Search

Page 87 of 1000 results

Combined Session

The User Experience Panel • There Will Be No Growth in the Digital Service Market Without Privacy

by Yann Lechelle, Bertrand Carlier, Gauthier le Masne de Chermont, Gil Bernabeu, Dan Hayden

... combination of Identity & Access Management and Customer Relationship Management continues to be a ... data sources, Customer Identity & Access Management (CIAM) needs to be secure ... susceptible to unauthorized third party access for malicious use. Compliance ... Element (SE) but have different access rights. This presents a complex ... example, without it being access intentionally or unintentionally by an ... association, GlobalPlatform is in a privileged position of being able to ... corner stone of the management of the SE.

Blog

Why recertification isn’t sufficient anymore – time to look at user behavior and detect anomalies

by Martin Kuppinger

... processes for IAM (Identity and Access Management) that ensure that identities ... USB stick? What if a privileged account is hijacked by an ... attacker who runs privileged actions? Knowing that the ... no technology in traditional static access management, i.e. creating accounts, assigning them ... . Technology is there, from privileged threat analytics to user behavior ... oh yes, there are fraud management solutions for that available as ... ) and detecting (recertification and Access Intelligence) to responding, based ...

Executive View

Executive View Balabit syslog-ng

by Martin Kuppinger

... areas of information security: log management, privileged activity monitoring and user behavior ... such as around Identity and Access Management, Privileged Account Monitoring, or specific types ... as well as on new management and configuration capabilities and performance ... Puppet, a popular open source configuration management tool. Now, a large number of ... an entry-level enterprise log management solution beyond standard syslogd; or ... direct Big Data integration Centralized management for large-scale deployments Tight ...

Executive View

Executive View Ping Identity’s PingFederate

by John Tolbert

... of identity federation protocols, web access management (WAM) systems provided SSO within ... adding robust directory, Consumer Identity & Access Management (CIAM), and Identity-as-a-Service ... systems: CA Siteminder, Oracle Access Manager, Tivoli Access Manager, and SAP NetWeaver ... cybersecurity, PingFederate offers API access to its logs via syslog ... for Business Intelligence, CyberArk for Privilege Management (configured from CyberArk side), and ... rules and authentication chains for access to sensitive data. In ...

Blog

Brauchen wir neue Sicherheitslösungen für virtualisierte Umgebungen?

by Martin Kuppinger

... unterschätzen: Es gibt auch zusätzliche Management-Anwendungen für die Virtualisierung. Dort ... laufen muss. Sie müssen beim Management von privilegierten Zugriffsberechtigungen auch die ... Management-Werkzeuge für die Virtualisierungsinfrastruktur berücksichtigen. ... ist beispielsweise, dass es ein PxM (Privileged Access/User Management) für externe Cloud-Infrastrukturen ...

Webinar

Controlling the Impacts of Recession on IT Security

... impact on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and ... Information Rights Management. In a quick survey ... act on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and ... Information Rights Management. And they have ... doors. PAM is a must in these days, given that privileged accounts impose ...

Blog

Do You Need a Better IAM System to Meet the GDPR Requirements?

by Martin Kuppinger

... (Consumer/Customer Identity and Access Management), where full support for ... from leaking and managing access to such information. That ... The need for granular management access to PII might lead to ... procedures. However, with today’s Access Governance and Data Governance, a ... as Access Governance in combination with Dynamic Authorization Management or ... for Big Data. Likewise, Privilege Management for better protecting systems that ... IAM, i.e. Identity Provisioning and Access Governance, there is little change.

Blog

Is there really no way to avoid shared user accounts?

by Martin Kuppinger

... , mainly in the context of Privilege Management, I raised the (somewhat provocative ... a functional account to quickly access PCs and perform some tasks ... applications to, for instance, access databases. Administrators commonly tend to ... for rapid authentication and access to applications with an ... into IAM (Identity and Access Management). Aside from the argument ... standard operations such as eMail access. That works well and ... openly consider alternative solutions. Privilege Management tools are just helping with ...

Advisory Note

Advisory Note KYC as an Enabler in the Financial Services Business Transformation

by Bruce Hughes

... data security, identity / access management, and personal data access controls in accordance with ... introduces a new step – Customer Identity Access Management (CIAM) – in combination, the three ... lifecycle and access governance, access management and federation, single sign-on, and privilege management. CIAM ... Consumer Identity and Access Management ... Advisory Note: Consumer Identity and Access Management for “Know Your Customer” – ...

Press Release

New KuppingerCole Reports: Leadership Compass "IAM/IAG Suites" and the Advisory Note "Security and the Internet of Everything and Everyone"

... -areas of the Identity and Access Management/Governance. These solutions not only ... Identity Provisioning or Access Governance, but also, for example, Privilege Management, Enterprise Single ... -areas of the Identity and Access Management/Governance. These solutions not only ... Identity Provisioning or Access Governance, but also, for example, Privilege Management, Enterprise Single ...