Search

Page 100 of 1000 results

Report

Vendor Report: SAP

by Martin Kuppinger

... in access controls Enterprise role management Management of super user privileges Segregation of Duties controls (SoD ... BusinessObjects Risk Management: An Enterprise Risk Management solution which supports the management of the risk ... in the future. Privileged Account Management Partially Support for SAP superuser management is included in SAP ... risk management into an enterprise risk management (today implemented as SAP BusinessObjects Risk Management) and ...

Blog

Why is IBM TIM 5.1 just a minor release?

by Martin Kuppinger

... Management, SoD support, attestation and, last not least, support for some Privileged ... Account Management (or Privileged Identity Management, the term IBM is using ...

Blog

What you could do with stolen data - a squib

by Martin Kuppinger

... employees of that IT company had some privileged accounts with access to massive amounts ... concept for differentiated access controls, no privileged access management, no data leakage prevention, nothing ...

Insight

OT, ICS, SCADA

... is the application of the Principle of Least Privilege. This is sometimes not supported in legacy ... OT environments suffer from legacy management practices that frustrate the application ... OT system covers multiple locations e.g. water management with multiple pumping stations, or if it ... basic: e.g. ensuring no email access or remote management software is installed, to the sophisticated: e.g. advanced ... on an electricity grid, or a building information system management. Most Industrial Control Systems are ...

Blog

Quest acquires Bitkoo – another step for Quest to play with the big boys

by Martin Kuppinger

... ), and e-DMZ (Privileged User/Account Management) are just some ... a vendor in the  Dynamic Authorization Management space (http://jacksonshaw.blogspot.com ... surprise given that Dynamic Authorization Management is one of the most interesting ... IAM market. Dynamic Authorization Management is about externalizing authorization decisions ... of different applications, Dynamic Authorization Management systems build the backend for ... authentication), authorization (Dynamic Authorization Management), and auditing/alerting. The ...

Report

Vendor Report: Oracle

by Martin Kuppinger

... ergänzende Produkte zugeordnet. Dazu zählen Management-Lösungen für die Datenbanken, Datensicherheit ... für das Business Process Management, das Content Management, Portale und das Identity ... spezielle Lizenzierungsvarianten (z.B. Oracle Identity & Access Management Suite) und einige Add-Ons ... User Centric Identity Managements. Privileged Account Management Nein Information Rights Management Ja Oracle zählt auch ... es vergleichsweise wenige Lücken wie PAM (Privileged Account Management) gibt, die noch durch ...

Report

Vendor Report: Symplified - 70121

by Dave Kearns

... might be considered “traditional“ Identity Management services (authentication, authorization, single sign ... an on-demand unified management platform, combining comprehensive management with defense-in-depth security ... - including Web vulnerability management, data protection and compliance management -were to be designed ... KeyChain™), provided access management, authentication, user management and provisioning,, federated ... and user access privileges throughout the entire identity management lifecycle – from ...

Report

Vendor Report: Evidian

by Martin Kuppinger

... Suite supports role management, identity management, and access management. Service Management: With its OpenMaster ... Services, Virtual Directory Services, and Privileged Account Management which are, at that point ... : Evidian Management centric approaches. Privileged Account Management GRC No Platform-specific Partially Access Management Evidian ... IAM Suite Role Management tools, including policy management, authorization management (being amongst the ...

Report

Product Report: Evidian Identity & Access Manager 9 - 70130

by Martin Kuppinger

... Access Governance provides governance and management of access controls in IT systems. As a result, ... Analysis • Access Request Management • Access Risk Management • Role Management • SoD Controls Evidian ... accounts, access rights, and administrative privileges into easily understandable business terms ... it on IT departments to provide business-oriented access management, so it is very important that those on ... supervision. Fully integrated recertification campaign management would be a logical extension. Evidian ...

Webinar

Sicherheitsanalysen und Sicherheitsmanagement - schnell, automatisiert, intelligent.

... geworden. Security Information and Event Management (SIEM) stellt Ihnen wirksame Mittel ... zu. SIEM (Security Information and Event Management) verdient dabei als Kernelement einer ... (Anomaly Detection) Integration des Identity Managements in die SIEM-Auswertung. Wer hat ... erweiterter Audit-Mechanismen in die Auswertung (Privileged User Monitoring & Change Detection) Zunächst ...