Search

Page 11 of 1000 results

Whitepaper

Whitepaper Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity

by John Tolbert

... for designing consent and delegated access management solutions The regulatory environment driving ... requirements. Use cases driving delegated access management Delegated access management is a satisfactory and common ... build integrated apps Web Access Management (WAM) for access control policy creation Data ... and in transit, integration with Privileged Access Management for admins, and storing all ... for architecting consent and delegated access management Consent management has become a core requirement ...

Video

Privilege Management From the Cloud: Go or No-Go?

by Martin Kuppinger

The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task.

Buyer's Compass

Buyer's Compass Access Management

by Richard Hill

... allow for centralized user management, authentication, and access control. Access Management focused IDaaS vendors ... the most common web access management demands. Hybrid Access Management Today, many organizations have ... the identified Access Management use-cases: Functional Selection Criterion Web Access Management Hybrid Access Management Workforce ... for Identity and Access - 70738 Architecture Blueprint: Access Governance and Privilege Management - 79045 Leadership ...

Blog

Consolidation in Privilege Management Market Continues: Bomgar Acquires Lieberman Software

by Martin Kuppinger

... Software is one of the Privilege Management veterans. Looking at their portfolios ... of Bomgar comes from Session Management related to their Remote Control ... in the Shared Account Password Management and related capabilities. The two ... capabilities in most areas of Privilege Management by joining their forces. With ... second merger in a row, the Privilege Management market dynamics are under change ...

Video

Best Practices of Privileged Identity Management

by Anmol Singh

Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.

Video

State-of-the-Art Privilege Management by Design

by Matthias Reinwarth

Privilege Management needs to be injected into ... solution for some critical access. An adequate management of shared accounts is ... still a vital foundation layer for Privilege Management. Controlling applications on servers and ... controlling critical access helps putting the focus on sensitive privileges. And understanding ... assist you in adapting your Privilege Management strategy as threat patterns change ...

Blog

Privileged Account Management

by Martin Kuppinger

... months, PAM (Privileged Account Management), also called PIM (Privileged Identity Management) or PUM (Privileged User Management) became ... at least some sensitive access rights. And privileged accounts typically aren't personal ... which puts privileged accounts at risk: The broad range of access controls ... this accounts (up to full access), the lack of a clear responsibility ... access, automatically generated one-time passwords, and a better support for lifecycle management ...

Video

The Future of Privilege Management – Understanding the Bigger Picture

by Martin Kuppinger

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, ... account password management, a privileged Single Sign-On, or restrictions for elevated privileges is ... no longer sufficient. Privilege Management is getting broader ... by a full support for managing privileged sessions at runtime. Vertically by ... only focusing on few highly privileged users, but all types of ... privileged users, well beyond the IT ...

Blog

There are many facets of Privileged Account Management

by Martin Kuppinger

The PAM/PIM/PUM (Privileged Account/Identity/User Management; I prefer PAM) market is one ... as for different types of privileged accounts, there are many ... PAM solutions. That included aspects like Privileged Password Management Privileged User Provisioning Privileged SSO Privileged Session Management ... On-Demand Privileges That ... and limiting) the access as well as auditing privileged access. Even while some ...

Leadership Compass

Leadership Compass Access Management and Federation

by Martin Kuppinger

... of traditional Web Access Management. In addition, some Access Management solutions add features ... Usability Positive Strengths Web Access Management User Access Management Adaptive Authentication Challenges Missing ... . Atos DirX Access DirX Access is the Access Management and Federation solution ... OpenIAM Access Manager providing access management including identity federation, web-based access management, and ... Privilege Management - 72330 Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access ...