
Oracle Identity Governance Suite offers features including:
• Closed loop remediation: provides an automated way for reviewers to revoke improper access across target systems and includes alerts should remediation fail;
• Privileged Account Management: allows only authorized users to gain high risk access to sensitive applications in a timely manner, while providing sufficient audit trails;
• Customizable User Interface: helps reduce total cost of ownership and increases system reliability with self-service features and common connectors across user provisioning, identity analytics and privileged account management to help enable customers to better leverage existing investments;
• Increased security and improved business responsiveness: enforces internal security audit policies and eliminates potential security threats from rogue, expired and unauthorized accounts and privileges, while giving users immediate access to key applications and systems;
• Enhanced regulatory compliance: cost-effectively enforces and attests to regulatory requirements associated with identifying who has access privileges to sensitive, high risk data.
“With Oracle Identity Governance, we are delivering a single complete identity governance platform that dramatically simplifies the identity lifecycle,” said Marc Boroditsky, vice president of product management, Identity and Access Management at Oracle.
As SecurityWeek noted in previous coverage of Oracle Identity Management 11g, organizations are increasingly looking at ways to take authorization decisions out of individual applications and move them into a centralized systems with centralized rules. Instead of building the logic to handle security individually inside each application and managing each one’s security policies separately, externalizing authorization means a single platform will be in charge of managing all the policies and rules.
More on Oracle Identity Governance Suite can be found in this Datasheet (PDF).

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Chrome 114 Released With 18 Security Fixes
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Breaking Enterprise Silos and Improving Protection
- Spyware Found in Google Play Apps With Over 420 Million Downloads
- Millions of WordPress Sites Patched Against Critical Jetpack Vulnerability
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
- PyPI Enforcing 2FA for All Project Maintainers to Boost Security
- Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack
