{"id":1484,"date":"2006-05-12T00:00:00","date_gmt":"2006-05-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/12\/oracle-platform-targets-security\/"},"modified":"2021-12-30T11:39:28","modified_gmt":"2021-12-30T11:39:28","slug":"oracle-platform-targets-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/12\/oracle-platform-targets-security\/","title":{"rendered":"Oracle platform targets security"},"content":{"rendered":"<p>Oracle last week set in motion the second phase of its multiyear, three-prong plan to develop an integrated suite of identity management software using the piece parts it acquired over the last two years.   The suite&#8217;s goal is to offer corporations everything from fine-tuned access control to identity federation with partners as corporations address security and compliance issues by building identity-management infrastructures.  Oracle last week announced the availability of Oracle Identity Manager 10g R3, the provisioning software that is one part of the Oracle Identity Management suite.  Compliance features highlight the R3 software, which was acquired last year along with Thor Technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Provisioning software provides a platform for giving users access to resources based on a set of roles and rules and an audit trail for who has access to what and when.<\/p>\n<p>Identity Manager R3 is the first in a series of software releases that will continue this summer when the company updates its federation software (acquired from Phaos in 2004 and Oblix in 2005), its access-management software (Oblix) and its virtual directory technology (acquired from OctetString in 2005).<\/p>\n<p>Oracle&#8217;s short-term goal is to deliver incremental upgrades to the components of its identity-management suite but the ultimate goal is to align all the software under a common architecture.  &#8220;I&#8217;d characterize Oracle as having established communication among these components, but not yet integration and functional rationalization,&#8221; says Jonathan Penn, an analyst with Forrester Research.  Oracle faces the same chore as many other vendors, which is tying together a collection of software garnered through acquisition into an identity platform with common underpinnings such as a single workflow engine.  &#8220;Oracle plans to be out front, and their plan is clearly to be a leader in this marketplace,&#8221; says Roberta Witty, an analyst with Gartner.<\/p>\n<p>http:\/\/www.networkworld.com\/news\/2006\/051506-oracle-security.html?WT.svl=bestoftheweb1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"predecessor-version":[{"id":3971,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1484\/revisions\/3971"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}