Search

Page 40 of 1000 results

Keynote

Need for PAM for Secured User Access to Business Applications on Cloud

by Ninad Chavan

... users accessing core business applications PAM helped address the same with ...

Executive View

Executive View Symphonic – Intelligent Authorization

by Graham Williamson

... sophisticated key or token management to the access control task. Developers ... they are trying to access? Is an access request coming from a ... to provide the requisite access control functionality. Symphonic support ... authentication services. With corporate access control environments becoming more complex ... standard role-based access control mechanisms: Access control decisions are ... access controls. Related Research Leadership Compass: Access and Federation – 71147 Leadership Compass: Privileged Access Management ...

Expert Talk

Best Practices as the Foundation of Agility and Innovation: IdentityPROCESS+ as an IGA Process Example • Access Certification Campaigns that Work • Security and Efficiency Can and Does Co-Exist

by Dr. Alfons Jakoby, Martin Menzer, Sebastien Faivre, Osman Erkan

... from a solid position.Risk management, of course, is another ... key management discipline which is much ... a centralized identity directory. With access certification, organizations and regulations aim ... Who can access to personal data? Who can leverage privileged accounts? ... used to successfully deploy access certifications campaigns within months ... actionable framework to successfully deploy access certifications campaigns - An ... entries within minutes - Access certification interfaces that business ...

Webinar

Next-Gen Identity Analytics and Access Governance Approach

... learning accelerates identity analytics and access governance for creation of ... efficiency, better UX and risk management to just auditing and compliance ... such as periodic access certifications for access to data, resources, privileged operations, applications ... and other IT assets Building and automating access governance ... stakeholders Being able to extend access governance and identity analytics ... : Identity Analytics functions and Access Certification of 2000 entries within ...

Video

Martin Kuppinger - User Behaviour: The Link between CyberSecurity and Identity Management

by Martin Kuppinger

An increasing number of attacks, both external cyber-attacks and internal attacks, are well-thought-out and long-running. Particularly external, targeted attacks rely on the use of zero-day-exploits, which factually are yet unknown exploits. Thus, standard approaches such as signature-based analysis don’t help – you can’t detect what you don’t know. On the other hand, malicious behavior of internal users is hard to detect. Commonly, existing entitlements are used, but not as they should be used. Both ...

Keynote

User Behaviour: The Link between CyberSecurity and Identity Management

by Martin Kuppinger

An increasing number of attacks, both external cyber-attacks and internal attacks, are well-thought-out and long-running. Particularly external, targeted attacks rely on the use of zero-day-exploits, which factually are yet unknown exploits. Thus, standard approaches such as signature-based analysis don’t help – you can’t detect what you don’t know. On the other hand, malicious behavior of internal users is hard to detect. Commonly, existing entitlements are used, but not as they should be used. Both ...

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

by Martin Kuppinger

... features is some support for Privileged Account Management (PAM). That’s interesting. I’ve ... provisioning vendors starting to acquire PAM vendors and adding these capabilities ... passwords for the use of privileged accounts and re-setting these ... became a pioneer in integrating PAM with provisioning.There is no ... other vendors to follow, adding PAM support as well. However, ... done proves my thesis on PAM moving into provisioning, servicing ... the term PAM (or PIM or PUM): I prefer Privileged Account Management because it ...

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

by Martin Kuppinger

... features is some support for Privileged Account Management (PAM). That's interesting. I've ... provisioning vendors starting to acquire PAM vendors and adding these capabilities ... passwords for the use of privileged accounts and re-setting these ... became a pioneer in integrating PAM with provisioning. There is no ... other vendors to follow, adding PAM support as well. However, ... done proves my thesis on PAM moving into provisioning, servicing ... the term PAM (or PIM or PUM): I prefer Privileged Account Management because it ...

Press Release

KuppingerCole publishes Leadership Compass about Access Control/Access Governance for SAP environments

... a new Leadership Compass about Access Control/Access Governance for SAP environments. The ... of the market for Access Control & Access Governance Solutions for SAP ... can significantly improve enterprise risk management and corporate compliance with applicable ... can significantly improve enterprise risk management and corporate compliance with applicable ... management of privileged users (including mechanisms for well-defined ad hoc access ... of several solutions for Access Control and Access Governance for SAP ...

Report

Advisory Note: Maturity Level Matrixes for Identity and Access - 70738

by Martin Kuppinger

... for Privilege Management. Vendors use a variety of terms such as Privileged Access Management or Privileged User Management ... . KuppingerCole commonly uses the abbreviation PxM. KuppingerCole ... Advisory Note Maturity Level Matrixes for Identity and Access Management ... centralized privileged user management with consistent management & provisioning Management of privilege elevation. Application Privilege Management. Privileged users ...