Search

Page 42 of 472 results

Blog

From preventive to detective and corrective IAM

by Martin Kuppinger

Controls in security and GRC (Governance, Risk Management, ... details. Today’s more advanced Access Intelligence and Access Risk Management solutions ... from a deferred approach towards near-time or real-time detection. If unusual activity is detected, alerts ... . IAM needs to become not only “real-time detective”, but also needs to have ...

Webinar

Reducing Risk with User Behavior Analytics (UBA)

... their growth plans. Fortunately, Artificial Intelligence (AI) and Machine Learning have matured ... point where making use of analytics in Security broadly is possible. With this more ... only protected, but also monitored in real time for anomalies in behavior. The use ... : Evolving trends in the use of analytics in security Market trends in privileged access management ... scenarios where analytics fit in the security landscape. He will show the emerging ...

Report

Technology Report: Access Governance Architectures - 70219

by Martin Kuppinger

... if required. · Access Analytics and Intelligence: Analytical capabilities to understand the current ... access controls, sometimes complemented by adding real-time monitoring information about information access ... KuppingerCole scenario “Understanding IT Service and Security Management” (#70173), describes three ... well as the Information Security part of the IT Service & Security Management layer. KuppingerCole – ... Page 19 of 20 The Future of Information Security – Today. KuppingerCole supports IT professionals with ...

Video

Reducing Risk with User Behavior Analytics (UBA)

by Martin Kuppinger

Artificial Intelligence (AI) and Machine Learning have matured to ... point where making use of analytics in Security broadly is possible. With this more ... only protected, but also monitored in real time for anomalies in behavior. The use ...

Webinar

Ground Control to Major CRO: Is Identity Governance a risky experience?

... how business risk changes over time in response to the implementation of policies and ... new risks – access is the new security perimeter. Why a business centric approach ... the cost of compliance as well as improving security posture. In the first part of this ... part, Andrea Rossi from IBM Security Systems, will describe how IBM ... understands and provides security for the new agile business ... operations and by integrating IAM with real-time cyber threat intelligence.

Report

Executive View: ITMC IDM365 - 71289

by Martin Kuppinger

... in a controlled way, including a defined period of time with automatic rollback of unapproved tasks ... a complete audit trail to integrated business intelligence capabilities up to tailored automated documentation for ... of IAM professionals with strong expertise in real-world deployments of IAM solutions – the ... discuss legal issues related to information security and technology, KuppingerCole do not provide ... No.: 71289 Page 5 of 6 The Future of Information Security – Today KuppingerCole supports IT professionals with ...

Blog

Getting a Grip on Operational Technology

by Alexei Balaganski

... communication protocols and device-specific real-time operating systems. Driven above all ... , they were usually designed without security in mind. Current ICS, however, have ... the same blatant disregard for security. The underlying reason for that ... ” are everywhere now, and embedded intelligence finds widespread use in industrial networks ... . However, the challenges for information security professionals go far beyond that. There ... are challenges that traditional IT security isn’t yet capable of addressing. This ...

Blog

Internet of Opportunities

by Alexei Balaganski

... market, including lack of standards, massive security and privacy-related implications, as well ... optimization, providing better intelligence and more efficient planning, enabling real-time reaction to various ...

Webinar

5 Steps to Protect Your Data from Internal & External Threats

... information should not be limited to IT or the security team; every employee should contribute ... raising their awareness about information security and educate them about data ... evolution of Access Governance and Access Intelligence. What is needed to completely capture the ... will cover is the question where real-time-analysis really is required and what ... , Vice President of Product Management at Whitebox Security, is going to discuss in greater detail the ...

Blog

European Identity Award 2012

by Bettina Buthmann

... category "Best Access Governance and Intelligence Project", the award goes to ... It also involves real-time monitoring. In the category "Best Cloud Security Project" two ... requirements and integrates with security scanning solutions for the ... "Best Innovation / New Standard in Information Security" goes to OpenID Connect as a standard ... enables secure authentication and other security services on mobile devices. Designed ... approach is an excellent example of how security can be increased in this critical area ...