Search

Page 62 of 1000 results

Speaker

Alejandro Soret Madolell

Alejandro is passionate about new technologies and innovation with almost 10 years of expertise on software development with strong knowledge and experience in the area of Microsoft ecosystems and endpoint administration. Recently he has focused on IT Security, specializing in privileged access management and identity management. Alejandro lives and works in Madrid, Spain. He currently holds the position of Product Manager for the WALLIX Endpoint Management product portfolio.

Speaker

Adam Bosnian

Adam Bosnian is responsible for managing and expanding global strategic relationships with technology partners at CyberArk. Bosnian has a strong product and strategy background, and has served in a range of sales and marketing executive roles. As an early member of the CyberArk management team, Bosnian helped the company define the market for privileged access management. Bosnian is an experienced industry speaker and frequently contributes to cybersecurity discussions with influential global media.

Report

Product Report: Oracle Database Security

by Martin Kuppinger

... market are in fact access control including privileged access management and advanced security by ... market are in fact access control including privileged access management and advanced security by ... as some vendors of PxM (Privileged Access/Account/User/Identity Management) tools. However, Oracle ... market are in fact access control including privileged access management and advanced security by ... -specific Privileged Access Management solution. The latter allows to define and audit privileged access to ...

Report

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

by Mike Small

... architecture and included services. ● Security management services included – FireHost includes services ... based firewalls and a Privileged Access Management system to control administrative access;  The FireHost corporate ... through the use of a Privileged Access Management (PAM) system. All access is via hardened jump ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise ... relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud ...

Report

Executive View: VeriClouds CredVerify™ - 72567

by Mike Small

... Related Research Documents Leadership Compass: Privilege Management - 72330 Leadership Compass: Identity ... - 70319 Leadership Compass: Cloud Access Security Brokers - 72534 KuppingerCole Executive ... firewalls, intrusion prevention systems, access controls as well as ... passwords are used to authenticate privileged access – for example for ... Information Security and Identity and Access Management (IAM). KuppingerCole stands ... relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools ...

Speaker

Kevin Switala

Kevin Switala is responsible for sales strategy in the DACH region, and collaborates with the regional team to gain market share, build the partner network, and expand local brand awareness. He has been in IT industry sales serving Central European Markets for the past 10 years. Prior to Auth0, Kevin was regional sales manager for BeyondTrust, a leader in Privileged Access Management, where he increased qualified pipeline in the DACH region. Follow his travels and food adventures on Instagram @swilalaa.

Report

Product Report: CrossIdeas IDEAS - 70897

by Martin Kuppinger

... of Identity and Access Management, Access Governance, and Dynamic Authorization Management, there are some ... don’t see any vendors offering PAM (Privileged Access Management) solutions of their own that ... activity-based access management, role management and SoD (Segregation of Duties) management. KuppingerCole Product ... SoDs. 5.8 Risk Management CrossIdeas has integrated Access Risk Management features into IDEAS ... international markets for Identity & Access Management and Access Governance. Another important point ...

Speaker

Jur Huisman

... federated and privileged access management and life cycle part of the access management solution on ...

Report

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

... attention: IAM (Identity and Access Management) basics. This includes understanding ... selecting the right vendor for Privilege Management. Recommended readings: ● Leadership Compass: ... example in the usage of privileged user accounts. The future ... APAM – Adaptive, Policy-Based Access Management. A growing number of organizations ... ● Leadership Compass: Cloud User and Access Management – 70969 ● Leadership Compass: Cloud ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ...

Speaker

Dan Blum

... , privacy, cloud computing and identity management Dan Blum develops Security Architects ... contributed to projects such as Privileged access management (PAM) assessment and architecture for a European ... -rest encryption and enterprise key management for a private education company Full ... the U.S. government’s E-Authentication Program Identity management architecture for a large pharmaceutical Blum ...