Search

Page 82 of 1000 results

Executive View

SAP HANA Platform Security

by Mike Small

... depend on their assigned roles and privileges. Roles are used to bundle ... and structure privileges, making it possible to create sets of privileges for specific groups ... such as authentication, authorization, user management, encryption, and audit logging are ... situations – for example where a highly privileged user needs temporary access to a ... provide backup encryption and key management capabilities. Administration and Monitoring ... SQL commands, for example identity management (user and role provisioning) or ...

Video

Todd Peterson - Rightsizing IGA – One Size Does Not Fit All

... Holy Grail of identity and access management is identity governance and administration (IGA ... management; and from user access governance, through data governance, and into privileged ...

Keynote

Rightsizing IGA – One Size Does Not Fit All

by Todd Peterson

... Holy Grail of identity and access management is identity governance and administration (IGA ... management; and from user access governance, through data governance, and into privileged ...

Expert Talk

Best Practices as the Foundation of Agility and Innovation: IdentityPROCESS+ as an IGA Process Example • Access Certification Campaigns that Work • Security and Efficiency Can and Does Co-Exist

by Dr. Alfons Jakoby, Martin Menzer, Sebastien Faivre, Osman Erkan

... from a solid position.Risk management, of course, is another key management discipline which is much ... to personal data? Who can leverage privileged accounts? Are those SoD risks ...

Combined Session

Harness Your Identity Analytics to Deliver Contextual Authentication • Panel: Transforming Secure Access to be Intelligent

by Niklas Brask, Dr. Torsten Lodderstedt, Steve Hutchinson, Ingo Schubert, Simon Moffatt

... to reduce over-provisioning and improve privileged access management systems. But what about ...

Report

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266

by Martin Smith

... Steps to Consumer Identity and Access Management - 72549 KuppingerCole Executive View NRI ... specialty within Identity and Access Management. Consumer IAM systems provision ... self-service registration and consent management; an Authentication service; an ID Repository; an ... and configuration, threat information, privileged-user accounts, and other ... enterprise’s brand and messaging. Privileged user roles are for ... features such as UMA 2.0-based consent management, restriction of access by CIAM administrators ...

Webinar

Next-Gen Identity Analytics and Access Governance Approach

... operational efficiency, better UX and risk management to just auditing and compliance. It is important ... certifications for access to data, resources, privileged operations, applications and other IT assets ...

Blog

Managed Identity Services: Talking the Talk with Covisint

by Felix Gaehtgens

... used to work for Dewpoint, an Identity Management consultancy in the US Midwest. Covisint was ... federated logins. To streamlining the management of federation agreements and trust relationships ... Covisint built a comprehensive suite of management tools. Diversification was next - what ... with large organisations' internal Identity Management systems, partly by hosting ... that deal with context and privilege or group information. Covisint ... and cloud computing continues, identity management must be extended outside of ...

Blog

Managed Identity Services: Talking the talk with Covisint

by Felix Gaehtgens

... used to work for Dewpoint, an Identity Management consultancy in the US Midwest. Covisint was ... federated logins, and streamlined the management of federation agreements and trust ... relationships by building a comprehensive suite of management tools. Diversification was next - what ... with large organisations' internal Identity Management systems, partly by hosting ... that deal with context and privilege or group information. Covisint ... and cloud computing continues, identity management must be extended outside of the ...

Partner

Indeed Identity

... authentication and access management for employees and customers, privileged access management for admins ... and critical business users, and management of digital ...