Page 91 of 1000 results


Executive View: Knowledge Vault - 71412

by Alexei Balaganski

... significant limitations, such as an inability to track privileged access by Microsoft’s own administrators or lack ... and compliance reports, as well as a number of management tools for automating common administrative ... 365. Additionally, it provides over 20 preconfigured “management actions”, which are GUI-based ... a graphical designer for creating custom management actions. Microsoft Azure Active Directory ... , limited presence outside of US and Germany ● “Management actions” – wizard-like processes to simplify ...


Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

by Martin Kuppinger

... SSO approaches such as Web Access Management, Identity Federation or Kerberos, the ... become an IAM (Identity and Access Management) vendor with one of the most ... ESSO also is integrated with Oracle Privileged Account Manager (OPAM), a component ... Oracle Identity Governance suite, to retrieve privileged credentials, such as Unix/ Linux root ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... Sign-On, Federation, User Centric Identity Management, eID cards, Cloud Security ...


Technology Report: Access Governance Architectures - 70219

by Martin Kuppinger

... Scenario: Understanding IT Service and Security Management - 70173 August 2, 2011 KuppingerCole – Technology ... , deep integration of PxM (Privileged Access, Account, Identity, User Management) and the standard ... deeper connections to target systems Privileged Access/User Management: Supporting all types of users ... this, features for role management, policy management, rule definition and analysis, workflows ... middle tier, the IT Service & Security Management layer. That architecture is complemented by IT Governance ...


CSP vs. tenant - Understanding shared responsibilities

by Matthias Reinwarth

... , the reliable and robust management of users and privileged accounts and their individual ... computing environments. The provisioning of appropriate management interfaces, the implementation of change processes ... the lines of the ITIL service management processes with typical roles like ...


Secured by Design: The smart streets of San Francisco

by Martin Kuppinger

... devices as well as certain rights and privileges. That is why identity is a prerequisite for ... evolved that’s taking care of the management of access rights. With UMA, millions ...


Christopher Schütze

... : Authentication and Authorization Cybersecurity Privileged Access Management Cloud Technology IAM/IAG Guidelines ... integrators for identity and access management. He has provided clients with technical ...


Can’t see the wood from the trees?

... the importance of organizations to broaden their management beyond traditional provisioning and governance ... a time period that exceeds policy Privileged accounts: accounts with increased levels ... , applications or transactions. Unnecessary entitlements: excessive privileges that exist within the system


Product Report: Oracle Database Security

by Martin Kuppinger

... are in fact access control including privileged access management and advanced security by encryption ... for all data types. Privileged access management and SoD controls for databases ... as some vendors of PxM (Privileged Access/Account/User/Identity Management) tools. However, Oracle ... are in fact access control including privileged access management and advanced security by encryption ... Database Vault as a database-specific Privileged Access Management solution. The latter allows to define ...

Press Release

KuppingerCole publishes Leadership Compass about Access Control/Access Governance for SAP environments

... can significantly improve enterprise risk management and corporate compliance with applicable ... can significantly improve enterprise risk management and corporate compliance with applicable ... SoD rules (Segregation of Duties), the management of privileged users (including mechanisms for well ...


Advisory Note: Migration Options and Guidelines for Oracle Waveset - 70610

by Fulup Ar Foll

... is also historically known as Sun Identity Management/Manager or, in short, SIM, which ... units to add new users, grant privileges, enforces policies etc. was exploding ... moved the responsibility of enforcing identity management policies from KuppingerCole – Advisory Note ... an agreed format to provision identity and privileges for a given user. As an example ... native processes running with “superadmin” privileges. With adequate authorization there is no ... and verify user access and privileges that are present in the ...