Search

Page 99 of 1000 results

Report

Leadership Compass: Identity Provisioning - 70151

by Martin Kuppinger

... Fischer Automated Role & Account Management 27 11.10 ForgeRock OpenIDM 28 11.11 Hitachi ID Management Suite 29 11.12 IBM Security ... to add new users, grant privileges, enforces policies etc. was exploding ... Table 22: Hitachi ID Management Suite rating. Overall, Hitachi ID Management Suite is an interesting ... for creating custom Identity Management solutions like management or request interfaces to ... 49 11.21 SAP NetWeaver Identity Management SAP NetWeaver Identity Management is the Identity Provisioning product ...

Press Release

European Identity Conference (EIC) expands further

... (Identity and Access Management) and GRC (Governance, Risk Management and Compliance). At the ... (Identity and Access Management) and GRC (Governance, Risk Management and Compliance). At the ... changes this will require in service management. A roadmap is additionally needed for managing ... strategy, a comprehensive approach to governance, risk management, and compliance without artificially separating ... such as Enterprise Single Sign-On and Privileged Access Management (PAM).Optimization is key to achieving ...

Report

Advisory Note: Cloud Provider Assurance - 70586

by Mike Small

... the Cloud needs to assure that privileged access by the CSP is properly controlled ... shown under service level management and security management. The process works with ... Control  Information Security Incident Management  Business Continuity Management 9 https://www.isaca.org ... -cycle management Technical compliance and vulnerability management Change management Data isolation Log management and ... are broken into five groups: • Management – – – – – – – – – • Data Governance – – – – – – • Access Standards ...

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

by Martin Kuppinger

... new features is some support for Privileged Account Management (PAM). That’s interesting. I’ve blogged ... -time passwords for the use of privileged accounts and re-setting these passwords ... PAM (or PIM or PUM): I prefer Privileged Account Management because it is about accounts which are ...

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

by Martin Kuppinger

... new features is some support for Privileged Account Management (PAM). That's interesting. I've blogged ... -time passwords for the use of privileged accounts and re-setting these passwords ... PAM (or PIM or PUM): I prefer Privileged Account Management because it is about accounts which are ...

Report

Vendor Report: Atos DirX - 70621

by Martin Kuppinger

... Scenario Understanding IT Service and Security Management - 70173 August 2, 2011 KuppingerCole ... Bereich Identity, Security and Risk Management angesiedelt. Im Gegensatz zur generellen ... stärkeren Ausrichtung auf Access Request Management und der Bereitstellung von ... Management Identity Federation, Usercentric Identity Management Privileged Account Management Information Rights Management Platform-specific Access Management ... Standards im Bereich Identity und Access Management werden unterstützt. Seite 21 von 26 ...

Report

Vendor Report: Beta Systems - 70150

by Martin Kuppinger

... Ausrichtung auf Access Request Management und der Bereitstellung ... Management von Benutzerkonten unterstützt. Nein Ja Nein Teilweise Identity Federation, Usercentric Identity Management Privileged ... Account Management Nein Information Rights Management Platform-specific ... SAPspezifische Funktionalität) Enterprise Role Management Beta SystemsProdukte Teilweise Kommentare Es ... optimal miteinander und mit bestehenden Management- und Kontrollsystemen in Unternehmen integrieren ...

Report

Scenario: The Future of Authentication - 70341

by Craig Burton

... to move from here to there? 28 14. Identity Management as a Service (IdMaaS) 29 15. Glossary 30 ... based—for a spectrum of authorization privileges to the same data and resources ... Authentication Report No.: 70341 Page 28 of 32 14. Identity Management as a Service (IdMaaS) Thus the architecture ... Provisioning, proofing, automation Authentication, session management, SSO, federation Authorization, consent, ... authority: An organization responsible for the management of an administrative domain. Administrative domain: ...

Report

Trend Report: Top Trends 2012-2013 - 70516

by Martin Kuppinger

... Prevention (DLP) and secure device management. KuppingerCole – Trend Report – ... 5 3. GRC 6 4. Identity and Access Management 7 5. Mobile Computing 8 KuppingerCole – Trend ... to become more agile in adopting management solutions for their increasingly heterogeneous ... the horizon.  PxM (Privileged Access/User/Identity Management) on the other hand ... controlled by Access Governance and Service Management tools as outlined in our report ... Identity and Access Management (IAM), Governance, Risk Management and Compliance ( ...

Report

Scenario: Understanding Cloud Computing - 70157

by Martin Kuppinger

... Cloud needs to assure that privileged access by the Cloud Service ... IT Service and Security Management – 70173 Fig.10: Elements of IT Service Management KuppingerCole – Scenario – ... a key challenge for IT service management.  Service Level Management (SLM): a methodology for ensuring ... managing IT services; unlike Business Service Management, IT Service Management focuses on IT services at all layers ... of services such as application infrastructure or IT management services. SaaS: Software as a Service; describes ...