Snapshot: ClusterSeven Enterprise Spreadsheet Manager - 70852

Report Details

ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS Excel, but also desktop applications such as MS Access or other VBA based applications and files such as .CSV (comma separated variable). 


Date Title Price
Jan 12, 2012

Snapshot: ClusterSeven Enterprise Spreadsheet Manager - 70852

ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS…

free Get Access

Latest Related Reports

Advisory Note

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained …

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Executive View

Executive View: Hitachi ID IAM Suite - 72543

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and…

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Executive View

Executive View: FSP Identity Governance and Administration Suite - 71324

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von…

Advisory Note

Advisory Note: Enterprise Role Management - 70285

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the…

Leadership Brief

Leadership Brief: Transforming IAM – not Panicking - 71411

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Executive View

Executive View: Beta Systems Garancy Recertification Center - 71315

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive…

Executive View

Executive View: SailPoint IdentityIQ - 71319

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance, and minimizes risk by applying controls across all IAM services geared towards business users. They expand…

Executive View

Executive View: Protected Networks 8MAN - 71520

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00