Search

Page 38 of 472 results

Advisory Note

The Impact of Blockchains on Business Process Management and Optimisation

by Bruce Hughes

... and transactions connected to each step. Security and accountability are built in, so is ... areas such as Finance, Utilities metering intelligence and Logistics / Supply Chain Management ... description: Advisory Note: The IoT Security Disruptive potential of Blockchains - 71612") : ... been used to manage operational processes in real time in industries such as manufacturing, energy exploration ... . In manufacturing and supply chain management, security authentication, management and communication protocols ...

Leadership Compass

Identity Provisioning

by Martin Kuppinger

... and have evolved over time. That was the time of central authentication repositories ... to serve end-user requests almost in real time from a small web interface, this ... had developed and acquired over time. The current version is well integrated ... America.  IBM IBM Security Identity Governance & Intelligence IBM Security Identity Governance & Intelligence is the successor ... to show the state of any point in time in the past remain fairly unique ...

Executive View

Entrust IdentityGuard for Enterprise

by Mike Small

... scores are based on a sophisticated real-time risk assessment of the device ... of physical authentication devices: One-Time-Passcode Tokens - Entrust offers two ... addition to providing an OATH-compliant, one-time passcode, the Display Card includes ... transmission of a configurable number of one-time passcodes (OTP) to a mobile device ... for constant network availability, delivery timing or software deployment to a mobile ... Cyber Threat Intelligence providers, giving it an edge in the security innovation area. ...

Executive View

Saviynt Identity Governance and Administration (IGA)

by Richard Hill

... governance. Traditional, perimeter-based security is becoming less important. Previously ... Saviynt Security Manager platform combines advanced analytics and intelligence with ... a few. Product Description The Saviynt Security Manager platform is designed, according ... individualized access catalogue filtering. Saviynt Security Manager’s risk-based approach ... level. The module also identifies security risks by continuously monitoring, ... access rights with real-time audit logs with analytics and intelligence to achieve ...

Report

Advisory Note: Managing Risks to Critical Infrastructure - 70819

by Rob Newby

... defeat high end threats – Security and Intelligence Agencies Mainstreaming cyber throughout defence ... overstretched and give little time to extra security, as most have security in mind when building ... most of the advances in Information Security technology of recent times. As such, communications systems have ... critical alerts on events impacting operations in real-time is vital. To set this up, you need ... your global emergency response. Whilst real-time alerting gives you a view of how ...

Buyer's Compass

Buyer’s Guide: Consumer Identity and Access Management Solution

by John Tolbert

... paramount. Can consumers be prompted at registration time for each potential use of their ... intelligence subscriptions. Fraud intelligence providers gather, parse, and analyze data about real ... -friendly reports and send it to security intelligence systems. Examples of information that can ... , such as SIEM or security intelligence, fraud intelligence, and compromised credential intelligence solutions. If your organization ... but does not yet have security intelligence infrastructure, initiate a separate project to ...

Advisory Note

KYC as an Enabler in the Financial Services Business Transformation

by Bruce Hughes

... omni-channel communications, provide data security, identity / access management, and ... sub-prime mortgages, asset-backed securities, and interest rate swaps ... essentially requires the availability and security of APIs between banks ... operate data analytics solutions. Security, privacy, and regulatory compliance ... experience or “gut feel” instead of business intelligence. Regulation The regulatory compliance landscape ... “single source of truth”, available in or near real time; Perform data analytics to understand your ...

Executive View

Oracle Identity Cloud Service

by Mike Small

... also creates challenges around management, security and administration. Managing identity ... for managing many of the time-consuming tasks involved in delivering ... of unsanctioned access. Cloud Access Security Brokers (CASB) provide a partial ... IDaaS capabilities as part of their security services, including tighter integrations with ... comprehensive range of functionality for multiple real-life use cases. These include ... Access Governance & Intelligence - 71145 Leadership Compass: Cloud Access Security Brokers - 72534 ...

Advisory Note

Information Stewardship in the Age of Blockchain

by Karin Gräslund

... both its compliance and security at the same time and in a balanced ... classifying all unstructured enterprise data in real time as it is produced and becomes a ... information, but implements a near real-time information-centric security technique to report on and react ... installed to report the current security level in real-time and thus to protect ... security. The management objective must be to limit the intruder’s free time –i.e. the time ... to agents derived from artificial intelligence, which could execute tasks ...

Report

Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager - 71000

by Martin Kuppinger

... every single attribute imposes real time synchronization and reconciliation with all ... part of compliance enforcement is done in real time before accepting the action. In this ... time. From this snapshot the customer can run data-intelligence ... Sun Identity Manager had no real data-intelligence/compliance components. The last ... time. Furthermore most legacy systems are weak on compliance and data-intelligence ... Page 27 of 28 The Future of Information Security – Today. KuppingerCole supports IT professionals with ...