Search

Page 56 of 1000 results

Whitepaper

Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT

by Martin Kuppinger

Commissioned by Oracle Introduction Cloud services have become a reality for most businesses over the past few years. For most businesses, “cloud first” has become the norm, not the exception. As a result, more and more of the business workloads are shifting to the cloud, into as-a-service deployment models. This has created hybrid business systems for most organizations. This evolution requires other IT services such as IAM (Identity and Access Management) to follow this trend. This critical authentication ...

Executive View

Symphonic – Intelligent Authorization

by Graham Williamson

... a requirement for sophisticated key or token management to the access control task. Developers ... of the policy. Symphonic Symphonic Access Management Strengths and Challenges Undoubtedly there ... and Federation – 71147 Leadership Compass: Privileged Access Management – 79014 Leadership Compass: CIAM ...

Video

The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It

by Martin Kuppinger

The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared. What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases. In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these ...

Executive View

Safe-T Software Defined Access

by Martin Kuppinger

... from a weak or stolen password or compromised privileged credentials as examples, a case can be made ... from long-established Web Access Management and Web Application Firewalls to CASB ... based on a broad range of different protocols. Management of data flows (named as workflows by Safe ...

Executive View

IBM Security Access Manager (ISAM)

by Richard Hill

... for the foreseeable future. The management of user identity and access ... Identity governance with user lifecycle management and compliance options as well as a ... such as MaaS360 for mobile device management, IBM QRadar Security Intelligence Platform ... IAM functionality, it is also marketed as an Access Management and Identity Federation platform with ... WAF capabilities for Web Access Management. ISAM provides the standard ... IBM Security Policy Management - 70953 Executive View: IBM Privileged Identity Manager – 71557

Webinar

Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

... entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and ... and Assets. In many organizations, provisioning privileged access to critical assets is delivered ... as an entry point for an attack. Today’s Privileged Management technologies make it possible to provide secure ... when used for privileged access How combining privileged session management with a secure ... VPNs for securing privileged sessions and why Privileged Access Management solutions can integrate ...

Executive View

TechDemocracy Intellicta

by Matthias Reinwarth

... a business differentiator and a strategic management instrument. The identification, execution and ... Device (including Mobile Device Management and Endpoint Management) Network (including Threat Intelligence ... is designed to implement continuous Compliance Management and to provide different stakeholders, including ... data sources include identity management systems, privileged user management and identity intelligence ... Provisioning - 71139 Leadership Compass: Access Management and Federation - 71102 Whitepaper: ...

Video

Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation

The future of IT security will depend on CISOs who are brave enough to build a new security model that is both innovative and unconventional. Gas distribution company, SGN, is blazing a trail that every company can follow. As a UK, critical infrastructure company SGN’s cloud-first strategy, provided an opportunity to redefine the security model with privileged access zero-touch and zero-trust as key principles. This thinking is enabling secure adoption of the cloud, IoT and frictionless user experience. The ...

Video

Reducing Risk with User Behavior Analytics (UBA)

by Martin Kuppinger

... this more specifically in Identity & Access Management is now possible. One of the most ... of such analytics has been in managing privileged identities and accounts. Given that ... Behavior Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk ...

Report

Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536

by Matthias Reinwarth

... Provisioning - 70949 Leadership Compass: Access Management and Federation - 71102 1 Introduction Legal ... Identity and Access Management, Data Security, Business Process Management and Business ... (“Informed”) – defines business and risk management requirements. • Cyber Security Technology (“Secured ... (including Security Architecture and Vulnerability Management) Data (including data classification, ... data sources include identity management systems, privileged user management and identity intelligence solution ...