Sunday Mar 31, 2013

Authentication and Authorization Problem in Cyprus

If you are following the Cyprus bailout story, you will sympathize with the extraordinary situation faced by Cypriots coping with unprecedented banking regulation. Faced with a risk of capital outflow, the government placed limits on domestic and foreign currency transactions. After the restrictions were lifted, it was discovered that there were loopholes that allowed withdrawals from subsidiary banks in London where the controls were not enforced. For controls to work they have to be consistent. The limits are very specific and very difficult to enforce. As institutions and governments try to apply fiscal or regulatory controls over large groups of people, the controls are only as effective as the identity management capabilities of the institution. The problem is latency. The longer it takes for an endpoint or in this case a bank subsidiary to get updated, the more security risk. In this case Cyprus loses a significant fraction of foreign deposits.

The problem is not unique to Cyprus. During the American financial crisis, the breakdown in trust almost froze the credit system. When a credit card is swiped at the local retailer, the authentication does not always go directly to the bank that issued the credit card. The transaction flows to a merchant bank. The entire system depends on keeping the merchant banks in synch. Every transaction we make without cash has an element of identity involved. The economic cost of identity authentication, while not explicit, is a factor in every credit card transaction and every purchase online. The Cyprus crisis demonstrates what can happen if identity controls break down or fail. In Cyprus the consequence is failure of the banking system.

Authentication failure at an individual level ends in fraud or theft. As the customer experience becomes more digital the consequences are more drastic. Authentication failure can hurt an individual, a business or in this case compromise the future of a nation.

Wednesday Mar 27, 2013

Why You Should Care About Privacy

Author: Phil Hunt

On April 4, at 10am Pacific, Oracle Identity Management (@OracleIDM) will be hosting a twitter conversation on privacy (#PrivQA). I am pleased to confirm that the Ontario Commissioner of Information & Privacy, Dr. Cavoukian will be joining the conversation. In particular, I would like to encourage privacy and security industry folks to participate. For more information, see our recent newsletter Q&A (http://www.oracle.com/us/dm/nsl100162749-qadrcavoukian-1919966.html) with links to her whitepaper on privacy by design (PbD).

Privacy is an issue that has been of concern to myself and many other industry professionals. Most of us continue to be amazed that for the most part, both users and the application developer community simply do not care. When the subject arises, eyes immediately shut with yawns soon to follow. 

Yet, every day, more and more problems emerge in the industry that are leading to monetary and even physical harm. For example, financial fraud appears to be exploding fuelled by easy access to personal information available on social services. Fraudsters combine social demographic information to leverage weak classic communications media like fax and telephone to convince financial institutions to transfer funds (http://www.fcac-acfc.gc.ca/eng/consumers/fraud/onlinefraud/social/). In another case, access to private information in Google, apparently enabled hackers to compromise Mat Honan's Apple accounts, even remotely wiping out his laptop, iPad, and iPhone (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/). Here, where I live in BC, there is the sad story of Amanda Todd, who was bullied to the point, she committed suicide. Was this a lack of privacy? Was there a lack of appropriate anonymity? Was this poor system design?  We are only just beginning to understand how far reaching privacy issues can be.

These cases also show there are some interesting relationships between anonymity, privacy, and security that need further exploration. Do I need to be anonymous? I live an honest life, why do I need to keep my personal information private? Why should I care about anonymity? The system is secure right? Nobody asks who is the security intended for. What motivates the service providers? What damages do they face in the event of real losses? We are now discovering that while we may have the best of intentions, the fraudsters out there do not. Boring as the subject of privacy may seem, we should all be worried. We should all care.

Dr. Cavoukian's efforts to get our industry to start thinking about Privacy-by-Design are to be applauded. I'm not sure where this will go, but I'm glad this conversation has started. Remember to join in the twitter conversation on April 4 at 10AM (Twitter hashtag #PrivQA).

About the Writer:

Phil Hunt joined Oracle as part of the November 2005 acquisition of OctetString Inc. where he headed software development for what is now Oracle Virtual Directory. Since joining Oracle, Phil works as CMTS in the Identity Standards group at Oracle where he developed the Kantara Identify Governance Framework and provided significant input to JSR 351. Phil participates in several standards development organizations such as IETF and OASIS working on federation, authorization (OAuth), and provisioning (SCIM) standards.  Phil blogs at www.independentid.com and a Twitter handle of @independentid.

Virgin Media Webcast Tomorrow

A quick reminder that tomorrow (Thursday, March 28) at 10 am PDT / 1 pm EDT, experts from Virgin Media, implementation partner aurionPro SENA and Oracle will discuss how Virgin Media successfully enabled secure wi-fi services in London Underground in time for the London Olympics 2012.

Join the webcast to hear hear how Virgin Media, the UK’s first combined provider of broadband, TV, mobile, and home phone services, used Oracle Identity Management, Oracle Virtual Directory, and Oracle Entitlements Server to leverage back-end legacy systems for the project, systems that were never designed to be externalized.

You’ll learn how Virgin Media:

  • Transformed the London Underground deployment into a platform for authorizing other services
  • Reused Oracle Entitlements Server and Oracle Virtual Directory for authorizing customers to view video-on-demand content on their Virgin Media set top boxes
  • Expanded to deliver true place-shifting—allowing subscribers to watch pay-per-view assets from any device, anywhere

As you continue to embrace mobile and social, Oracle Identity Management will become even more important, enabling interaction and securing the experience. Join us and find out how.

Register now for this Webcast, “Virgin Media Takes Identity Management Underground.”

Experts will be at hand to take your questions live. You can also submit the questions via twitter. Direct those to @OracleIDM using #IDMtalk

Webcast:Virgin Media takes Identity Management Underground
Thurs., March 28, 2013
10 a.m. PT / 1 p.m. ET

Tuesday Mar 26, 2013

India’s Massive Identity Project: The Identity and Privacy Lens

Indian administrators are undertaking one of the most ambitious e-projects ever – collecting biometrics data for the 1.2 billion citizens and assigning every individual a unique 12-digit ID. This unique, randomly generated ID along with the biometrics data collected in a database, will be used in identity verification for any individual and will allow even the most economically poor citizens access to Government welfare programs and services.

The project is a game changer! India has seen rapid economic growth but challenges with economic disparity and illiteracy is certain sectors still remain. As a result, the most vulnerable citizens are almost invisible –with no state issued IDs or proofs that will allow then access to Government issued benefits. Without an ID, imagine trying to open a bank account or getting phone and utilities for your home or small business/farm. Identity fraud further aggravates the issue.

This is where Aadhaar (translation: foundation) comes in. Systematically, this State run program will build a database of individual’s photographs, fingerprints and iris scans and assign a randomly generated 12-digit ID. With this, identities can be verified anytime-anywhere using any device so long as it is connected to the internet. Now, every individual will have a valid identification proof, one that is backed by biometrics authentication. 

Once completed, it will be the world's largest biometric database – no other ID database comes even close to the size and scope of this project. With valid identification, people will have access to the welfare programs and Government issued services. The same, validated authentication can be used to open bank accounts, make money withdrawals, submit loan applications, and more. The empowerment possibilities are limitless.

But, with that, the idea of having this one, all powerful database with all-you-need identity information in it, is a cause of concern for some privacy and cyber security experts. How do you balance the individual’s right to privacy with the enormous benefit that this project has the potential for? How do you alleviate the security concern? Is data security enough of a safeguard against potential misuse of this wealth of information? How do you enable responsible identity management?

We invite the community to discuss this and other security and privacy related issues on the upcoming twitter conversation on Thursday, April 4th at 10 am PDT / 1 pm EDT. Ontario’s Commissioner of Information and Privacy, Dr. Ann Cavoukian, will be participating in the live talk and we look forward to getting her perspective on this and other such topics. Please join in the conversation with #PrivQA; we look forward to hearing your opinion.

Join the Conversation
Thursday, April 4, 2013
10 a.m. PDT / 1 p.m. EDT
#PrivQA on Twitter

Monday Mar 25, 2013

Security Newsletter, March edition – Q&A with the Commissioner, IDM goes Underground

The March edition of the Security Inside Out Newsletter is now out. This edition puts a spotlight on Privacy and features a Q&A session with a well known privacy expert, and showcases relevant resources.

With businesses relying more than ever on online channels to manage, build and grow their customer interactions, issues around security, privacy and compliance have taken center stage more so than ever before. Last week, we talked about the role security plays in enabling the new digital experience and in connecting organizations to social, mobile and cloud. This week we will talk about Privacy.

Dr. Ann Cavoukian is Ontario’s Commissioner of Information and Privacy and one of the world’s leading experts on Privacy. The March edition of the newsletter features a Q&A with the Commissioner where she delved into the role technology can play in protecting and managing privacy, and discussed her mantra Privacy by Design. We encourage you to read the feature and download the whitepaper that discusses Privacy and Security by Design: A Convergence of Paradigms. The feature serves as good background for a conversation on Privacy that we will have on our blog this week leading up to the twitter conversation with the Commissioner next week (on April 4th).

Yes, a twitter conversation! The Commissioner has agreed to participate in a live twitter chat to discuss Privacy and respond to industry questions - recent news, private sector responsibility, the work required, industry standards, the importance of Privacy by Design, and much more. The live conversation will take place on twitter on Thursday, April 4th at 10 am PDT / 1 pm EDT. Please participate using #PrivQA. And if you have questions, comments or feedback for the Commissioner you can send those before or during the event using #PrivQA. Questions before the event can be sent to @OracleIDM using #PrivQA.

The newsletter also showcases Virgin Media’s implementation of Identity Management to enable secure wi-fi services in the London Underground. The project started just before the London Olympics 2012, realized a tremendous success and has evolved in scope since. Do read the interesting feature and register for an upcoming webcast with Virgin Media this Thursday, March 28 at 10 am PDT. Since Virgin Media, Oracle and implementation experts from aurionPro SENA will all be at hand to answer questions, be sure to stay on for the live Q&A bit towards the end.

And, as always, the newsletter captures both recent and upcoming Security and Identity Management events, conferences, training, industry reports, news and more. So, if you haven’t done so, we recommend you subscribe to the Security Inside Out Newsletter today.

We’d love to hear from you. Let us know some topics you’d like to see covered in the upcoming editions. Or just let us know how we are doing. We look forward to hearing from you.

Friday Mar 22, 2013

New Oracle Security Facebook Page Launches

This week we mostly talked about how you can leverage security to unlock potential opportunities and grow your business via social, mobile and cloud. Catch the brief screencast and download the complimentary whitepaper in case you missed those earlier.

And, as we wrap up the week, some good news for Security and IT professionals interested in hearing more from Oracle Security professionals. We’re creating a new community on Facebook for Security professionals worldwide.  Via the Oracle Security Facebook page, we’d share the latest updates on all things Security – discuss industry and Oracle Security news, announce Oracle events, build community thought leadership, share customer success stories, and announce exclusive offers. Most of all, we will look to engage with you so that together we continue to grow the Security community and add value. This page will complement our existing Identity Management Facebook page.  

Watch this ~30 second video featuring my colleague, Troy Kitch, as he summarizes the goals of this new page, and connect with us on Facebook by liking the page. See you on Facebook! And wishing you the very best for the weekend!

Thursday Mar 21, 2013

Managing Security in the Social, Mobile, Cloud World

As we look forward in 2013, we look at the key trends driving the IT transformation today. Surely, mobile, social and cloud would top the list. With the proliferation of mobile devices companies are looking to offer access to the most commonly used (or user facing) business applications on users’ personal mobile devices. The spread of social networking is forcing organizations to allow users to access company resources using their social media sign-ons. And regardless of whether it is in a datacenter or in the cloud, the business application needs to be just as secure and reliable.

Customers today are demanding a seamless online experience, one that is geography agnostic. But most applications that are required to support this seamless digital experience were architected 10 or 20 years ago and are not scalable or agile enough. Worse, the applications still keep user experience and security at cross-hairs; you inevitably compromise on one or the other.

The applications for today and tomorrow will need to support the internet scale, offer a seamless user experience across all channels and yet be secure to enable a digital interaction with confidence. Which means, a re-architecture that adopts SOA for flexibility, BPM for collaboration and participation, a scalable user portal and Big Data for better business analytics and Fast data for the massive scale that will be required and a Security Inside Out approach. To learn more about how each of the Fusion Middleware components fit into a social, mobile, cloud strategy, we recommend you peruse all the videos and assets for The New Business Imperative: Social, Mobile, Cloud screencast program here.

In our previous posts, we talked about the essentials for Securing the New Digital Experience and how Oracle has adopted a platform approach to provide a solid foundation to enable a secure, seamless digital experience.

Here, we wanted to share with you, some customer experiences. Industry leading organizations have adopted the platform approach to Identity Management and have started to leverage the capabilities of our latest release, Identity Management 11gR2, to enable secure mobile and social access. Companies, like SaskTel, are offering Identity Management in the cloud to some of the most security-conscious organizations.

SuperValu, for example, is leveraging Identity Management to bolster employee productivity in their stores by delivering secure, simplified sign-on for store managers on iPads.

And Oracle itself is using Oracle Identity Management internally to offer a centralized, single identity system, a simplified identity context to its employees across a myriad of applications the employees have (and need) access to. Managing a dynamic workforce across geographies, folding in M&As, leveraging Identity Management to power the cloud services – Oracle Identity Management within Oracle is another good example of the success of a platform approach to identity management and security. Catch this podcast to get the full Oracle on Oracle story.

Want to learn more? We recommend the following resources:

Engage with Us

Product Information on Oracle.com: Oracle Identity Management

OracleIDM Blog, Twitter and Facebook

Wednesday Mar 20, 2013

SoMoClo Drives The Next Evolution in Identity Management

The world (and hence, an enterprise) today is very different from what we had say even 5 years ago. Lines between social and professional worlds are blurring fast. I use my smartphone to connect with friends and colleagues, check in on FourSquare for business meetings, follow my friends’ updates on Facebook, check work email, respond to LinkedIn requests from my professional friends and review the .xls sent by my colleague.

The pace of technology evolution is driving the customer expectations today. User experience is key. A user needs to be able to sign on using say, the Google account, and use that across all his/her media experience – a smartphone, an iPad, gaining access to business applications, logging on to social media sites like Facebook, LinkedIn, others.

But so is security. A spate of security incidents in 2012 has, once again, brought the security issues to the fore. Did you know that 76% of mobile applications today store credentials on the device and 10 percent of those store passwords in pain text on the device? With 90% of organizations looking to offer mobile applications by 2014, those are indeed grim statistics. In a world where 62% companies are looking to connect with their customers and build relationships via the social networks, news stories like LinkedIn password hacking definitely make users like you and I pause.

Identity Management is the lynchpin for security and user experience. Breaking away from tradition, the latest release of Oracle Identity Management, 11gR2, marries convenience with security in offering a complete, seamless and secure digital experience to the users.

Focusing on reducing time to deployment and overall Total Cost of Ownership (TCO) and easing the user experience, R2 takes a platform approach to Identity Management bringing innovation, simplification and extreme scale to bear.

Leveraging the innovation in Oracle Fusion Middleware implies Identity R2 utilizes a common, standards-based model for workflow and UI customizations. R2 offers a scalable internet-grade identity platform that leverages ADF for UI customizations and workflow extensibility, SOA for flexibility, on BPM for collaboration and Coherence for extreme performance and Webcenter clustering for scale support.

Learn more about how Oracle Identity Management 11gR2 supports usability and scale requirements and the out-of the-box features that it offers to support the social, cloud and mobile security features. Catch the on-demand R2 launch webcast today and engage with us on OracleIDM to discuss your emerging identity requirements and whether or not you think R2 meets those. We look forward to hearing from you.

Resources:

On Demand Webcast: Identity Management 11gR2 Launch

Oracle Identity Management on o.com

OracleIDM Blog, Twitter and Facebook

Tuesday Mar 19, 2013

Identity Management Down Under at Victoria University

Educational institutions have a dynamic ecosystem with students, teachers and operational administration requiring significant IT and helpdesk resource investment. Victoria University in Melbourne, Australia embarked on an identity management project to automate and streamline access and authorization to the University’s systems for over 55,000 students and 3000 staff.

Check out the following video to see how the University simplified sign-on process for the students, empowered them with self service and, in the process, eliminated helpdesk overhead.

Monday Mar 18, 2013

Do You Trust Social, Mobile and Cloud?

The last decade or so there has been a complete transformation in the way we work or how we consume information. Work is no longer about geography, it is an activity. “Company resources” are not just servers and systems in your server room, these could be in a data center, in the cloud or even the employees’ smart phones, iPads, tablets and more. Users of these “company resources” could be employees with physical badges, vendors, partners or customers connecting through the social media channels as Facebook, Twitter or Pinterest. Work can happen anywhere, via any device, through any network (intranet/social media channels/internet) leveraging company resources.

And why are organizations adapting this “work anywhere, anytime” model? The reasons are plenty - to improve efficiency, bring agility, build user productivity, offer seamless user experience to its customers or to simply establish a trust relationship with the customer. Social, Mobile and Cloud (SoMoClo) together is a business opportunity, a competitive advantage that organizations are seeking. And Security is the lynchpin in this new work order. Without a secure, seamless digital experience, it all falls apart.

With each new experience, the security risk increases. Each channel presents its own security points of failure. How can my company enable social trust as a means of connecting to customers & employees? How do I accommodate dynamic workgroups and teams of people around the globe that need to be part of my value chain? Is the Bring Your Own Device (BYOD) threatening the security of my digital and intellectual property? How can I securely connect mobile devices to my enterprise without compromising security? Are my applications secure enough to be cloud ready?

The security solution, thus, needs to scale and span across all the channels, encompass the growing breadth of both the “company resources” and the user population. The solution needs to provide the foundation (a platform) that feeds uniform security policies and extends identity context to the complete digital experience.

Naresh Persaud, Director, Security and Identity Management at Oracle, discusses the IT transformation driven by SoMoClo and underscores the need for a sound security solution. Catch this brief screencast on Securing the New Digital Experience to learn how the latest advances in Oracle Identity Management and Oracle Fusion Middleware solutions are fueling the transformation that is driving innovation in IT today.

For more information on Oracle Identity Management, visit us or join the conversation on our blog, Facebook page or catch us on Twitter.

Oracle IDM helps with College Entrance Exams!

Well - to be specific, ETS, the world's largest non-profit college assessment company uses Oracle IDM to manage their internal and external systems used by students taking their college entrance exams!

Check out the video below, where Jim Moran, Chief Information Security Officer at ETS talks about how Oracle products support his business.

Friday Mar 15, 2013

Calling All IDM Experts: Oracle OpenWorld Call for Papers is Now Open

Want to share your Identity Management implementation experience? Got some thoughts on deployment best practices, innovative use cases, the next BIG thing in Identity Management? Then don't hold back.

Oracle OpenWorld call for speaking proposals is now open. Take the stage at one of the biggest IT conferences of the year and take part in shaping the IT discussion of today and tomorrow. Through the year, we keep hearing about how Oracle Identity Management customers are looking to hear from their peers, the Oracle solution and technology experts. So, if you have experience with and expertise on Oracle Identity Management, do submit your speaking proposal for Oracle OpenWorld. The call for papers closes on April 12. Visit the Call for Proposals section to get general information, content policies, tips, guidelines and more.

Oracle OpenWorld 2013 will be held this year from September 22 - 26 in San Francisco, CA.

And engage with us on this blog, Twitter and Facebook.


Thursday Mar 14, 2013

#MobileIDM Tweet Chat Archive Now Available

Thanks to everyone who participated in our last week’s twitter chat on Mobile Identity Management. Whether your organization has already embraced the mobile culture (offering applications on mobile, allowing seamless access to specific resources via mobile or enabling BYOD) or is exploring to do so, mobile security has become top of mind for most security and IT professionals. So, we thank the participants for taking some time to share their thoughts and perspective on this topic.

During #MobileIDM chat, the discussion ranged from how far mobile authentication will go and whether it can be adopted as sole factor in user authentication to whether the current industry standards support mobile uptake. Since the conversation invited participation from organizations who have or are looking to securely enable mobile, as well as industry analysts, thought leaders, implementation experts and other solution providers, we good a good range of best practices and advice on defining, managing and executing security policies that can extend to mobile.

Here is the link to the discussion archive if you missed the live event or if the tweets were zipping by too fast on your screen and you’d like to catch the full set.

We must admit, we are hooked to twitter chats! Both the #MobileIDM chat as well as the #Authchat discussion that we hosted in January enjoyed participation from Identity Management (IDM) enthusiasts around the world. (And a big shout-out to the APAC conversation participants who couldn’t join in during the live event due to the time difference but chimed in the next day.) As a result, the IDM community now has two rich sources of information (& perspectives) to rely on. To focus specifically on privacy, @OracleIDM will host a live twitter conversation with Dr. Ann Cavoukian, Ontario Commissioner of Information and Privacy and a well known privacy expert on Thursday, April 4 at 10 am PDT/ 1 pm EDT. If you have questions on privacy you’d like to ask the Commissioner, send those to @OracleIDM using #PrivQA.

And, as always, we look forward to your feedback. If you have topics in mind you’d like the IDM community to weigh in, send those our way and perhaps we can incorporate in our tweet chat schedule.

Wednesday Mar 13, 2013

Virgin Media Takes Identity Management Underground

Hardware and Software, Engineered to Work Together
Oracle Corporation
Webcast Virgin Media Takes Identity Management Underground. Oracle Identity Management.

Oracle Identity Management Gave Virgin Media the Security and Control to Provide Free Wi-Fi to Millions

The 2012 Olympics brought millions of athletes, support crews, vendors, and spectators into London. The task of providing free, secure Wi-Fi services to the London Underground went to Virgin Media.

In retrospect, they registered more than 10,000 new users daily. And supported up to 800,000 sessions every day—which peaked at 24,163 simultaneous users. And millions of tweets, Facebook posts, and more.

Join This Important Security Webcast

You’ll hear how Virgin Media, the UK’s first combined provider of broadband, TV, mobile, and home phone services, used Oracle Identity Management, Oracle Virtual Directory, and Oracle Entitlements Server to leverage back-end legacy systems that were never designed to be externalized.

You’ll learn how they:

  • Transformed the London Underground deployment into a platform for authorizing other services
  • Reused Oracle Entitlements Server and Oracle Virtual Directory for authorizing customers to view video-on-demand content on their Virgin Media set top boxes
  • Expanded to deliver true place-shifting—allowing subscribers to watch pay-per-view assets from any device, anywhere

As you continue to embrace mobile and social, Oracle Identity Management will become even more important, enabling interaction and securing the experience. Join us and find out how.

Register now for this Webcast, “Virgin Media Takes Identity Management Underground.”

Join us for this Webcast, Virgin Media Takes Identity Management Underground.
Thurs., March 28, 2013
10 a.m. PT / 1 p.m. ET
Presented by:
Ben Bulpett
Ben Bulpett
Alliances and Enterprise Accounts, aurionPro Sena
Perry Banton
Perry Banton
IT Architect, Virgin Media
Naresh Persaud
Naresh Persaud
Director, Product Marketing, Oracle
Stay Connected
Twitter Facebook Blog
Use #idmtalk

To participate in the live Q&A, submit your questions on Twitter before or during the event.
Send to @oracleidm using #idmtalk
Hardware and Software, Engineered to Work Together
Copyright © 2013, Oracle and/or its affiliates.
All rights reserved.
Contact Us | Legal Notices and Terms of Use | Privacy Statement

Friday Mar 08, 2013

Kaiser uses Oracle IDM to reduce compliance costs

Kaiser Permanente is the largest privately owned healthcare provider in the US.  We asked Kurt Lieber, Executive Director of Technology, Risk Office at Kaiser to explain why he chose Oracle technology, and how the Oracle IDM platform improved his business performance.


Thursday Mar 07, 2013

UPMC Offers CloudConnect Health IT to Help Healthcare Organizations with Identity Management

UPMC announced today the launch of CloudConnect Health IT. Powered by Oracle Identity Management, CloudConnect Health IT is a cloud-based identity management solution geared towards small and midsized health care providers.

CloudConnect Health IT is a complete package from UPMC that offers healthcare providers Oracle Identity Management applications enhanced by health care-specific processes developed at UPMC to specifically meet the needs of clinicians. The goal is to provide cost-effective, standardized, cloud-based IT security solution specifically designed to meet the needs of small and midsized healthcare providers.

The CloudConnect Health IT solution will allow health care users to easily manage user accounts, including automating adding, modifying and terminating a user’s computer access; managing access based on the user’s job profile; and providing self-service functions such as password reset, as well as comprehensive management reporting. The new service is built on Oracle Identity Governance Suite, Oracle Access Management and Oracle Directory Services to enable ease of use and offer the support and scalability that will be required in the cloud.

For more information, read the press release.

Wednesday Mar 06, 2013

Avea Telecommunications upgrades to Oracle IDM - Customer Video

Avea Telecommunications is going through a major upgrade of their IDM systems.  We recently caught up with Ulvi Bucak and asked him to tell us a bit more about his project. Avea has been a long time Sun IDM customer - so Ulvi and his team had to make a lot of decisions about how they wanted to upgrade. As a Telecommunications provider in Turkey, performance and security were top priorities. Take a look at the video to hear Ulvi talk about his project.


Monday Mar 04, 2013

Live Twitter Chat on Mobile IDM - Get Heard!

You are invited! If you have something to say on Mobile Security and Identity Management, if you have questions on the security requirements to support mobile, if you have experience with mobile security, if you have been following the developments (the debates and discussions) on this topic, you are invited to participate in the live twitter conversation on Mobile Identity Management. Amit Jasuja, the Senior Vice President at Oracle will kick-off the discussion on @OracleIDM on Thursday, March 7th at 9 am Pacific/ 12 pm Eastern, and we hope to hear from you and the rest of the IDM twitterverse.

The live twitter chat would run 45 minutes and we look to have a meaningful conversation on the current challenges, existing solutions, potential deficiencies in the solutions, industry's task list, expected outcomes, and more if time permits. So, if you have a twitter handle, we encourage you to participate in the live discussion. Join or simply follow along using hashtag: #mobileidm.

And, if you have questions in mind, simply send those to us @OracleIDM and we will do our best to include or have those addressed by the IDM community.

So, mark your calendar:

Live Tweet Chat

Topic: Mobile IDM
Date: Thursday, March 7th (this week!)
Time: 9 am Pacific/ 12 pm Eastern
Hashtag: #MobileIDM
Host: Amit Jasuja, SVP, Oracle on @OracleIDM

Much like the last twitter chat, we will archive and post the discussion shortly after the live event. Talk to you soon!


About

Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.

Search

Archives
« March 2013 »
SunMonTueWedThuFriSat
     
1
2
3
5
9
10
11
12
16
17
23
24
28
29
30
      
Today