Professional Documents
Culture Documents
Compliance
• Increasing regulatory demands
• Increasing privacy concerns
• Business viability concerns
IT Efficiency Security
• Extranet Accessibility • Organized crime
• Higher level of B2B integrations • Identity theft
• Faster reaction to changing requirements • Constant global threats
Data breaches and cybercrime The Ponemon Institute finds Majority of 400 directors
are on the rise. that surveyed recognize that the
right IT strategy is very
important for
of all IT of all
92%
organizations
have
experienced
70%
70% reported
security
breaches
69% Compliance
of IT security
When a
company
66% Customer
Satisfaction
announces a
77%
professionals
believe their
security
2%
organizations
are vulnerable
breach, its
stock price can
drop by
57% Managing
Risk
to cybercrime
Source: Ponemon Institute, 2008 Source: Ponemon Institute, 2006 Source: Corporate Board Member/ Deloitte
Consulting, March 2007
• Operational Efficiency
• Leaked Passwords
• Administrative costs
– Administering access for users
– Help desk calls
– Manual provisioning of accounts for new hires
– Manual aggregation and cross checking of audit data
• User Productivity
– Long wait times for access to requested systems
– Forgotten passwords
• IT Productivity
– Developers re-inventing security for each app
• Restricts Access
• Automates attestation
• Enhanced IT Productivity
– Developers re-use centralized security functions
– Accelerated application deployments – Virtual Directory
Access Manager
Identity Manager Internet Directory
Adaptive Access Manager
Enterprise Single Sign-On
Role Manager Virtual Directory
Identity Federation
Entitlements Server
Directory Server
Databases
& OS/Legacy
HR Applications
Applications
Identity Data
Other Sources
Physical Security
Kerberos &
Basic Auth. Portals
Single Sign On Across Enterprise
Standards-based Federation
Biometric
Custom Apps
Smart Card
Any Application
Fully
Integrated
IdM Suite
IDENTITY MANAGEMENT
Service- Rich User &
Oriented Administrator
Security Experience
• Integrates Products on a
Common Platform
Applications
Partners/Affiliates
Enterprise-class Manageability
IdM Infrastructures
• Identity as a Service
• Insulating developers from Identity
Infrastructure
Fusion Middleware
Applications
Oracle HTTP
Certificates Server w/
WebGate
Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time
© 2009period.
Oracle Corporation
It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace,
Oracle as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic
Confidential 29
Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide
to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Strongest Vendor According To
“Oracle continues
to increase in
mindshare while
broadening its IdM
portfolio.”
- VantagePoint 2008:
Identity and Privacy
Trends in Enterprise IT
Quote Attribution
Title, Company