Media Coverage

Stage IAM Analytics & Intelligence

Atos SE (Société Européenne), est une entreprise leader de services numériques avec un chiffre d'affaires annuel de 11 milliards d'euros et 93 000 collaborateurs dans 72 pays. Atos fournit à ses clients du monde entier des services de conseil et d'intégration de systèmes, d'infogérance et de BPO, de Big Data et de Cyber-sécurité, d'opérations Cloud et des services transactionnels par l'intermédiaire de Worldline, le leader européen et un acteur mondial dans les services de paiement....

Read More

Why relying on standards is best for secure Cloud Computing

Why relying on standards is best for secure Cloud Computing   Who will have access to what? In a complex world where soon everyone and everything – people, things and services – will be connected everywhere and anytime through a global cloud, IAM is one of the best means to protect enterprise security, especially when firewalls are not sufficient any more. However, to guard cloud computing, the IAM technology must be further developed. For this, standards play a central role.   The mere defining of roles for individual access permissions is no longer...

Read More

Please Stop Using Snowden as Evidence of the Necessity of Data Loss Prevention Technology!

Rarely a day goes by as an IT Security professional that one will not hear a security vendor or consulting firm using the  Edward Snowden  affair as proof that their security product is necessary for data loss prevention (DLP) protection. Insider threats must be mitigated, and whistleblowers such as Snowden are lumped together with rogue or disgruntled employees as an example of common insider threat actors. The reality is that whistleblowers are a unique type of actor at the cause of confidential data loss, and the response of information security to this type of insider...

Read More

KUPPINGERCOLE RECOGNIZES GURUCUL FOR USER BEHAVIOR ANALYTICS APPROACH TO THREAT DETECTION

LOS ANGELES -- (BUSINESS WIRE) --  Gurucul , the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here:...

Read More

Security Think Tank: Top five issues in taking a structured approach to security in the cloud

Last week, experts discussed the need to focus on the basics of security in the cloud. Here, the security think tank expert panel covers a structured approach to cloud computing security. The term "cloud" has been turned into a marketing platform by many suppliers and this has obscured what it really is - a way to procure and deliver IT services. The cloud covers a wide spectrum of services and delivery models. The common security concerns are ensuring the confidentiality, integrity and availability of the services and data delivered through a cloud environment.

Read More

KuppingerCole Recognizes Gurucul for User Behavior Analytics Approach to Threat Detection

LOS ANGELES--( BUSINESS WIRE )-- Gurucul , the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here: ...

Read More

Blockchain or Bulls**t

When the UK government published its report “ Distributed Ledger Technology: beyond block chain ” this attracted some sceptical comments on various internet forums.  Is Blockchain the answer to many problems or is it just another over-hyped technology looking for problems? Well there are plenty of problems around trust in information that need to be solved and the report provides plenty of examples.  Some of these examples refer to existing solutions and these provide some confidence that there is value in the technology.  Others are more futuristic with a...

Read More

CA Technologies is an Overall Leader for privilege management, says KuppingerCole

CA Technologies  has been named an Overall Leader in privilege management in the recent  Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator. “The scope of privilege management though quite broad can be summed up as ‘automating the management of who can access your most critical data and systems when, from where, at...

Read More