Search

Page 98 of 1000 results

Report

Leadership Compass: CIAM Platforms - 70305

by John Tolbert

... Research Advisory Note: Identity & Access Management/Governance Blueprint - 70839 Advisory Note ... - 70962 Leadership Compass: Privilege Management - 70960 Leadership Compass: Access Management and Federation - 70790 ... 70157 Scenario: Understanding Identity and Access Management - 70129 Vendor Report: SecureAuth ... Identity Portfolio comprises Identity Management and Governance, Privileged Access Management, Single Sign-On, ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for ...

Report

Vendor Report: TESIS SYSware

by Martin Kuppinger

... ’s focus is on password, privileged account and access management solutions for Windows file ... ’s focus is on password, privileged account and access management solutions for Windows file ... -centric Identity Management Privileged Account Management Information Rights Management Platform-specific Access Management No Generic IAM ... potential on the market, e.g. privileged account management (PAM) and access management on file servers. It ...

Report

Product Report: Oracle Database Firewall - 70339

by Martin Kuppinger

... March 2012 Content 1. 2. 3. 4. 5. Management Summary Highlights Market Segment Product ... available, enabling simple policy management and efficient handling of ... few vendors of PxM (Privileged Access/Account/User¬/Identity Management) tools. Some of ... this specific market. Access control, which includes privileged access management, advanced security ... and performance. 4.3 Policy management Oracle Database Firewall uses policies ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance ( ...

Report

Vendor Report: Quest Software

by Martin Kuppinger

... tools Privilege Manager for Unix to control the use of privileged accounts ... Quick Connect Password Manager InSync Privilege Manager for Unix InTrust Reporter ... are facing today in Identity Management, Access Management, and Compliance. 4.1 Products We’ve ... tools Privilege Manager for Unix to control the use of privileged accounts ... scenario to also include Java Privileged Account Management Partially Only forUnix and ... Directory Services and improvements in Privileged Account Management are amongst the most ...

Report

Product Report: Oracle ESSO - 70581

by Sebastian Rohr

... of depth and maturity regarding Privileged Account Management KuppingerCole is positive regarding ... integration between OAM and ESSO. Privileged Account Management is a candidate already identified ... of 11gR2. Integration between Privileged Account Management and ESSO will be released ... current lack of integration with Privilege Management, a module which is new in ... Identity and Access Management, the combined disciplines of  Identity Management and  Access Management. Identity Management The ...

Report

Advisory Note: Big Data Security, Governance, Stewardship - 71017

by Mike Small

... through abuse of privilege by those with access to the data ... is that of abuse of privilege by an insider. An ... insider with administrative privileges may be able to make ... access and tamper with the Big Data. 4.2 Poor Data Management Good data management ... , changes are managed and privileged access is restricted. Data flowing ... compliance against agreed objectives. Information Management Management plans, builds, runs and ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ...

Report

Advisory Note: EIC 2014: Trends and Hot Topics - 71127

by Martin Kuppinger

... of attention: IAM (Identity and Access Management) basics. This includes understanding ... -On - 70962 ● Leadership Compass: Privilege Management - 70960 KuppingerCole Advisory Note EIC ... Application Security Infrastructures Managing the access of users from a business ... ● Technology Report: XACML – Extensible Access Control Markup Language KuppingerCole Advisory ... example in the usage of privileged user accounts. The future ... like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC ...

Report

Executive View: Nexis contROLE - 71502

by Matthias Reinwarth

... on to existing Identity and Access Management infrastructures. KuppingerCole Report EXECUTIVE ... on to existing Identity and Access Management infrastructures. by Matthias Reinwarth ... least privilege requires that only the minimum set of access rights ... violations, undesired critical combinations of privileged assignments, and little or never ... Information Security and Identity and Access Management (IAM). KuppingerCole stands for ... relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools ...

Report

Product Report: CrossIdeas IDEAS - 70620

by Martin Kuppinger

... anymore. Fig. 2: Identity and Access Management and Access Governance solutions have to take ... context of Identity Access Management, Access Governance, and Dynamic Authorization Management, there are some ... don’t see any vendors offering PAM (Privileged Access Management) solutions of their own that ... activity-based access management, role management and SoD (Segregation of Duties) management. The product ... international markets for Identity & Access Management and Access Governance. Another important point to ...

Report

Vendor Report: Novell - Identity and Security

by Martin Kuppinger

... greater business orientation. Comparatively weak PAM solution. Despite strong technical platform ... substantial improvements. Novell Privileged User Manager: Allows management of privileged user accounts in ... yes Novell SecureLogin web access management yes Novell Access Manager Strong authentication and ... management yes Novell Access Manager, Novell Cloud Security Service privileged account management limited Novell Privileged ... oriented layers and dashboards. Central Access Management: The functionality offered by ...