Page 6 of 472 results


Why recertification isn’t sufficient anymore – time to look at user behavior and detect anomalies

by Martin Kuppinger

... he has access to within a short period of time, all data ending up at an USB stick ... behavior analytics and, beyond identities, Real Time Security Intelligence. Such technology can be implemented in a compliant ... approaches and even beyond Access Intelligence. We must become able identifying anomalies ... talking about something entirely new). Time to move to the next level of IAM ... ) and detecting (recertification and Access Intelligence) to responding, based on better detection and ...


Die wahren Zugriffsrisiken kennen und verringern - real-time statt nur einmal jährlich

Access Governance ist inzwischen eine etablierte Disziplin innerhalb der Governance- und Informationssicherheitsorganisation von Unternehmen. Mit Access Intelligence-Funktionen werden vermehrt zusätzliche Analysedienste bereitgestellt, mit deren Hilfe man besondere Risiken beispielsweise durch eine ungewöhnliche Anhäufung von Zugriffsberechtigungen bei bestimmten Benutzern identifizieren kann. Access Governance arbeitet dabei auch mit Soll-/Ist-Vergleichen, also dem Abgleich von aktuellen Berechtigungen in ...


Are You Ready for Security Automation?

by John Tolbert

... subjects. And so we'll look at these real quickly here. Security does the product meet ... that, that many times customers don't think about a security incident. So for ... third pillar that we had was a real time collaboration. And, and this starts ... that, that requires their feedback. So real time collaboration was really key, started ... I think for the first time in history, we've made threat intelligence actionable inside of Sox ... 650 different products, mostly in the security domain, but also in, in it in general. So ...


Why Your Organization Needs Data-centric Security

by Alexei Balaganski

... vendors to their customers, lack of optimized security defaults, or just a possibility to accidentally ... and shortage of skilled security experts, security does not often become ... employed, providing not just real-time correlation of security telemetry across different layers but ... product lines for data security, cloud security, breach prevention, and ... combining edge, application security, and data security, Imperva protects companies ... Research Labs and the global intelligence community enable Imperva to stay ...

Market Compass

Cloud-delivered Security

by Alexei Balaganski

... additional security features and threat intelligence through API-based integrations. Essential Real-time monitoring ... provide holistic and real-time views into the whole platform’s security and compliance ... perform real-time analysis using Cisco Advanced Malware Protection. In addition to DNS security and ... adapt to risk in real-time and are delivered through a converged security platform that protects ... including email security and continuity, transactional and marketing email, real-time monitoring and ...

Leadership Compass

Database and Big Data Security

by Alexei Balaganski

... latest technological developments like artificial intelligence and consent management, integrations ... -generation data and database security solution for real-time data protection in heterogeneous ... business intelligence, data analytics, cloud computing, virtualization, and information security. IBM Security Guardium ... inspection, database discovery, and artificial intelligence. By combining network traffic inspection ... – 70632 Executive View: IBM QRadar Security Intelligence Platform – 72515 Executive View: Oracle ...

Executive View

Microsoft Cloud App Security

by Mike Small

... acquisition and recent improvements include real time malware detection, enhanced SAML ... user. It exploits Microsoft threat intelligence and research to identify emerging threats ... -based controls provide near real time response while API based ... integration, API connectors, and real-time access and session controls leveraging ... cloud resources in real time. Microsoft Microsoft Cloud App Security Strengths and Challenges ... as well as the wealth of threat intelligence collected by Microsoft's threat analysis teams ...

Leadership Compass

Access Governance & Intelligence

by Richard Hill

... access controls, sometimes complemented by adding real-time monitoring information about access to IT assets ... requests. Hitachi ID Identity Manager supports real-time control of user behavior in accessing ... Security Identity Governance & Intelligence IBM Security IGI IBM Security Identity Governance & Intelligence is the successor of IBM Security ... more, while also participating in real-time discussions with other customers, partners ... to detect access risks based on real-time tracking of provisioning and user access ...

Buyer's Compass

Security Orchestration, Automation and Response (SOAR)

by John Tolbert

... does it reduce the amount of time spent on repetitive manual tasks that ... , vendors are expanding their existing security intelligence, security orchestration, or incident response platforms to ... and NDR tools directly for real-time memory analysis and IoC ... legacy systems. Speed of Deployment and Time-to-Value Related to the deployment model ... will often claim typical deployment times, which are useful as a ... value(s) in terms of enhanced security, enterprise integration, time to value, operational efficiency, and ...

Buyer's Compass

Database and Big Data Security

by Alexei Balaganski

... compromise legitimate user accounts. Unpatched security vulnerabilities or configuration problems in the ... reporting functions. On top of that, advanced real-time analytics, anomaly detection, and SIEM ... error in database management by utilizing artificial intelligence (or, at the very least, an external ... availability, performance, and security requirements. Most real-life deployments will end ... business value(s) in terms of enhanced security, enterprise integration, time to value, operational efficiency, and ...