Back to the main page
QA: SVP Amit Jasuja on Key Trends in Identity Management
As senior vice president of product development for Oracle's identity management products, Amit Jasuja is focused on how identity management can enable the new work experience as organizations embrace cloud, mobile, and social technologies. His vision is to have every user and device authenticated and trusted across the network.
We asked Jasuja to review the most recent developments in Oracle identity management solutions.
Q. Briefly tell us about your team's key innovations in 2012.
A. Mobile, social, and cloud computing are driving the biggest rearchitecture of systems in organizations today. In response, Oracle introduced a foundation for social identity management by enabling social sign-on. With Oracle Identity Management 11g Release 2 we have defined mobile identity management and extended the platform to allow organizations to extend their enterprise access control policies to mobile applications. And we continue to support open standards that significantly ease adoption of public and private clouds.
We also made our products easier to use, easier to customize, and easier to configure. Now it's as easy to request access through a role or an entitlement as it is to shop online. And to meet dramatically rising demands for performance and scale, we launched Oracle Optimized Solution for Oracle Unified Directory, which delivers up to three times performance gains thanks to hardware and software that are engineered to work together. “Optimized" means that it's preconfigured to provide performance while lowering the total cost of ownership.
Q. In your contact with customers this year and at Oracle OpenWorld, what security concern was top-of-mind?
A. Apart from mobile and social, managing privileged accounts was high on everyone’s list. Most organizations have hundreds and sometimes thousands of accounts not associated with a named user, and typically they have broad-reaching privileges.
We just launched Oracle Privileged Account Manager, a password checkout system for shared operating system, application, and database accounts. Now you can lease an account to a user for a period of time, then remove access when the time period has expired.
Q. You've said we're seeing "the end of work as we know it." Please explain.
A. Mobile and social are transforming the way we work and collaborate. First of all, internet-enabled mobile devices enable us to work wherever we are. We are no longer tethered to an office. At the same time, we're seeing more and more dynamic teams rather than large fixed organizations. Companies are using social media-style interaction to connect with customers—and to enable employees.
Q. How are these trends challenging traditional identity management?
A. Increasingly, we're seeing teams in different departments and geographies needing access to the same information and applications. The problem is that IT systems and identity management policies and procedures have traditionally relied on organizational charts and department structure, which no longer define a team.
At the same time, employees want access from any location, often over public Wi-Fi and increasingly with their own devices. So that has to change how we think about enabling secure application access.
Q. How is Oracle responding?
A. To meet these challenges, we deliver solutions that allocate and certify access to systems and data dynamically. That's why we continue to be so focused on providing a single, comprehensive platform approach. Instead of separate point products, requesting and enforcing access can rely on a single set of policies and intelligence.
Our latest release delivers on the platform promise, offering a complete portfolio of proven, integrated solutions that support the scale required in today’s social, mobile, cloud environment.
Use these resources to learn more about Oracle’s innovative approach to identity management.