Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Oracle Identity Management empowers organizations to efficiently oversee the complete lifecycle of user identities across all enterprise resources, extending beyond the firewall and into cloud environments. This comprehensive platform provides scalable solutions for identity governance, access management, and directory services. By implementing this contemporary system, organizations can enhance security, streamline compliance processes, and seize business opportunities related to mobile and social access. As part of the Oracle Fusion Middleware suite, Oracle Identity Management contributes to increased agility, improved decision-making, and lowered costs and risks in various IT landscapes today. Furthermore, we are excited to introduce a groundbreaking, fully integrated service that encompasses all essential identity and access management functions via a multi-tenant Cloud platform, known as Oracle Identity Cloud Service, which further elevates the user experience and operational efficiency.

Description

Provide employees with the necessary applications and services while safeguarding data and processes from unauthorized access. Simplify the management and validation of user access through governance tools that automate user provisioning and ensure compliance with access certification for on-premise applications and data. By integrating preventive policy checks and monitoring emergency access, governance can be effectively enforced. Automatically detect and address access risk violations within SAP and external systems, while embedding compliance checks and essential risk mitigation into operational workflows. Facilitate user-initiated, workflow-oriented access requests and approvals, ensuring transparency and efficiency in the process. Accurately identify and resolve issues related to segregation of duties and critical access by incorporating integrated risk analysis. Streamline user access assignments across SAP and third-party systems automatically, while defining and maintaining compliance roles in clear, business-friendly terminology to enhance understanding and adherence. This comprehensive approach not only mitigates risks but also fosters a secure and efficient operational environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend DDoS Mitigator
Active Directory
Arxes Data Management
Axya
Chemical Safety Software
Cloud Assess
Dovetail Software
DvSum
Exegy SMDS
Fracttal
IntelliGrants IGX
Intellicta
ManWinWin
Proofpoint Adaptive Email Security
SecureIdentity DLP
SecureIdentity MFA
SecureIdentity PAM
ValueStreamer
iDashboards

Integrations

A10 Defend DDoS Mitigator
Active Directory
Arxes Data Management
Axya
Chemical Safety Software
Cloud Assess
Dovetail Software
DvSum
Exegy SMDS
Fracttal
IntelliGrants IGX
Intellicta
ManWinWin
Proofpoint Adaptive Email Security
SecureIdentity DLP
SecureIdentity MFA
SecureIdentity PAM
ValueStreamer
iDashboards

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

www.oracle.com/middleware/technologies/identity-management/

Vendor Details

Company Name

SAP

Founded

1972

Country

Germany

Website

www.sap.com/products/access-control.html

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Self-Service Password Reset (SSPR)

Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Alternatives

EzyWine PRO Reviews

EzyWine PRO

Ezy Systems
SailPoint Reviews

SailPoint

SailPoint Technologies
SPHEREboard Reviews

SPHEREboard

SPHERE Technology Solutions