Search

Page 27 of 498 results

Report

Leadership Compass: Identity Provisioning - 70949

by Martin Kuppinger

... end-user requests almost in real time from a small web interface, this ... what some vendors call Access Intelligence, i.e. advanced analytical capabilities beyond what ... improving the integrated Access Governance/Intelligence functionality, based on a separate offering ... called Garancy Access Intelligence Manager, which is not within ... adding enhanced Access Governance and Intelligence functionality. Support for role management ... formation of an IBM Security Business Unit some time ago, when Tivoli ...

Report

Leadership Compass: Enterprise Key and Certificate Management - 70961

by Rob Newby

... driven by security and compliance needs. Up until recent times, compliance has ... driven by security and compliance needs. Up until recent times, compliance has ... spend a lot of time working out customers’ real needs before guiding them ... for Microsoft SQL Server encryption, real-time full duplex key mirroring and ... , who have spent time and money developing a security background story and go ... encryption, privileged user access control, security intelligence and application-level encryption libraries ...

Report

Product Report: CrossIdeas IDEAS - 70897

by Martin Kuppinger

... Governance, and Identity and Access Intelligence, i.e. advanced analytics. The ... requests of applications in real time. Applications need to ... products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured ... by the degree of security within the product. Information Security ... as weaknesses in security. Known security vulnerabilities and hacks ... IDEAS, the following ratings apply: Security  Functionality  Integration  Interoperability ...

Report

Executive View: Axiomatics Policy Management Suite - 70895

by Graham Williamson

... major query options for a real-time lookup on an identity provider ... Integration with J2EE, Spring Security and Java servlets is supported ... authorization into its identity intelligence tools Relationships are also ... legal issues related to information security and technology, KuppingerCole do ... com The Future of Information Security – Today KuppingerCole supports IT ... neutral view on these information security market segments, covering all ... Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Leadership Compass: Privilege Management - 70960

by Peter Cummings

... to rate products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured by ... banks and large amounts of intelligence related data has been leaked ... the target source supplied in real-time by the Privilege Management Solution ... not be a bad investment of time. Security Functionality Integration Interoperability Usability Positive ... infrastructures and mobile applications. The real-time management of passwords is also ...

Report

Executive View: Gigya Identity Enterprise - 70299

by John Tolbert

... cyber threat and compromised credential intelligence to reduce misuse of accounts ... Protected Identity (NPI), which provides real-time analysis and alerting on in ... legal issues related to information security and technology, KuppingerCole do not ... 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals ... neutral view on the information security market segments, covering all relevant ... as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting ...

Report

Product Report: iT-CUBE agileSI - 70349

by Martin Kuppinger

... SAP security Simple configuration, based on SAP standards Continuous, near real-time analytics ... for SAP environments security Configuration might become ... defined by iT-CUBE as “Security Intelligence for SAP customers”. It is ... add new capabilities for security analytics, both real-time as well as historical ... tools aggregate security information out of logs and real-time events from ... – with SIEM tools: • Advanced security analytics and real-time analysis is required for ...

Report

Executive View: Omada Identity Suite - 70828

by Martin Kuppinger

... analytical capabilities based on Business Intelligence technology. ● Access Request Management ... to the standard data model real time or via batch. The ... issues related to information security and technology, KuppingerCole do ... of 7 The Future of Information Security – Today KuppingerCole supports IT professionals ... for identity focused information security, both in classical and ... view on these information security market segments, covering all ... Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Product Report: SAP Business Objects GRC Access Control

by Sachar Paulus

... Provisioning (CUP), since this enables real-time risk analysis of planned authorization ... different levels (management, administrator etc.) security “What-if” scenarios (simulation risk ... been integrated into the Business Intelligence offering as a result of the ... a suite of applications that implement security controls for the authorizations in ... risk analysis and resolution like security administrators, business process owners and ... generated “out of the box”. Security administrators, business process owners and ...

Report

Executive View: RSA Archer GRC - 70888

by Matthias Reinwarth

... a concept branded as „Risk Intelligence“. This is clearly reflected in ... platform. Data collected ranges from real-time information from relevant applicable enterprise ... ”, “Risk Management”, “Vendor Management”, “Security Operations Management” and several more ... GRC. Solution concepts like „IT & Security Risk“, „Business Resiliency“, „Operational ... ’s overall portfolio of security solutions. RSA Security Division as part of ... of 6 The Future of Information Security – Today KuppingerCole supports IT professionals ...