Executive View: CyberArk Privileged Threat Analytics - 70859

Report Details

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren diese Technologien noch bis vor kurzem außerhalb von IT-Abteilungen nahezu unbekannt. Aber aufgrund der derzeitigen Entwicklungen in der IT-Industrie wendet sich die Informationssicherheit immer mehr vom Schutz vor äußeren Einflüssen ab und rückt stattdessen die Verteidigung gegen Bedrohungen durch Insider in den Mittelpunkt. Im gleichen Maße, in dem Unternehmensnetzwerke immer offener werden und häufig verschiedene miteinander verbundene Standorte integrieren müssen, verschwindet schrittweise auch die Idee eines Netzwerks mit klar definierten äußeren Grenzen...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 28, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem…

€190.00 Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: ARCON Privilege Manager - 70950

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support…

Executive View

Executive View: Micro Focus Privileged Account Manager - 71314

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ…

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix &…

Executive View

Executive View: Osirium: Privileged Access Management - 70836

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes…

Executive View

Executive View: Thycotic Privilege Manager - 70221

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus…

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides…

Executive View

Executive View: ManageEngine Password Manager Pro - 70613

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management,…

Executive View

Executive View: BeyondTrust PowerBroker PAM - 70725

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Whitepaper

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks…

Executive View

Executive View: One Identity SafeGuard 2.0 - 71251

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities,…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Some Perspective on Self-Sovereign Identity

Identity isn't hard when you don't always use it. For example, here in the natural world we are anonymous—literally, nameless—in most of our public life, and this is a handy thing. Think about it: none of us walks down the street wearing a name badge, and it would be strange to do so. A [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00