Search

Page 37 of 472 results

Leadership Compass

Infrastructure as a Service – Global Providers

by Mike Small

... of availability and improved response times where services are consumed across ... real business benefits. These include AWS Nitro technology that increases infrastructure security ... services while at the same time remaining compliant with laws and ... range of development services including Artificial Intelligence / Machine Learning, and SaaS ... control code. In addition, it uses artificial intelligence and machine learning technologies to protect ... This allows transfer ownership at any time based on an open and portable ...

Whitepaper

Governance for all data: Get a grip on unstructured data

by Martin Kuppinger

... while improving the risk and security posture of the enterprise. Highlights ... management tools do. Another functional capability is real-time monitoring of the activities on data is ... acquiring the technology from Whitebox Security in 2015, including the integration ... gap in their IGA and security infrastructure. Action Plan for ... such as regulatory compliance risks or security risks to sensitive data and other ... 70849 Leadership Compass: Access Governance & Intelligence - 71145 Leadership Compass: Identity Provisioning ...

Executive View

One Identity Safeguard Suite

by Paul Fisher

... the digital workplace, DevOps, containers, security automation and the Internet of Things ... pose a significant threat to the overall security posture of an organization because of their ... more sophisticated making them robust security management tools in themselves. While ... Analytics tracks user activity in real-time without recourse to predefined correlation ... first time or replace an existing solution. In addition, Unix and Windows security and ... 71147 Leadership Compass: Access Governance & Intelligence - 71145

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR)

by John Tolbert

... -jackers effectively steal CPU time and energy from the devices ... in a central secure location for real-time and later analysis. EDR systems ... also performs evaluation of threat intelligence information, event correlation, interactive querying ... malware analysis and threat intelligence Interoperability with other security tools at other layers ... and close a perceived gap in the security architecture. If your organization is in an ... of malware analysis and threat intelligence Interoperability with SIEM solutions and ...

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.2

by Richard Hill

... the ability to withdraw consent at any time. Beyond the user’s right to ... Engine and MFA components. Based on a real-time assessment of multiple risk factors consumers ... can be prompted to provide a one-time password in addition to their regular password ... Engine leverages threat intelligence from within NRI Secure’s managed security services network ... a variety of user-behavior and threat-intelligence factors. Also appealing is that the ... third party fraud or threat intelligence. MFA and the Risk Engine ...

Whitepaper

Overcoming PSD2 Challenges with Onegini Connect

by Richard Hill

... the financial sector, increase transactional security, and improve customer experiences. ... service businesses, as well as new security technologies. PSD2 will build on ... Consumer Identity Management and Mobile Security capabilities; supporting on-premises or in ... party Marketo and Salesforce business intelligence and marketing automation tools. ... accounting system, promoting updates in real-time. wp79058_20180919.png Bizcuit already ... PSD2 security requirements. This not only helps the organizations accelerate time ...

Executive View

CipherCloud CASB+

by Mike Small

... as well as policy-based data security controls such as encryption, tokenization ... of cloud applications. Its risk intelligence team continuously categorizes and analyses ... accurately spot anomalies and potential security threats and destination of IP ... accurately spot anomalies and potential security threats. It supplements the logs ... lost or stolen, keys can be revoked in real-time to prevent unauthorized users from accessing ... 71124 Leadership Compass: Cloud Access Security Brokers - 72534 Leadership Brief: ...

Executive View

Thycotic Privilege Manager

by Anmol Singh

... such as digital workplace, DevOps, security automation and the Internet of ... pose significant threat to the overall security posture of an organization because of ... privilege management. A least privilege security model for endpoints requires the ... . Request workflow management allows security teams and application owners to ... deny execution of grey-listed applications in real time. This mobile application is included free ... alerting as well as other threat intelligence databases. Thycotic offers a modernized user ...

Executive View

Deep Secure Content Threat Removal Platform

by Martin Kuppinger

... unknown, and it takes additional time to protect against attacks once they ... what is indicated as phase 2 in figure 1, the time where attacks are run but ... traditional approaches is available, during which time other less skilled attackers can ... the emerging field of “Cognitive Security”, where AI (Artificial Intelligence) and other advanced technologies ... useful business information, i.e. the real content, from the data and ... isolation approach, the focus is on non-real-time delivery channels such as file transfer ...

Leadership Brief

Defending Against Ransomware

by John Tolbert

... protect against ransomware, the following security products and services are recommended ... ads. Augment with real-time updates from cyber threat intelligence subscription services. ... (EPP): Deploy comprehensive endpoint security tools with Anti-Malware Signature ... to evade detection. Implement endpoint security packages that use heuristic/behavioral ... -in for possible capital investments for security, begin by making the board ... edge networks Deploy strong endpoint security tools Educate users about phishing ...