Page 71 of 1000 results

Advisory Note

Information Stewardship in the Age of Blockchain

by Karin Gräslund

... Controlling risks through information access management, Promoting value-oriented information behavior ... Information stewardship comprises the organizational management of the information lifecycle from ... data like intellectual property, strategic management, conversations on product development or marketing ... , and prevent disaster: Management must ensure that privileged access is closely monitored ... . Refer to it - in an extended meaning - as a “life management platform”, if it is a registry with all entitled ...


Wertvolle Daten kennen, schützen und besser nutzen – die Chancen von Datenschutz und Datensicherheit

by Martin Kuppinger

... -Umgebungen ausgefeilte Mechanismen für das Management von Zugriffsberechtigungen und das Auditing ... stehenden Themen wie das Consent Management, also den Umgang mit Einwillungen ... und Arbeit investiert, um ein IT-Portfolio-Management aufzubauen und dort beispielsweise aktuelle ... erfordert passgenaue Tools für das Management von unstrukturierten Daten und den ... zu reduzieren und das Minimalprinzip („Least Privilege“) gezielt umzusetzen. Varonis Dataprivilege implementiert ...

Executive View

Nexis Controle 3.0

by Matthias Reinwarth

... support. KuppingerCole understands Enterprise Role Management (ERM) as a strategic approach to structuring ... set of demands: The principle of least privilege requires that only the minimum ... as an add-on to an existing Identity and Access Management infrastructure system or as a stand-alone service ... intelligent role mining entitlement management role lifecycle management; and identity intelligence and ... of Duties) violations, undesired critical combinations of privileged assignments, and little or never used ...

Press Release

KuppingerCole’s 11th European Identity and Cloud Conference 2017

... for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... the most recent information on Identity, Privilege & Access Management, Cybersecurity as well as the impact ... once again honor outstanding identity management and cloud computing projects and ... : Next-Generation of Identity-Based Security Privileged Account Management & User Behaviour Analytics. Identity ...

Advisory Note

Rising to the Security Challenge of Heavy Cloud Adoption

by Dan Blum

... with appropriate vulnerability management, firewall rules and access privileges or credentials has ... have a strong focus on architecture, risk management and collaboration. KuppingerCole’s IT Cloud Strategy ... to do so. Recommendations: Determine risk appetite and management style. Understand the enterprise norms ... „hooks“ to existing or new vendor management and project management processes Build the security ... to manage risk or complexity Extend enterprise privileged access management (PAM) solutions to cover core ...


Product Report: Kaspersky Endpoint Security 8 and Kaspersky Security Center 9 - 70401

by Alexei Balaganski

... languages  Continuous application control (startup, privilege, activity and vulnerability monitoring)  Granular ... of application activity and enforces application privileges and access restrictions. This module ... Security Center provides centralized creation, management and enforcement of security policies. ... No.: 70401 Page 8 of 11 application startup and privilege control, and web filtering. Kaspersky ... of award winning antimalware technologies, excellent management and reporting functionality and integration ...


Analyst Chat #21: IAM Requires a Solid Process Framework

by Matthias Reinwarth

... excess Federation, or for sure privileged access management. And you can use the ... generic processes like sod management, risk management, and some standard processes ... covers Federation topics and privileged access management topic. And the same ... being composed of model management, identity, life cycle management, access request, ... sure. Everything around privileged access management, things like the management or processes for ... session management. So who is able to review session if one access and privileged function ...


KCLive Event Recordings 2020 Available

... the help of modern access management.Watch videos here Cybersecurity Leadership ... Event focuses on the IT Service Management (ITSM) to Identity Governance and ... Identity and Access Management, Identity Governance and Privileged Access Management can protect ... in CIAM to achieve effective identity management and better customer experience. We investigate ... here Cybersecurity & Enterprise Risk Management This KCLive Event helps you ... Identity Fabrics & the Future of ID Management This KCLive Event is designed to help ...


Executive View: akquinet SAST GRC Suite - 70979

by Matthias Reinwarth

... Planning), CRM (Customer Relationship Management), SCM (Supply Chain Management) or BW (Business Warehouse) ... Security focuses on Access Governance, i.e. the management and control of authorizations, users, roles ... up-to-date by applying mature software update management. Comprehensive information (e.g. Security Notes) about ... risks:  SAST Audit AdminTrack – Privileged User Management Module for SAP systems. Includes ... -only access to HCM (Human Capital Management) data by privileged users.  SAST Audit SystemTrack ...

Executive View

VMware AppDefense

by Matthias Reinwarth

... infrastructure solutions. Identity and Access Management, Access Governance and endpoint application ... behavior of a system. Compartmentalization and least privilege principles are applied to application systems ...