Search

Page 45 of 1000 results

Executive View

Nexis Controle 3.4

by Matthias Reinwarth

... important. KuppingerCole considers Enterprise Role Management (ERM) to be a possible strategic approach to the ... represent a variety of demands: The least privilege principle requires that only minimal ... as an add-on to an existing Identity and Access Management infrastructure or as a stand-alone service with ... automated role mining; entitlement management; full role lifecycle management capabilities; and identity ... including regular reporting, role lifecycle management, access approval and recertification processes ...

Report

Leadership Compass: Access Governance - 70735

by Martin Kuppinger

... or improved integration with for instance Privilege Management tools or User Activity Monitoring solutions ... have a valid, deep integration of Privilege Management and the standard Access Governance ... automated reconciliation. · In future integrated (!) Privilege Management features for extending these controls ... for User Activity Monitoring and Privilege Management. Weaknesses/Threats Historically associated ... is the new integration with the Privilege Management products of CA Technologies. Another important ...

Report

Advisory Note: Making critical infrastructures in finance industry fit for the age of cyber attacks - 70405

by Martin Kuppinger

... 13, 2012 #70,177 Advisory Note Privilege Management April 13, 2012 #70,173 KuppingerCole ...  Despite the fact that Privilege Management (#70,177 Advisory Note Privilege Management) is a quite established ... many organizations. However, gaps in Privilege Management are always high risk weaknesses ... Inconsistent approach on security Immaturity of Privilege Management Immaturity of Security Information strategy ... disciplines of  Identity Management and  Access Management. Identity Management The discipline of managing ...

Executive View

TrustBuilder Identity Hub

by Martin Kuppinger

... Intelligence, Software Defined Environments and Privilege Management also needed to be supported by IAM ... in December 2017. Identity and Access Management (IAM) software product of TrustBuilder Corporation ... and Openshift to help organizations centralize management of security policies and streamline deployment ... workflow UI, Docker container support, consent management, FIDO 2.0 and User Managed Authorization ... – 70878 Executive View: Osirium: Privileged Access Management - 70836 Blogpost: Robotic Process Automation ...

Report

Executive View: Identity Automation RapidIdentity - 71203

by Martin Kuppinger

... Web Access Management and Identity Federation, and management of privileged users and shared ... custom integrations. In the area of Privileged User Management, the product delivers basic capabilities ... Sign-On, Identity Federation, and basic Privilege Management capabilities. Another notable feature is ... requirements, customization might become baseline privilege management, single sign-on, more challenging identity ... folder ● No full support for privilege management, management advanced features such as session ● ...

Executive View

IBM Security Identity Governance and Intelligence

by Martin Kuppinger

... includes additional capabilities such as Privilege Management, Web Access Management, Identity Federation, and more ... , from the definition to the ongoing management and review of entitlements, is challenging. Furthermore ... point than solely relying on role management. Management of SoDs and Business Rules to ensure ... , with full graphical configuration. SoD management within ERP environments, including specific ... activity-based modeling and role management, ISIGI provides sophisticated Segregation of Duties ...

Report

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

by Mike Small

... Data Classification 23 6.2.2 Secure Storage 23 6.2.3 Privilege Management 23 6.2.4 Information Flow Control 23 6.2.5 Infrastructure ... management need careful attention. The staff in the data centre may have privileged ... storage technology used. 6.2.3 Privilege Management Privileged accounts are needed to manage ... rights are appropriate. c. Privileged Access Management – ensuring privileged users are controlled. ... IT services; unlike Business Service Management, IT Service Management focuses on IT services at all ...

Executive View

Balabit Contextual Security Intelligence Platform

by Alexei Balaganski

... than accounts hijacked by hackers, legitimate privileged users such as IT administrators abusing ... flexible and high-performance log management, which collects security intelligence ... . When operating in tandem, Log management, Privilege Monitoring and User Behavior Analytics ... Balabit’s solution helps identifying hijacked privileged accounts or malicious insiders much ... source of forensic information for incident management. Shell Control Box is also ... Intelligence – 71033 Advisory Note: Privilege Management – 70736

Executive View

Saviynt Identity Governance and Administration (IGA)

by Richard Hill

... importance of the role of adequate Identity Management, robust and efficient administrative processes ... fine-grained, role, entitlement and privileged access management. Saviynt’s customers are worldwide ... is reflected in the role engineering and management module as well, providing sophisticated features ... and rollback. Cross-application SoD management and analysis functionality (alerts, investigation ... models and encryption key management. It also provides privileged activity monitoring by looking at the ...

Blog

Robotic Process Automation – an IAM Challenge

by Martin Kuppinger

... argument for such solution is that management of the robot accounts appears ... is just a consequence of doing the management of RPA wrong. RPA accounts are ... a responsible manager, and changes in management can be handled via well-defined ... be based on runtime authorization, i.e. Dynamic Authorization Management. As for technical accounts, in the rare ... needs access to that account, Privileged Access Management (PAM) comes into play. ... be handled via Shared Account Password Management. Behavior of the accounts can be ...