Search

Page 24 of 472 results

Blog

Cybersecurity of Tomorrow: Delivered Entirely From the Cloud

by Alexei Balaganski

... quite some time. An increasingly popular replacement to traditional on-premises security solutions, ... for security event correlation, behavior analysis and threat intelligence. However ... defense in a multilayered “defense in depth” security infrastructure, providing visibility into all ... real-time – some solutions may only focus on web traffic, others only on e-mail security ... time being. If you were still reluctant to jump the cloud security ... bandwagon until recently, now is the best time to give ...

Executive View

Senrio Insight

by Alexei Balaganski

... in 2015 by a team of veteran security researchers and former intelligence officers, the company is focused ... trigger real-time alerts to mitigate potential threats. A number of integrations with third party security ... external threat intelligence data as well, which allows detecting communications (both real-time and ... manufacturers and developers, Senrio Trace is a real-time security monitoring solution that can be directly ... insight into IoT device behavior in real-time and at scale. Senrio Senrio Insight ...

Report

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266

by Martin Smith

... simple and convenient. At the same time, compliance with new and demanding ... and services like threat intelligence and managed security services. On the other ... in V.2.0—SMS and voice messages. Time-based one-time passwords (OATH TOTP) is supported ... Engine and MFA components. Based on real-time assessment of multiple risk factors consumers ... can be prompted to provide a one-time password in addition to their regular password ... media and telecom customers Integrated real-time risk analysis Wide selection of OTP ...

Report

Leadership Compass: Access Governance - 70948

by Martin Kuppinger

... Identity Management Suite/Garancy Access Intelligence Manager 30 11.5 Brainwave Identity GRC 31 11.6 ... Governance. Whitebox Security supports a well thought-out approach on real time access risk ... if required. Access Analytics and Intelligence: Analytical capabilities to facilitate understanding ... significant progress in security management for Garancy Access Intelligence Manager. For environments ... by the additional Access Intelligence capabilities. Security Functionality Integration Interoperability Usability ...

Blog

Need for Standards for Consumable Risk Engine Inputs

by John Tolbert

... . Many of these new tools bring real value, in that they do in fact make ... security ecosystem. On the supply side there are various intelligence services. The forms of intelligence ... the primary consumers of these types of intelligence. Conceptually, risk-adaptive authentication and ... ” of intelligence which can be processed by the bank’s authentication and authorization solutions at transaction time ... . KuppingerCole believes that standardization of a few intelligence attributes as well as normalization of values may ...

Whitepaper

IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud.

by Richard Hill

... doing with it, while applying consistent security controls regardless of whether it’s in ... when, etc.) User device information (security health e.g. OS type, browsers, plugins ... Audit logs, including SIEM Other security policy information (e.g. certifications or re- ... to regulations and compliance, is used Intelligence Intelligence gives the ability to make access ... mis-configurations, while the preventive security capability allows to halt or ... highly granular access controls and real-time analytics for external users’ ...

Executive View

CyberArk Privileged Session Manager for Cloud

by Anmol Singh

... one of the most sought-after security capabilities by security leaders to gain visibility and ... Manager capabilities to deliver a unified set of security controls across an organization’s hybrid environment ... environment, thereby enhancing administrative efficiency, security and user productivity. CyberArk Privileged ... Threat Analytics module provides near real-time detection and alerting of suspicious privileged ... for meaningful and actionable threat intelligence. Therefore, it may not be appropriate to compare ...

Report

Executive View: Deep Secure Content Threat Removal Platform - 71311

by Martin Kuppinger

... unknown, and it takes additional time to protect against attacks once ... is indicated as phase 2 in figure 1, the time where attacks are run but ... approaches is available, during which time other less skilled attackers can ... the emerging field of “Cognitive Security”, where AI (Artificial Intelligence) and KuppingerCole Executive View ... isolation approach, the focus is on non-real-time delivery channels such as file transfer ... data decomposition technology ensures real-time transparent protection from unknown ...

Executive View

Checkmarx Software Exposure Platform

by Alexei Balaganski

... programming languages (over 25 at the time of this review), operating systems and ... scanning, which can reduce analysis times up to 80% by only working on modified parts ... application security testing which is known for relatively long scan times but ... because known vulnerabilities are detected in real time and thus have no impact on ... existing test cycle times. CxIAST is a solution targeted specifically ... approaches, as well as integrating security and compliance intelligence from 3^rd^ party open source ...

Report

Leadership Compass: Secure Information Sharing - 72014

by Graham Williamson

... categories to rate products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured by the degree ... storage of documents facilitates sharing with real-time updates. As soon as a modification is made to a document ... in critical infrastructure protection and defense intelligence environments. Their Trustworthy Technology solutions ... Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring ...