What Integrates with Oracle Identity Management?

Find out what Oracle Identity Management integrations exist in 2024. Learn what software and services currently integrate with Oracle Identity Management, and sort them by reviews, cost, features, and more. Below is a list of products that Oracle Identity Management currently integrates with:

  • 1
    OpenVPN Reviews

    OpenVPN

    OpenVPN

    Free Up to 3 Users - $11/month
    198,252 Ratings
    See Software
    Learn More
    Over 15,000 businesses worldwide trust Access Server from OpenVPN for a self-hosted VPN to securely extend their private network to their remote workforce over the internet. That means your remote and hybrid workforce will have access to their business resources with top network security, without adding hundreds of hours of setup and maintenance time to your to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.
  • 2
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 3
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 4
    Indent Reviews

    Indent

    Indent

    $8 per month
    Faster access unlocks more revenue. Give your team on-demand access to apps that is faster and easier without frustrating them. Slack allows users to request access to apps. Managers can approve or deny the request from Slack. All of this is auditable. Stop manually catherding approvals. Every time an access is granted, there's a security risk. Indent helps teams to scale security and least-privilege by shifting users from permanent access without slowing things down. Automate spreadsheet-based processes for SOC 2, SOX ISO and HITRUST. Controls and policies are baked directly into the access request workflows. Reduce your license footprint by only providing access when needed, instead of granting permanent access. Indent reduces costs without adding friction to the end user experience. If you want to lead a rapidly growing company to success, you need to take on big risks.
  • 5
    IntelliGrants IGX Reviews
    Agate Software's industry-leading Grants Management solution, IntelliGrants®, allows clients of both state and federal governments to manage all data related the grant lifecycle in one user-friendly environment. The new IGX platform from IntelliGrants enables agencies to quickly analyze grant data and provide reports on it for any stage of its grant lifecycle. IntelliGrants is an efficient and easy-to-use platform that manages all aspects of grant management for your agency, from pre-application to grant closeout. IntelliGrants IGX has improved processes for nonprofits, educational institutions, governments, transportation agencies, and more thanks to its purpose-built features for grant management and data tracking. IntelliGrants IGX offers benefits in communication, time management, performance review and more. Our newest product bundle includes features that provide even further usability and functionality.
  • 6
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 7
    SecureIdentity MFA Reviews
    A simple password and username approach is not enough to protect your business' sensitive data. Your private data is vulnerable to attack if log-ins are compromised in a matter of minutes. SecureIdentity provides information about the identity, device, and data of each user. This allows you to prove who is doing what at all times. MFA is the best option for privacy and layered data security. Our MFA solution integrates seamlessly into Microsoft's Active Directory or other LDAP solutions. This allows you to reutilize existing authentication database infrastructure without having to re-architect and deploy, backup, and manage a secondary user base. We believe that users should be able choose any device they want to use as their authentication token. This could be their phone, tablet, laptop, or desk phone.
  • 8
    SecureIdentity PAM Reviews
    Our SecureIdentity Platform is a set of solutions that focuses primarily on user experience and provides verifiable security in all your activities. The combination of these solutions creates a comprehensive solution that protects the user's identity, data, and device. Secureldentity PAM acts as an interactive broker between users, administrators, and users on protected endpoints. This allows users to gain privileged entry to areas they have been granted permission to in the Universal Directory without actually exposing their credentials. SecurEnvoy partners closely with top technology companies and platforms to provide the highest level security and peace-of-mind. Many popular business applications and solutions can be integrated with our pre-built integrations. Learn more about specific integrations, or contact our technical staff to discuss your individual needs.
  • 9
    SecureIdentity IAM Reviews
    SecureIdentity IAM enforces access decisions regarding applications and data repositories. It can dynamically decide what programs a user can run and which file servers or cloud storage areas it is allowed to access by reading information from the Universal Directory. Clients on the endpoints enforce this policy by intercepting requests for access to data areas or applications and verifying them against the defined policy. If the action is permitted, the user experience will continue as normal without any overhead. Access to the executables or DLL files required for the action is blocked dynamically if it is prohibited. To provide a forensic trail, logs of all events are sent back from the platform to its event database.
  • 10
    SecureIdentity DLP Reviews
    SecureIdentity DLP is a data security portfolio that protects data on-premises, offsites, and in the cloud. It prevents data loss from malware, insider threat, and human error. This can be done across multiple channels, regardless of file type, by blocking sensitive information across both structured and unstructured data repositories. SecureIdentity DLP platform allows you to identify the user, their device and the data they are working with so that you can easily prove who is doing what at all times. DLP is essential to protect organizations when new technologies are adopted. DLP integrates well with other parts the security market. Our DLP solutions stand out from the rest because they address threats from trusted as well as untrusted users through unique intellectual algorithms, fingerprinting features, and other unique features. SecureIdentity DLP can stop data loss by analyzing all protocols in real time, even those that are not known.
  • 11
    SecureIdentity IRAD Reviews
    SecureIdentity Platform allows organizations provide verifiable trust for every activity they do. You can easily prove who is doing what by providing the identity of the user, their device and the data they are using. SecurEnvoy partners closely with top technology companies and platforms to provide the highest level security and peace-of-mind. Many popular business applications and solutions can be integrated with our pre-built integrations. Learn more about specific integrations, or contact our technical staff to discuss your individual needs. SecureIdentity IRAD is based on artificial intelligence and detects any unusual interaction or activity in the user's actions. This allows for real-time analysis of user interactions and mitigates risks.
  • 12
    Oracle Access Management Reviews
    Access Management provides risk-aware, end to end multifactor authentication (MFA), and single sign on (SSO) that seamlessly integrate identities across cloud and on-premises. Organizations can deploy Access Management as an image in Oracle Cloud Infrastructure, or in on-premises Data Centers. This gives them the flexibility to manage access to their existing enterprise platforms and supports their migration to cloud. These policies can be applied regardless of device or location so that users have access to all data from any device, at any time, from any device. You can provide seamless user access control across the enterprise and cloud from any device. Single sign-on (SSO), simplifies access and reduces the requirements for the user while providing consistent access security. Adaptive authentication reduces risk by increasing the login requirements for users based upon device, location, or behavior when access to sensitive information is required.
  • 13
    Tessian Defender Reviews
    Tessian Defender is an inbound email security system that automatically blocks a variety of attacks that bypass Secure Email Gateways. It also provides in-the-moment training that encourages employees to adopt secure email behavior. Defender protects against known and unknown email threats, including Account Takeover (ATO), Business Email Compromise, spear phishing, and any impersonation attacks that bypass Secure Email Gateways. Defender's in-the moment training empowers users to increase their email security awareness. Defender automates repetitive tasks like triage and review, removing the burden from the SOC and admins. This reduces the need to verify email threats by humans and reduces FTE requirements. Defender's behavioral intelligence uses at least 12 months' worth of historical data, which includes company emails and company network.
  • 14
    Intellicta Reviews
    TechDemocracy's brainchild, Intellicta is the first to provide a comprehensive assessment of an entity's cybersecurity compliance, risk, and governance. It is the only product that can predict potential financial liabilities arising from cyberspace vulnerabilities. Intellicta empowers non-technical business decision makers to evaluate, measure and evaluate the effectiveness of their cybersecurity, governance, and compliance programs. The platform can be tailored to meet any company's specific business requirements. It uses quantifiable metrics that are based on proven models such as ISO, NIST, ISM3, and NIST to provide solutions. Intellicta boasts an open-source architecture that aggregates, analyzes, and monitors every aspect of an enterprise's unique ecosystem. It can extract critical information from cloud-based, on premises and third-party systems.
  • Previous
  • You're on page 1
  • Next