Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cisco Duo Reviews & Ratings
    1,313 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,122 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    108 Ratings
    Company Website
  • Kinde Reviews & Ratings
    48 Ratings
    Company Website
  • FusionAuth Reviews & Ratings
    119 Ratings
    Company Website
  • Rippling Reviews & Ratings
    12,711 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    489 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    177 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website

What is Oracle Access Management?

Access Management delivers an all-encompassing solution for multifactor authentication (MFA) and single sign-on (SSO), adopting a risk-sensitive strategy that seamlessly incorporates identities and systems across both cloud and on-premises environments. It can be utilized as an image within Oracle Cloud Infrastructure or set up in local data centers, providing organizations the versatility to oversee access for their existing enterprise systems while easing their migration to cloud frameworks. These policies empower users to securely access data regardless of their device or geographical location, ensuring data security is always available. Moreover, organizations can enforce cohesive user access controls throughout their entire enterprise and cloud ecosystems, guaranteeing that access is not only streamlined but also fortified. The SSO feature simplifies the authentication process, minimizing user demands while upholding a uniform level of access security. Additionally, adaptive authentication bolsters protection by modifying login criteria based on the user's device, location, and activity, particularly for access deemed high-risk. This multifaceted approach aids organizations in effectively reducing potential security vulnerabilities while simultaneously providing a user-centric experience that enhances productivity. Ultimately, Access Management not only prioritizes security but also encourages a more agile and responsive organizational environment.

What is IBM Secure Proxy?

IBM Sterling Secure Proxy acts as a protective layer for your dependable network by preventing direct links between external partners and internal servers. This solution significantly boosts the security of your network and data transfers at the perimeter, allowing for secure business-to-business transactions and managed file transfer (MFT) sharing. Functioning as a proxy located in a demilitarized zone (DMZ), Secure Proxy utilizes multifactor authentication, SSL session terminations, the mitigation of inbound firewall vulnerabilities, protocol inspection, and other measures to protect your trusted environment. Furthermore, it provides guidelines for effective firewall management aimed at enhancing perimeter security, which results in improved overall protection for your data and secure zones. The implementation of multifactor authentication is a prerequisite for accessing backend systems, ensuring a tighter grip on connection validation and control. In addition, its proxy capabilities and features are designed to enhance the security of file transfers at the network's edge. With sophisticated routing capabilities, it simplifies infrastructure updates, ultimately saving time and reducing the risks associated with system transitions. Overall, IBM Sterling Secure Proxy offers a holistic approach to network security, reinforcing the integrity and continuity of your business operations while adapting to the ever-evolving landscape of cyber threats. This makes it an essential asset for organizations striving to maintain secure and efficient communication.

Media

Media

Integrations Supported

AssetCues
Docker
Hardcat Asset Management
Intellicta
Kubernetes
Lyftrondata
Maestro
Oracle Cloud Functions
Oracle Cloud Infrastructure
Oracle Identity Management
PrintSmith Vision
RadiantOne
Simcad Pro
TSM

Integrations Supported

AssetCues
Docker
Hardcat Asset Management
Intellicta
Kubernetes
Lyftrondata
Maestro
Oracle Cloud Functions
Oracle Cloud Infrastructure
Oracle Identity Management
PrintSmith Vision
RadiantOne
Simcad Pro
TSM

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Oracle

Date Founded

1977

Company Location

United States

Company Website

www.oracle.com/security/identity-management/access-management/

Company Facts

Organization Name

IBM

Date Founded

1911

Company Location

United States

Company Website

www.ibm.com/products/secure-proxy

Categories and Features

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Categories and Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Access Auditor Reviews & Ratings

Access Auditor

Security Compliance Corp

Popular Alternatives

UserLock Reviews & Ratings

UserLock

IS Decisions