Search

Page 86 of 1000 results

Combined Session

GDPR, Blockchain & The Right to be Forgotten • Panel: How to Interact with your Customer without Comprising Privacy

by Martin Kuppinger, Rooly Eliezerov, Dr. Ina Nikolova, Lewis Barr, Wouter de Wit

A World without Identity and Access Management systems is unimaginable in our time. Just ... Facebook. But topics like access management are especially important in corporate ... forgotten? Building an identity and access management strategy is a key factor to comply ... access management solutions, including identity governance, access management, privileged account management, certificate ... -based authentication, identity federation, complete lifecycle management ...

Combined Session

Moving Identity Talent Development Beyond the Basics • What Every ID Professional Should Know • The Identity Profession and Professionals

by Pamela Dingle, Andrew Hindle, Olaf Grewe, Steve Hutchinson

... backing into the art of identity management. The lack of an established ... and eventual certification, for identity management. IDPro Board member Steve ... federations, enabling social sign-on, managing privileged accounts, and all of the other ... the professional of identity management? What does it mean to be an identity management professional? How do I ... on what it means to be an identity management professional. Panelist will discuss topics ... about IDPro, the identity management professional organization, and the ...

Expert Talk

It’s time for IAM to Grow Up! 3 Steps to an Evolved Identity Strategy • Empower IAM to Serve your Business Needs • Measuring the success of Governance

by Marc Vanmaele, Paul Walker, Stephen Mowll

... , and basic 2FA for a few privileged users. It’s time for IAM to grow ... program to be a progressive part of an integrated risk management platform for tomorrow. Key Takeaways ... an agile approach to API management, integration, identity and access management, smart analytics, and ...

Executive View

Skyhigh Cloud Security Platform

by Mike Small

... Information and Event Management (SIEM) as well as key management. Skyhigh Cloud ... would impact the anomalies detected. Privileged user threats - Skyhigh detects ... a range of privileged user threats. It Identifies excessive user ... data, and unwarranted escalation of privileges and user provisioning. Integration with ... standard Key Management Interoperability Protocol("OASIS Key Management Interoperability Protocol ... with a registration portal. Rights Management Integration - Skyhigh integrates with ...

Executive View

Oracle Database Security Assessment

by Alexei Balaganski

... . By eliminating human factor from database management, ADWC provides unprecedented security, reliability ... and performance for enterprise data management in the cloud. The key ... automation for all aspects of database management, Oracle ADWC not only reduces ... as auditing, monitoring and test data management solutions, support multiple database types ... : Oracle Key Vault for centralized management of encryption keys Oracle Audit Vault ... path access to data and controlling privileged users Oracle Advanced Security for ...

Webinar

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

... employees in your company use a privileged account? Are these accounts properly ... etc. Once compromised, these privileged credentials give attackers access to ... information as a trusted user. Privileged Account Management (PAM) solutions from Thycotic belong ... automatically identify and securely store privileged accounts How to manage sensitive ... and quickly improve control across privileged accounts Creating a fundamental security ... why solutions for Privileged Account security and management are imperative for ...

Blog

Future-Proofing Your Cybersecurity Strategy

by Alexei Balaganski

... hand, the chance that your management will give you a bigger budget ... administrators, are becoming the most privileged users in your company, you have ...

Blog

RSA’s 2018 Conference Starts Bi-Polar and Ends with a Minor Breach

by Dan Blum

... how multi-factor authentication, privileged access management, and other layered security measures ... things right is all about risk management - understanding the company's business context ...

Report

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

by Matthias Reinwarth

... importance of the role of adequate Identity Management, powerful and efficient administrative processes ... is reflected in the role engineering and management module as well, providing sophisticated features ... includes features for the management and monitoring of privileged accounts from individual access ... other use cases, to design privileges, authorization management, perform role analysis and role ... IAG functionalities (e.g. access analytics and privileged account management) in one product   Core focus ...

Webinar

Controlling and monitoring administrative access to enterprise IT

... and/or line management and secure management of system access, including management of user ids ... keys But appropriate measures for privileged user management have to go beyond that: ... webinar gives an overview of privileged session management, including Administrator credentials management Privileged system access request ... about requirements and benefits of privileged session management in the legal and regulatory ... insight into today’s approaches for privileged session management based on practical experiences, ...