Partner Details

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

 Sponsored Events

Date Title
May 09  ‑  May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

May 05  ‑  May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

May 13  ‑  May 16, 2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

May 14  ‑  May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Mar 21, 2013 Webinar

Extending Data Governance Beyond the Database

Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.

Mar 07, 2013 Webinar

BYOD, Social Networking, Cloud - sicher und kalkulierbar

Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausforderungen.

Apr 17  ‑  Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Feb 09, 2012 Webinar

Bridging the Cloud Sign-On Gap

With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frustration. In this webcast KuppingerCole and Oracle will discuss how organizations can benefit from a cloud sign-on strategy. In addition, you will learn how single sign-on can jump start your cloud access management strategy and improve security.

May 10  ‑  May 13, 2011 Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 03, 2011 Webinar

Database Firewall – Build the first line of protection

Database Security is one of the key elements within any IT security strategy, given that several of the most severe incidents in IT are related to attacks against databases and that most of the critical and sensitive information in organizations is stored in databases. Database firewalls implement a first line of defense, blocking in real time any suspicious data manipulation without forcing production environment redesign. Thus, companies should consider the value that these tools can add to their security strategy.

Apr 12, 2011 Webinar

Reliable Protection for Information in Databases

How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mechanisms within databases and in the surrounding system environment. In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security. Roxana Bradescu of Oracle will talk more in detail about how to implement encryption in Database Security, with respect to key management, protection of data at rest and in transit, and strong authentication.

Mar 29, 2011 Webinar

Overcoming Enterprise Entitlement Barriers by Externalizing Authorization

Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.

Mar 15, 2011 Webinar

Database Governance – How to Put the Right Controls in Place to Protect your Data

In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.

May 04  ‑  May 07, 2010 Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.

May 04  ‑  May 07, 2010 Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.

Mar 24, 2010 Webinar

Beyond Simple Attestation – How to Really Keep Your Access Under Control

Attestation should not be a point solution, but an element within a larger information security architecture. In this Webinar, we will talk about where access certification is today and what is changing – and what has to change. We will describe maturity levels with respect to access certification and will focus on the relationship to risk management and to overall IT governance.

Dec 09, 2009 Webinar

XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.

Dec 09, 2009 Webinar

How to Efficiently Implement SoD Controls: Which Level Works?

SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.

Sep 21, 2009 Webinar

Identity Services and the Cloud

The reason companies are considering cloud computing is to avoid the expense involved in building or acquiring the infrastructure, and to some extent managing it. However, without paying attention to the security and governance implications, those cost savings will actually evaporate when they either try to retrofit their existing business policies and controls into the cloud environment, or when they have to deal with the fallout from a breach or issue. In This webinar, Nishant Kaushik (Oracle) and Martin Kuppinger (Kuppinger Cole) will talk about this, and examine how identity services are crucial to making cloud computing viable.

Jun 24  ‑  Jun 26, 2009 Congress

Identity Management & GRC Conference Istanbul

ID-Conf Istanbul is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant IT-Security related topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and Service Oriented Architecture (SOA). With it's world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, ID-Conf Istanbul is an absolute must-attend event for enterprise IT leaders from all over Europe.

May 05  ‑  May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Mar 11, 2009 Webinar

Fraud Prevention and Multi-factor Authentication

In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk about his experiences from numerous projects.

Jan 21, 2009 Webinar

Service Oriented Security (SOS)

Service-Oriented Security aligns with the overall Application-Centric approach of Identity and Access Management solutions - with the goal of providing a comprehensive, standards-based, developer-friendly platform. By leveraging and sharing many of the common Identity "Services", Service-Oriented Security allows developers to spend the effort on where it counts the most - the application logic itself. Security will be just a service that can be invoked over a well defined hetrogenous interface based on open Standards. Furthermore application developers building identity-enabled applications must look to the benefits of these services and understand when and how to use these services in their application design.

Dec 04, 2008 Webinar

Enterprise Role Management

Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.

Apr 22  ‑  Apr 25, 2008 Congress

European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.

May 07  ‑  May 10, 2007 Congress

1st European Identity Conference

Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning

May 07  ‑  May 10, 2007 Congress

European Identity Conference 2007

Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning

 Reports

Date Title Price
Mar 09, 2017

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers…

€1295.00
May 29, 2015

Executive View: Oracle Privileged Account Manager - 71057

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as…

€190.00
Apr 27, 2015

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well…

€190.00
Mar 17, 2015

Executive View: Oracle Database Vault - 70899

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database…

€190.00
Aug 18, 2014

Executive View: Oracle Audit Vault and Database Firewall - 70890

Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the…

€190.00
Apr 22, 2014

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in…

€190.00
Mar 06, 2014

Executive View: Oracle Entitlements Server (OES) 11gR2 - 70831

Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle…

€190.00
Oct 31, 2013

Executive View: Oracle Big Data Solutions - 70993

Smart information is big data analyzed to provide answers to business questions. Oracle provides a range of integrated software and hardware tools needed to acquire and analyze big data into…

€190.00
Feb 08, 2013

Snapshot: Oracle Audit Vault and Database Firewall - 70631

Oracle Audit Vault and Database Firewall is a new offering combining and enhancing two existing products: Oracle Audit Vault and Oracle Database Firewall. The product monitors Oracle…

€190.00
Dec 13, 2012

Snapshot: Oracle Mobile and Social Access Management - 70724

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This…

€190.00
Dec 05, 2012

Product Report: Oracle ESSO - 70581

With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase.…

€295.00
Mar 26, 2012

Product Report: Oracle Database Firewall - 70339

Oracle Database Firewall is part of Oracle’s defense in depth approach to security, providing a first line of defense for databases by analyzing database traffic before it reaches the…

€295.00
Dec 08, 2011

Vendor Report: Oracle Cloud Security - 70160

This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which…

€195.00
Apr 27, 2011

Product Report: Oracle Database Vault/Oracle Audit Vault - 70112

The market for Database Security involves a number of different technical solution approaches which are not covered by a single product, but instead require a set of different products and…

€95.00
Apr 27, 2011

Snapshot: Sun to Oracle Identity Upgrade - 70382

Oracle Sun to Oracle Identity Upgrade program is an initiative aimed at informing Sun customers about the company’s future strategy for former Sun Identity and Access Management (IAM)…

free
Mar 05, 2011

Snapshot: Oracle Database Firewall - 70384

Oracle Database Firewall is one of several Oracle offerings in the database security market. It complements other products such as Oracle Database Vault that offer protection within the…

free
Sep 20, 2010

Product Report: Oracle Database Security

Oracle Database Security is in fact not a single product but a set of products. It supports different features around securing content in databases. This report focuses mainly on Oracle…

€95.00
May 02, 2009

Market Report: Oracle buys Sun – the Impact on IAM and GRC strategies and tactics

The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some…

€165.00
Mar 04, 2009

Vendor Report: Oracle

Oracle has, largely through making acquisitions, transformed itself over the past few years into one of the leading suppliers in the IAM (Identity and Access Management) and GRC (Governance,…

€95.00
Feb 20, 2009

Vendor Report: Oracle

Oracle hat sich in den vergangenen Jahren insbesondere durch Zukäufe zu einem der führenden Anbieter im Bereich IAM (Identity und Access Management) und GRC (Governance, Risk…

€95.00
Jan 23, 2009

Product Report: Sun Identity Manager

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with…

€95.00
Oct 09, 2007

Product Report: Oracle Identity Manager

Der Oracle Identity Manager ist die Lösung für das Enterprise Provisioning innerhalb des Oracle-Produktportfolios. Das Produkt zeichnet sich durch eine sehr große…

€95.00
Jul 10, 2007

Vendor Report Oracle

Vendor Report: Oracle Der Report beschreibt und bewertet das Identity Management-Angebot von Oracle und die Positionierung des Anbieters.

€95.00

 Webcasts

Date Language Title
May 14, 2015

Luca Martelli, Christian Patrascu - Evolution or Revolution: Unlocking The Potential of The New Digital Economy

Cloud, Mobile & Social continue to have an impacting effect on IAM projects. In addition to this, Digital business plus Internet of Things have begun to further influence the IAM programs worldwide. The Convergence of identities like people & things is furthermore driving these trends. Hence the question can be put: Is Identity in the gravity center of these emerging trends? The presentation goes though some real life examples of how Security and Identity Management are enabling Digital Transformation from the business and technical points of view.

Mar 22, 2013

Extending Data Governance Beyond the Database

Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to e...

Mar 11, 2013

BYOD, Social Networking, Cloud - sicher und kalkulierbar

Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausford...

Feb 21, 2012

Best Practice Driven Identity & Access Management

Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on the mos...

Feb 09, 2012

Bridging the Cloud Sign-on Gap

With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frust...

May 12, 2011

Interview with Fulup Ar Foll, Oracle

Day three of the European Identity Conference 2011

May 11, 2011

Interview with Nishant Kaushik, Oracle

Day two of the European Identity Conference 2011

May 03, 2011

Database Firewall - Build the First Line of Protection

Database Security is one of the key elements within any IT security strategy, given that several of the most severe incidents in IT are related to attacks against databases and that most of the critical and sensitive information in organizations is stored in databases. Database firewalls implemen...

Apr 13, 2011

Reliable Protection for Information in Databases

How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mecha...

Mar 30, 2011

Overcoming Enterprise Entitlement Barriers by Externalizing Authorization

Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this W...

Mar 16, 2011

Database Governance - How to Put the Right Controls in Place to Protect Your Data

In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and t...

Jan 14, 2010

Harnessing Sun's OpenSSO Authentication and Authorization Mechanisms

It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst...

Dec 09, 2009

How to Efficiently Implement SoD Controls: Which Level Works?

SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole...

Dec 09, 2009

XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by dif...

Sep 22, 2009

Identity Services and the Cloud

The reason companies are considering cloud computing is to avoid the expense involved in building or acquiring the infrastructure, and to some extent managing it. However, without paying attention to the security and governance implications, those cost savings will actually evaporate when they ei...

Mar 11, 2009

Fraud Prevention and Multi-factor Authentication

In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk abou...

Jan 23, 2009

Service Oriented Security (SOS)

Service-Oriented Security aligns with the overall Application-Centric approach of Identity and Access Management solutions - with the goal of providing a comprehensive, standards-based, developer-friendly platform. By leveraging and sharing many of the common Identity "Services", Service-Oriented...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity & Cloud Conference 2012

Language:
English
Registration fee:
€1980.00 $2376.00
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Apr 17 - 20, 2012 Munich, Germany

Key Topics

  • Making Information Security a Strategic Priority

  • Planning, Managing & Governing IAM & Cloud

  • How to Efficiently Protect Critical Infrastructures

  • Service-focused IT in the Age of Cloud Computing

  • Cloud Provider Assessment, Governance and Audit

  • Evaluating and Reducing the Risks of Cyber Crime

  • Mobile Privacy and Security

  • Cloud Computing Contracts & Law

  • Data Protection and Privacy

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00