Connect with us

Hi, what are you looking for?



Oracle Launches New Identity Governance Suite

Today at Oracle OpenWorld, Oracle announced the release of Oracle Identity Governance Suite, an important component of Oracle Identity Management 11g Release 2, which was unveiled in July 2012. 

Today at Oracle OpenWorld, Oracle announced the release of Oracle Identity Governance Suite, an important component of Oracle Identity Management 11g Release 2, which was unveiled in July 2012. 

The database software giant says its Identity Governance Suite delivers a simple out-of-the-box user experience coupled with a drag-and-drop user interface and work flow customization to enable organizations to address their compliance, governance and security objectives.

Oracle Identity GovernanceBy using Oracle’s Identity Governance Suite, organizations can provide user self-service, simplify account administration, and streamline audit tasks, something the company says leads to lower overall total cost of ownership for managing identities.

Oracle Identity Governance Suite offers features including:

• Closed loop remediation: provides an automated way for reviewers to revoke improper access across target systems and includes alerts should remediation fail;

• Privileged Account Management: allows only authorized users to gain high risk access to sensitive applications in a timely manner, while providing sufficient audit trails;

• Customizable User Interface: helps reduce total cost of ownership and increases system reliability with self-service features and common connectors across user provisioning, identity analytics and privileged account management to help enable customers to better leverage existing investments;

• Increased security and improved business responsiveness: enforces internal security audit policies and eliminates potential security threats from rogue, expired and unauthorized accounts and privileges, while giving users immediate access to key applications and systems;

Advertisement. Scroll to continue reading.

• Enhanced regulatory compliance: cost-effectively enforces and attests to regulatory requirements associated with identifying who has access privileges to sensitive, high risk data.

“With Oracle Identity Governance, we are delivering a single complete identity governance platform that dramatically simplifies the identity lifecycle,” said Marc Boroditsky, vice president of product management, Identity and Access Management at Oracle.

As SecurityWeek noted in previous coverage of Oracle Identity Management 11g, organizations are increasingly looking at ways to take authorization decisions out of individual applications and move them into a centralized systems with centralized rules. Instead of building the logic to handle security individually inside each application and managing each one’s security policies separately, externalizing authorization means a single platform will be in charge of managing all the policies and rules. 

More on Oracle Identity Governance Suite can be found in this Datasheet (PDF).

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...