Search

Page 58 of 1000 results

Executive View

Executive View TechDemocracy Intellicta

by Matthias Reinwarth

... including Identity and Access Management, Data Security, Business Process Management and Business ... Personae and Access) Device (including Mobile Device Management and Endpoint Management) Network ( ... data sources include identity management systems, privileged user management and identity intelligence ... and assessed, including Infrastructure Security, Access Control, Logging and Monitoring, ... Identity Provisioning - 71139 Leadership Compass: Access Management and Federation - 71102 Whitepaper: TechDemocracy ...

Video

Reducing Risk with User Behavior Analytics (UBA)

by Martin Kuppinger

... this more specifically in Identity & Access Management is now possible. One of ... privileged identities and accounts. Given that such identities and accounts have access ... Analytics (UBA) to monitor access to privileged accounts helps organizations reduce risk ...

Executive View

Executive View SailPoint SecurityIQ

by Martin Kuppinger

... “least privilege” – and to be able answering the “who has access to ... approaches to manage access e.g. to file server shares Management of data ownership ... Integration into User Management and Identity Provisioning Audit and ... policy violations; to automate the management of access entitlements, based on e.g. defined ... extended capabilities such as full access request management based on configurable workflows ... access review processes that run on IdentityIQ; centralized role and policy management ...

Video

Mo Ahddoud - SGN Securing Shared Credentials at The Heart of Digital Transformation

The future of IT security will depend on CISOs who are brave enough to build a new security model that is both innovative and unconventional. Gas distribution company, SGN, is blazing a trail that every company can follow. As a UK, critical infrastructure company SGN’s cloud-first strategy, provided an opportunity to redefine the security model with privileged access zero-touch and zero-trust as key principles. This thinking is enabling secure adoption of the cloud, IoT and frictionless user experience. The ...

Blog

RSA’s 2018 Conference Starts Bi-Polar and Ends with a Minor Breach

by Dan Blum

... 't see how multi-factor authentication, privileged access management, and other layered security measures ... right is all about risk management - understanding the company's business context ... Mobile App users were improperly accessed. I suppose it is easier for ...

Workshop

Forum Systems Workshop - How to Simplify and Secure your APIs in the age of PSD2, Open Banking Compliance, and GDPR

... Multi-Context Authentication Threat-Mitigation Privileged Access Management Protocol Conversion Message Conversion Data ...

Pre-conference Event

How to Simplify and Secure your APIs in the age of PSD2, Open Banking Compliance, and GDPR

by Martin Kuppinger, Jason Macy, Rizwan Mallal, Greg DiFruscio

... Multi-Context Authentication Threat-Mitigation Privileged Access Management Protocol Conversion Message Conversion Data ...

Blog

What you could do with stolen data - a squib

by Martin Kuppinger

... IT company had some privileged accounts with access to massive amounts of ... valid concept for differentiated access controls, no privileged access management, no data leakage prevention ...

Report

Executive View: BeyondTrust PowerBroker - 71504

by Ivan Niccolai

... from being a niche market anymore, Privilege Management (PxM) is more and more becoming ... leading PxM vendors, please refer to the KuppingerCole Leadership Compass on Privilege ... combining two major components: PowerBroker, a Privileged Access Management suite, and Retina, a set of ... : Server Privilege Management, Enterprise Password Security and Endpoint Least Privilege. Server Privilege Management is a product ... implies, is focused on least-privilege access management on Mac and Windows endpoints ...

Report

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

by Ivan Niccolai

... Intelligence - 71033 Leadership Compass: Privilege Management - 71100 KuppingerCole Executive View ... Privileged User Management products and Privileged Access Management products (usually referred to as PxM ... PxM vendors, refer to the KuppingerCole Leadership Compass on Privilege Management. Privilege management ... Privilege Management solutions go much further than simple password generation and access ... Privilege Management platform which is integrated into an organisation’s overall Identity and Access Management ...