Search

Page 84 of 1000 results

Executive View

Executive View Digital Shadows SearchLight™

by Matthias Reinwarth

... traditional security and risk management inadequate or at least ... of corporate security, Identity and Access Management (IAM), governance and policy ... activate strong authentication, insufficient access controls or simply misconfiguration ... at different stakeholders. Senior management can gain immediate up ... of cyber security, risk management and digital risk protection ... enterprise security data and a privileged administration frontend into the ... part of Digital Risk Management processes and responsibilities outside ...

Video

Todd Peterson - Rightsizing IGA – One Size Does Not Fit All

... Holy Grail of identity and access management is identity governance and administration ... lifecycle management; and from user access governance, through data governance, and into privileged access ...

Keynote

Rightsizing IGA – One Size Does Not Fit All

by Todd Peterson

... Holy Grail of identity and access management is identity governance and administration ... lifecycle management; and from user access governance, through data governance, and into privileged access ...

Blog

IAM for a Microservices World: Securing Agile IT

by Martin Kuppinger

... about securing containers. That includes privileged access to the environments the containers ... , but also the fine-grained access management and governance of such environments ... the interesting challenge of segregating access to development, test, and production ... into play here is API Management & Security. Beyond that, we will ... and govern identities and their access at both the level of ... them currently are focused on privileged users – which is a good start ...

Webinar

Step-by-Step Guide to GDPR Compliance

... implement those actions, from restricting privileged access to advanced log analytics and ... Automation Cyber Supply Chain Risk Management Privileged Access Management Enterprise Cloud ITSM Meets IAM ... once again showcase outstanding identity management and security projects, standards and ... Expo-Area Join Networking Events Access online event platform View Livestreams ... Conference On-site access to live sessions Unlimited access to online ... Ticket Full Virtual Experience Unlimited access to online event platform Watch ...

Leadership Brief

Leadership Brief Defending against ransomware

by John Tolbert

... remove malicious attachments, and block access to nefarious sites and malvertising ... libraries. Privilege Management Enforce least privilege for users and deny malware access to advanced ... “tech support”. Screenlockers may deny access to the whole operating system ... number does not guarantee that access to files and systems will ...

Blog

IAM@IBM: Finally back to leadership

by Martin Kuppinger

... ”), such as the IBM Security Access Manager, the IBM Security Directory ... . One is the IBM Security Access Manager for Mobile, an appliance ... that allows managing mobile access, provides SSO services and risk ... - and context-aware access, based on information such as ... also introduced their own Privilege Management solution, IBM Security Privileged Identity Manager, to ... analyze real-time activity of privileged identity use. The third major ...

Blog

BAIT and VAIT as Levers to Improving Security and Compliance (And Your IAM)

by Matthias Reinwarth

... MaRisk ("Minimum requirements for risk management"=”Mindestanforderungen an das Risikomanagement") for ... of information risks and their management is integrated into the overall ... corporate/business risk management. Information security is strengthened by ... the demand for a uniform authorization management, access management and governance are moving even ... : improvements in identity and access management, privileged account management and access governance have proven to ...

Executive View

Executive View Varonis DatAdvantage

by Martin Kuppinger

... discipline of IAM (Identity & Access Management) comes to its limits when ... identification nor the fine-grain management of entitlements e.g. on Windows ... on cross-system management of identities and access, not on the ... runtime performance of managed environments. Management of ownership, entitlements, and ... – 79028 Architecture Blueprint: Access Governance and Privilege Management - 79045 Advisory Note: ... Redefining Access Governance - Beyond annual recertification ...

Blog

The employee – still security risk Nr. 1

by Martin Kuppinger

... to consider: Many internals have privileged access, frequently with a lack of ... regardless from where it is accessed, where it resides, which device ... used, and whether it is accessed from internals or externals. Point ... do: Access Governance and Intelligence are one of these things. Privilege Management is ... another one. However, Privilege Management should be well ... -integrated with Identity Provisioning and Access Governance ...