Search

Page 78 of 1000 results

Workshop

Pre-conference Workshop

... the complete functional range of ARCON Privileged Access Management, based on analogies like doors ... Introduction When are we talking about privileged access? Why does it matter? Definition ... protection goals are most important? Privileged access in real world scenarios Real ... vs. protectors Interim results Coffee Break - 15:00 - 15:30 Privileged access in virtual world scenarios Virtual ...

Video

Analyst Chat #13: Cybersecurity Portfolio Optimization

by Matthias Reinwarth

... . A year preparation is key incident response management is very essential in this topic and ... in general, encryption, multifactor authentication, privileged access management that they really take these ... is having some kind of portfolio management and portfolio management is usually only focused on two ... very easily identify and present to management to say, okay, we have a short term ... to visualize it and to share with your management at the end. Okay, great. I know ...

Leadership Compass

Database and Big Data Security

by Alexei Balaganski

... policy-based access management, identifying and removing excessive user privileges, managing shared ... databases, artificial intelligence and consent management. Thanks to their recent breakthrough ... policy-based access management, identifying and removing excessive user privileges, managing shared ... types of personal information, and centralized management of access policies across databases, applications ... for application development and operations management, data management and governance, and, of course ...

Video

KC Virtual Awards: Category - Enterprise IAM

by Martin Kuppinger

... Series 2020 honors outstanding Identity Management and Security projects, standards or people ... Governance & Administration, Identity Federation, Privileged Access Management, and other technologies. These projects ...

Video

Analyst Chat #5: Beyond prevention - The Bigger Picture of Cyber Security

by Matthias Reinwarth

... approaches to get your credentials to access privileged accounts or things like that. And ... some kind of corporate risk management or which integrates it, risk management into it. One other ... You've mentioned instant response management and business continuity management as part of the respond ... by senior officials of an organization. So the C level management, when it comes to responding to an incident, how ... incident response management and business continue to management. The incident response management is more, ...

Networking Event

KC Virtual Awards: Category - Enterprise IAM

by Martin Kuppinger

... Series 2020 honors outstanding Identity Management and Security projects, standards or people ... Governance & Administration, Identity Federation, Privileged Access Management, and other technologies. These projects ...

Executive View

Indeed Certificate Manager

by Alexei Balaganski

... for multifactor authentication, privileged access management and public key infrastructure management based on a unified ... (Indeed CM) is a software suite for centralized management of enterprise public key infrastructures. Initially ... Indeed CM Server – it is responsible for the management of system users, maintains the smart ... 10 devices, Indeed CM supports full management of Windows Hello for Business credentials ... Manager provides comprehensive yet convenient management capabilities for both administrators and ...

Webinar

The Security & Identity Challenges of Modern IT: Agile IT & DevOps Done Right & Secure

... , it is about enhancements to traditional PAM (Privileged Access Management). It is about concepts, organization, and tools ...

Blog

CESG Draft Cloud Security Principles and Guidelines

by Mike Small

... consumers should be provided with secure management tools for the service. Access ... processes should be designed to mitigate risk of privilege abuse. Consumers of the service should ...

Leadership Compass

Identity as a Service (IDaaS) - IGA

by Martin Kuppinger

... of capabilities targeted at supporting access management requirements of organizations ranging from authentication ... access certification, role lifecycle management, SOD controls management etc. may not be ... Authentication & FederationBaseline capabilities for Access Management, i.e. SSO to target applications etc. ... additional capabilities around PAM (Privileged Access Management). They thus moved out ... Intelligence - 71145 Leadership Compass: Privileged Access Management - 79014 Leadership Compass: Identity ...