Search

Page 9 of 472 results

Executive View

ObserveIT Insider Threat Management

by Alexei Balaganski

... that usually operate by collecting security events from various sources - ... standalone UBA solution must be investigated by a security analyst, who will then have ... also responsible for applying the real-time user activity analytics to the ... alerts that must be investigated by security experts before a mitigation action ... to those without a strong internal IT security team. Related Research Executive View ... Monitoring – 71258 Advisory Note: Real-Time Security Intelligence – 71033 Advisory Note: Understanding ...

Report

Executive View: Onapsis Security Platform - 71290

by Alexei Balaganski

... with SAP to provide up-to-date intelligence on vulnerabilities and other threats specific ... Human Resources systems to Business Intelligence to Customer Relationship and Supply ... information with the latest vulnerability intelligence is able to detect these ... BusinessObjects) with the latest security intelligence from the company’s own ... ensures detection of most security threats close to real-time. When additional business context ... lab provides up-to-date SAP security intelligence Open APIs for integrating with ...

Report

Leadership Compass: Cloud Access Security Brokers - 71138

by Mike Small

... cloud; ● Reporting and integration with security intelligence systems. 7.6 Other Unique Selling Propositions ... and communicated. Web Security - cloud based and real-time anti-malware scanning available ... based on context, behaviour and threat intelligence. Session Assurance - Step-up or restrict access ... threat intelligence, provided by the IBM X-Force® research team, with global security analytics ... CloudLock Cloud Access Security Broker harnesses crowd-sourced, cybersecurity intelligence to enable enterprises ...

Advisory Note

Big Data Security, Governance, Stewardship

by Mike Small

... and Cognitive Technologies towards Artificial Intelligence. Some of these are illustrated ... data-security"): Advanced security information and event management (SIEM): Security ... security monitoring systems to detect attacks in near real-time. Big Data analytics can allow security ... fraudulent activity in time to prevent or limit loss. National Security: Some research ... using-big-da/384"), provides real-time personalized marketing messages to ... enough time for the all inherent vulnerabilities and security weaknesses ...

Report

Executive View: Zscaler Internet Security Platform - 71010

by Alexei Balaganski

... threat intelligence across multiple attack vectors. It’s also capable of blocking detected threats in real time ... real time, as well as combine, them with historical data from their own security cloud ... and external sources of threat intelligence. With its ... web traffic ● Email security is no longer part of the solution ● Real-time analysis of all ... Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring ...

Leadership Brief

Lösungen für die Personalknappheit in Ihrem Cyber Defense Center

by Martin Kuppinger

... aktuelle Informationen über Angriffsvektoren an sogenannte Security Intelligence Platforms (SIPs) liefern, welche ... verstehen und darauf reagieren zu können Security Intelligence PlatformsKognitive SicherheitswerkzeugeSIEM Kenannte reguläre Ereignisse ... Management Basisschutz und -analyse Security Intelligence PlatformsThreat Intelligence ServicesPrivileged Threat AnalyticsFirewallsIdentity & Access ... Ansätze wie Security Intelligence Platforms (SIPs), die manchmal auch als Real Time Security Intelligence (RTSI) ...

Leadership Brief

Data Security and Governance (DSG) for Big Data and BI Environments

by Anmol Singh

... in data thefts, security breaches and failed audits. Business Intelligence platforms help to extract ... to significantly improve the state of security by bringing tangible security benefits in terms of managing access ... restrictions. Recommendation Besides practising common security standards around the network, ... to identify and prioritize data security controls. Security leaders should work with data ... activities and threats in real-time. It is also important that security leaders implement appropriate access ...

Report

Executive View: Bomgar Privileged Access Management - 71307

by Matthias Reinwarth

... Copyright 5 Related Research Advisory Note: Real-Time Security Intelligence - 71033 Leadership Compass: Privilege ... important means to improve the overall security of the organisation by preventing cyberattacks ... a strategic roadmap approach  No real-time, behavioural administrative access analytics  ... 5 of 6 The Future of Information Security – Today KuppingerCole supports IT professionals with ... Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security ...

Report

Executive View: IBM Security Policy Management - 70953

by Graham Williamson

... -grained attributes evaluated at run-time. Rather than just using group ... threat detection, access control and security intelligence. There is no single solution to ... date and time, location or IP address range, and it can incorporate security status ... -aware adaptive authentication based on real-time, per-session risk calculation to ... a malware detection service. Security intelligence tools that provide network behavior ... extended in order to support embedded run-time policy enforcement. In addition, an improved ...

Report

Vendor Report: Symantec Cloud Security - 70115

by Mike Small

Vendor Report: Symantec Cloud Security Symantec Cloud Security Vendor Report © KuppingerCole, IT Analysts ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. Horst ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. ... protection information assets. Symantec delivers real-time threat monitoring and analysis to minimize ... a comprehensive approach to threat identification, intelligence gathering and validation, and response ...