Search

Page 97 of 1000 results

Blog

Real-time Security Intelligence – more than just "next generation SIEM"

by Martin Kuppinger

... . SIEM (Security Information and Event Management) is still, typically, a tool-driven approach ... . A strong potential is in integrating network configuration management systems with Real-time Security ... webinar on “Mitigate targeted attacks with privileged account analytics” – not about Realtime ...

Report

Product Report: Siemens DirX Identity 8.1

by Martin Kuppinger

... Scraping. Integrierte Basisfunktionen für das Privileged Account Management. Unterstützung der SoD (Segregation ... zu entwickeln. Password und Privileged Account Management Ein wichtiger Bereich bei Enterprise ... auch eine Basisfunktionalität für das Privileged Account Management in das Produkt integriert. Damit ... logische Integration von Funktionen des Privileged Account Managements in Provisioning-Produkte begonnen haben ... Anwendungen im System- und Service-Management wird dadurch signifikant erleichtert. Allerdings ...

Report

Product Report: Engiweb IDEAS

by Martin Kuppinger

... which is built around role management, authorization management, and other features. The ... deep integration of own PAM (Privileged Access Management) and the standard access governance ... in two areas: • Enterprise Role Management • Entitlement Management, providing an authorization engine for applications ... around access and authorization. 5 Role Management Role Management is a core competency of Engiweb. ... emerging architectural concept. 8 Access Management The access management capabilities described above are ...

Report

Advisory Note: IAM and GRC Market Evolution 2011/2012 - 70180

by Martin Kuppinger

... (Identity and Access Management), and GRC (Governance, Risk Management, Compliance)., As is to be expected, ... 2011/2012 PxM (Privileged Access, Account, Identity, User Management) Driven by regulatory ... by cloud providers. Web Access Management Web Access Management (also known as Web SSO ... • • • • Identity and Access Management: Identity and Access Management enables centralized, consistent, and ... to problems. Business/IT Service Management: Combined Business/IT Service Management allows business users to request ...

Report

Executive View: Joyent Cloud Services – Security and Assurance - 70636

by Mike Small

... of customer data 6 2.2.7 Identity and Access management 6 2.2.8 Logging and Monitoring 6 2.2.9 Service Contract ... that would normally require manual management. ● Node.js is Joyent’s runtime. Node.js allows ... server and network virtualization, operations management and customer self-service. It provides ... , file system, analytics and resource management capabilities that enable organizations to run ... root access. 2.2.8 Logging and Monitoring Privileged access and access to the Joyent ...

Report

Advisory Note: IAM and GRC Market - the Evolution in 2011/2012 - 70180

by Martin Kuppinger

... (Identity and Access Management), and GRC (Governance, Risk Management, Compliance)., As is to be expected ... many vendors. PxM (Privileged Access, Account, Identity, User Management) Driven by regulatory compliance ... Access Management: Identity and Access Management enables centralized, consistent, and automated management of ... problems. Business/IT Service Management: Combined Business/IT Service Management allows business users to ... from scratch. Identity and Access Management is a typical example. We strongly ...

Report

Executive View: HP Virtual Private Cloud – Security and Assurance- 70739

by Mike Small

... of customer data 6 2.2.7 Identity and Access management 6 2.2.8 Logging and Monitoring 7 2.2.9 Service ... data integrity. 2.2.7 Identity and Access management HP currently uses local authentication credentials ... services ordering and approval. Identity management is based on the OpenStack Keystone4 ... 6 of 9 2.2.8 Logging and Monitoring Privileged access and access to security management systems including: hypervisors ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ...

Press Release

European Identity & Cloud Awards 2013

... in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), ... in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), ... business value of professional Identity Management and Cloud Security.In the ... category “Best Identity and Access Management Project”, the award goes ... infrastructure for dynamic access permissions management, an important milestone in their architecture ... internal PC systems from unauthorized privileged access, while ensuring that IT ...

Blog

European Identity & Cloud Awards 2013

by Bettina Buthmann

... initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), ... category “Best Identity and Access Management Project”, the award goes to ... infrastructure for dynamic access permissions management, an important milestone in their architecture. ... their internal PC systems from unauthorized privileged access, while ensuring that IT ... greatly contributed to the Identity Management field with his “Seven Laws ... for their Access and Identity Management Program, thus ensuring their ...

Keynote

Don’t Let Password Mismanagement Land Your Company in News Headlines

by Jonathan Cogley

10 Questions to Gauge Your Password Management Maturity How mature are your team’s password practices? Password Management is a critical part of your network security. Privileged passwords are almost always involved in a network breach. Join us for a pop quiz in presentation format with Jonathan Cogley, the CEO of Thycotic Software, to see how you stack up compared to your industry peers and discuss password management best practices that you can take back to your team.