{"id":1479,"date":"2006-05-08T00:00:00","date_gmt":"2006-05-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/08\/gartner-gives-cautious-nod-to-oracle-identity-management\/"},"modified":"2021-12-30T11:39:27","modified_gmt":"2021-12-30T11:39:27","slug":"gartner-gives-cautious-nod-to-oracle-identity-management","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/08\/gartner-gives-cautious-nod-to-oracle-identity-management\/","title":{"rendered":"Gartner Gives Cautious Nod to Oracle Identity Management"},"content":{"rendered":"<p>On the occasion of its one-year anniversary of Oracle&#8217;s purchase of Oblix, Oracle has achieved a bragging right.   Namely, Oracle announced on May 8 that Gartner has plugged its Oracle Identity Manager tool into its Leaders Quadrant in the 1H06 User Provisioning Magic Quadrant report.   Gartner tempered Oracle&#8217;s joy, however, by giving Oracle a grade of &#8220;Cautious Optimism&#8221;&#8212;the &#8220;likely highest possible grade,&#8221; according to Ray Wagner, research vice president at Gartner.  &#8220;Integration continues,&#8221; Wagner said in his notes on the product, which is a component of the Oracle Identity and Access Management Suite.  In a short time, it has amassed a very strong management team and IAM technology portfolio.  Adding its January 2005 PeopleSoft acquisition for HR management, Oracle is positioning itself to be the &#8216;mover and shaker&#8217; in the IAM market.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Oracle&#8217;s acquisition of Thor was a good move because it had no UP product outside of its own Oracle product suite.<\/p>\n<p>Hasan Rizvi, vice president of Security and Identity Management Products for Oracle, said that the company has seen &#8220;good customer momentum&#8221; based on its original strategy when it entered the identity management arena by purchasing Oblix.  That strategy had three parts: provide a complete suite of best-in-class components, to spare customers who were struggling with integrated individual components; help customers with application integration as they struggle to integrate identity management components with business applications such as SAP, PeopleSoft HR and Siebel CRM; and to allow heterogeneous support and standards support in order to facilitate identity management technology deployment.<\/p>\n<p>Oracle plans to announce four new Identity Manager customers on May 9: storage vendor Network Appliance; Gevity, a human resources outsourcing firm; Highmark, an insurance company; and Seguro Popular, a government agency in Mexico. <\/p>\n<p>http:\/\/www.eweek.com\/print_article2\/0,1217,a=177631,00.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1479","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1479"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1479\/revisions"}],"predecessor-version":[{"id":3966,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1479\/revisions\/3966"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}