{"id":1464,"date":"2006-01-30T00:00:00","date_gmt":"2006-01-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/30\/bmc-oracle-increase-identity-management-focus\/"},"modified":"2021-12-30T11:39:26","modified_gmt":"2021-12-30T11:39:26","slug":"bmc-oracle-increase-identity-management-focus","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/30\/bmc-oracle-increase-identity-management-focus\/","title":{"rendered":"BMC, Oracle Increase Identity Management Focus"},"content":{"rendered":"<p>Many businesses are realizing the need to have a fool-proof method for identifying users of their computer networks, to both protect their data and meet federal regulations such as HIPPA and SOX.  BMC Software, for one, is trying to position itself as the go-to security vendor for adding identity-management features to Microsoft .Net environments.  Oracle, meanwhile, says it&#8217;s on the lookout to partner with a vendor that that offers single sign-on software to add to its portfolio of identity management offerings, which are largely the result of an acquisition spree over the past few years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BMC released BMC Identity Management .Net, which lets companies add user access, compliance, and password management into applications based on .Net.  Due to lack of options, many businesses have been forced to build their own identity management apps for the .Net environment, says Somesh Singh, VP and general manager of BMC&#8217;s identity management group.  BMC&#8217;s move to support .Net could help it stand apart from some of its large competitors in the business application market.&#8221;This will give small and medium businesses better automated control over their user populations, including access and the levels of privileges are being granted; something only large businesses have been able to afford and implement,&#8221;says Gerry Gebel, a Burton Group senior analyst, noting that BMC competitor Oracle doesn&#8217;t support the .Net environment with its security tools.<\/p>\n<p>http:\/\/www.compliancepipeline.com\/showArticle.jhtml?articleID=177105746<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1464","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1464"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1464\/revisions"}],"predecessor-version":[{"id":3951,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1464\/revisions\/3951"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}