Search

Page 16 of 1000 results

Leadership Brief

Incident Response Management

by Christopher Schütze

... better reliability. Classification of Incident Response Management – the big picture A company’s IT Risk ... it over to Incident Response Management and Business Continuity Management teams, where the “Respond ... granted for specific purposes through a Privileged Access Management (PAM) solution. It may be necessary ... and business strategies Incident Response Management is an important part of your organization’s strategy ... Business Continuity and Incident Response Management Begins Leadership Brief: Responding to ...

Market Compass

Dynamic Authorization Management

by Graham Williamson

... advantageous. This includes control on access to management consoles, protection of data in transit and ... to deliver scalability. 2020mc-labeldynamic-authorization-management_usability.png Vendors to watch In ... with password management, group management with role optimization, privileged access management, and identity ... comprehensive. Solutions are provided for privileged account management and access control to web ... Suite. Policy administration accommodates the management hierarchy required in modern businesses, ...

Webinar

The Common Credentials Dilemma – how to get a grip on password sprawl for privileged accounts

... risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have ... elevated privileges. They can be both personal, such ... as business users with high-level privileges, and shared, such as administrator, dba ... portion of accounts with highly elevated privileges is shared. To manage these accounts, to avoid ... will focus on Golden Rules for Privilege Management and on the recommended approach for ...

Video

Roy Adar - Mitigate Targeted Attacks with Privileged Account Analytics

Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany

Video

How to Stop the Insider Threat: Protect Yourself from Privileged Users

by Martin Kuppinger

KuppingerCole Webinar recording

Video

Mitigate Targeted Attacks with Privileged Account Analytics

by Martin Kuppinger

KuppingerCole Webinar recording

Video

Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!

by Martin Kuppinger

KuppingerCole Webinar recording

Video

Philip Lieberman - Securing Privileged Identities in the Real World: A Proposed Maturity Model of Competence and Capabilities

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Executive View

Osirium Opus Privileged IT Process Automation

by Martin Kuppinger

Osirium Osirium Opus Introduction PAM (Privileged Access Management) has its traditional focus on ... started in the field of PAM (Privileged Access Management) and focused on a task-based approach ... of tasks, Osirium builds on its expertise in Privileged Management to provide a solution that allows customers ... unmanaged. Opus allows for a centralized management of automation (which commonly is based on ... – 70878 Executive View: Osirium: Privileged Access Management - 70836 Blogpost: Robotic Process Automation ...

Video

The Common Credentials Dilemma - How to Get a Grip on Password Sprawl for Privileged Accounts

by Martin Kuppinger

KuppingerCole Webinar recording