Welcome!

Java IoT Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Yeshim Deniz

News Feed Item

Oracle Announces Oracle Mobile Authenticator

New Strong Authentication Solution Offers a Cost-Effective Way to Prevent Unauthorized Access

REDWOOD SHORES, CA -- (Marketwired) -- 04/10/14 -- Oracle (NYSE: ORCL)

News Summary
As digital security risk continues to grow, the need for organizations to authenticate user identities using 2-factor strong authentication, before providing employees and customers access to sensitive information, is crucial. However, the cost of providing secure authentication methods beyond a password have historically been prohibitive, and most users have bristled at the idea of carrying around a token or card to validate their identity. To address these challenges, Oracle is introducing Oracle Mobile Authenticator, a new component of Oracle Access Management Suite. With this solution, an employee's or consumer's personal phone or tablet can be turned into a second factor authentication device, eliminating the complexity associated with supplying, maintaining and revalidating security devices such as tokens or smart cards. This provides a more cost effective approach to securing consumer access for companies looking to secure their customers and employees from fraud.

News Facts

  • Oracle today introduced Oracle Mobile Authenticator, a token-based authentication application that enables organizations to cost-effectively provide strong authentication and prevent unauthorized access to vital company and customer data.
  • Removing the cost and complexity of purchasing and maintaining authentication solutions like smart cards and tokens, Oracle Mobile Authenticator combines user names and passwords with an additional layer of security at the device level, turning a user's personal mobile device into an authentication device.
  • With Oracle Mobile Authenticator, companies can further secure their applications and data, while giving their workforce and customers the freedom to use their preferred personal device.
  • Oracle Mobile Authenticator runs on mobile devices, generating a time based security code, and a corresponding service that enable applications to accept soft token authentication.
  • By providing a single solution for stronger authentication and complete access control, Oracle Mobile Authenticator also allows organizations to use a single access management infrastructure for single sign-on (SSO), federated Web access control, fraud detection, token management and enterprise SSO.
  • In addition, the application enables organizations to utilize a wide range of second factors at no additional cost, including soft token generation, Google Authenticator and behavior-based access.
  • Oracle Mobile Authenticator and Oracle Adaptive Authentication have been added to the Oracle Identity Management platform through the latest update to Oracle Identity Management 11g R2, which also introduced enhancements for cloud and mobile applications, as well as new features and capabilities.
  • Oracle Mobile Authenticator is available for download from the Apple Store and Google Play. Terms, conditions and restrictions apply.

Comprehensive and Integrated Security for Today's Mobile Enterprise

  • Oracle Identity Management is a complete and integrated, next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and helps reduce operational costs.
  • Oracle Mobile Authenticator and Oracle Adaptive Authentication provide a flexible way to deploy stronger authentication by offering the following capabilities:
    • Behavior-based access management, which detects fraud and anomalous behavior, such as a user attempting to log in from multiple distant locations, a user logging in during non-working hours, or a user logging in from multiple devices.
    • Step-up authentication and out-of-band authentication for access to highly sensitive transactions or data.
    • Support for authentication via Google's Authenticator.
    • Soft token generation service to replace physical token devices and reduce costs.
    • Support for the OAuth standard to allow sign-on via social media and cloud services.

Supporting Quote

  • "In today's business landscape, mobile devices have become an extension of a user's identity and provide a simple and powerful solution to address growing digital security risks," said Amit Jasuja, senior vice president of Java and Identity Management, Oracle. "Oracle's approach to strong authentication enables organizations to take advantage of the growing number of personal devices in the workplace while reducing the cost of authentication. Additionally, the new Oracle Mobile Authenticator application delivers the added benefit of fraud detection and reduced risk."

Supporting Resources

About Oracle
Oracle engineers hardware and software to work together in the cloud and in your data center. For more information about Oracle (NYSE: ORCL), visit www.oracle.com.

Trademarks
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Contact Info
Teri Whitaker
Oracle
+1.650.506.9914
Email Contact

Drew Smith
Blanc & Otus
+1.415.856.5127
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.