Search

Page 24 of 1000 results

Video

Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

by Martin Kuppinger

Privilege Management has been a key element of both IAM (Identity & Access Management) and ... from compliance regulators forcing privilege management solutions to expand their ... scrupulously designing access policies and rigorously monitoring every privileged account’s ... activities to prevent a malicious user from misusing their privileges ... one could stop giving anyone privileged access at ... all? Why delegate access to a sensitive ...

Webinar

The Compelling Need for Privileged IT Process Automation

... only the right people have access to the right accounts, ... managing critical IT infrastructure and privileged accounts. In this webinar you ... in security and operations in privileged IT process automation The ... Kuppinger will talk about where Privileged Access Management (PAM) is evolving and where traditional ... at the gap between todays PAM, ITSM, and other tools. ... about the Osirium approach for Privileged IT Process Automation, where operators ... supported in performing exactly the privileged tasks they are entitled ...

Video

Privileged Attack Vectors: Verständnis und Minimierung interner und externer Cyber-Risiken

by Martin Kuppinger

... Datenschutzbestimmungen haben dazu geführt, dass Privilege Management-Lösungen von der relativen Unbekanntheit ... Cybersicherheit gebracht wurden. Eine effiziente PxM-Strategie muss heutzutage mehrere Funktionsbereiche ... von Passwörtern, Durchsetzung des Least Privilege Prinzips, Schwachstellenintegration, zentrale Analyse, Auditierung ...

Session

Planning and Deploying Identity Federation based PAM Using Certificates

by Kari Nousiainen

Metso Outotec have recently deployed PrivX from SSH.COM as a Privileged Access Management system to provide audited secure access to server administrators and developers. They have integrated the PrivX PAM solution into their existing workforce identity management solution to provide secure audited access using Just-In-Time certificate-based access rather than passwords.

Video

Paul Fisher: In the Future PAM will Become Embedded in the IT Stack

by Paul Fisher

Paul Fisher will expand on his analysis of how Privileged Access Management platforms will develop support for DevOps and other key users. This will mean that certain PAM functions will be embedded within the technology stack, opening up password free and secure access paths and enable rapid task fulfilment.

Keynote

In the Future PAM will Become Embedded in the IT Stack

by Paul Fisher

Paul Fisher will expand on his analysis of how Privileged Access Management platforms will develop support for DevOps and other key users. This will mean that certain PAM functions will be embedded within the technology stack, opening up password free and secure access paths and enable rapid task fulfilment.

Advisory Note

Advisory Note KRIs and KPI for Access Governance

by Mike Small

... Identity Lifecyle Management Access Management Authentication Allocation and Review Privileged Management Identity and Access Monitoring The ... Related ISO/IEC 27001 Controls A.9.2.3 Privilege Management Indicator: Systems with controlled levels ... /IEC 27001 Controls A.9.2.3 Privilege managementA.9.4.4 Use of privileged utility programs Indicator: Percentage ... risk. Related Research Leadership Compass: Privilege Management - 72330 Leadership Compass: Identity as ...

Executive View

Executive View Atos DirX Access

by Martin Kuppinger

... ), Access Management: Enabling access of users, i.e. supporting authentication, identity federation, and authorization. Privileged Access Management (PAM): These ... technologies focus on highly privileged users and the ... and of privileged user sessions. Access Management, also referred to as Web Access Management & Identity ... Access Management and Federation – 71147  Executive View: Evidian Identity & Access Management – 70872  Leadership Compass: Access ...

Executive View

Executive View Micro Focus Access Manager

by Graham Williamson

... fulfillment, through authentication and access management to analytics and governance. ... Restful APIs, certificate management and card access management tools are also provided ... well as Linux PAM, Citrix and remote access via RDP ... Access Manager Management Console provides the facility to manage access policies. Access ... Leadership Compass: Access Management and Federation – 71147 Leadership Compass: IDaaS Access Management - 79016 ... 80193 Executive View: Micro Focus Privileged Account Manager - 71314 Blog: ...

Video

Privileged User Monitoring as Key Element of Counter-Measures

by Martin Kuppinger

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. Attackers are trying to gain access to privileged accounts, hijacking these. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions.