Oracle Adaptive Access Manager
   HOME

TheInfoList



OR:

The Oracle Adaptive Access Manager

is part of the
Oracle Identity Management Oracle Identity Management, a software suite marketed by Oracle Corporation, provides identity and access management (IAM) technologies. The name of the software suite closely resembles the name of one of its components, Oracle Identity Manager. ...
product suite that provides
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
services to web and other online applications. Oracle Adaptive Access Manager was developed by the company Bharosa, which was founded by Thomas Varghese, Don Bosco Durai and CEO
Jon Fisher Jon Fisher (born January 19, 1972) is a Silicon Valley entrepreneur and writer. Jon sold his own Non-fungible token, NFTs before founding software company, ViciNFT. As a co-inventor and co-founding CEO, Fisher built three companies including Bh ...
. The software was included in Oracle's acquisition of Bharosa.


History

Oracle acquired Bharosa, which means 'trust' in the
Hindi Hindi (Devanāgarī: or , ), or more precisely Modern Standard Hindi (Devanagari: ), is an Indo-Aryan language spoken chiefly in the Hindi Belt region encompassing parts of northern, central, eastern, and western India. Hindi has been de ...
language, to extend its web-based access management solutions. In 2003, Bharosa was founded by Thomas Varghese, a research
scientist A scientist is a person who conducts Scientific method, scientific research to advance knowledge in an Branches of science, area of the natural sciences. In classical antiquity, there was no real ancient analog of a modern scientist. Instead, ...
and serial entrepreneur. Later, Don Bosco Durai and
Jon Fisher Jon Fisher (born January 19, 1972) is a Silicon Valley entrepreneur and writer. Jon sold his own Non-fungible token, NFTs before founding software company, ViciNFT. As a co-inventor and co-founding CEO, Fisher built three companies including Bh ...
came on board as co-founders.


Design philosophy

The premise was simple in that the existing
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
technologies were unsatisfactory and easy to compromise. No
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
technology can really provide its full and intended
security Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
benefits unless the
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
and
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
are re-designed from the grounds up.Oracle Adaptive Access Manager
/ref> Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud.


References

{{reflist, 2


External links





* ttp://blogs.oracle.com/bornidentity/ Thomas Varghese Aims to Address Challenges in Identity Management and Security in This Blog Oracle software