Thursday May 02, 2013

European Identity Conference

This year's European Identity Conference is devoted to cloud, mobile and social. This promises to be an exciting event this year. Here is a link to the conference.  You will not want to miss Peter Boyle and Mike Neuenschwander. Peter's keynote is on Thursday May 16th. Peter Boyle is Head of Identity Services for BT. Below is an abstract for his talk.

If Your Customers Don't Feel Safe, They Will Leave You

More than 559 million adults have been victims of cyber-crime - that´s more than the population of the European Union. More businesses are trying to connect with customers on social and mobile but, 15% of social networking users have had accounts infiltrated and 21% have fallen prey to mobile or social attacks. Only one incident can cause a customer to shift brands. If you are trying to find new paths to market online, don´t miss this session. Securing the customer experience should be the top priority for any business initiative involving cloud, mobile and social. Faced with the need to secure a growing hosting business with more than 10,000 customers accessing services on-line, British Telecom Identity enabled their applications to secure their customer data and transactions. In this session, Peter Boyle Head of Identity Services for BT will discuss how to keep your customer safe, loyal to your brand and keep them coming back for more.

See Mike Neuenschwander will speak in the following sessions:

  • May 14th 2:00 pm :The Future of IAM
  • May 15th 10:30 am: Next Generation Cloud and Mobile Identity Management 
  • May 15th 2:00 pm: The Future of IAM: "Do not kill IAM, improve and extend it"
  • May 16th 2pm: Life Management Platforms, Personal Data, Private Cloud 

Thursday Feb 07, 2013

Richard III – Authentication Gets Shakespearean

With the recent discovery of Richard III in a Leicester parking lot, we realize that authenticating an individual is as important as authenticating a king. Your identity is king.

The recent twitter #authchat provides a good survey of authentication techniques. Authenticating Richard required many of the same identity management techniques we use in software. Here are a few observations:


DNA evidence from two related descendants was critical in verifying the identity of the king. The same is true for the way we authenticate today. While we may use finger print readers on our laptops and in our data centers, we still rely on additional factors of authentication beyond biometrics. From the description of the battle of Bosworth, many thumbs and fingers were most likely misplaced – lots of parts everywhere. If Richard were alive today, he would have commanded, “my kingdom for a thumb!” If the researchers had tested DNA from the wrong thumb, the results would have been wrong. Biometrics are only a piece of the puzzle.

Third Party Verification

The research team had to find a descendant to verify the DNA of Richard III. DNA, like a certificate, on its own is not enough to prove who you are.  A third party has to vouch for the fact that the information is correct. We may think we are advanced because we can make an instant SAML request to an identity provider to log into our 401K plan or download a ringtone, but it is perhaps more amazing that the team found an identity provider (Richard's descendant nephew) across 500+ years of the family tree, in a country thousands of miles away.

Context Aware

Finding the king and verifying the identity were almost equally challenging tasks. The location information from history played a role. In addition, the context of the injuries and the battle description were all indicators that helped to confirm the identity. Other factors including radio carbon dating and food consumption patterns were all part of the context used in the formula. Today, with many users with different roles accessing our systems, adaptive access and context aware security are used to complement authentication. Now, we may be a long way from using food consumption patterns to authenticate a user on a banking website, but I would not rule it out. It gives validity to the claim “you are what you eat.”

The key is that no single form of authentication is sufficient in all circumstances. Context helps to provide ongoing assurance that we are dealing with the correct user. It turns out Richard III was not the tyrant as he is remembered, but perhaps just the victim of identity fraud. Congrats to the research team – truly a remarkable accomplishment and the discovery demonstrates that “the king’s name is [still] a tower of strength”(Shakespeare,Richard III) -- especially given the amount of media exposure.

Friday Feb 01, 2013

Oracle Identity Event San Francisco

Tuesday, February 05, 2013
2:00 PM – 5:00 PM
Bourbon and Branch
501 Jones Street
San Francisco, CA, 94102
In Person
Space is limited. Register today!

Take the Next Big Step in Identity Management Evolution

We call the latest release of Oracle Identity Management the evolved platform. And for good reason. It simplifies the user experience, enhances security, and allows businesses to expand the reach of identity management to the cloud and mobile environments like never before.

Join this important event to discuss the recent launch of Oracle Identity Management. You’ll learn more about the evolution of this exceptional business solution and get the unique opportunity to network with existing Oracle customers and speak directly with industry experts. The agenda includes:
  • Overview of capabilities
  • Customer and partner presentations
  • Discussion with early adopters

Register now for this event. Valet Parking is included.

Presented in participation with:

Qubera Solutions


2:00 p.m.
2:15 p.m.
Welcome Remarks
2:15 p.m. - 2:45 p.m.
Identity Access Management Platform Overview
2:45 p.m. - 3:15 p.m.
Customer Spotlight - MedicAlert
3:15 p.m. - 4:15 p.m.
Beverage Academy Hands On Cocktail Class
4:15 p.m.
Networking Reception & Cocktails
4:30 p.m.
Closing Remarks

Register Now!

Tuesday Nov 27, 2012

More Opportunities to Discuss IDM 11g R2

If you attended any of the recent webcasts, then you heard several customer testimonials discussing early adoption of Identity Management 11g R2.  If you missed a chance to connect with product managers from Oracle in person regarding the new release, here are a few physical events that you may wish to attend.Click on a city below to register.

Atlanta IdM 11g Forum
Wednesday, December 5, 2012

Orlando IdM 11g Forum
Thursday, December 6, 2012

Scottsdale IDM 11g Forum
Tuesday, December 11, 2012

Dallas IDM 11g Forum

Thursday, December 13, 2012

If you missed any of the customer presentations you can read the Kaiser and BT testimonials in Oracle Magazine - Security on The Move.

Thursday Nov 08, 2012

Identity R2 Event Orlando

Oracle Corporation
Oracle - Take the Next Big Step in Identity Management Evolution

Take the Next Big Step in Identity Management Evolution

We call the latest release of Oracle Identity Management 11gthe evolved platform. And for good reason. It simplifies the user experience, enhances security, and allows businesses to expand the reach of identity management to the cloud and mobile environments like never before.

Join this important event to discuss the recent launch of Oracle Identity Management 11g. You'll learn more about the evolution of this exceptional business solution and get the unique opportunity to network with existing Oracle customers and speak directly with Oracle product experts. The agenda includes:

  • Overview of capabilities
  • Product demonstrations
  • Customer and partner presentations
  • Discussion with early adopters

Register now for the event or call 1.800.820.5592 ext. 11087.

Register Now

Join us for this event.

Thursday, December 6, 2012

The Capital Grille
Pointe Orlando, 9101
International Drive
Orlando, FL 32819

Get Directions

9:00 a.m. Registration & Continental Breakfast
9:30 a.m. Welcome Remarks
Dave Profozich, Group Vice President, Oracle
9:45 a.m. Keynote:Oracle Identity Management 11g R2
Scott Bonnell, Sr. Director Product Management, Oracle
10:30 a.m. Coffee Break
10:45 a.m. Oracle 11gR2 Overview/Demo/Technical walkthrough
Mark Wilcox, Sr. Manager Product Management, Oracle
11:45 a.m. Closing Remarks
Dave Profozich, Group Vice President, Oracle
12:00 noon Networking Lunch

Register now for this exclusive event or call 1.800.820.5592 ext. 11087.

If you are an employee or official of a government organization, please click here for important ethics information regarding this event.
Hardware and Software Engineered to Work Together
Copyright © 2012, Oracle and/or its affiliates.
All rights reserved.
Contact Us | Legal Notices and Terms of Use | Privacy Statement

Thursday Nov 01, 2012

Secure Government Series Part 3

Oracle Corporation
Secure Government Training Series
Safeguarding Government Cyberspace

Click here, to register for the live webcast.

Safeguarding Government Cyberspace

Cybersecurity threats represent one of the most serious national security, public safety, and economic challenges. While technologies empower government to lead and innovate, they also enable those who seek to disrupt and destroy progress. Cloud computing, mobile devices and social networks help government reduce costs and streamline service delivery, but also introduce heightened security vulnerabilities.

How can government organizations keep pace with heightened service delivery demands and advancements in technology without compromising security?

Join us November 28th for a webcast as part of the “Secure Government Training Series” to learn about a security portfolio that helps organizations mitigate cyber attacks by providing Full-spectrum cybersecurity capabilities that harden the data tier, lock down sensitive information, and provide access controls and visibility for frequently targeted systems.

Gain insights to an integrated security framework and overall strategy for preventing attacks that will help your organization:

  • Deploy resilient IT infrastructure
  • Catalog and classify sensitive and mission-critical data
  • Secure the enterprise data tier and lock down trusted insider privileges at all levels
  • Automate and centralize enterprise auditing
  • Enable automated alerting and situational awareness of security threats and incidents

For more information, access the Secure Government Resource Center or to speak with an Oracle representative, please call1.800.ORACLE1.

LIVE Webcast
Safeguarding Government Cyberspace
November 28th, 2012

2:00 p.m. ET
Visit the Secure Government Resource Center

Click here for information on enterprise security solutions that help government safeguard information, resources and networks.


Visit the Secure Government Resource Center
Hardware and Software Engineered to Work Together
Copyright © 2012, Oracle. All rights reserved. Contact Us | Legal Notices | Privacy Statement

Wednesday Oct 24, 2012

UPMC Picks Oracle Identity Management

UPMC, a $10-billion integrated global health enterprise, has selected Oracle as a key technology partner in UPMC’s $100-million analytics initiative designed to help “unlock the secrets of human health and disease” by consolidating and analyzing data from 200 separate sources across UPMC’s far-flung network.As part of the project UPMC also selected Oracle Identity Management to secure the interaction and insure regulatory compliance. Read complete article here.

As healthcare organizations create new services on-line to provide better care Identity Management can provide a foundation for collaboration.

Monday Oct 15, 2012

Identity R2 in London Oct 24th with Amit Jasuja

Join Amit Jasuja, Senior Vice President Identity Management and Security, Oracle, and Peter Boyle, Head of Identity Services, BT in London on 24th October 2012 for the UK launch of Oracle Identity Management 11gR2. You’ll learn more about the evolution of this exceptional business solution and get the unique opportunity to network with existing Oracle customers and speak directly with Oracle product experts

The agenda includes:

  • An overview of capabilities
  • Product demonstrations
  • Customer presentations
  • An interactive panel discussion

Amit Jasuja will also be available for 1:1 meetings. Please email to request a meeting with Amit.

Click here to Register. 

Wednesday Oct 03, 2012

America The Vulnerable

At the Executive Edge this week, Joel Brenner shared his perspective on the state of cyber-security. Today our most critical military and corporate secrets are under attack. In his presentation, Joel shared his perspective on how organizations can can better prepare for the changing security climate.

The amount of state sponsored espionage has highlighted weaknesses in our national security infrastructure. The Internet was primarily intended to provide a means of collaboration for non-commercial entities. Today it is the backbone of our digital commerce and digital experience and it was not designed to secure the activities and data we share today. 

Check out "America The Vulnerable" and learn more. 

The Threats are Outside the Risks are Inside

In the past few years we have seen the threats against the enterprise increase dramatically. The number of attacks originating externally have outpaced the number of attacks driven by insiders. During the CSO Summit at Open World, Sonny Singh examined the phenomenon and shared Oracle's security story. While the threats are largely external, the risks are largely inside.

Criminals are going after our sensitive customer data. In some cases the attacks are advanced. In most cases the attacks are very simple. Taking a security inside out approach can provide a cost effective way to secure an organization's most valuable assets.

Tuesday Oct 02, 2012

Executive Edge: It's the end of work as we know it

If you are at Oracle Open World, it has been an exciting couple of days from Larry's keynote to the events at the Executive Edge. The CSO Summit was included as a program within the Executive Edge this year. The day started with a great presentation from Joel Brenner, author of "America The Vulnerable", as he discussed the impact of state sponsored espionage on businesses. The opportunity for every business is to turn security into a business advantage. As we enter an in-hospitable security climate, every business has to adapt to the security climate change. 

Amit Jasuja's presentation focused on how customers can secure the new digital experience. As every sector of the economy transforms to adapt to changing global economic pressures, every business has to adapt. For IT organizations, the biggest transformation will involve cloud, mobile and social. Organizations that can get security right in the "new work order" will have an advantage. It is truly the end of work as we know it.  The "new work order" means working anytime and anywhere. The office is anywhere we want it to be because work is not a place it is an activity. Below is a copy of Amit Jasuja's presentation.

Wednesday Sep 26, 2012

Meet and Greet with IDM Executives at Oracle OpenWorld

Oracle’s Identity Management Team

Invites You to

Learn How to Secure The New Digital Experience

Come see how the Oracle Identity Management platform can position your company to take
advantage of the emerging business opportunities.

  • Leverage Social Identities for web authentication
  • Enable customers and employees to interact through their mobile devices
  • Deploy Self Service User Provisioning for quick role changes based on business needs

We look forward to seeing you there!

Wednesday, October 3rd 
3:30-4:30 PM  Meeting
4:30-5:30 PM  Cocktail Reception

Four Seasons Hotel

Yerba Buena Room

757 Market Street
San Francisco, CA 94103



Copyright © 2012, Oracle and/or its affiliates. 
All rights reserved.

Contact Us | Legal Notices and Terms of Use | Privacy Statement

Tuesday Sep 25, 2012

CSO Summit @ Executive Edge

If you are attending the Executive Edge at Open World be sure to check out the sessions at the Chief Security Officer Summit. Former Sr. Counsel for the National Security Agency, Joel Brenner ,  will be speaking about his new book "America the Vulnerable". In addition, PWC will present a panel discussion on "Crisis Management to Business Advantage: Security Leadership". See below for the complete agenda.

TUESDAY, October 2, 2012

Chief Security Officer Summit Welcome

Dave Profozich, Group Vice President, Oracle

10:00 a.m.–10:15 a.m.

America the Vulnerable

Joel Brenner, former Senior Counsel, National Security Agency

10:15 a.m.–11:00 a.m.

The Threats are Outside, the Risks are Inside

Sonny Singh, Senior Vice President, Oracle

11:00 a.m.–11:20 a.m.

From Crisis Management to Business Advantage: Security Leadership

Moderator: David Burg, Partner, Forensic Technology Solutions, PwC

Charles Beard, CIO and GM of Cyber Security, SAIC
Jim Doggett, Chief Information Technology Risk Officer, Kaiser Permanente
Chris Gavin, Vice President, Information Security, Oracle
John Woods, Partner, Hunton & Williams

11:20 a.m.–12:20 p.m.


Union Square Tent

12:20 p.m.–1:30 p.m.

Securing the New Digital Experience

Amit Jasuja, Senior Vice President, Identity Management and Security, Oracle

1:30 p.m.–2:00 p.m.

Securing Data at the Source

Vipin Samar, Vice President, Database Security, Oracle

2:00 p.m.–2:30 p.m.

Security from the Chairman’s Perspective

Jeff Henley, Chairman of the Board, Oracle
Dave Profozich, Group Vice President, Oracle

2:30 p.m.–3:00 p.m.

Thursday Sep 20, 2012

It's The End of Work as We Know It, But I Feel Fine

If you are attending Open World this year, don't miss Amit Jasuja's session on trends in Identity Management. This session will take place on Monday October 1st in Moscone West at 10:45. You can join the conversation on Twitter as Amit Jasuja discusses the trends that are shaping Identity Management as a market and how Oracle is responding to these secular trends. Use hashtag OracleIDM. In addition, here’s a list of the sessions in the  Identity Management  track.

In Amit's session, he will discuss how the workplace is changing. The pace of technology is accelerating and work is no longer a place but rather an activity. We are behaving socially in our professional lives and our professional responsibilities are encroaching on our social lives. 

The net result is that we will need to change the way we work and collaborate. Work is anytime and anywhere. This impacts the dynamics of teams and how they access information and applications. Our teams span multiple organizations and "the new work order" means enabling the interaction and securing the experience.

It is the end of work as we know it both economically and technologically. Join Amit for this session and you will feel much better about the changing workplace. 

Wednesday Sep 19, 2012

Security Newsletter – September Edition is Out Now


The September issue of Security Inside Out Newsletter is out now. This month’s edition offers a preview of Identity Management and Security events and activities scheduled for Oracle OpenWorld. Oracle OpenWorld (OOW) 2012 will be held in San Francisco from September 30-October 4. Identity Management will have a significant presence at Oracle OpenWorld this year, complete with sessions featuring technology experts, customer panels, implementation specialists, product demonstrations and more. In addition, latest technologies will be on display at OOW demogrounds. Hands-on-Labs sessions will allow attendees to do a technology deep dive and train with technology experts.

Executive Edge @ OpenWorld also features the very successful Oracle Chief Security Officer (CSO) Summit. This year’s summit promises to be a great educational and networking forum complete with a contextual agenda and attendance from well known security executives from organizations around the globe.

This month’s edition also does a deep dive on the recently announced Oracle Privileged Account Manager (OPAM). Learn more about the product’s key capabilities, business issues the solution addresses and information on key resources. OPAM is part of Oracle’s complete and integrated Oracle Identity Governance solution set.

And if you haven’t done so yet, we recommend you subscribe to the Security Newsletter to keep up to date on Security news, events and resources.

As always, we look forward to receiving your feedback on the newsletter and what you’d like us to cover in the upcoming editions.

Tuesday Sep 18, 2012

Webcast Reminder: Implementing IDM in Healthcare, September 19th @10:00 am PST

Join me and Rex Thexton from PwC tomorrow (September 19th) as we review an IDM project that Rex and his team completed for a large healthcare organization.  Rex will talk through the IT environment and business drivers that lead to the project, and then we will go through planning, design and implementation of the Oracle Identity Management products that PwC and the customer chose to complete the project.

This will be a great opportunity to hear about the trends that are driving IT Healthcare, and to get your Identity Management questions answered.

If you haven't already registered - Register Here!

Monday Sep 10, 2012

Focus on Identity Management at Oracle OpenWorld12


Heading to Oracle OpenWorld 2012? Then we have Identity Management and relevant sessions all mapped out for you to help you navigate Oracle OpenWorld. Do make use of Focus On Identity Management document online or if you’d like to have a copy handy, use the pdf version instead.

In the meantime, here are the 3 must-attend Identity Management sessions for this year:

  • Trends in Identity Management
    Monday, October 1, at 10:45 a.m., Moscone West L3, room 3003, (session ID# CON9405)
    Led by Amit Jasuja, this session focuses on how the latest release of Oracle Identity Management addresses emerging identity management requirements for mobile, social, and cloud computing. It also explores how existing Oracle Identity Management customers are simplifying implementations and reducing total cost of ownership.
  • Mobile Access Management
    Tuesday, October 2, at 10:15 a.m., Moscone West L3, room 3022, (session ID# CON9437)
    There are now more than 5 billion mobile devices on the planet, including an increasing number of personal devices being used to access corporate data and applications. This session focuses on ways to extend your existing identity management infrastructure and policies to securely and seamlessly enable mobile user access.
  • Evolving Identity Management
    Thursday, October 4, at 12:45 p.m., Moscone West L3, room 3008, (session ID# CON9640)
    Identity management requirements have evolved and are continuing to evolve as organizations seek to secure cloud and mobile access. This session explores emerging requirements and shares best practices for evolving your identity management implementation, including the value of a service-oriented, platform approach.

For a complete listing of all identity management sessions, hands-on labs, and more, see Focus on Identity Management now. See you at OOW12. 

Friday Sep 07, 2012

Mark Wilcox Discusses Privileged Account Management

The new release of Oracle Identity Management 11g R2 includes the capability to manage privileged accounts. Privileged accounts, if compromised, create a risk for fraud in the enterprise and as a result controlling access to privileged accounts is critical. The Oracle Privileged Account Manager solution can be deployed stand alone or in conjunction with the Oracle Governance Suite for a comprehensive solution.

As part of the comprehensive platform, Privilege Account Manager is interoperable with the Identity suite. In addition, Privileged Account Manager can re-use Oracle Identity Manager connectors for propagating changes to target systems. The two are interoperable at the data level. I caught up with Mark Wilcox, Principal Product Manager of Oracle Privileged Account Manager and discussed with him the capabilities of the offering in this podcast. Click here to listen.

Tuesday Aug 14, 2012

Identity Management at Oracle OpenWorld 2012

Are you registered for Oracle OpenWorld 2012 to be held in San Francisco from September 30 to October 4? Visit the Oracle OpenWorld 2012 site today for registration and more information. And, if you need further convincing, here’s a preview of the planned sessions and forums on Identity Management.

Identity Management General Sessions*

Monday October 1, 2012




10:45 am – 11:45 am

CON9405: Trends in Identity Management

Amit Jasuja, Senior Vice President, Identity Management and Security, Oracle

Moscone West, L3      Room 3003

1:45 pm – 2:45 pm

CON9437: Mobile Access Management

Daniel Killmer, Principal Product Manager, Oracle

Moscone West, L3       Room 3008

1:45 pm – 2:45 pm

CON3568: Unified User Provisioning & Management using Oracle Identity Management 11g

Sada Rajagopalan, Solution Architect, Collegeboard

Moscone West, L3       Room 3011

3:15 pm – 4:15 pm

CON9492: Simplifying your identity management implementation

Viresh Garg, Director, Product Management, Oracle

Moscone West, L3      Room 3008

4:45 pm – 5:45 pm

CON9444: Modernized and Complete Access Management

Forest Yin, Director, Product Management, Oracle

Moscone West, L3       Room 3008

Tuesday October 2, 2012




11:45 am – 12:45 pm

CON9491: Enhancing End User Experience with Oracle Identity Governance

Sanjay Rallapalli, Principal Product Manager, Oracle

Moscone West, L3        Room 3008

1:15 pm – 2:15 pm

CON9447: Enabling Access for Hundreds of Millions of Users

Vamsi Motukuru, CMTS, Oracle

Moscone West, L3       Room 3008

5:00 pm – 6:00 pm

CON9465: Next Generation Directory - Oracle Unified Directory

Etienne Remillon, Principal Product Manager, Oracle

Moscone West, L3

Room 3008

Wednesday October 3, 2012




10:15 am – 11:15 am

CON9458: Eliminate end-user managed passwords while increasing security with Oracle ESSO

Daniel Killmer, Principal Product Manager, Oracle

Moscone West, L3        Room 3008

11:45 am – 12:45 pm

CON9494: Sun2Oracle: Identity Management platform transformation

Scott Bonnell, Senior Director, Oracle

Moscone West, L3        Room 3003

11:45 am – 12:45 pm

CON9631: Entitlement-centric access to SOA and cloud services – Development Track

Sreenivasa Chitturi, Senior Software Development Manager, Oracle

Moscone West, L3        Room 3008

11:45 am – 12:45 pm

CON3957: Delivering secure WiFi on the Tube as an Olympic legacy from London 2012

Ben Bulpett, Director, Enline plc Ben Bulpett, Director, Enline plc


1:15 pm – 2:15 pm

CON9493: Identity Management and the Cloud

Melody Liu, Senior Principal Product Manager, Oracle

Moscone West, L3

Room 3008

3:30 pm – 4:30 pm

CON9624: Real-time External Authorization for Middleware, Applications and Databases

Sid Mishra, Principal Product Manager, Oracle

Moscone West, L3        Room 3008

5:00 pm – 6:00 pm

CON9625: Taking Control of Oracle WebCenter Security

Ganesh Kirti, Senior Director, Platform Security, Oracle

Moscone West, L3       Room 3008

Thursday October 4, 2012




11:15 am – 12:15 pm

CON5794: Solutions for Migration of Oracle Waveset to Oracle Identity Manager

Steve Giovannetti, CTO, Hub City Media

Moscone West, L3        Room 3008

12:45 pm – 1:45 pm

CON9640: Evolving Identity Management

 Michael Neuenschwander, Senior Director, Oracle

Moscone West, L3      Room 3008

2:15 pm – 3:15 pm

CON9662: Securing Oracle Applications with Oracle Enterprise Identity Management Platform

Roger Wigenstam, Senior Director, Oracle

Moscone West, L3        Room 3008

* Schedule subject to change

In addition, there are Identity Management hands-on-labs sessions planned, including:

  •  Complete Access Management, and
  •  Integrated Identity Governance

Identity Management executives and experts will also be at hand for discussions and follow ups. And don’t forget to catch live demonstrations of our complete Oracle Identity Management solutions set while at OpenWorld.

Follow the conversation on Oracle OpenWorld 2012 on twitter with #OOW12 and as always, engage with us @oracleidm.

We recommend the use of the Schedule Builder tool to plan your visit to the conference and for pre-enrollment in sessions of your interest. You can search identity management sessions using the term “identity management” in the Content Catalog. We hope to see you there!

Thursday May 31, 2012

The Business Case for a Platform Approach

Most customers have assembled a collection of Identity Management products over time, as they have reacted to industry regulations, compliance mandates and security threats, typically selecting best of breed products.  The resulting infrastructure is a patchwork of systems that has served the short term IDM goals, but is overly complex, hard to manage and cannot scale to meets the needs of the future social/mobile enterprise.

The solution is to rethink Identity Management as a Platform, rather than individual products. Aberdeen Research has shown that taking a vendor integrated platform approach to Identity Management can reduce cost, make your IT organization more responsive to the needs of a changing business environment, and reduce audit deficiencies. 

View the slide show below to see how companies like Agilent, Cisco, ING Bank and Toyota have all built the business case and embraced the Oracle Identity Management Platform approach.

Wednesday May 30, 2012

The Oracle Platform

Today’s enterprises typically create identity management infrastructures using ad-hoc, multiple point solutions. Relying on point solutions introduces complexity and high cost of ownership leading many organizations to rethink this approach. In a recent worldwide study of 160 companies conducted by Aberdeen Research, there was a discernible shift in this trend as businesses are now looking to move away from the point solution approach from multiple vendors and adopt an integrated platform approach. By deploying a comprehensive identity and access management strategy using a single platform, companies are saving as much as 48% in IT costs, while reducing audit deficiencies by nearly 35%.

According to Aberdeen's research, choosing an integrated suite or “platform” of solutions for Identity Management from a single vendor can have many advantages over choosing “point solutions” from multiple vendors. The Oracle Identity Management Platform is uniquely designed to offer several compelling benefits to our customers. 

  • Shared Services: Instead of separate solutions for - Administration, Authentication, Authorization, Audit and so on–  Oracle Identity Management offers a set of share services that allows these services to be consumed by each component in the stack and by developers of new applications 
  • Actionable Intelligence: The most compelling benefit of the Oracle platform is ” Actionable intelligence” which means if there is a compliance violation, the same platform can fix it. And If a user is logging in from an un-trusted device or we detect an attack and act proactively on that information.
  • Suite Interoperability: With the oracle platform the components all connect and integrated with each other. So if an organization purchase the platform for provisioning and wants to manage access, then the same platform can offer access management which leads to cost savings.
  • Extensible and Configurable: With point solutions – you typically get limited ability to extend the tool to address custom requirements. But with the Oracle platform all of the components have a common way to extend the UI and behavior

Find out more about the Oracle Platform approach in this presentation.

Tuesday May 29, 2012

Keeping Entitlements in Check

Thanks for going the webcast on keeping entitlements in check. As a follow up, I have attached the slides to the webcast. The webcast will be available on demand shortly via IOUG.   A few key takeaways:

  • Application security means applying both preventive and detective controls. Audit and security groups need the combination of both access certification and runtime dynamic authorization.
  • Today, security policy is largely fragmented and brittle to change. The result is audit exposure for highly regulated applications. 
  • By addressing the entire value chain of application security with a comprehensive platform approach, organizations can reduce the risk and improve compliance. 


Monday May 21, 2012

CSO Roundtable Amsterdam

This lunch event gives senior security executives across different industries an opportunity to hear Oracle’s formula for cyber-security and to hear from Chris Gavin, Vice President Information Security, Oracle Corporation as he shares more insights into:

  • Oracle’s information security best practices
  • Information security in a “bring your own device” to work culture
  • Securing cloud, mobile and social access.
  • Security as a business enabler
  • Responding to cyber-security threats

An organization’s brand and reputation is built up through the years but can also be severely damaged or even destroyed by a single security incident. The media coverage around these information security breaches underscores just how devastating these failures can be to an organization’s reputation. Reach out to your sales rep if you would like to attend.

Sunday May 20, 2012

Amit Jasuja Talks About Securing Applications

Securing applications is complex because it involves providing the right level of visibility to auditors, application owners and developers. Application security has primarily been hard coded into applications and difficult to change. In addition, auditors have a difficult challenge verifying security controls for applications. The complexity has left applications vulnerable to fraud and audit violations. By taking a platform approach to application security, Oracle provides all of the components to address the application security value chain. See the embedded slides below.

Thursday May 17, 2012

Platform Approach to Identity in The Cloud

If you missed the webcast, you can register to view the on-demand version at this link:  Register Here.  There were a few questions during the webcast and we have captured the answers below. In addition, you can find an embedded copy of the slides below as well.

1. How is data privacy handled in a cloud identity solution and can you share any thoughts especially on cross-border privacy restriction?

A: Private data is not stored in the cloud. As part of the implementation, the PII data and sensitive information is filtered so that confidential information is not used.

2. Can you describe how you have PeopleSoft integrated with OIM?

A: PeopleSoft is used to source new user identity information. There is not a provisioning connection back into PeopleSoft 

3. Do you still keeping some Manual ID provisioning? If does, is this because of some legacy plataforms dependencies or you are looking forward to migrate to Oracle IdM?

A: Yes. There is a process to do provisioning manually in the event the cloud environment is unavailable.

4. Can you provide some insight about how OIM and OIA help you to reduce audit findings due to the closed loop remediation process?

A: Today ManpowerGroup is not doing closed loop remediation, but this is a desirable end state and a next step. 


Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.


« June 2016