Search

Page 41 of 472 results

Executive View

PingIdentity’s PingDirectory

by John Tolbert

... exchanges of user information between different security domains as in merger & acquisition situations, or ... business partners on collaborative projects. To promote security, PingDirectory allows for encryption of data ... correlation of events by external SIEM and Security Intelligence programs. Advanced identity analytics require ... integrates with Splunk for Business Intelligence, CyberArk for Privilege Management ( ... -in dashboards for performance monitoring and real-time metrics display. It also includes a ...

Report

Snapshot: IBM InfoSphere Guardium V 9.0 - 70632

by Martin Kuppinger

... database security product. However, in its new release it extends real-time database ... on Information Management and Business Intelligence. Given that InfoSphere Guardium is ... and auditing, security enforcement, and advanced security intelligence capabilities. IBM ... and correlate the data in real-time with data activities. This ... System i and System z, including real-time monitoring of privileged user activities 4.2 ... Page 4 of 5 The Future of Information Security – Today. KuppingerCole supports IT professionals with ...

Leadership Brief

Defending against ransomware

by John Tolbert

... : Defense in depth starts with good security training for users: avoid suspicious ... real-time updates from cyber threat intelligence subscription services. Endpoint Security: Deploy comprehensive endpoint security ... payloads to evade detection. Implement endpoint security packages that use heuristic/behavioral ... common desktop applications to perform Just-in-Time malware assembly and encryption. Patching ... on edge networks, deploy strong endpoint security tools, and prepare for the ...

Blog

IAM@IBM: Finally back to leadership

by Martin Kuppinger

... that brings together their capabilities in Security Intelligence – such as the IBM X-Force ... Security Access Manager, the IBM Security Directory Integrator, the IBM Security ... announcements. One is the IBM Security Access Manager for Mobile, an ... own Privilege Management solution, IBM Security Privileged Identity Manager, to manage ... tight integration with QRadar to analyze real-time activity of privileged identity use. ... with QRadar security intelligence. The latter allows for better analysis of real-time attacks ...

Report

Product Report: SailPoint IdentityIQ 5.2 - 70287

by Martin Kuppinger

... organizations needed to invest strategically in information security and privacy protection, as well as ... time to encroach on the access governance market. However, we feel that there is a real ... from a business user perspective. Identity Intelligence is not a module but a ... background as it goes on. If unusual behavior or security events are detected, the system ... IdentityIQ 70287 5.9 Internal Auditing and Security IdentityIQ's basic job is to ... features of the product. For security reasons, IdentityIQ has chosen to ...

Video

Steve Tout - Risk Aware IAM for an Insecure World

... important than ever to integrate threat intelligence insights proactively into authentication workflows ... to be enhanced by deeper integration with modern security solutions and automated within an organization ... ’s security operations center for rapid visibility, to ... of risk insight into policy enforcement in real-time is an evolution for most companies, and ...

Keynote

Risk Aware IAM for an Insecure World

by Steve Tout

... important than ever to integrate threat intelligence insights proactively into authentication workflows ... to be enhanced by deeper integration with modern security solutions and automated within an organization ... ’s security operations center for rapid visibility, to ... of risk insight into policy enforcement in real-time is an evolution for most companies, and ...

Report

Best Practice: European Identity Award 2012: Europol - 70703

by Martin Kuppinger

... Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding ... ecosystem in a highly security-sensitive environment, including external collaboration. Real-time monitoring beyond simple ... thus shows new approaches to Access Intelligence. KuppingerCole Best Practice Report – ... Best Access Governance and Intelligence Project  Best Cloud Security Project  Best Approach ... solution on identity awareness in auditing and security intelligence in a highly sensitive environment, KuppingerCole ...

Report

Product Report: Axiomatics Policy Management Suite - 70293

by Martin Kuppinger

... patent-pending solution solves many real world authorization issues and ... layered and heterogeneous environments we find in real-world IT today. Page 3 of 10 ... Web portals Application or service-level security Axiomatics integrates on all of these ... Dynamic Authorization Management system). At the time of writing, Axiomatics is releasing a set ... to integrate dynamic authorization with identity intelligence tools, as exemplified by its ... has gained good experience in translating real-world policies to XACML even ...

Report

Advisory Note: Access Governance Architectures - 71039

by Martin Kuppinger

... if required. Access Analytics and Intelligence: Analytical capabilities to facilitate understanding ... access controls, sometimes complemented by adding real-time monitoring information about information access ... KuppingerCole scenario “Understanding IT Service and Security Management” (#70173), describes three ... well as the Information Security part of the IT Service & Security Management layer. 5. Architectural ... Page 17 of 18 The Future of Information Security – Today KuppingerCole supports IT professionals with ...