Search

Page 25 of 472 results

Executive View

Symantec CloudSOC™

by Mike Small

... on 100+ objective security attributes based on Symantec threat intelligence. These attributes and ... in cloud apps and from real-time cloud application traffic to provide ... options, proxy chaining, shared intelligence, unified policy management, using ... Threat Protection including file reputation intelligence, A/V scanning, and sandboxing technologies ... . It uses global intelligence from Symantec’s cyber intelligence network to identify high ... including: biometrics, OTP (One Time Passwords), Two Factor Authentication ...

Report

Advisory Note: From Big Data to Smart Information - 70750

by Mike Small

... 5.5.2 Natural language Processing 11 5.6 Business Intelligence Analytics Tools 11 5.7 Providing Standard Access ... that can be analyzed by Business Intelligence Tools to identify trends and improve ... keep and which to discard. Real time security event data creates a similar challenge ... Smart Information. 5.6 Business Intelligence Analytics Tools Big Data tools ... using Big Data technologies to build intelligence on the networks of cyber- ... incident reports. Then using business intelligence software the data is processed ...

Report

Vendor Report: Courion Corporation - 70920

by Dave Kearns

... adds a new identity and access intelligence layer on top. While speaking with ... what some vendors call Access Intelligence, i.e. advanced analytical capabilities beyond what ... Access Assurance Suite by adding access intelligence and risk assessment capabilities, and ... manor, creating near-real-time graphical profiles of the most critical security risks to information ... Strong analytical capabilities, applying Business Intelligence to Access Management Products relatively easy ...

Report

Leadership Compass: Access Governance - 70735

by Martin Kuppinger

... of access controls, sometimes complemented by adding real-time monitoring information about information access ... physical security solutions and SCADA environments. The latter is an important feature in times where ... Access Intelligence area, but not in the core Access Governance capabilities. Security Functionality ... access violations and other events in real-time. Overall, the product WhiteOPS is more ... Leadership Compass document at a later point of time. KuppingerCole – Leadership Compass – Access Governance ...

Report

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

by Alexei Balaganski

... Together they provide a unified real-time insight and an audit trail for ... their products into an integrated risk intelligence suite, the BeyondInsight IT Risk ... is able to combine privileged access intelligence with information about endpoint and ... real-time alerting on various suspicious activities and can easily prevent such common security ... very light on resources and enables real-time capture of all file system modifications ... statements, the product can provide real-time monitoring and alerting of various ...

Report

Leadership Compass: IAM/IAG Suites - 71105

by Martin Kuppinger

... - 70785 Executive View: IBM Security Intelligence with Big Data - 70743 Executive ...       Identity Provisioning Access Governance and Intelligence, User Activitiy Monitoring Access Management ... based on their significant growth in recent times and their strong partner ecosystem ... EmpowerID not only delivers a real suite of products but also covers ... for instance integration with QRadar Security Intelligence capabilities. Thus, they are in a ... partner solution. Clearly, there is no real IAM Suite yet, however SAP ...

Report

Leadership Compass: Privilege Management - 71100

by Martin Kuppinger

... for the target source supplied in real-time by the Privilege Management Solution, ... ongoing integration with IBM Security’s threat intelligence and discovery capabilities and IBM ... infrastructures and mobile applications. The real-time management of passwords is also a nice ... feature, where you can setup real-time alerts when and if passwords ... systems, session auditing and recording, real-time supervision of sessions, and scheduled ... single sign-on and basic automated real-time session analytics. Wallix is one of ...

Report

Product Report: Akamai Intelligent Platform - 70874

by Rob Newby

... Multiple security features across a massively distributed network ● Protection against hackers in real-time ● ... approach to flood-type attacks. Intelligence led solutions are another logical ... will come immediately with the Intelligence Network remains to be seen. ... a very time consuming and worthy business, of course, but the “intelligence network” is ... not new to the Security market, indeed Akamai ... name this, as Symantec’s Global Intelligence Network is already the longest ...

Report

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

by Matthias Reinwarth

... to be adequately maintained regarding their security, identity administration and governance. Traditional ... entitlements.  Identity Governance and Intelligence – Saviynt provides the required functionality ... current access data to allow for real-time analytics to implement preventive controls ... 71506 Page 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals with ... Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security ...

Executive View

BeyondTrust PowerBroker for Unix & Linux

by Martin Kuppinger

... they also need to constantly improve security, to have the right counter measures ... strategic acquisitions, including eEye Digital Security, Likewise and Blackbird Group. ... their products into an integrated risk intelligence suite, the BeyondInsight IT Risk ... BeyondTrust can combine privileged access intelligence with information about endpoint and ... can be used for forensics, for real-time session control, and for the ... information against vulnerability data and security intelligence from external sources. Thus, ...