Search

Page 96 of 1000 results

Report

Vendor Report: Novell – Identity and Security

by Martin Kuppinger

... KuppingerCole definierten Marktsegmenten übereinstimmen: • Compliance Management: In diesem Bereich finden sich ... im Identity und Access Management-Markt ab. Security Management: Hier finden sich ebenfalls ... weiter. Novell Privileged User Manager: Damit wird das Management von privilegierten Benutzerkonten ... der Novell Privileged User Manager, den KuppingerCole zu den Identity Management-Lösungen ... Novell Cloud Security Service Privileged Account Management Teilweise Novell Privileged User Manager, Unterstützung ...

Report

Business Report: IT-Initiativen 2011-2012: Eine 6*3-Matrix - 70265

by Martin Kuppinger

... Konsolidierung von Richtlinien und Management-Schnittstellen für die Netzwerkinfrastrukturund ... Access Management und die Datenbanksicherheit bis hin zu PxM (Privileged Access, ... Identity, User Management) zum Schutz auch ... Security Information and Event Management), Service Management und Continuous Controls ... Integration von PxM (Privileged Access, Identity, User Management) in Identity Provisioning ... Einführung PxM, also Privileged Access/Identity/User Management, umfasst Lösungen, ...

Report

Vendor Report: TESIS SYSware

by Martin Kuppinger

... Forschungsbereich. Interessantes Produkt im Wachstumsmarkt Privileged Account Management. Gute Softwarearchitektur und flexible Integrierbarkeit ... -centric Identity Management Privileged Account Management Information Rights Management Platform-specific Access Management Nein Generic ... – wie beispielsweise das Privileged Account Management und das Management von Berechtigungen auf File ... TESISDIVA auf hohem Niveau abgedeckt. • Privileged Account Management: In diesem Wachstumsmarkt, der insbesondere ...

Report

Product Report: CA IdentityMinder™ - 70914

by Rob Newby

... Highlights 4 3 Product Description 4 3.1 Provisioning 6 3.2 Password Management 7 3.3 User Interfaces & Clients 7 3.4 Connectors 8 3.5 ... moving towards combining CA Technologies identity management and governance toolset, although GovernanceMinder ... to add new users, grant privileges, enforce policies etc. was exploding ... ™ Report No.: 70914 Page 6 of 16 3.2 Password Management CA IdentityMinder now has mature and ... is required to do in the deployment, operation, management and discontinuation of each product. The ...

Report

Vendor Report: Courion

by Felix Gaehtgens

... RoleCourier RoleCourier is Courion’s a comprehensive role management solution within the Access Assurance ... the AccountCourier product as well. Management of accounts and privileges can be delegated in a very ... 3.3.4 PasswordCourier PasswordCourier is the password management solution that allows self-service ... Web Access Management No Courion resells RSA’s WAM solution. Privileged Account Management No Courion ... resells Cyber-Ark’s PAM solution. Enterprise Role Management ...

Blog

Novell enters PAM market - the first deal in the next wave of acquisitions in IAM?

by Martin Kuppinger

... acquired the technology for privileged account management (PAM) from ... Fortefi Ltd. PAM addresses the need to better manage privileged ... accounts. It is a broad field, starting with root account management in ... assigned to a user. A consistent lifecycle management often is missing. Thus it is no surprise ... point solutions, even while the management of privileged accounts should be a part ... of the overall identity/account lifecycle management. Thus it is no surprise, that Novell ...

Blog

Preventing, or surviving, data leaks

by Dave Kearns

... of the Security, Identity and Access Management (SIAM) market. Multiple press releases ... and services to protect your sensitive, privileged, and proprietary data as well as the ... postings, social networks, etc.) to see if privileged or protected data (or PII) is leaving the ...

Webinar

XACML Made Easy: Modeling High Level Policies in XACML

... has a direct impact on compliance management. Many applications implement their own ... proprietary access management logic, based exclusively on roles. ... databases often only allow us to specify privileges for “database users” on a per- ... XACML policies that give specific privileges to employees. These XACML policies ... Instead we use features such as attribute management, domain specific languages, policy tracing ... to assist the definition and management of policies. There is the common ...

Report

Technology Report: XACML – Extensible Access Control Markup Language

by Felix Gaehtgens

... Control Markup Language entitlements and privileges can be handled not just on ... . These roles entitle a subject to certain privileges. It is often left up to applications to ... decide how roles map to specific privileges. The problems with RBAC in ... particular director could have access privileges to certain sites and certain ... – it is an improvement in contrast to manual entitlement management but many issues remain unsolved ... seen in the latest generation of access management products. Vendor adoption of XACML is ...

Report

Executive View: EmpowerID 2013 - 70005

by Peter Cummings

... 4 2.1 Single Sign-On 4 2.2 Provisioning 4 2.3 Mobile Identity Management 5 2.4 Governance and Compliance 5 3 Strengths And ... of them. As should be expected from an access management solution EmpowerID offers federation using ... offers workflow based User Lifecycle Management and Provisioning. As expected, HR-driven provisioning ... to the approver with the necessary privileges to perform the intended operation. A final ... features in access control Mobile Identity Management included Easy to deploy Everything in one ...