Search

Page 92 of 1000 results

Report

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

by Mike Small

... tools allow the extension of existing management systems and security services to encompass ... established and implemented an Information Security Management System (ISMS) 3 certified to ISO 27001 ... to have access to vCloud Air management systems. All privileged access is logged and captured ... server. Furthermore, the vCloud Air management network is isolated from VMware's corporate ... , regulation, or governmental request. Patching & Vulnerability Management: VMware maintains the systems it uses ...

Video

Intelligente Protokollierung von Aktivitäten

by Martin Kuppinger

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten Nutzern und Administratoren können Fehlverhalten und daraus resultierende Gefahren schneller erkannt und weitere negative Auswirkungen für Systeme, Anwendungen und Daten verhindert werden.

Report

Vendor Report: Passlogix

by Martin Kuppinger

... ) or additional features for its PAM (Privileged Access Management) functionality, Passlogix has an interesting ... ) Somewhat limited PAM (Privileged Access Management) portfolio yet but strength in management of shared accounts ... Management No Strong Authentication and Password Management Partially Identity Federation, User-centric Identity Management No Privileged ... Account Management Partially Platform-specific Access Management No Comment Some ...

Report

Executive View: Onapsis Security Platform - 71290

by Alexei Balaganski

... into existing risk and incident management infrastructures. by Alexei Balaganski ... Customer Relationship and Supply Chain Management. Constant availability and protection of ... existing network security and incident management systems, it provides a unified ... the solution can greatly simplify management of large infrastructures with many ... behavior patterns of internal SAP users, privileged accounts, as well as external ... violates nearly every organization’s change management guidelines. However, rich alerting ...

Report

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

by Martin Kuppinger

... Report No.: 71045 Page 1 of 11 Content 1 Management Summary 3 2 Predictions vs. Recommendations 3 3 Predictions ... Advisory Note: Identity & Access Management/Governance Blueprint – 70839 Advisory Note ... beyond Report No.: 71045 Page 2 of 11 1 Management Summary Information Security is in constant flux ... recommend is in integrating network configuration management systems with RTSI and advanced ... as well as outsiders masquerading as insiders. Privileged account management should be a part of every organization’s ...

Report

Advisory Note: Secure your Cloud against Industrial Espionage - 70997

by Rob Newby

... Solutions 6 5 Industrial Espionage 7 6 Governance 8 7 Risk Management 11 7.1 Threat Actors 13 7.2 Data Classification 13 7.3 Monitoring ... Centric Security 15 9 Encryption and Key Management 16 10 Conclusion 20 11 Cloud Security Checklist 20 12 ... /better than the competition? Solution Privileged User Security Data Security Technical ... (Security Information and Event Management) solutions, IT Service Management, and others. However, most ... the Cloud needs to assure that privileged access by the CSP is properly ...

Report

Executive View: Seclore FileSecure - 71295

by Martin Kuppinger

... with this including misuse of administrative privileges, inadvertent deletion, legal seizure and ... product follows the Information Rights Management (IRM) approach, which stands in contrast ... . Another strength is the flexible user management, including integration with a number of identity ... available Strong support for identity management capabilities Flexible, granular policies and ... strong policy management including “policy federation” allowing importing ...

Report

Executive View: Microsoft Azure – Security and Assurance - 71282

by Mike Small

... Directory is a cloud identity and access management solution providing capabilities to manage users ... infrastructure using Azure tools including a management portal. KuppingerCole Executive View Microsoft ... and inside of Azure. Zero standing privileges. Access to customer data by Microsoft operations ... has established an Enterprise Business Continuity Management (EBCM) framework and this is applied ... “Information security aspects of business continuity management” specified ISO/IEC 27001:2013 ...

Report

Leadership Brief: 10 Security Mistakes That Every CISO Must Avoid - 72000

by Amar Singh

... regulations, policies, processes and people management. Where in the past security ... table. Top Ten Mistakes Unmanaged Privileged Users Unpatched Systems & Applications ... Data Breach Missing Information Risk Management Strategy Misuse of Security Tools ... Missing Incident Management & Response Capability Missing Basic ... .  Produce and maintain an effective risk management strategy.  Develop a strategic approach to ... has meant that senior executive management is increasingly taking charge of ...

Report

Product Report: CrossIdeas IDEAS - 70620

by Martin Kuppinger

... 15 5.1 Activity-based Approach 16 5.2 Role Management 17 5.3 Dynamic Authorization Management 17 5.4 Provisioning 18 5.5 Attestation 19 5.6 ... for true Dynamic Authorization Management/Entitlement Management. KuppingerCole Product Report – ... any vendors offering PAM (Privileged Access Management) solutions of their own ... point than solely relying on role management. Management of SoDs and Business Rules ... in its market. 5.3 Dynamic Authorization Management Entitlement Management consists of two separate segments:  ...