Search

Page 11 of 1000 results

Video

John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection.

Video

The Seven Keys to a Successful Privileged Account Management Strategy

by Alexei Balaganski

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.

Video

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being connected to enterprise networks and to the internet. This brings many business advantages but also opens these once isolated technologies to advance threats. Securing these privileged account and their privileged ...

Report

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

by Martin Kuppinger

... areas:     Directory Services Access Management Identity Administration and Governance Fraud ... Plus. OES supports Dynamic Authorization Management, i.e. runtime decisions about authorizations ... traditional requirements of user management within organizations and access management to on-premise applications, ... innovative features such as Dynamic Authorization Management, risk- and contextbased authorization, or ... -edge in their market segments, e.g. Privilege Management ● Oracle’s approach of minimizing functional ...

Combined Session

IaaS Cloud Services for the Paranoid • Privilege Management @ BASF

by Dr. Ravindar Bindra, Christian Schwenk

Many companies today are purchasing IaaS as an extension or replacement of their internal data centers and the Infrastructure team is given the task of offering the internal customers a PaaS for their hosted applications. The question of how to secure the data remains uppermost in the minds of CISOs and now even CIOs. For the security professional - it gives a green field in which to architect the utopia of The Perfect Design. When coupled with Operational reality, a more realistic, scalable and simple ...

Report

Product Report: CA Access Control – Privileged User and Password Management

by Martin Kuppinger

... – Privileged User and Password Management CA Access Control – Privileged User and Password Management Product ... of misuse of privileged accounts. Thus it is part of the Privileged Access Management (PxM) market ... threats around privileged accounts. CA Access Control Privileged User and Password Management (CA Access ... the risks associated with privileged accounts. 5 Privileged Password Management In that area, CA Access ... provide a wider solution to Privileged user management that extend beyond password vaulting ...

Report

Leadership Compass: Access Management and Federation - 71102

by Martin Kuppinger

... Manager 38 11.14 Oracle – Access Management 39 11.15 Ping Identity – Federated Access Management 40 11.16 SecureAuth - IdP 41 ... Server - 71129 Leadership Compass: Privilege Management - 71100 Leadership Compass: Secure ... is required to do in the deployment, operation, management and discontinuation of the product. The ... Page 38 of 53 11.14 Oracle – Access Management Oracle Access Management is a multi-functional product that ... well as Dynamic Authorization Management, Oracle Access Management Suite Plus provides a ...

Blog

Privileged Account Management

by Martin Kuppinger

... , PAM (Privileged Account Management), also called PIM (Privileged Identity Management) or PUM (Privileged User Management) became increasingly ... of PAM to root account management. There are far more privileged accounts which have ... and a better support for lifecycle management. Given the technical differences between ... . The integration with existing lifecycle management solutions (e.g. identity provisioning) is, if existing, ... for integrating the new Novell Privileged User Management with other Novell offerings ...

Video

EIC 2012 Keynote: Ripped from the Headlines – The ‘Privileged’ Connection – Solved!

Roy Adar, Vice President of Product Management, Cyber-Ark April 17, 2012 16:30

Blog

There are many facets of Privileged Account Management

by Martin Kuppinger

The PAM/PIM/PUM (Privileged Account/Identity/User Management; I prefer PAM) market ... as well as for different types of privileged accounts, there are many different ... aspects like Privileged Password Management Privileged User Provisioning Privileged SSO Privileged Session Management On-Demand Privileges That ... the access as well as auditing privileged access. Even while some vendors ... should keep in mind that privileged accounts are found in every ... in the are of Client Lifecycle Management some time ago. There will ...