Search

Page 41 of 498 results

Blog

Impressions from the Oracle OpenWorld

by Alexei Balaganski

... talks about a future roadmap, this time visitors had ample opportunity to ... had a chance to talk to real customers sharing their success stories ... is completely redesigned with the “security first” principle in mind. His ... a completely separate control plane and security perimeter of the cloud infrastructure ... exploit them. At the same time, this isolation barrier prevents ... just for finding and mitigating security threats but also to ... ’s OpenWorld was undoubtedly the Artificial Intelligence. And although I really hate ...

Webinar

Making Sense of the Top 5 Latest Cybersecurity Trends

... laws, and harsh privacy regulations, security professionals now have way too ... dreaded skills gap in IT security is making qualified experts increasingly ... decisions taken by an artificial intelligence? Zero Trust approachSure, the old ... dynamic context-based authentication with real-time behavior biometrics, the continuous authentication ... asset and also its greatest security risk. Since C-level executives have ...

Leadership Brief

Leadership Brief What AI can do for you today – and what not

by Mike Small

... for example, the analysis cyber security event data. Where large amounts ... . For example, from cyber security to fraud. The application of ... example, in the cyber-security space to be able to ... complete for given circumstances). Security Event Analysis Identify abnormal patterns ... in security event data and relate ... to consistently identify imperfections in real time. Facial Recognition Recognize regular ... criminal suspects. Summary AI (Artificial Intelligence) is a generic term that ...

Executive View

Executive View Auth0 Customer Identity Management

by John Tolbert

... data in consideration of the real-time risk levels. MFA, in ... are becoming more commonplace as security requirements. For example, the ... party MFA solutions like: Duo Security, Yubikeys, Google Authenticator and ... third-party threat or fraud intelligence. For example, consider a third ... -party threat intelligence feed that outputs a variable called ... family management concepts at this time, but relationships can be ... native marketing analytics and business intelligence features. The product does ...

Leadership Compass

Leadership Compass Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E)

by Martin Kuppinger

... Cloud Access Governance and Intelligence Positive Neutral Neutral Neutral ... Provisioning deployment. Category Rating Security Positive Functionality Neutral Integration Weak ... directory capabilities. Category Rating Security Strong positive Functionality Weak ... enterprise deployments. Category Rating Security Strong positive Functionality Neutral ... Governance capabilities. Category Rating Security Positive Functionality Neutral Integration Neutral ... an identity provider service in real-time. In many cases IB ...

Executive View

Executive View Beta Systems Garancy IAM Suite

by Martin Kuppinger

... facing multiple changes affecting their security posture. The perimeter which separated ... user and role recertificationns Access Intelligence Manager – enhanced, BI-based analytics ... changes in target systems in real-time. The standard processes, starting with ... a rarely found capability. The Access Intelligence module, based on Microsoft’s COTS ... OEM workflow tool; the Access intelligence module that relies on Microsoft ... moving it at a level of a real suite, in contrast to just ...

Advisory Note

Advisory Note Identity in IoT

by John Tolbert

... the patients, as well as real-time data feeds from the smart ... requirements and availability Just like real estate, location is an important ... either measure the signal travel time discrepancy between two equal paths ... for each device at the time of manufacture. Issuers should use ... is useful for traffic analysis, security intelligence, and on some occasions, incident ... of primary identifier at registration time? Do the back-end identity ... a root-of-trust at the time of device manufacture provides a significant ...

Executive View

Executive View SAP Customer Data Cloud

by John Tolbert

... cyber threat and compromised credential intelligence to reduce misuse of accounts ... Protected Identity (NPI), which provides real-time analysis and alerting on in ... functions meet HIPAA standards for security and privacy. SAP also is ... Support: Freshdesk, Freshservice, and Zendesk Security and ID Verification: SIEM, standardized ...

Advisory Note

Advisory Note Consumer Identity and Access Management for “Know Your Customer”

by John Tolbert

... OAuth2, WS-Federation, and OASIS’ Security Assertion Markup Language (SAML). Many ... including, current infrastructure, sponsorship, design, security and privacy, and regulatory compliance ... . As the missions of security-oriented enterprise IAM and the ... CIAM information feeds to SIEM (Security Incident and Event Management) ... systems or dedicated security analytics systems for a more comprehensive ... Consider using threat intelligence services that provide near real-time information about compromised ...

Executive View

Executive View SecureAuth IdP

by John Tolbert

... pre-defined policies to determine real-time risk levels that either grants ... are becoming more commonplace as security requirements. For example, the upcoming ... events by external SIEM and Security Intelligence programs. Advanced identity analytics require ... are designed to meet high security requirements. SecureAuth accepts most every ... native marketing analytics and business intelligence features. The product does not ... risk engine SecureAuth Threat Service intelligence integration Phone Number Fraud Prevention ...