Launches Oracle Identity Management 11g Release 2 - Industry’s First Identity Management Platform
Delhi: Oracle Corporation has launched Oracle Identity Management 11g Release 2, the industry’s first Identity Management Platform optimized to secure the new digital experience. Announcing this a press statement said, this has further strengthened Oracle’s comprehensive and integrated enterprise security solutions spanning hardware, database, middleware, and enterprise applications.
“Organizations today, while recognizing the need for an end-to-end security solution, fail to look at security comprehensively until they’ve had a security breach. It is only at such time that they realize the importance of having a security strategy in place,” said Sundar Ram Gopalakrishnan, VP- Technology, APAC, Oracle Corporation. “Oracle helps organizations develop and implement a comprehensive security strategy that can protect them against internal and external threats and help them address the changing compliance requirements.”
In India, Oracle is focusing on sectors like Telecom, BFSI and Government as these sectors own extensive classified or confidential data and are more prone to security threats. These sectors are also guided by strong regulatory compliances. Oracle with its full spectrum of security solutions is in a strong position to address the needs of these demanding industries. End-to-end security solutions Point solutions are hard to integrate and scale, eventually making it an expensive proposition. These also often leave security gaps since there is no centralized management or reporting, with independent owners for every solution.
End-to-end Oracle security solutions offer the lowest TCO and comprehensive security. Organizations can leverage Oracle solutions to not only meet their compliance needs but also to securely centralize and streamline IT infrastructure, data, applications and identity management. Information ranging from trade secrets to financial and confidential data has become the target of sophisticated attacks. While most organizations have deployed perimeter firewalls, intrusion detection, and anti-spam technologies, they lack an in-depth, inside-out data protection security strategy.
According to the recent Independent Oracle Users Group (IOUG) Data Security Survey undertaken amongst database and information security professionals, organizations are inadequately protecting sensitive data and database infrastructure. The results are disturbing with 60% of respondents saying they are either likely or somewhat likely to have, a data breach over the next 12 months. Similarly, a recent study revealed 48% of breaches were caused by insiders – so with all the monitoring 48% of breaches were caused by people who had either excessive access or even legitimate access to the data. 92% of stolen records are from database servers, 89% of records were stolen with simple SQL injection attacks and a whopping 86% of attacks were due to lost or stolen credentials.
“It is increasingly vital for organizations to know who has access to what, whether that access is appropriate, and that sensitive data is secure. From a compliance perspective, it’s equally important that organizations are able to prove that appropriate access and data security controls are in place”, said Sundar Ram Gopalakrishnan, VP- Technology, APAC, Oracle Corporation.