Search

Page 42 of 1000 results

Webinar

Privileged User Management: Wer kontrolliert die Admins?

Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im ... in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über ... Methoden. Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im ... in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über ...

Report

Product Report: SAP Business Objects GRC Access Control

by Sachar Paulus

... be used as a reference structure Privileged access management for enterprise business applications User ... Provisioning (CUP) · Enterprise Role Management (ERM) · Superuser Privilege Management (SPM) 4 Risk Analysis ... Privilege Management Superuser Privilege Management (SPM, former known as Virsa Firefighter) allows privileged emergency access ... be part of an overall privileged access management strategy across all platforms ... part of an organizational-wide privileged access management strategy. The GRC AC product ...

Report

Leadership Compass: Cloud Access Security Brokers - 72534

by Mike Small

... data. ● Rights Management – that provide granular access control over access to unstructured files ... clouds, including user activity monitoring, privileged user monitoring, cloud data loss ... access, activities, and data, including access based on device classification, “least privilege” admin access ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise ... relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud ...

Report

Leadership Compass: Cloud Access Security Brokers - 71138

by Mike Small

... Model (Scenario: Understanding Identity and Access Management - 70129). It provides a mature approach ... clouds, including user activity monitoring, privileged user monitoring, cloud data loss ... of cloud applications, identity and access management, and threat prevention. Security Functionality ... access, activities, and data, including access based on device classification, “least privilege” admin access ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise ...

Report

Executive View: Gigya Customer Identity Management Suite - 71529

by Matthias Reinwarth

... Cloud User and Access Management - 70969 Advisory Note: Redefining Access Governance - 71185 ... such a customer identity and access management system as a solution maintained ... access to personal data only on the basis of a least privilege ... principle. KuppingerCole Executive View Gigya Customer Identity Management Suite ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for ... relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools ...

Report

Identity Management Roadmap 2009

by Martin Kuppinger

... services Authorization Basic Access Management Centralized Access Management Flexible Federation services ... web access management. •Federation support in Web Access Management: Web Access Management products ... providing management functionality for privileged accounts and providing controlled access even ... access management or federation. •Federation support in Web Access Management: Web Access Management ... Web Access Management or Federation platforms. •Web Access Management solutions: Web Access Management ...

Report

Product Report: Blackbird Management Suite - 70402

by Craig Burton

... systems for accessing Windows-based files systems and file system management and ... security systems. LDAP The Light Directory Access Protocol ... , the file system management features of the Suite use a “Privileged Windows Explorer ... reduces complexity and provides access to File System management features of the ... suite in a familiar file system access model ... aspects like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ...

Report

Product Report: Evidian Identity & Access Manager 9 - 70130

by Martin Kuppinger

... • Auditing and Analysis • Access Request Management • Access Risk Management • Role Management • SoD Controls Evidian Identity ... & Access Manager supports most of ... interface for (delegated) user management, access rights request management, and provisioning by eMail ... information on accounts, access rights, and administrative privileges into easily understandable business ...

Report

Technology Report: XACML – Extensible Access Control Markup Language

by Felix Gaehtgens

... : XACML – Extensible Access Control Markup Language entitlements and privileges can be handled ... roles entitle a subject to certain privileges. It is often left up ... how roles map to specific privileges. The problems with RBAC in ... -forward. A particular director could have access privileges to certain sites and certain ... , applications or application servers. Several access management products are built on XACML ... XACML support by vendors: 1. Retrofitting access management products that have been around ...

Speaker

Volker Lätzer

... a focus on Identity and Authorization Management, Privileged Access Management and IT Governance. Volker Lätzer ... optimization of identity and authorization management solutions.