Search

Page 93 of 1000 results

Report

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

by Mike Small

... which include: ● Management Options: There are three management options: Managed Infrastructure ... compute, network, storage, and traffic management services to meet the customer’s ... on a role specific basis, and privileged infrastructure access is tightly restricted to the ... a set of vendor neutral cloud management standards. This is attractive to enterprises ... with a long history of IT service management. ● Free support to help the ... Identity and Access Management (IAM), Governance, Risk Management and Compliance ( ...

Report

Vendor Report: Courion - 70353

by Martin Kuppinger

... , applying Business Intelligence to Access Management Products relatively easy to deploy Strong ... provisioning, access request management and certification, role lifecycle management, enterprise single ... 3.3.3 RoleCourier RoleCourier is Courion’s a comprehensive role management solution within the Access Risk ... to the AccountCourier product as well. Management of accounts and privileges can be delegated in a very granular ... solution. Access No integrates with Privileged Account Yes Management Courion resells and fully ...

Report

Executive View: Prot-On - 71268

by Martin Kuppinger

... Compass: Enterprise Key and Certificate Management - 70961 Advisory Note: Connected ... this including misuse of administrative privileges, insecure deletion, legal seizure ... with their access rights. The management of these identities and policies ... Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... ), IT Risk Management, Authentication and Authorization ... -On, Federation, User Centric Identity Management, eID cards, Cloud Security ...

Report

Vendor Report: TESIS SYSware

by Martin Kuppinger

... Password Management No Identity Federation, User-centric Identity Management Privileged Account Management Information Rights Management Platform ... -specific Access Management No Generic IAM ... potential on the market, e.g. privileged account management (PAM) and access management on file servers. It does ... and is covered in depth by TESISDIVA. - Privileged account management: TESIS also appears to be well positioned ...

Report

Executive View: Covertix SmartCipher™ - 71267

by Mike Small

... Users 5 2.1.3 Directory Integration 5 2.1.4 Key management 5 2.1.5 Supported File types 5 2.1.6 Policy ... Compass: Enterprise Key and Certificate Management - 70961 Advisory Note: Connected ... this including misuse of administrative privileges, insecure deletion, and data ... party LDAP directories. 2.1.4 Key management Covertix SmartCipher provides its own ... Identity and Access Management (IAM), Governance, Risk Management and Compliance ( ... -On, Federation, User Centric Identity Management, eID cards, Cloud Security ...

Report

Advisory Note: Database Governance - 70102

by Martin Kuppinger

... Provisioning •Database Security •SIEM •Service Management •… •IT risks •Access Governance, Database ... Security Development Standard Management Test Privileged (human) Monitoring Production Privileged (technical) Fig. ... user management and rely on authenticated, personalized users for access to databases. Privileged ... such as identity provisioning or privileged account/identity/user management (PxM). Another view ... of priority) are key: • • • • • • • 5 Database Management Systems (DBMS) including technical features ...

Report

Vendor Report: Symantec Cloud Security - 70115

by Mike Small

... for security, compliance, availability, storage management, data protection and virtualization. Optimizing ... we see gaps around Identity Management and Privileged User Management. Even with the acquired ... product range. Lack of an integrated Privileged User Management solution (one of the cornerstones of Cloud ... for inappropriate activity. It provides centralized management to configure and maintain security policies ... are gaps around Identity Management and Privileged User Management. The results from the ...

Report

Product Report: SailPoint IdentityIQ 5.2 - 70287

by Martin Kuppinger

... tight integration between PxM (Privileged Access/Identity/User Management) and standard access ... and Analysis • Access Request Management • Risk Management • Role Management • SoD Controls SailPoint IdentityIQ ... related risks by a combination of role management, risk scoring, policies, attestation processes ... capabilities to analyze the status of access management across a heterogeneous IT environment. The IdentityIQ ... standardization efforts in the realm of role management. Page 11 of 14 KuppingerCole Ltd. Arnheimer ...

Report

Product Report: Völcker ActiveEntry 4.1

by Martin Kuppinger

... traceable administration of identities and access privileges in heterogeneous IT infrastructures via automated processes ... of the status of identities and user privileges, as well as "identity intelligence", namely ... of its unique features. 6 Password management Password management in the sense of the ability to ... , allowing detailed analysis of rights and privileges. In sum, Völcker’s connector offering is ... compliance reasons in order to deactivate unneeded privileges and is achieved through a defined process ...

Report

Advisory Note: IT-Initiativen 2012-2013: Eine 6*3-Matrix - 70609

by Martin Kuppinger

... Externalisierte Anwendungssic herheit Dynamisches Autorisierungs management IT GRCTechnologieei nführung E-SSO ... Access Management und die Datenbanksicherheit bis hin zu PxM (Privileged Access ... , Identity, User Management) zum Schutz ... Security Information and Event Management), IT Service Management und Continuous Controls ... Integration von PxM (Privileged Access, Identity, User Management) in Identity ... Griff PxM, also Privileged Access/Identity/User Management, umfasst Lösungen, ...