Search

Page 91 of 1000 results

Blog

How to identify attacks? Know your enemies – and what they already might do.

by Martin Kuppinger

... Adar, Vice President of Product Management at CyberArk, Roy brought up ... by uncommon behavior. Users might access far more documents than average ... SIEM (Security Information and Event Management) tools are one approach, however ... analytics for areas such as Privilege Management (for instance, CyberArk’s PTA), User ...

Pre-conference Event

Get to know the IAM Essentials in 4 hours

by Martin Kuppinger

... disciplines such as IT Service Management. It dives into the various ... Provisioning, Access Governance & Intelligence, Single Sign-On, Identity Federation, Privilege Management and Cloud ...

Blog

Managing risk, not preventing loss

by Dave Kearns

... the now venerable Identity Management company has produced and ... addresses when Verizon’s marketing management company was hacked. Verizon, ... related to breaches and risk management, came from questions from ... when he wrote: “Identity & Access Management is a perfect example of what ... and implementing good Identity and Access Management practices. We need to, ... From Identity and Access Solutions to Access Governance Privilege Management IAM and GRC ... advisory notes about risk management, governance and security through ...

Blog

European Identity Award 2012

by Bettina Buthmann

... in Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... the category "Best Identity and Access Management Project" the award went ... model the business rules for access approval. In the category ... a strategic IAM (Identity and Access Management) project, enabling centralized auditing across ... airports. The company has implemented a privilege management solution that supports compliance requirements ... efforts to implement identity and access management in public administration and ...

Press Release

European Identity Award 2012

... in Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... in Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... category "Best Identity and Access Management Project" the award went ... a strategic IAM (Identity and Access Management) project, enabling centralized auditing across ... The company has implemented a privilege management solution that supports compliance requirements ... to implement identity and access management in public administration and ...

Blog

European Identity Award 2012

by Bettina Buthmann

... rund um Identity & Access Management, GRC (Governance, Risk Management and Compliance) und ... Bereich des Identity & Access Management (IAM), des Governance, Risk Management & Compliance (GRC) ... Kategorie „Best Identity and Access Management Project“ wird der Award ... strategische IAM (Identity and Access Management)-Projekt umgesetzt, mit dem ... . Das Unternehmen hat eine Privilege Management-Lösung implementiert, die Compliance- ... erfolgreichen Bemühungen, Identity und Access Management in der staatlichen Verwaltung und ...

Press Release

European Identity Award 2012

... rund um Identity & Access Management, GRC (Governance, Risk Management and Compliance) und Cloud ... Bereich des Identity & Access Management (IAM), des Governance, Risk Management & Compliance (GRC) und ... rund um Identity & Access Management, GRC (Governance, Risk Management and Compliance) und Cloud ... Bereich des Identity & Access Management (IAM), des Governance, Risk Management & Compliance (GRC) und ... Flughäfen. Das Unternehmen hat eine Privilege Management-Lösung implementiert, die Compliance-Anforderungen ...

Press Release

European Identity & Cloud Awards 2013

... initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), ... initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC ... category “Best Identity and Access Management Project”, the award goes ... complete infrastructure for dynamic access permissions management, an important milestone in ... PC systems from unauthorized privileged access, while ensuring that IT ... structure for their Access and Identity Management Program, thus ensuring ...

Blog

European Identity & Cloud Awards 2013

by Bettina Buthmann

... initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), ... the category “Best Identity and Access Management Project”, the award goes ... a complete infrastructure for dynamic access permissions management, an important milestone in ... internal PC systems from unauthorized privileged access, while ensuring that IT ... greatly contributed to the Identity Management field with his “Seven ... organizational structure for their Access and Identity Management Program, thus ensuring ...

Combined Session

Using IAM to protect you from Advanced Persistent Threats and Auditors • Plugging "Cloud Identity Leaks" - Should your Business become an Identity Provider?

by Martin Kuppinger, Mark O'Neill, Ramses Gallego

Identity & Access Management has become a lot more than ... IAM can solve. For example access certification can bring you in ... removing attack vectors. Controlling privileged account access can reduce insider threats and ... that rely on sloppy admin access. And simply giving the business ... visibility into who has access to what at the right ... allows for a more holistic identity management solution for Cloud services.