Search

Page 30 of 1000 results

Report

Product Report: Blackbird Management Suite - 70402

by Craig Burton

... Integrated Architecture Active Directory Management File System Management What next? Product Evaluation ... Production • Service Mangement • Information Security Management • On-premise Production • External/Cloud Production ... , the file system management features of the Suite use a “Privileged Windows Explorer” design ... : KuppingerCole – Product Research Note – Blackbird Management Suite Report No.: 70402 Page 14 of 18 · · · · Integration ...

Webinar

The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

Access Governance is commonly associated with “recertification” or “attestation” as approaches for a recurring review of existing access controls by the responsible managers in IT and business. But knowing the problems isn’t sufficient – enforcing changes and implementing continuous processes for access controls is a key element. And, beyond that, many approaches mainly focus on standard access and not on the security sensitive privileged accounts. This session explains the elements for a consistent ...

Combined Session

Access Management: Policies and Standards • Building Blocks for a Complete Access Management Strategy and Implementation

by Martin Kuppinger, Stefan Dodel, Lars Hartke, Heinrich Wilking, Maarten Stultjens

The foundation for access management are policies and standards, leading to ... as the foundation for your access management. This session will discuss the ... compliance as well as administrative requirements. Access Management, especially in virtualized and cloud environments ... Governance, Provisioning, PxM (Privileged Access, Account, Identity, User) Management and as well SIEM ... to virtualization security products, web access management and versatile/risk-based authentication ... lines of defense and access management.

Press Release

Identity Management und Governance für Unternehmen – und die Cloud

... Identity und Access Management) und GRC (Governance, Risk Management, Compliance) weiter ... Identity und Access Management) und GRC (Governance, Risk Management, Compliance) weiter ... dafür erforderliche Weiterentwicklung des Service Managements im Mittelpunkt. Ergänzt werden muss ... Ansatz für Governance, Risk Management und Compliance ohne die künstliche ... Single Sign-On und dem Privileged Access Management (PAM) schreitet die Integration ... von Identity und Access Management mit Access Governance-Technologien, ...

Blog

Ohne Identity Management keine Sicherheit beim Cloud Computing

by Martin Kuppinger

... . Die Basis bildet ein IT Service Management, bei dem alle Dienste standardisiert ... die im Bereich Identity- und Access-Management (IAM). Ein Grundprinzip dabei ist ... Benutzer handelt.Identity- und Access-Management beim Cloud ComputingDas IAM muss ... in diesem Zusammenhang auch PAM (Privileged Access Management, auch als PUM oder PIM ...

Blog

The Risks of Local Password Management

by Martin Kuppinger

... Windows environment protected by PAM (Privileged User Management) for all administrators?The applications ...

Blog

Identity Management: Challenge Outsourcing

by Sebastian Rohr

... rights or enforcing rules on governance, risk management and compliance, these are still ... think about IAM (Identity & Access Management) every time you think about ... example. Just take maintenance and management services: written agreements on security ... of the company itself, ensuring central management of access rights may very well ... is probably to switch to claims-based rights management which does away with individual ... user and rights management, substituting one-time definition of access privileges for certain ...

Combined Session

The Fundaments of Effective Identity in the Cloud • Panel: Managing Privileged Identities in the Cloud

by Peter Heintzen, Philip Lieberman, Pamela Dingle, Shlomi Dinoor, Nimrod Vax

Just how should enterprise identity management and outsource SaaS applications integrate securely? In this session Ping Identity’s Pam Dingle discusses ways to avoid the nightmare of maintaining multiple directories in the cloud by leveraging four basic areas of identity integration with SaaS: provisioning, authentication, Internet Single Sign-On and authorization.

Insight

Identity & Access Management

... IAM. IAM, sometimes abbreviated to Identity Management, is easy to describe: It is everything that ... User Lifecycle Management & Access Governance Access Management & Federation Privileged Access Management While these ... major discipline of IAM, Access Management & Federation or just Access Management, is about access to ... Saviynt.,Key Players in Access Management For Access Management & Federation, these are, ... including, e.g., ITSM/ESM (IT Service Management/Enterprise Service Management). This allows for a more ...

Whitepaper

PAM for Managed Service Providers as an Added Value and Security Option

by Paul Fisher

... offers its Privilege Account Management Suite to manage privileged access across ... Really About Leadership Brief: Privileged Account Management Considerations - 72016 Leadership Compass ... Compass: Privileged Access Management- 80200 Leadership Compass: Privileged Access Management for DevOps ... - 80355 Whitepaper: AI, Machine Learning and Privilege Access Management ... - 80120 Whitepaper: Privileged Access Requirements for ...