Search

Page 14 of 548 results

Video

Analyst Chat #36: Questions to Ask Your Cloud Provider About Security

by Alexei Balaganski

... and Matthias Reinwarth discuss the security challenges for enterprises moving ... at KuppingerCole for quite some time, because all organizations are ... provider has its own infrastructure security. Obviously this is our ... correctly, right? Oh, again, security, security by design is not a technology ... opposed to automated approach towards security, meaning that a system, a service ... holy grail of general artificial intelligence in reality, which we probably ... they been tested in the real life scenarios? Not necessarily. ...

Video

Workforce Continuity in a Time of Crisis

by Warwick Ashford

It is not only in times of crisis like the current ... appropriate, security and compliant access rights to employees in near-real time to ... compliance. IAM tools using artificial intelligence (AI) in the form of ... workers automatically Staying secure in times of crisis

Executive View

Executive View: Radiflow SCADA Security Suite

by Alexei Balaganski

... Similar to traditional IT-focused security intelligence solutions, the platform then ... produce static point-in-time snapshots into SCADA network ... implement various operational and security capabilities. Radiflow customers are ... This module relies on threat intelligence collected by Radiflow’s own ... are performed only during specific time windows. An unplanned operation ... and threat updates. Beside real-time alerting, the platform offers ... intelligence feeds make for an efficient and easy-to-operate industrial security ...

Executive View

Executive View: Symantec Advanced Threat Protection

by Alexei Balaganski

... endpoint protection and threat intelligence technologies with advanced security analytics capabilities. # Introduction ... amounts of security data across the whole enterprise in real time utilizing the ... Threat Protection goes beyond pure Real-Time Security Intelligence by combining traditional on-premises ... yet on par with pure security intelligence platforms Limited orchestration capabilities, mostly ... platforms Related Research Advisory Note: Real Time Security Intelligence – 71033 Executive View: Symantec.cloud ...

Buyer's Compass

Buyer's Compass: API Management and Security

by Alexei Balaganski

... Dedicated API security solutions that rely on real-time monitoring and analytics ... API performance, availability and security. API productization and monetization ... truly proactive approach towards API security. Intelligent prioritization of discovered ... productivity and overall security posture. Analytics and Security Intelligence Continuous visibility and ... distributed architectures. Strong internal security and access management Administrative and ... High High Analytics and Security Intelligence High High High High ...

Executive View

Executive View: CensorNet Cloud Security Platform

by Mike Small

... security platform called CensorNet Unified Security Service which delivers integrated web security, email security ... holds all the data and intelligence information behind the products. ... or firewalls. CensorNet’s Cloud Intelligence Team maintains a continuously updated ... -Factor Authentication is adaptive, real-time, challenge-based and session- ... -Threats CensorNet Unified Security Service includes real-time anti-malware scanning ... email – CensorNet Email Security provides enhanced security and compliance when using ...

Blog

Artificial Intelligence and Cyber Security

by Mike Small

As organizations go through digital transformation, the cyber challenges they face become more important. Their IT systems and applications become more critical and at the same time more open. The recent data breach suffered by British Airways illustrates the sophistication of the cyber adversaries and the difficulties faced by organization to prevent, detect, and respond to these challenges. One approach that is gaining ground is the application of AI technologies to cyber security and, at an event in ...

Executive View

Executive View: IBM Security Identity Governance and Intelligence

by Martin Kuppinger

... provisioning capabilities. IBM Security Identity Governance and Intelligence provides its own provisioning ... capabilities in this area include real-time analysis of SoD rules to ... (which are typically not even real information objects but systems), ISIGI ... KuppingerCole feels that IBM Security Identity Governance and Intelligence is well positioned ... We rank IBM Security Identity Governance and Intelligence amongst the leading ... Research Executive View: IBM QRadar Security Intelligence Platform – 72515 Executive View: ...

Executive View

Executive View: ManageEngine Password Manager Pro

by Martin Kuppinger

... use of shared accounts. Among security risks associated with privileged users ... is lacking is support for real-time session analysis in the sense ... -the-box interfaces to SIEM (Security Information and Event Management) systems ... Full HA support Challenges No real-time session analysis yet, but shadow ... item Related Research Advisory Note: Real-Time Security Intelligence - 71033 Leadership Compass: Privilege Management ... - 72330 Advisory Note: Security Organization, Governance, and the Cloud ...

Executive View

Executive View: United Security Providers Secure Entry Server

by Matthias Reinwarth

... right user at the right time is getting increasingly important ... technological platform integrates with existing security technology solutions by leveraging ... real-life business requirements regarding agility, performance, user experience and security ... . KuppingerCole recommends including United Security Providers Secure Entry Server into ... IAM/IAG, CIAM or threat intelligence systems through interoperability and federation ... Leadership Compass: Access Governance and Intelligence - 71145 Leadership Compass: Identity ...