Stay Connected: Find Us on facebook Follow us on twitter Oracle on LinkedIn Oracle on YouTube 

product logo

Oracle Identity Analytics

Oracle Identity Analytics provides enterprises with the ability to define and manage roles and automate critical identity-based controls. Once roles are defined, certified, and assigned, the software continues to deliver scalable and sustainable identity governance and analytical solution throughout the user access lifecycle by:

  • Maintaining a centralized identity and access warehouse, optimized for complex analytical, simulation and governance needs
  • Metrics driven Identity Intelligence, powered by rich risk analytics, which is crucial in measuring how well IT supports the business and manages risk, and provides enterprises with the tools they need to mitigate risk, build transparency, satisfy compliance mandates and support business decisions.
  • Providing Persona-centric compliance monitoring in out-of-box compliance dashboards and reports to auditors, business users, compliance officers and IT managers
  • Providing a complete view of access-related data that includes the user's access; the "why and how" of that access and if the access violates policies
  • Automate the certification process and removing inappropriate access via Closed Loop Remediation with Oracle Identity Manager, providing improved sustainability for enterprises to deal with access reviews of thousands of applications and millions of entitlements
  • Providing continuous evidence that access is compliant to established audit and Segregation of Duty policies
  • Enabling changes in access based on changes in users' roles to minimize the disruptive effects of change on user productivity
  • Providing a complete set of role change management, lifecycle management and role change impact analysis capabilities

 


Download 
Download
Documentation 
Documentation
  
Certifications
Blog 
Blog
     
Resources
 Access Certification: Addressing & Building on a Critical Security Control (PDF)
 Getting PCI DSS Compliance Right (PDF)
 The Identity Warehouse: Best Practices (PDF)
 Governance, Risk, and Compliance: A Practical Guide to Points of Entry (PDF)
 Wave Methodology: A Practical Approach to Defining Roles for Access Control (PDF)
 
 
 
 
Technical Information