Search

Page 76 of 1000 results

Webinar

Transforming Governance, Security and Compliance

... for security management that builds on a "security rulebook" and derived privilege-user mapping ...

Report

Vendor Report: Cyber-Ark

by Martin Kuppinger

... approach and limitations to granular management of access to privileged system accounts. Well developed partner ... is an established leader in the field of Privileged Access Management (PAM). In addition, Cyber-Ark is active ... in more detail later. 3.2 Privileged Access Management solutions Privileged Identity Management Suite remains Cyber-Ark ... of affairs, a market for so-called Privileged Access Management solutions, or PAMs, has sprung up in recent ...

Report

Executive View: Nexis contROLE - 71502

by Matthias Reinwarth

... : Gemäß dem Minimalprinzip (Principle of least privilege) dürfen nur möglichst eingeschränkte Zugriffsrechte ... zu einem vorhandenen Identity and Access Management-Infrastruktursystem oder als Standalone-Lösung ... alle Prozesse im Rahmen des Role Management erforderliche, wertvolle Zusatzinformationen von unternehmenseigenen ... Genehmigungs-Workflows im Rahmen des Role Managements, sowie umfassende Analysefunktionen für erfahrene ... Role Mining und Role Lifecycle Management mit intelligenten Analytics-Funktionen  ...

Report

Advisory Note: Avoiding Lock-in and Availability Risks in the Cloud - 70171

by Mike Small

... Customer Responsibility To limit access to privileged accounts. To vet, manage and ... guest platform. To limit access to privileged accounts. To vet, manage and control ... Provider Responsibility To limit access to privileged accounts. To vet, manage and ... and infrastructure. To limit access to privileged accounts. To vet, manage and ... and infrastructure. To limit access to privileged accounts. To vet, manage and ... Cloud service and include resource management, performance management, patching, monitoring, auditing, ...

Report

European Identity & Cloud Award 2013: Swiss Reinsurance Company Ltd - 70774

by Martin Kuppinger

... but also supporting Privilege Access Management and Dynamic Authorization Management based on business rules ... Management. Support for internal and external users, including customers. ● Support for Privileged ... Access Management requirements as part of the project ... Project The EAM (Enhanced Access Management) project at Swiss Re resulted in an implementation of an ... the approval process strict privileged access and user management managing Segregation of Duty ...

Executive View

NRI Secure Technologies: Uni-ID Libra 2.4

by Richard Hill

... Identity and Access Management. Traditional Identity and Access Management (IAM) ... configuration is accomplished via its management console. Beyond social logins IdPs ... Kubernetes, OpenShift, or other container management platforms. Public cloud IaaS platforms ... Guide: Consumer Identity and Access Management Solution - 70259 Leadership Brief: ... Steps to Consumer Identity and Access Management - 72549 Leadership Compass: CIAM Platforms ... Authentication – 80061 Leadership Compass: Privileged Access Management - 80088

KuppingerCole

Advisory Services

... following areas: Identity & Access Management (Access Management, Lifecycle Management, Privileged Access, Access Governance, Adaptive ... Security & Governance, IoT & OT Security, Risk Management Emerging Technologies (such as Artificial Intelligence ...

Report

Advisory Note: Identity Information Quality - 70996

by Matthias Reinwarth

... Identity Information Quality No.: 70996 Content 1 Management Summary 4 2 Highlights 4 3 Identity Information 5 ... 16 6.4 Continuous, sustainable and automated data management 16 7 Identity Information Quality governance 18 8 ... Quality No.: 70996 Page 3 of 20 1 Management Summary A high level of Identity Information ... the past ● Continuous and sustainable management of Identity Information Quality We recommend ... adhering to the principle of least privilege. Continuously improving Identity Information Quality ...

Report

Vendor Report: Cyber-Ark

by Martin Kuppinger

... anderen Bezeichnungen wie Privileged User Management (PUM) und Privileged Account Management (PAM) verwendet. ... führenden Anbieter im Bereich von Privileged Access Management (PAM) etabliert. Darüber hinaus ... anderen Bezeichnungen wie Privileged User Management (PUM) und Privileged Account Management (PAM) verwendet. ... Report: Cyber-Ark • • • Privileged Identity Management (PIM) Suite: Suite von Funktionen ... den folgenden Abschnitten eingegangen. 3.2 Privileged Access Management-Lösungen Das wichtigste Produkt von ...

Report

Advisory Note: Industrial Control Systems: Getting a Grip on OT Cyber Security - 71110

by Graham Williamson

... Control Systems Report No.: 71110 Contents 1 Management Summary 3 2 Highlights 3 3 Introduction ... industrial systems dedicated to production management, process control or environment monitoring ... integration, a mechanism to homogenise identity management across the company is a requirement. ... adopt dynamic authorization management to SCADA systems or establish a privilege access management infrastructure to ... protect mission-critical systems. Deploy API Management As ...