Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/24/2012
02:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FoxT ServerControl Achieves Oracle Validated Integration With Oracle Identity Management

New Web services-based connector from FoxT enables data interchange between Oracle Identity Manager and FoxT ServerControl

MOUNTAIN VIEW, CA – May 22, 2012 ─ Fox Technologies Inc, a Gold level member of Oracle® PartnerNetwork (OPN), today announced it has achieved Oracle Validated Integration of FoxT ServerControl 6.5.4 with Oracle Identity Management 9.1. The new web services-based connector from FoxT enables data interchange between Oracle Identity Manager and FoxT ServerControl. Now organizations have a way to add granular authentication and authorization policy enforcement to their existing Oracle Identity Management processes, plus fully control privileged user access to their systems and data. The FoxT Connector for Oracle Identity Manager is available immediately through FoxT.

To achieve Oracle Validated Integration, Oracle partners are required to meet a stringent set of requirements that are based on the needs and priorities of the customers.

Specifically, FoxT ServerControl working in conjunction with Oracle Identity Management enables organizations to:

• Define fine-grained access policies and correlate these with identities defined in the Oracle Identity Manager solution

• Provision each instance of the user account across diverse servers and domains and effectively manage the state change of those accounts

• Manage authorization and authentication through assignment of roles to groups of users

• Control privileged and functional account delegation without sharing passwords

• Consolidate detailed user access activity data including keystroke logs for automated audit and compliance reporting

• Create fine-grained sub-administration rules for delegation of management tasks to Help Desk operators, Sys Admins and others

• Re-validate and report on the actual current deployed state of user accounts for accurate recertification of account status

“Recent news on costly security breaches from insider fraud highlights the on-going challenge with keeping user access rights enforced and up-to-date,” said Subhash Tantry, CEO at FoxT. “Providing synchronization of identity and access management processes can make it easier for organizations to meet their compliance, security and operational goals.”

“Oracle Validated Integration applies a rigorous technical review and test process,” said Kevin O’Brien, senior director, ISV and SaaS Strategy, Oracle. “Achieving Oracle Validated Integration through Oracle PartnerNetwork gives our customers confidence that the integration between FoxT ServerControl 6.5.4 and Oracle Identity Management 9.1 has been validated and that the products work together as designed. This helps reduce risk and improves the implementation cycles for our joint customers.”

About FoxT

FoxT protects corporate assets with an enterprise access management solution that centrally enforces granular access entitlements, in real-time, to operating systems, databases, and business applications on any networked device. The ability to proactively administer, authenticate, authorize, and audit access across diverse platforms, down to the operating system resource level, enables organizations to greatly reduce compliance and audit costs, streamline IT security administration, and protect corporate value by mitigating the risk of insider fraud. Headquartered in Mountain View, California, FoxT serves Global 1000 customers in 32 countries. For more information visit www.foxt.com or email [email protected]

About Oracle Validated Integration

Oracle Validated Integration, available through the Oracle PartnerNetwork (OPN), gives customers confidence that the integration of complementary partner software products with Oracle Applications and specific Oracle Fusion Middleware solutions have been validated, and the products work together as designed. This can help customers reduce risk, improve system implementation cycles, and provide for smoother upgrades and simpler maintenance. Oracle Validated Integration applies a rigorous technical process to review partner integrations. Partners who have successfully completed the program are authorized to use the “Oracle Validated Integration” logo. For more information, please visit Oracle.com at http://www.oracle.com/us/partnerships/solutions/index.html.

About Oracle PartnerNetwork Oracle PartnerNetwork (OPN) Specialized is the latest version of Oracle's partner program that provides partners with tools to better develop, sell and implement Oracle solutions. OPN Specialized offers resources to train and support specialized knowledge of Oracle products and solutions and has evolved to recognize Oracle's growing product portfolio, partner base and business opportunity. Key to the latest enhancements to OPN is the ability for partners to differentiate through Specializations. Specializations are achieved through competency development, business results, expertise and proven success. To find out more visit http://www.oracle.com/partners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).