Search

Page 26 of 498 results

Report

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

by Alexei Balaganski

... Introduction BeyondTrust is a global cyber security company headquartered in Phoenix, Arizona ... able to combine privileged access intelligence with information about endpoint ... become a mandatory component for every security infrastructure. BeyondTrust’s approach here ... -grained analysis. It supports real-time alerting on various suspicious activities ... of 5 The Future of Information Security – Today KuppingerCole supports IT professionals ... Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Leadership Compass: Access Governance - 70735

by Martin Kuppinger

... controls, sometimes complemented by adding real-time monitoring information about information access ... standard access governance tools. Over time a deep integration with Dynamic Authorization ... the Access Governance market. Over time, the venture-financed company has ... Access Intelligence area, but not in the core Access Governance capabilities. Security ... violations and other events in real-time. Overall, the product WhiteOPS is ... document at a later point of time. KuppingerCole – Leadership Compass – Access ...

Report

Leadership Compass: Privilege Management - 71100

by Martin Kuppinger

... the target source supplied in real-time by the Privilege Management Solution ... , ongoing integration with IBM Security’s threat intelligence and discovery capabilities and IBM ... infrastructures and mobile applications. The real-time management of passwords is also ... feature, where you can setup real-time alerts when and if passwords ... systems, session auditing and recording, real-time supervision of sessions, and scheduled ... sign-on and basic automated real-time session analytics. Wallix is one ...

Report

Product Report: Akamai Intelligent Platform - 70874

by Rob Newby

... ● Multiple security features across a massively distributed network ● Protection against hackers in real-time ... protection for internet services, and intelligence led solutions. Non-web-based ... approach to flood-type attacks. Intelligence led solutions are another logical ... a very time consuming and worthy business, of course, but the “intelligence network ... ” is not new to the Security market, indeed ... name this, as Symantec’s Global Intelligence Network is already the longest ...

Report

Leadership Compass: IAM/IAG Suites - 71105

by Martin Kuppinger

... Services - 70785 Executive View: IBM Security Intelligence with Big Data - 70743 Executive ... :        Identity Provisioning Access Governance and Intelligence, User Activitiy Monitoring Access Management ... their significant growth in recent times and their strong partner ecosystem ... vendors, EmpowerID not only delivers a real suite of products but also ... for instance integration with QRadar Security Intelligence capabilities. Thus, they are in ... solution. Clearly, there is no real IAM Suite yet, however SAP ...

Report

Executive View: BalaBit Shell Control Box - 71123

by Alexei Balaganski

... suite called Zorp. Since that time, BalaBit has grown into ... expand into other areas of security intelligence with products like Shell Control ... vendors go further and implement real-time analytics to detect and/ ... additional factors such as username, time of the day, etc.); ... intrusion detection system for further real-time analysis. In the same ... monitored by a second person in real time. Specify which potentially destructive commands ... four eyes authorization enables additional real-time control over their actions. In ...

Report

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

by Matthias Reinwarth

... be adequately maintained regarding their security, identity administration and governance. ... Traditional, perimeter-based security is getting less important. ... highly granular access controls and real-time analytics for external users’ ... entitlements.  Identity Governance and Intelligence – Saviynt provides the required functionality ... of 7 The Future of Information Security – Today KuppingerCole supports IT ... as well as Software Security, System and Network Security, Security Monitoring, Analytics & ...

Report

Leadership Compass: Dynamic Authorization Management - 70966

by Graham Williamson

... can now be made in real-time by a centrally-managed decision ... can now be made in real-time by a centrally-managed decision ... their networks. Routers can, in real-time, validate a complex rule to ... resource, the system will, in real-time, check the user’s identity ... threat protection, QRadar for security intelligence and Trusteer for fraud and ... Strengths/Opportunities Robust architecture with real-time lookup of identity credentials with ... deployment as network devices providing real time access control on connectors ...

Report

Product Report: CA GovernanceMinder™ - 70837

by Martin Kuppinger

... controls, sometimes complemented by adding real-time monitoring information about information access ... analytical capabilities based on Business Intelligence technology. Access Request Management as ... to rate products: ● ● Security Functionality ● ● Integration Interoperability ● Usability Security – security is measured by ... the degree of security within the product. Information Security ... has a consistent internal security model. The security features provided by the ...

Report

Leadership Compass: Identity Provisioning - 70151

by Martin Kuppinger

... to rate products:  Security  Interoperability  Functionality  Usability  Integration Security – security is measured by ... serve enduser requests almost in real time from a small web interface, this ... improving the integrated Access Governance/Intelligence functionality. Strengths/Opportunities Very mature ... concepts of overall governance and security. Security Functionality Integration Interoperability Usability strong ...