Search

Page 44 of 498 results

Report

Advisory Note: Maturity Level Matrixes for Identity and Access Management/Governance - 70738

by Amar Singh

... 19 2.2 Identity Provisioning For a long time Identity Provisioning has been the ... future. What will change over time is the nature of Access ... that are checked at run-time. Level DAM Characteristics 1 Initial Manual ... Provisioning, Access Governance, and Realtime Security Intelligence. Table 5: Maturity Levels for Privilege ... journeys”. Dynamic, integrated with Realtime Security Intelligence. Rule-based policy compliance. Key ... on-premise and cloud services. Real-time synchronization or federation. Support for ...

Report

Advisory Note: Making critical infrastructures in finance industry fit for the age of cyber attacks - 70405

by Martin Kuppinger

... traditional, simple attacks happening in real-time. It might take months ... , accumulated, risk-adjusted and ideally real-time data. KuppingerCole – Advisory Note – ... at least in many real cases - not "real-time" yet, whereas other sections ... other major driver is the real-time requirement. As noticed earlier, ... change to systems that support real-time reporting. These two arguments ... have been built in times with lower security awareness and which ... and thus providing automated attack intelligence, which would be the ...

Report

Advisory Note: Maturity Level Matrixes for Identity and Access - 70738

by Martin Kuppinger

... 19 2.2 Identity Provisioning For a long time Identity Provisioning has been the ... future. What will change over time is the nature of Access ... that are checked at run-time. Level DAM Characteristics 1 Initial Manual ... Provisioning, Access Governance, and Realtime Security Intelligence. Table 5: Maturity Levels for Privilege ... journeys”. Dynamic, integrated with Realtime Security Intelligence. Rule-based policy compliance. Key ... on-premise and cloud services. Real-time synchronization or federation. Support for ...

Report

Advisory Note: Identity Information Quality - 70996

by Matthias Reinwarth

... business processes or building a security strategy including Identity and Access ... business processes or building a security strategy including Identity and Access ... for Identification, Authentication, Authorization Security Information, required for identification and ... ’s access analytics and access intelligence systems provide mechanisms for simplifying ... which might be even almost real-time. Automated processes avoid the ... as well as Software Security, System and Network Security, Security Monitoring, Analytics & ...

Report

Buyer’s Guide: Access Governance and Identity Provisioning - 71030

by Martin Kuppinger

... if required. Access Analytics and Intelligence: Analytical capabilities to understand the ... controls, sometimes complemented by adding real-time monitoring information about information access ... meeting elevated internal governance and security requirements. Replacement of existing ... granular model for internal security and security and access management of the ... 17 The Future of Information Security – Today KuppingerCole supports IT ... Identity Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Best Practice: European Identity Award 2012: Europol - 70703

by Martin Kuppinger

... „Best Access Governance and Intelligence Project”: Strategic IAM project ... a highly security-sensitive environment, including external collaboration. Real-time monitoring beyond ... „Best Access Governance and Intelligence Project”: Strategic IAM project ... shows new approaches to Access Intelligence. KuppingerCole Best Practice Report ... Best Access Governance and Intelligence Project  Best Cloud Security Project  Best ... identity awareness in auditing and security intelligence in a highly sensitive environment, ...

Report

Snapshot: IBM InfoSphere Guardium V 9.0 - 70632

by Martin Kuppinger

... database security product. However, in its new release it extends real-time database ... database security product. However, in its new release it extends real-time ... on Information Management and Business Intelligence. Given that InfoSphere Guardium is ... supports monitoring and auditing, security enforcement, and advanced security intelligence capabilities. IBM offers ... and correlate the data in real-time with data activities. This ... System i and System z, including real-time monitoring of privileged user activities ...

Report

Product Report: SailPoint IdentityIQ 5.2 - 70287

by Martin Kuppinger

... modules, along with generic Identity Intelligence capabilities, form the top ... we feel that there is a real need for dedicated tools to ... customers have built up over time. Access Governance is covered ... modules, plus the general Identity Intelligence capabilities. These components provide ... from a business user perspective. Identity Intelligence is not a module but a functionality ... allows person-account-mapping. In real life, three-layer models ... 70287 5.9 Internal Auditing and Security IdentityIQ's basic job is to ...

Report

Advisory Note: Access Governance Architectures - 71039

by Martin Kuppinger

... Scenario: Understanding IT Service and Security Management - 70173 August 2011 ... Scenario Understanding IT Service and Security Management KuppingerCole Advisory Note ... if required. Access Analytics and Intelligence: Analytical capabilities to facilitate ... , sometimes complemented by adding real-time monitoring information about information access ... scenario “Understanding IT Service and Security Management” (#70173), describes three ... Identity Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Product Report: Axiomatics Policy Management Suite - 70293

by Martin Kuppinger

... patent-pending solution solves many real world authorization issues and ... heterogeneous environments we find in real-world IT today. Page 3 ... portals Application or service-level security Axiomatics integrates on all of ... Authorization Management system). At the time of writing, Axiomatics is ... integrate dynamic authorization with identity intelligence tools, as exemplified by its ... gained good experience in translating real-world policies to XACML ... auditing basic entitlement data. The real world is complex, and ...