Search

Page 47 of 483 results

Video

Analyst Chat #10: Making IAM Projects Succeed - The Importance of Project Management

by Graham Williamson

... I deal with it? You know, I think as a security practitioner, you've hit upon problem ... using tools around IGA, access intelligence, maybe data, access governance as ... That can help us, you know, as security administrators to lock down entitlements, to enforce ... crisis, being around at least in a, or in a real tangible way for two weeks ... . So yeah, this is in extra dangerous time because of the lack of preparedness that ... discovery classification and an enforcement of your security policies. And really it's the only ...

Video

Analyst Chat #1: How to Protect Data in a Hostile World

by Matthias Reinwarth

... I deal with it? You know, I think as a security practitioner, you've hit upon problem ... using tools around IGA, access intelligence, maybe data, access governance as ... That can help us, you know, as security administrators to lock down entitlements, to enforce ... crisis, being around at least in a, or in a real tangible way for two weeks ... . So yeah, this is in extra dangerous time because of the lack of preparedness that ... discovery classification and an enforcement of your security policies. And really it's the only ...

Whitepaper

Why Modern Enterprise IAM Must Be Rearchitected: Build Your Case for Containerized IAM and IDaaS

by Martin Kuppinger

... of today’s IT Infrastructures, well beyond serving security and regulatory compliance requirements. However ... Service Provider). However, there are no real as-a-service models available. This might ... . Specifically to mention are Geater Security: Much of the security comes with containerization. Containers ... IAM in a standardized container infrastructure. Faster Time to Value: Deployment can be gradual, and ... - 70305 Leadership Compass: Access Governance & Intelligence - 71145 Leadership Compass: CIAM Platforms ...

Blog

CIAM as a Key Factor in the Digital Transformation

by John Tolbert

... so as not to overburden users at registration time. Most CIAM services provide user ... and other malefactors. Compromised credentials intelligence services alert subscribers to the ... detect and aggregate compromised credential intelligence from across all tenants on ... of third-party compromised credential intelligence. Lastly, CIAM solutions can ... offer CIAM as SaaS. Thus, CIAM is a real differentiator that can help businesses ... experiences, enhanced privacy, and more security. Without CIAM, in the age of DT, ...

Buyer's Compass

Buyer’s Guide: Marketing Automation Systems and GDPR Readiness

by Roland Bühler

... conversion rates. In some cases, artificial intelligence (AI) can improve such analytics – have ... internal processes. In all cases, use a real-life scenario in order to evaluate the ... extensive individual interface development. Information security Information security is key in terms of marketing information ... activities accelerating marketing activities (reducing time-to-market). A further business case can ... with shortlisted systems based on typical real-world scenarios. In most cases, you ...

Blog

Ledger for the Masses: The Blockchain Has Come to Stay

by Matthias Reinwarth

... example of DevOps, Machine Learning, Artificial Intelligence, IoT, Containers and Microservices, Serverless ... evaluated against their impact in the real world. The Blockchain can even ... "Document-DBs", "Key-Value"-, "In-Memory-", "Time series-" and Graph databases as well ... probably only the beginning of the real Blockchain hype. It proves that there ... to laymen, but gained in maturity for IT, security and governance professionals. In practice, however ... and cost-effective implementation for real life (beyond the hype) ...

Whitepaper

KRITIS - Kritische Infrastrukturen verstehen und schützen

by Matthias Reinwarth

... Bereiche wird anhand eines realen Szenarios veranschaulicht, das anschließend ... einer Auditierung. Threat intelligence und moderne Security Operations Centers Über ... Intelligence ein wesentlicher Bestandteil der Cyberabwehr und der Reaktion auf Security ... Verfügbarkeit von umsetzbarer Threat Intelligence in einer Form bereitstellen ... wp80065loesungenundproduktevoncyberark20190829.png Privileged Account Security (PAS) bietet ein mehrstufiges ... Mindest- oder "just in time"-Privilegien und zum Wechseln, Überwachen ...

Combined Session

AI in Cybersecurity: Between Hype and Reality • Machine Learning & the SOC

by Alexei Balaganski, Cory Missimore

Artificial Intelligence is surely one of the hottest topics in ... , they’ve already matured enough to replace security analysts as well? In this session, we are ... but not least, should we human security experts start worrying about our ... jobs already? Security Operation Centers (SOC) s are ... banality, drawing a security analyst’s time, and attention away from potentially real threats or attacks ... is a primary concern for security analysts, chief information security officers, and chief executive ...

Blog

Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures

by Matthias Reinwarth

... has faced for a long time, change processes and systems in ... outer boundary of a company, the concept of a security perimeter, have practically ceased to exist ... digital transformation is the key to security, governance and audit, but also ... need to link identities and model real-life dependencies within teams, companies ... intelligence for ongoing business transformation, while ensuring compliance, consent and customer security ... while maintaining control and enforcing security. In a nutshell: We need to reconsider IAM ...

Leadership Compass

Infrastructure as a Service – Global Providers

by Mike Small

... customer to meet their responsibilities for security such as vulnerability scanners, firewalls, ... delivering those innovations that provide real business benefits. For example, ... is backed in the SLA by a credit of 50 times the fees for any period ... services while at the same time remaining compliant with laws and ... range of development services including Artificial Intelligence / Machine Learning, and SaaS ... simplify development and deployment of Artificial-Intelligence (AI)-powered chatbots and operational analytics ...