Search

Page 96 of 1000 results

Report

Executive View: Identity Automation RapidIdentity - 71203

by Martin Kuppinger

... identity lifecycle and coarse-grained access management for systems. Such a standardized ... On, Web Access Management and Identity Federation, and management of privileged users and ... In the area of Privileged User Management, the product delivers basic ... Identity Federation, and basic Privilege Management capabilities. Another notable feature ... , customization might become baseline privilege management, single sign-on, more ... ● No full support for privilege management, management advanced features such as session ...

Report

Advisory Note: Database Governance - 70102

by Martin Kuppinger

... Security Development Standard Management Test Privileged (human) Monitoring Production Privileged (technical) Fig. 5: Aspects ... management and rely on authenticated, personalized users for access to databases. Privileged administrative access ... as identity provisioning or privileged account/identity/user management (PxM). Another view on ... firewalls, data masking tools, etc. PxM tools, either general purpose tolls ...

Report

Product Report: SailPoint IdentityIQ 5.2 - 70287

by Martin Kuppinger

... of user lifecycle management and access fulfillment. In the Access Governance market segment ... of user lifecycle management and access fulfillment. In the Access Governance market ... tight integration between PxM (Privileged Access/Identity/User Management) and standard access governance. However, ... • Auditing and Analysis • Access Request Management • Risk Management • Role Management • SoD Controls SailPoint IdentityIQ ... with standard procedures within modern access management concepts. This enables IdentityIQ to ...

Report

Advisory Note: Authorization in the Cloud - 70217

by Mike Small

... authorization is managing users with privileged access rights. The activities of an ... the policies (for example access to resources). 4) Privilege Management – This is an important ... made by an insider with privileged access could potentially have an impact ... privilege and separation of duties imposed for privileged accounts? How is extraordinary privileged access ... activities of, an insider with privileged access could potentially have an adverse ...

Report

Advisory Note: IAM and GRC Market Evolution 2011/2012 - 70180

by Martin Kuppinger

... IAM (Identity and Access Management), and GRC (Governance, Risk Management, Compliance)., As is ... Market Evolution 2011/2012 PxM (Privileged Access, Account, Identity, User Management) Driven by regulatory ... run by cloud providers. Web Access Management Web Access Management (also known as Web ... , Web Application Firewalls, or Extranet Access Management) will remain a key technology; ... Access Management: Identity and Access Management enables centralized, consistent, and automated management of identities and access ...

Report

Advisory Note: IAM and GRC Market - the Evolution in 2011/2012 - 70180

by Martin Kuppinger

... IAM (Identity and Access Management), and GRC (Governance, Risk Management, Compliance)., As is ... added by many vendors. PxM (Privileged Access, Account, Identity, User Management) Driven by regulatory ... by cloud providers. Web Access ment Web Access Management (also known as Web ... , Web Application Firewalls, or Extranet Access Management) will remain a key technology; it ... Access Management: Identity and Access Management enables centralized, consistent, and automated management of identities and access ...

Report

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

by Mike Small

... Privilege Management 23 6.2.4 Information Flow Control 23 6.2.5 Infrastructure Security 24 6.2.6 Identity and Access Management ... may also have elevated privileges (backup systems, for example ... storage technology used. 6.2.3 Privilege Management Privileged accounts are needed to manage ... possibility of abuse of privilege by the IT service ... Management – knowing who is accessing information. b. Access Management – ensuring that access rights are appropriate. c. Privileged Access Management – ensuring privileged ...

Report

Vendor Report: Lieberman Software

by Martin Kuppinger

... is solutions for mass management and PAM (Privileged Account Management). Lieberman Software provides valuable ... is solutions for mass management and PAM (Privileged Account Management). Lieberman Software provides ... Privileged accounts are at risk because they often provide virtually unlimited access ... accounts and a structured, reliable access to these passwords when they ... privileges. Using these accounts, all or many data can be accessed ... . Thus a specific focused management of these accounts ...

Report

Vendor Report: Oracle Cloud Security - 70160

by Mike Small

... techniques including encryption and access control. Control of privileged access is ensured by ... in the tables. 4.4 Identity and Access Management Organizations adopting Cloud should determine ... identity management system to ensure correct management of privileged users and their access rights ... reports covering privileged users, account management, roles and privileges, object management and system management. Another ... focus primarily on identity and access management securing the application, middleware and ...

Report

Vendor Report: Fischer International - 70254

by Martin Kuppinger

... Integrated support for basic PAM (Privileged Access Management) requirements Relatively small partner ... Management Service (Manual Provisioning) Automated Role & Account Management Service (Automated Provisioning) Privileged Account Access ... Service (Basic PAM functionality) ... WebSSO federation scenarios Privileged Account Partially Management Strong support for ... seeking to provide Identity & Access Management as a hosted service. Mixed ...