SHARE
Facebook X Pinterest WhatsApp

Oracle Ties Mobile Security to Identity and Access Management

Five Reasons Why Information Security Is Everyone’s Job After acquiring Blitzer in 2013 to gain access to mobile security technologies, Oracle this week announced that it has integrated those capabilities within its overall identity and access management portfolio. Jim Taylor, senior director of product management for Oracle, says that via a single user interface, IT […]

Written By
MV
Mike Vizard
Jul 23, 2015
Slide Show

Five Reasons Why Information Security Is Everyone’s Job

After acquiring Blitzer in 2013 to gain access to mobile security technologies, Oracle this week announced that it has integrated those capabilities within its overall identity and access management portfolio.

Jim Taylor, senior director of product management for Oracle, says that via a single user interface, IT organizations can now consistently apply security policies across all their applications running on premise or in the cloud using the latest release of the Oracle Identity Management suite of software.

To achieve that goal, the updated Oracle Identity Management software adds identity governance tools that enable organizations to maintain and audit compliance with regulations that may require separation of duties and defined life cycle management processes.

As usage of mobile applications continues to expand across the enterprise, Taylor says IT organizations are employing a more platform-centric approach to IT security. Rather than thinking in terms of building one application at a time and then securing it, Oracle is providing a unified security and governance framework designed to be applied against both mobile devices and the applications that run on them, says Taylor.

Oracle-IDM-Image

Arguably, the rapid rise in mobile application and device usage caught most enterprise IT organizations off guard. As a result, a hodgepodge of mobile applications has evolved inside their organizations that have been created using a variety of tools with differing levels of security and governance capabilities. Oracle is making the case that in a world where security is of paramount importance, the time has come to implement a more comprehensive approach to IT security in general—and identity management in particular.

The degree to which that actually occurs will differ wildly across different IT organizations. But the days when IT organizations could try to manage mobile applications in isolation from the rest of the enterprise are rapidly coming to a close.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.