X

Cloud Security Perspectives and Insights

The Expanding Role of Identity in the Enterprise

Greg Jensen
Sr Principal Director - Security - Cloud Business Group

Organizations are continuing to evolve their security strategies around the realization that the user is the new perimeter. Gone are the days of placing security enforcements primarily on the network edge.Today, organizations are embracing and implementing an identity-centric security model to manage risk and mitigate threats to the enterprise. 

In the Oracle and KPMG Cloud Threat Report, 59% of organizations cite that they have had privileged cloud credentials phished or stolen, and businesses cite on average that 37% of user credentials are “over-privileged” which is highlighting the lack of governance, auditing, and workflow support by the business. With the adoption of cloud, organizations are working to merge their cloud and on-prem identity infrastructures to be more unified in nature. This will ensure that rapid provisioning of new users and services, as well as rapid de-provisioning, can be done in minutes instead of days. This sometimes isn’t enough. Of the businesses that have noted data loss due to misconfigured credentials, 51% note that they have adopted multi-factor authentication (MFA) to help reduce risk.

One of the most common requests that Oracle receives is, what is the future of identity management and how can businesses lay the groundwork for this expanding role of enterprise identity? Simeio Solutions recently interviewed Oracle’s identity and access management leaders to discuss how Oracle is modernizing identity in these evolving environments. We encourage you to watch the Simeio Solutions Coffee Talk with Eleanor Merritt, Oracle’s SVP of Identity Management, and Kamal Narayan, Oracle Director of Product Management.

To learn more about the key challenges that identity management solutions are well equipped to address, we encourage you to check out the Oracle and KPMG Cloud Threat Report series for 2020. For more information on how Oracle is working to solve today’s evolving enterprise identity needs, please visit the  Oracle Identity and Access Management webpage.

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.