Search

Page 98 of 1000 results

Blog

The effect of the recession on IT security

by Martin Kuppinger

... vendors in the market for Privileged Account Management (PAM) or Privileged Identity Management (PIM), like Cyber ... to act on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and ... Information Rights Management. And they have ... is a must in these days, given that privileged accounts impose the highest risks ... to some of these accounts. Information Rights Management has to become reality. And Data ...

Blog

Creating new attack surfaces in VMs and Network Security devices

by Martin Kuppinger

... (Policy Enforcement Points) for access management into network access gateways is, from ... and if we look at the risks around privileged accounts especially for network equipment ... policy management based on XACML, tightly integrated with the provisioning and PxM (Privileged ... "whatever - user, identity, access, account" Management), standard auditing ... ? And protect these devices consistently by management tools, PxM with support for ...

Report

Product Report: Layer 7 Technologies - 70627

by Craig Burton

... cb@kuppingercole.com February 2013 Content 1. Management Summary 4 2. Highlights 5 3. Customer Challenges and ... Platform is software that provides integration, management and orchestration between:    Web Services ... for API usage and delegate privileges for monitoring and managing user ... an administrator is required to do in the deployment, operation, management and discontinuation of the each product ... .  Interoperability - Rating interoperability for an API Management technology needs explanation. The key ...

Report

Snapshot: GreenSQL Unified Database Security - 70588

by Alexei Balaganski

... access – helps to solve the privileged accounts problem. Advanced auditing: monitoring ... mechanism. Unified dashboard: single management interface for all functions, providing ... Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ... ), IT Risk Management, Authentication and Authorization ... -On, Federation, User Centric Identity Management, eID cards, Cloud Security ... and Management, and Virtualization. For further ...

Webinar

Controlling the Impacts of Recession on IT Security

... impact on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and ... Information Rights Management. In a quick survey, ... to act on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and ... Information Rights Management. And they ... some of these accounts. Information Rights Management has to become reality. And Data ...

Report

Vendor Report: IBM’s IAM and GRC offerings

by Martin Kuppinger

... Web Single Sign-On, and privileged User Account Management at least for the Unix ... password management in the provisioning and access management solutions and a comprehensive key management ... participation in Open Source projects. Privileged Account Management Partially Provided mainly for Unix ... Attestation; Risk Management; SoD controls; Authorization/Entitlement Management; Role Management). Authorization Policies ... an incomplete offering in the field of Privileged Account Management (PAM), with focus on Unix and ...

Report

Vendor Report: Oracle

by Martin Kuppinger

... for business process management, content management, portals and identity management established in this ... solution for the administration and management of authorisations (entitlements), based on the ... classification and the ensuing differentiated management of access to information. With its ... user-centric identity management technologies. Privileged Account Management No Information Rights Management Yes Oracle ... comparatively few gaps such as PAM (Privileged Account Management) that have to be complemented by ...

Blog

Novell acquires again

by Martin Kuppinger

... where Novell acquired the PAM (Privileged Account Management) product from Fortefi Ltd ... supports Unix/Linux root account management. The area of PAM is become more ... area and customers have to invest.Privileged accounts like root accounts, administrative ... PAM is a part of Identity/Account lifecycle management and thus best integrated within ... the core Identity Management platforms.There might follow other ... step. Novell now supports the management of some privileged accounts, but not of all ...

Blog

The need for a holistic approach to IAM, GRC, DLP, PAM, and IRM

by Martin Kuppinger

... acronym for Privileged Account Management. Some vendors prefer PIM (Privileged Identity Management). These technologies ... try to manage the use of privileged accounts ... . IRM, finally, is Information Rights Management as the business counterpart to Digital Rights ... types.IRM strongly relies on an identity management infrastructure and, in effect, is just a ... interoperability of Microsoft’s Windows Rights Management when the “Geneva” framework finally ...

Combined Session

Using IAM to protect you from Advanced Persistent Threats and Auditors • Plugging "Cloud Identity Leaks" - Should your Business become an Identity Provider?

by Martin Kuppinger, Mark O'Neill, Ramses Gallego

Identity & Access Management has become a lot more than ... while removing attack vectors. Controlling privileged account access can reduce insider ... allows for a more holistic identity management solution for Cloud services.