About
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.
|
About
Oracle Reports, a component of Oracle Fusion Middleware is Oracle's award-winning, high-fidelity enterprise reporting tool. It enables businesses to provide instant access to information to all levels within and outside of the organization in a scalable and secure environment. Oracle Reports consists of Oracle Reports Developer, a powerful, declarative WYSIWYG reports design tool, and a JEE 5-based Oracle Reports Server with multi-tier architecture to access any data sources, generate reports in any popular format for web and paper, and burst and distribute reports to any destination. Oracle remains committed to the development of this technology and to the ongoing release as a component of the Oracle Fusion Middleware platform.
|
About
The core of extensible programming is defining functions. Python allows mandatory and optional arguments, keyword arguments, and even arbitrary argument lists. Whether you're new to programming or an experienced developer, it's easy to learn and use Python. Python can be easy to pick up whether you're a first-time programmer or you're experienced with other languages. The following pages are a useful first step to get on your way to writing programs with Python! The community hosts conferences and meetups to collaborate on code, and much more. Python's documentation will help you along the way, and the mailing lists will keep you in touch. The Python Package Index (PyPI) hosts thousands of third-party modules for Python. Both Python's standard library and the community-contributed modules allow for endless possibilities.
|
About
You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Businesses of all sizes seeking an identity and access management solution that offers a secure access to enterprise applications for both cloud and on-premises deployments
|
Audience
Businesses seeking a solution that provides access to all levels of information within and outside the organization
|
Audience
Developers interested in a beautiful but advanced programming language
|
Audience
Companies that need a powerful and comprehensive identity platform
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationOracle
Founded: 1977
United States
www.oracle.com/middleware/technologies/identity-management/
|
Company InformationOracle
United States
www.oracle.com/middleware/technologies/reports.html
|
Company InformationPython
Founded: 1991
www.python.org
|
Company InformationSailPoint Technologies
Founded: 2005
United States
www.sailpoint.com
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|||||
|
|
|
|||||
|
|
|
|
||||
|
|
||||||
Categories |
Categories |
Categories |
Categories |
|||
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
|
Audit Features
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Governance Features
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
GRC Features
Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Risk Management Features
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
SaaS Management Features
License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management
Self-Service Password Reset (SSPR) Features
Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)
User Provisioning and Governance Features
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
|
|||||
Integrations
Arm MAP
Azure Marketplace
Betteromics
ChatGPT Go
DepsHub
FacePlugin
Hyland Document Filters
KDevelop
LastPass
PandaAI
|
Integrations
Arm MAP
Azure Marketplace
Betteromics
ChatGPT Go
DepsHub
FacePlugin
Hyland Document Filters
KDevelop
LastPass
PandaAI
|
Integrations
Arm MAP
Azure Marketplace
Betteromics
ChatGPT Go
DepsHub
FacePlugin
Hyland Document Filters
KDevelop
LastPass
PandaAI
|
Integrations
Arm MAP
Azure Marketplace
Betteromics
ChatGPT Go
DepsHub
FacePlugin
Hyland Document Filters
KDevelop
LastPass
PandaAI
|
|||
|
|
|
|
|