Search

Page 21 of 472 results

Executive View

Microsoft Azure Blockchain Services

by Ivan Niccolai

... summer of 2015, Ethereum’s momentum is real and has a vibrant community of developers ... analytics, machine-learning algorithms, security features, and developer tools. ... or anything else for which near real-time information is required to support decision ... maintaining transaction and identity security through a unique democratic ... and technical requirements for security, performance, and operational processes ... #71,033 Advisory Note: Real Time Security Intelligence #71,152 Advisory Note: Security and the Internet ...

Executive View

ERPScan Smart Cybersecurity Platform for SAP

by Matthias Reinwarth

... development of a dedicated market segment of SAP security products, as documented in the “Leadership Compass ... the only) aspect of SAP security. Application platform security: Just like any other ... of Duties conflicts. Application platform security - The vulnerability management module allows ... like an external attacker would do); whitebox security assessments (scanning for system misconfiguration ... scan projects can be provided to existing Real-time Security Intelligence (RTSI), SIEM systems, to IT GRC or ...

Blog

The need for an "integrated identity" within hybrid cloud infrastructures

by Matthias Reinwarth

... administration, the operation and the security aspects of modern IT infrastructures. For ... traditional access governance and access intelligence tasks. Providers of traditional, on premises IAM ... including a suitable identity, access and security approach. The implementation of a concept ... "integrated identity". For the access intelligence and access governance side the ... be evaluated by means of an existing Access Intelligence, an existing Real-Time Security Intelligence (RTSI) solution or by deploying the AWS ...

Blog

Antivirus is dead, so what?

by Alexei Balaganski

... viable approach for developing efficient IT security is a multi-layered design ... perimeter), database and application security, identity management and information ... this evolution is the so-called Real-time Security Intelligence, where security solutions are becoming a mix of ... analytics and external sources of real-time security information, such as zero day ... coordinated, another aspect of a security application suite becomes more important ... security solutions, they are still relevant and won’t go away any time ...

Blog

The role of Adaptive Authentication in Consumer Identity Management

by Ivan Niccolai

... be at the forefront. While usability and security are typically seen as objective in conflict ... time now being used by almost all online banking services, offers better security ... , coupled with a holistic approach to security and risk management can leverage ... experience as well as ensuring appropriate security controls are in place for high ... in line with consumer demand. As with security, performance tuning is a process, not a ... centric IAM becomes a key component of a Real-Time Security Intelligence strategy.

Blog

The New Meaning of “Hacking your TV”

by Alexei Balaganski

... struggle between hackers and corporate security teams is fundamentally asymmetrical. Regardless of its ... from protecting the perimeter towards real-time security intelligence and early detection of insider threats ... of duties principle isn’t a part of their security strategy). And, of course, complete disruption ... consequences. For a quick overview of top 10 security mistakes with potentially grave consequences ... appropriately titled KuppingerCole’s Leadership Brief: 10 Security Mistakes That Every CISO Must ...

Webinar

Privileged User Monitoring as Key Element of Counter-Measures

... approaches fit into the concept of Real Time Security Intelligence and into an overall Privilege Management ...

Keynote

The new role of the CI(S)O 2020: Enable disruptive innovation

by Martin Kuppinger

... are the ever-increasing challenges of security, privacy, data protection, and last ... to the underlying Information Security, identifying the top security and privacy technologies that ... Management and Advanced Analytics and Real Time Security Intelligence.

Blog

How to identify attacks? Know your enemies – and what they already might do.

by Martin Kuppinger

... your systems with various layers of security. Use anti-malware tools, even ... before. Accounts might be used at unusual times. Users might log in from suspicious ... of things, eventually over a longer period of time, which is typical for a specific form ... to analyze such patterns. Standard SIEM (Security Information and Event Management) tools ... is converging into a new discipline we call Real-Time Security Intelligence (RSI). There is a new report out ...

Report

Business Report: Identity & Security in the Cloud

by Tim Cole

... Security in the Cloud Business Report © Kuppinger Cole + Partner, 2009 Autor: Tim ... Lissabon - Heidelberg Business Report: Identity & Security in the Cloud 3 Nutzeranforderungen an Cloud ... von IAM und IT Security möglich. Konventionelle Security-Ansätze auf der ... beeinträchtigen, verlagert Pandas „Collective Intelligence“-Technologie den Schutz angeblich ... Kunde sofort versteht. In der realen Welt seien alle IT-Anwendungen ... Identity & Access Management sowie IT Security an. www.cloudsecurityalliance.org 7.2 Bücher ...