Vendor Report: Oracle
Oracle has, largely through making acquisitions, transformed itself over the past few years into one of the leading suppliers in the IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance) areas. Within these IT market segments, the Company is now in a position to deliver solutions covering the majority of requirements and it maintains one of the broadest service portfolios of all suppliers, even if there continue to be sporadic gaps.
This situation does however create challenges in relation to the integration requirement. Many of the acquired products have/had different architectures, application and user interfaces. Oracle has addressed these issues at an early stage. But more action is still required. What is not in doubt, however, is Oracle's pursuit of a clearly defined strategy in this regard and, compared to many other providers in the market, it has made rapid progress with respect to integration. But varying product histories have the potential to cause projects to experience increased time and effort in relation to integration and administration.
Oracle has a past record of demonstrating its capability in the thorough implementation of strategies. This is what makes Oracle a viable supplier, and one that should always be taken into consideration in decision-making processes undertaken in this market segment, even where systems are not based on Oracle databases.
|Mar 04, 2009||
Vendor Report: Oracle
Oracle has, largely through making acquisitions, transformed itself over the past few years into one of the leading suppliers in the IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance) areas. Within these IT market segments, the Company is now in a…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]