Search

Page 27 of 472 results

Report

Product Report: iT-CUBE agileSI - 70349

by Martin Kuppinger

... standards Continuous, near real-time analytics for SAP environments security Configuration might become ... . This use-case is defined by iT-CUBE as “Security Intelligence for SAP customers”. It is, in fact, about ... to add new capabilities for security analytics, both real-time as well as historical, to SAP environments ... . SIEM tools aggregate security information out of logs and real-time events from different ... – with SIEM tools: • Advanced security analytics and real-time analysis is required for any ...

Report

Product Report: SAP Business Objects GRC Access Control

by Sachar Paulus

... on different levels (management, administrator etc.) security “What-if” scenarios (simulation risk analysis ... been integrated into the Business Intelligence offering as a result of the Business Objects ... Control is a suite of applications that implement security controls for the authorizations in SAP ... if there are appropriate mitigating controls. A security audit is so to say permanent by definition. If one ... application. Requestors or approvers can check in real time if a request poses a risk of conflicting roles ...

Report

Executive View: Omada Identity Suite - 70828

by Martin Kuppinger

... advanced analytical capabilities based on Business Intelligence technology. ● Access Request Management ... to the standard data model real time or via batch. The common ... legal issues related to information security and technology, KuppingerCole do not ... Page 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals with ... company for identity focused information security, both in classical and in ... -neutral view on these information security market segments, covering all relevant ...

Report

Executive View: Gigya Identity Enterprise - 70299

by John Tolbert

... cyber threat and compromised credential intelligence to reduce misuse of accounts and ... Protected Identity (NPI), which provides real-time analysis and alerting on in-network credential ... 70299 Page 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals with ... headquartered in Europe focusing on Information Security and Identity and Access Management ... Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security ...

Report

Executive View: RSA Archer GRC - 70888

by Matthias Reinwarth

... platform. Data collected ranges from real-time information from relevant applicable enterprise ... focus on the above-mentioned Risk Intelligence approach. Instead of focusing on a narrow, compliance ... ’s strong position as a provider of mature enterprise security products and services (including Identity ... within RSA’s overall portfolio of security solutions. RSA Security Division as part of the EMC ... No.: 70888 Page 5 of 6 The Future of Information Security – Today KuppingerCole supports IT professionals with ...

Report

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

by Graham Williamson

... connection. These data flows can be real-time i.e. transmission on a demand basis, batch ... heritage as a gateway provider facilitates improved security, connection management as well as compliance and ... functions. Axway 5 Suite’s operational intelligence (OI) capability extends the dashboard functionality ...          CA SiteMinder (direct and through SOA Security Manager) IBM Tivoli Access Manager ... 71184 Page 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals with ...

Report

Executive View: Oracle Big Data Solutions - 70993

by Mike Small

... Information Discovery 6 2.9 Oracle Advanced Analytics 6 2.10 Security 6 3 Strengths and Challenges 7 4 Copyright 8 ... scalable processing rather than to enforce security controls. In addition: the provenance of ... providing realtime analytics for business intelligence applications accessing large data warehouses ... the database to manage real-time predictive models and results. 2.10 Security While Hadoop provides ... 70993 Page 8 of 9 The Future of Information Security – Today KuppingerCole supports IT professionals with ...

Report

Executive View: RSA Aveksa Identity Management & Governance - 70873

by Martin Kuppinger

... changes if required. Access Analytics and Intelligence: Analytical capabilities to understand the current ... of access controls, sometimes complemented by adding real-time monitoring information about information access ... discuss legal issues related to information security and technology, KuppingerCole do not provide ... No.: 70873 Page 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals with ... company for identity focused information security, both in classical and in cloud ...

Leadership Compass

Identity Governance & Administration 2021

by Richard Hill

... market, which preceded Security Identity Governance & Intelligence (ISIGI). At the time, IBM has integrated ... the capability to monitor user activity in real-time. Micro Focus is also capable of ... and role outlier detection. Also, real-time SoD checks in which a third- ... that enables real-time SoD checking. The solutions also provide intelligence to the ... Identity Risk & Analytics solution provide real-time graphics of user data. The ... to detect access risks based on real-time tracking of provisioning and user access ...

Video

Zero Trust Means Zero Blind Spots

by Alexei Balaganski

... start using them as a real useful reasonable guidelines implemented practical ... Those policies are evaluated to the real time. You're in a context which ... implement security without monitoring and visibility for multiple times, but ... it's a identity management or a seam or threat intelligence feeds or anything else, the compliance ... , please. Hi everyone. So as Alexei mentioned, I'm a real title and I am CTO for guardian ... unsegmented network is sort of in numbers. So this is a real customer scenario from one of our ...