...
ORACLE Deutschland     ORACLE Deutschland
Riesstra�e 25 • 80992 M�nchen
Phone: +49 89 1 4300
Internet: http://www.oracle.com/de

Oracle Identity Management’s best-in-class suite of IdM solutions delivers the industry’s only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:

Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—”Hot-Pluggable” Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.

In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Congress: European Identity & Cloud Conference 2013 14.05. – 17.05.2013 , Munich/Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Extending Data Governance Beyond the Database 21.03.2013 , 16:00 CET, 11:00am EDT, 8:00am PDT
Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.
Webinar: BYOD, Social Networking, Cloud – sicher und kalkulierbar 07.03.2013 , 11:00 Uhr
Die Einbindung mobiler Endger�te, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielf�ltige Einsatz von Cloud-Anwendungen – all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausforderungen.
Congress: European Identity & Cloud Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , M�nchen
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
Webinar: XACML: The Holy Grail of Access Governance? 09.12.2009 , 16:00 – 17:00 CET, 10am Eastern
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
Webinar: How to Efficiently Implement SoD Controls: Which Level Works? 09.12.2009 , 17:00-18:00 CET, 11am Eastern
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Service Oriented Security (SOS) 21.01.2009 , 17:00 CET – 17:45 (16:00 UTC)
Service-Oriented Security aligns with the overall Application-Centric approach of Identity and Access Management solutions – with the goal of providing a comprehensive, standards-based, developer-friendly platform. By leveraging and sharing many of the common Identity “Services”, Service-Oriented Security allows developers to spend the effort on where it counts the most – the application logic itself. Security will be just a service that can be invoked over a well defined hetrogenous interface based on open Standards. Furthermore application developers building identity-enabled applications must look to the benefits of these services and understand when and how to use these services in their application design.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , M�nchen
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , Munich
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Executive View: Oracle Enterprise Single Sign-On Suite Plus – 7102422.04.2014Martin Kuppinger €190.00
Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both as on-premise and cloud-based approaches but also as targeted Single Sign-On to Cloud apps. However, in most organizations there are still in use many legacy applications installed on-premise Providing single sign-on to all types of applications, on all platforms, increases convenience for users and might also reduce help desk cost. In addition, there are many specific use cases such as hospitals or production environments that require E-SSO for security and efficiency reasons…

Order the report

Executive View: Oracle Entitlements Server (OES) 11gR2 – 7083106.03.2014Martin Kuppinger €190.00
Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway…

Order the report

Leadership Compass: Enterprise Single Sign-On – 7096227.01.2014Martin Kuppinger €1295.00
The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of mature products that suit their needs. As always, however, it is about the details. Some solutions offer specific features that are relevant to specific use cases, such as unlocking multiple systems for traders in the finance industry or in control rooms. Thus when selecting vendors, it is strongly recommended to thoroughly look at support for the more specific use cases – that is where even the Leaders differentiate significantly. In fact, there are no weak vendors in that analysis. All of the vendors show particular strength and provide a good foundation for addressing the E-SSO challenges of organizations.

Order the report

Leadership Compass: Privilege Management – 7096022.01.2014Peter Cummings €1295.00
This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to record RDP Sessions, while logging key strokes for SSH based connections. This approach is regarded as standard, but we are now seeing many vendors being more innovative, on one hand due to the migration towards the new platforms (Cloud, Mobile, Social) which requires privilege management for many more environments, and on the other due to the emerging challenges regarding Privileged Access that require more than just managing passwords. The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start…

Order the report

Snapshot: Oracle Audit Vault and Database Firewall – 7063108.02.2013Martin Kuppinger €190.00
Oracle Audit Vault and Database Firewall is a new offering combining and enhancing two existing products: Oracle Audit Vault and Oracle Database Firewall. The product monitors Oracle databases and databases from other vendors. On the one hand it can detect and block threats while on the other hand it consolidates audit data not only from the database firewall component but also from the databases themselves and from other sources like operating system log files, application logs, etc…

Order the report

Product Report: Oracle ESSO – 7058105.12.2012Sebastian Rohr €295.00
With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase. KuppingerCole offers a model designed to help IT organizations manage this dichotomy by changing the perspective on IT in general. We consider that an IT organization’s job should not only be viewed from a technology perspective but—perhaps even more importantly—should also be viewed from a business perspective. Then, the primary goal of an IT organization and its sole purpose is to provide the services needed to make IT work better.

Order the report

Product Report: Oracle Database Firewall – 7033926.03.2012Martin Kuppinger €295.00
Oracle Database Firewall is part of Oracle’s defense in depth approach to security, providing a first line of defense for databases by analyzing database traffic before it reaches the database. Oracle Database Firewall expands Oracle’s solutions for heterogeneous databases, supporting Oracle Database, SQL Server, IBM DB2 LUW, and Sybase ASE. MySQL support was introduced in the most recent release. Unlike most other products in that area, Oracle Database Firewall accurately analyzes database activity traffic over the network with very little latency and thus is able to intercept and prevent unauthorized database activities based on pre-defined policies. Oracle Database Firewall defends against SQL Injection attacks and is complementary to Oracle Database Vault and Oracle Audit Vault. Oracle Database Firewall is a software appliance that includes a hardened version of Oracle Enterprise Linux. The product focuses on SQL traffic over the network and supports a wide…

Order the report

Snapshot: Oracle Database Firewall – 7038405.03.2011
Oracle Database Firewall is one of several Oracle offerings in the database security market. It complements other products such as Oracle Database Vault that offer protection within the database by providing protection by analyzing database traffic outside the database. Like few other products in that area, Oracle Database Firewall analyzes database activity traffic over the network and thus is able to intercept and filter potentially illegitimate database activities based on pre-defined policies.

Order the report

Product Report: Oracle Database Security20.09.2010Martin Kuppinger €95.00
Oracle Database Security is in fact not a single product but a set of products. It supports different features around securing content in databases. This report focuses mainly on Oracle Advanced Security and Oracle Database Vault but covers the other products as well. This is based on the fact that these two products are, from the KuppingerCole understanding, at the core of Oracle Database Security. Both products are part of the relatively new product category Database Security, which consists of products which are specifically trying to enhance the security of information in databases. That includes stronger security controls, data masking for test environments, but especially the access control on data in databases. The core capabilities in the Database Security market are in fact access control including privileged access management and advanced security by encryption of data. Other features like audit log analysis (sort of database-specific SIEM – Security Information…

Order the report

BYOD, Social Networking, Cloud – sicher und kalkulierbar11.03.2013
Die Einbindung mobiler Endger�te, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielf�ltige Einsatz von Cloud-Anwendungen – all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausforderungen. Watch
How to Efficiently Implement SoD Controls: Which Level Works?09.12.2009
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity. Watch
XACML: The Holy Grail of Access Governance?09.12.2009
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts. Watch
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.