Consumers and the enterprise loose when internet fraud occurs. With the increasing sophistication of fraudsters and regulations governing online data privacy, organizations need a robust security solution. Such a solution must ensure that online activities are legitimate. It must as well work with centralized policies and centralized access control.
Effective security solutions evaluate risk and confirm identities by validating multiple aspects of a user, thus focusing on the risk in specific contexts. They also take action against fraud in real time. Such access systems can provide an improved level of security with context-sensitive online authentication and authorization. Thus, the risk related to any online activity, from an enterprise point of view, should be evaluated and proactively acted upon based on various types of data such as device, location, user, behaviour, historical data and combinations of those.
In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk about his experiences from numerous projects.
This webinar is sponsored by Oracle.
Solution Specialist Identity and Access Management
Stefan is responsible for advising customers, partners and Oracle organisations on I&AM solutions and architecture across EMEA. He has been working in the areas of Identity and Access management for about 6 years, joining Oracle with the acquisition of Oblix. He has a track record for... MORE
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known as a widely-read columnist... MORE
Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable
middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric