Search

Page 44 of 1000 results

Executive View

EmpowerID

by John Tolbert

... Management. EmpowerID offers User Management, Provisioning, Access Governance, Privilege Management, Single Sign-On (SSO), access management ... user provisioning, entitlement management, SaaS integration, access ... Provisioning, Identity Governance, Entitlement Management, Privilege Management, and Access Recertification. ... configured static policies Privileged Access Management, including Password Vaulting ... , Session Recording, Service Account Rotation, and Temporary Privilege ...

Executive View

Gurucul Predictive Risk Analytics

by Mike Small

... . SIEM (Security Information and Event Management) is often promoted as a solution to these ... plus case management. Detection of misuse, sharing and takeover of High Privilege Access (HPA ... include: role management, policy management, rule definition and analysis, workflows management, attestation and ... such as HR Systems, Identity & Access Management solutions, log aggregators, applications, network ... source examples include: Identity Management (IDM), Privilege Access Management (PAM), Directories, SIEMs, ...

Report

Product Report: SAP GRC Access Control 10 - 70737

by Martin Kuppinger

... and Remediation 7 4.4 Enterprise Role Management 7 4.5 Privilege Management 8 4.6 Access Request Management and User Provisioning 8 4.7 Periodic ... Access Request Management and Enforcement, SoD Management (Segregation of Duties), Superuser Privilege Management, and Enterprise ... Role Management. The ... Analysis and Remediation ● Enterprise Role Management ● Privilege Management KuppingerCole Product Report SAP GRC ...

Executive View

Kleverware IAG

by Martin Kuppinger

... allows for requesting access, profile management, password reset, and synchronization. Configurable ... , SPML, and SCIM support. Access Management: This category includes authentication, authorization ... vendors looking to offer competitive access management capabilities and so is social identity integration ... that are essential to the entitlement management of the business Identification of changes in entitlements ... Architecture Blueprint: Access Governance and Privilege Management - 79045 Advisory Note: KRIs and ...

Executive View

SailPoint IdentityIQ

by Christian Himmer

... with a focus on Access Request Management, Role Management, Access Recertification, and SoD ( ... a well thought-out, deep integration of Privilege Management with the standard Access Governance ... users from an Access Governance perspective, Privilege Management tools add features such as restricting ... Governance but mitigate it by using specific Privilege Management capabilities. SailPoint is one of the pioneers ... capabilities to analyze the status of access management across a heterogeneous IT environment. The ...

Report

Vendor Report: Dell IAM - 70812

by Dave Kearns

... Identity Provisioning - 70949 Leadership Compass: Privilege Management - 70960 Advisory Note: Buyer’s Guide ... provider specializing in the management of user identities, access privileges and security across ... areas of Identity Governance, Access Management and Privileged Access Management with the products acquired ... Services Dell offers both Privilege Account Management (PAM) and Privilege Account Governance (PAG ... Yes Enterprise Single Sign-on Privileged Account Management Federation/Cloud SSO Enterprise Role ...

Advisory Note

Cyber Risk – Choosing the Right Framework

by Mike Small

... practices for IT infrastructure management. ITIL v4 specifies 34 management practices which are ... areas: general management practices, service management practices and technical management practices. These ... Assets, Continuous Vulnerability Management, Use of Administrative Privileges, Secure Configuration for ... Domain Framework Security Service Management & Performance Management covering the entire ... Architecture Blueprint: Access Governance and Privilege Management - 79045 Architecture Blueprint: Identity ...

Whitepaper

Balancing Security and Convenience: Identity Verification & Authentication made easy

by Martin Kuppinger

... seem to stand in conflict with risk management, regulatory, and security requirements. Solutions ... Leadership Compass: Privilege Management – 72330 Architecture Blueprint: Access Governance and Privilege Management - 79045 Advisory ...

Report

Advisory Note: Authorization in the Cloud - 70217

by Mike Small

... • • Authorization Management: the process of defining the resources and access privileges that groups ... Authorization Management – the process of defining the resources and access privileges that groups ... policies (for example access to resources). 4) Privilege Management – This is an important aspect of the ... an approach to authentication and access management based on open protocols. Identity federation ... Computing – Authorization in the Cloud 4.4 Privilege Management The malicious activities of, or mistakes made ...

Webinar

Minimizing Security Impacts of a Growing Remote Workforce

... secure remote access and endpoint privilege management pillars of a PAM solution can securely ...