Search

Page 26 of 472 results

Report

Product Report: CA GovernanceMinder™ - 70837

by Martin Kuppinger

... of access controls, sometimes complemented by adding real-time monitoring information about information access ... advanced analytical capabilities based on Business Intelligence technology. Access Request Management as the ... categories to rate products: ● ● Security Functionality ● ● Integration Interoperability ● Usability Security – security is measured by the degree ... of security within the product. Information Security is a key ...

Report

Leadership Compass: Identity Provisioning - 70949

by Martin Kuppinger

... serve end-user requests almost in real time from a small web interface, this ... what some vendors call Access Intelligence, i.e. advanced analytical capabilities beyond ... improving the integrated Access Governance/Intelligence functionality, based on a separate ... offering called Garancy Access Intelligence Manager, which is not within the ... adding enhanced Access Governance and Intelligence functionality. Support for role ... the formation of an IBM Security Business Unit some time ago, when Tivoli products ...

Report

Leadership Compass: Identity Provisioning - 70151

by Martin Kuppinger

... to serve enduser requests almost in real time from a small web interface, this ... clearly on a configuration approach providing lower time-to-value compared to more complex solutions ... improving the integrated Access Governance/Intelligence functionality. Strengths/Opportunities Very ... decisions from applications. Over time, strong role management and ... lack of real multi-tenancy support. On the other hand, IBM Security Identity ... but could become cumbersome over time. KuppingerCole – Leadership Compass – Identity ...

Report

Leadership Compass: Dynamic Authorization Management - 70966

by Graham Williamson

... applications can now be made in real-time by a centrally-managed decision point, ... of their networks. Routers can, in real-time, validate a complex rule to permit or ... resource, the system will, in real-time, check the user’s identity provider ... threat protection, QRadar for security intelligence and Trusteer for fraud and ... Strengths/Opportunities Robust architecture with real-time lookup of identity credentials with no ... deployment as network devices providing real time access control on connectors between ...

Report

Leadership Compass: Enterprise Key and Certificate Management - 70961

by Rob Newby

... are driven by security and compliance needs. Up until recent times, compliance has been ... who spend a lot of time working out customers’ real needs before guiding them ... for Microsoft SQL Server encryption, real-time full duplex key mirroring and ... spent time and money developing a security background story and go to market strategy. Security Functionality ... encryption, privileged user access control, security intelligence and application-level encryption libraries ...

Report

Product Report: CrossIdeas IDEAS - 70897

by Martin Kuppinger

... Governance, and Identity and Access Intelligence, i.e. advanced analytics. The product’s main ... engine answers authorization requests of applications in real time. Applications need to be built so as to externalize their ... categories to rate products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured by the degree ... of security within the product. Information Security is a key ...

Webinar

Access Governance for today’s agile, connected businesses

... and Access Governance needs to be responsive to real time security information – for example supporting immediate ... -aware approaches Extending IAM by real time cyber threat intelligence In the first part of this ... , Strategy and Product Management, IBM Security Systems, will describe how IBM ... understands and provides security for this new ABC, by supporting ... processes and by integrating IAM with real-time cyber threat intelligence.

Report

Executive View: BalaBit Shell Control Box - 71123

by Alexei Balaganski

... to expand into other areas of security intelligence with products like Shell Control ... Some vendors go further and implement real-time analytics to detect and/or prevent ... as additional factors such as username, time of the day, etc.); detecting suspicious ... an intrusion detection system for further real-time analysis. In the same way, SCB ... and monitored by a second person in real time. Specify which potentially destructive commands ... four eyes authorization enables additional real-time control over their actions. In ...

Report

Executive View: Axiomatics Policy Management Suite - 70895

by Graham Williamson

... and applications can now be made in real-time by a centrally-managed “decision point”, ... by raising the level of information security to new heights. With a single ... dynamic authorization into its identity intelligence tools Relationships are also maintained ... legal issues related to information security and technology, KuppingerCole do not ... kuppingercole.com The Future of Information Security – Today KuppingerCole supports IT professionals ... company for identity focused information security, both in classical and in ...

Report

Leadership Compass: Privilege Management - 70960

by Peter Cummings

... to rate products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured by the degree ... Swiss banks and large amounts of intelligence related data has been leaked ... for the target source supplied in real-time by the Privilege Management Solution, thus ... progress would not be a bad investment of time. Security Functionality Integration Interoperability Usability Positive ... infrastructures and mobile applications. The real-time management of passwords is also a nice ...