Search

Page 52 of 1000 results

Report

Leadership Compass: Secure Information Sharing - 72014

by Graham Williamson

... Report No.: 72014 Page 1 of 57 Content 1. Management Summary 6 1.1 Overall Leadership 7 1.2 Product Leadership ... 70962 Leadership Compass: Privilege Management - 70960 Leadership Compass: Access Management and Federation - 70790 ... leadership is so dominant. Microsoft’s rights management solution is mature and it is well- ... is required to do in the deployment, operation, management and discontinuation of the product. The ... controls and Cloud environment management tools. Security Functionality Integration ...

Executive View

One Identity Manager

by Christopher Schütze

... life-cycle management, access entitlements, workflow and policy management, role management, access ... systems such as IT Service Management (ITSM) tools as well as Privileged Access Management (PAM) tools have ... database. One Identity offers a privileged access management solution named Safeguard, which is ... Identity Manager systems are mapped in Privileged Account Management. These objects can be synchronized ... IT Shop, or report subscriptions for Privileged Account Management systems. The standard user interfaces ...

Executive View

Ping Identity’s PingFederate

by John Tolbert

... identity federation protocols, web access management (WAM) systems provided SSO ... grown to be a major vendor of identity management solutions, both for on-premise and ... directory, Consumer Identity & Access Management (CIAM), and Identity-as-a-Service ( ... System for Cross-Domain Identity Management is a protocol for exchanging identity ... for Business Intelligence, CyberArk for Privilege Management (configured from CyberArk side), ... suite of solutions. As a premiere identity management solution vendor, Ping Identity has ...

Video

Scott Carlson - Just trust everyone and we will be fine, right?

Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls? In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.

Keynote

Just trust everyone and we will be fine, right?

by Scott Carlson

Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls? In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.

Blog

Do You Need a Better IAM System to Meet the GDPR Requirements?

by Martin Kuppinger

... (Consumer/Customer Identity and Access Management), where full support for EU GDPR ... EU GDPR. The need for granular management access to PII might lead to a renaissance ... (or naissance?) of Dynamic Authorization Management (think about ABAC) finally. It is far ... well for Big Data. Likewise, Privilege Management for better protecting systems that ...

Advisory Note

KYC as an Enabler in the Financial Services Business Transformation

by Bruce Hughes

... spurring an unprecedented focus on customer relationship management (CRM) and customer retention - especially ... and capital requirements management, business compliance measures, risk management, reporting quality ... identity and authentication, management of privacy requirements, big data management, facilitating deep ... management and federation, single sign-on, and privilege management. CIAM Consumer Identity and Access Management ... , accounting standards, and risk management practices can be automated and ...

Blog

It’s not about security vs. safety – it is about security and safety

by Martin Kuppinger

... stuff – with unidirectional firewalls, with privilege management technologies to protect shared administrative accounts ...

Report

Product Report: Oracle ESSO - 70581

by Sebastian Rohr

... lack of depth and maturity regarding Privileged Account Management KuppingerCole is positive regarding the ... is an integration between OAM and ESSO. Privileged Account Management is a candidate already identified and ... looking forward to test this feature. Privileged Account Management (OPAM) was released as part ... of 11gR2. Integration between Privileged Account Management and ESSO will be released in an ... is the current lack of integration with Privilege Management, a module which is new in the Oracle ...

Blog

Why Cybersecurity and Politics Just Don’t Mix Well

by Alexei Balaganski

... deployed in the network? Was privileged account management fine-grained enough to prevent far ... into specific topics like IAM & Privilege Management in the research area of our website ...