Search

Page 90 of 1000 results

Blog

Mobile, Cloud, and Active Directory

by Martin Kuppinger

... field of IAM (Identity and Access Management) – entering that market. Aside from ... we call Cloud User and Access Management. There are a number of expectations ... to Privilege Management with its Server Suite and a Cloud User and Access Management solution ... in the Cloud User and Access Management market. While they provide common ... with Container Management such as Samsung Knox. All mobile access is managed ... in the Cloud User and Access Management market took. However, it might ...

Webinar

Whitelisting und darüber hinaus

... zwischen Administrations-Accounts und Benutzerapplikationen: Privilege Management für die Kontrolle administrativer Benutzer ... und geteilter Accounts. Application Identity Management für sicheren automatisieren Zugriff auf ...

Blog

Why Cybersecurity and Politics Just Don’t Mix Well

by Alexei Balaganski

... in the network? Was privileged account management fine-grained enough to prevent ... into specific topics like IAM & Privilege Management in the research area of ...

Webinar

Intelligente Protokollierung von Aktivitäten

... , Anwendungen und Daten verhindert werden. Privilege Management befasst sich mit den leistungsfähigsten ... für privilegierte Konten selten durchgängiges Management der Konten über den gesamten ...

Press Release

KuppingerCole presents the Prime Time for the Next Generation of IAM Solutions

... IAM (Identity and Access Management) and IAG (Identity and Access Governance) can also ... high-risk users such as privileged users, others have a broader scope ... ” explains Martin Kuppinger. For him Access Intelligence solutions, which have been ... areas of risk-based, adaptive access, you can move your IAM ... Security, Cloud Security, and Identity Management and Governance, that is taking ...

Combined Session

The Anthem Breach and how it could have been Avoided • Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions

by Martin Kuppinger, Dave Kearns

... IAM (Identity and Access Management) and IAG (Identity and Access Governance), moving from ... high-risk users such as privileged users, others have a broader scope ... something might have gone wrong. Access Intelligence solutions, which have been ... areas of risk-based, adaptive access, you can move your IAM ...

Blog

Why to invest in IAM and GRC - especially in these days

by Martin Kuppinger

... what is happening from a risk management perspective (Why didn't governments have ... for SoD management, PAM (Privileged Account Management), and defined, auditable Identity/Access/Role Lifecycle Management. But ... reducing the overall administrative workload. Management by risk is sort of ... "management by exceptions", focusing on the ... IT risks supports Operational Risk Management. Any IT risk is, in ...

Blog

Abschied von Username/Passwort

by Martin Kuppinger

... Sachen Identity und Access Management (IAM) und Governance, Risk Management und Compliance (GRC ... die Unterstützung für die Network Access Protection (NAP), wo es nun ... , die sonst über spezielle PAM-Lösungen (Privileged Account Management) adressiert werden müssen.Alles ... größere Schritt aus der Identity Management-Perspektive sicherlich das Geneva-Framework ... -Funktionen und das Windows Rights Management mit sich bringt.

Blog

Oracle OpenWorld '13 Part 1 - Midway Report

by Peter Cummings

... bit more on the Identity & Access Management news. There are several new ... with some extensions to their Access Management suite of products already available ... authentication. In the area of access governance there is also a ... resides there. Adding Data Access Governance to the IAM portfolio ... User Activity Monitoring”. Beyond that, access policies for data can also ... developments in the area of Privilege Management with increased integration to ... on a base of granular access governance. Together with the massive ...

Blog

Preventing, or surviving, data leaks

by Dave Kearns

... of the Security, Identity and Access Management (SIAM) market. Multiple press releases ... services to protect your sensitive, privileged, and proprietary data as well ... employee had a legitimate right to access the data as individual records ... networks, etc.) to see if privileged or protected data (or PII ...