Search

Page 19 of 537 results

Video

Analyst Chat #61: Post-SolarWinds Software Security Strategies

by Alexei Balaganski

... and strategic approaches towards improving security in organizations depending on ... management awareness and software development security. welcome to the KuppingerCole ... finally after the solar intentions intelligence that people at least ... into some specific technology and real controls in place, but ... again, environments that software security starts with security, your own software, ... to invest in software competition security, basically understanding that every ... have in place all the time. So again, before, uh, ...

Blog

Data-Driven Decision Making for Identity Security

... enterprises are struggling to balance security while simultaneously enabling a highly ... been friction with security and making highly specific security decisions quickly ... know it or not. The real question is, as your ... might include things like login times, login locations, associated roles ... risk assessment to make informed security decisions. And through more ... informed decisions comes more automated security, which enables business agility. ... the business level. Symantec’s Global Intelligence Network (GIN) is one ...

Executive View

Executive View: BeyondTrust Password Safe

by Anmol Singh

... strategic acquisitions, including eEye Digital Security and Blackbird Group. These ... products into an integrated risk intelligence suite - the BeyondInsight IT ... able to deliver privileged access intelligence with information about endpoint ... use of threat and vulnerability intelligence combined with behavioural analytics ... Password Safe allows for near real-time replication of data and password ... Research Advisory Note: Real-Time Security Intelligence - 71033 Advisory Note: Security Organization, Governance, and ...

Executive View

Executive View: TrustBuilder Identity Hub

by Martin Kuppinger

... the security threats. New IAM technologies included Access Analytics and Intelligence. ... decision-making process, while Intelligence gives the ability to make ... Together, access analytics and intelligence provide the ability not only ... with Adaptive Authentication & Authorization, Real-Time Security Intelligence, Software Defined Environments and Privilege ... external or internal identities. Security services from TrustBuilder Identity ... organizations centralize management of security policies and streamline deployment ...

Executive View

Executive View: Balabit Blindspotter

by Alexei Balaganski

... developments in the field of real-time security intelligence, such as detection of scripted ... the company’s Contextual Security Intelligence Suite, an integrated Real-time Security Intelligence Platform providing detection and ... of such activity detected by a Real-Time Security Intelligence solution is a situation in which ... Balabit’s Contextual Security Intelligence (CSI) Suite – an integrated security platform for real-time detection and ... syslog-ng – 71571 Advisory Note: Real Time Security Intelligence – 71033

Executive View

Executive View: Evidian Identity & Access Management

by Richard Hill

... Governance and Administration, and Analytics & Intelligence into their IAM suite. # ... the security threats. New IAM technologies included Access Analytics and Intelligence. Analytics ... Integrations with Adaptive Authentication & Authorization, Real-Time Security Intelligence, Software Defined Environments and Privilege ... Web Access Manager Analytics and Intelligence Identity Governance and Administration ... control model. Analytics and Intelligence Evidian Analytics and Intelligence (A&I) module is integrated ...

Executive View

Executive View: Gurucul Predictive Risk Analytics

by Mike Small

... been successful at providing actionable security intelligence in time to avert loss or ... : A real time contextual view of identities, access and activities. Identity access intelligence and ... that spans Access Governance and Security Intelligence. This section compares the functionality ... remove their own risk patterns. Security Intelligence Access governance provides an important ... . Related Research Advisory Note: Real Time Security Intelligence - 71033 Blog: Real-time Security Intelligence – more than just “next ...

Executive View

Executive View: BeyondTrust PowerBroker PAM

by Martin Kuppinger

... products into an integrated risk intelligence suite, the BeyondInsight IT Risk ... able to combine privileged access intelligence with information about endpoint and ... access credentials and alert in real-time as passwords are released and ... privileged session activity is started. Real-time session monitoring, recording and the ... use of threat and vulnerability intelligence and behavioural analytics makes it ... scale Related Research Advisory Note: Real-Time Security Intelligence - 71033  Leadership Compass: Privilege ...

Executive View

Executive View: WALLIX Bastion

by Anmol Singh

... significant threat to the overall security posture of an organization because ... sensitive data and critical operations. Security leaders, therefore, need a stronger ... activity review and intervention in real time. Activity logging, tracing and ... to integrate it with other security tools. Detailed privileged session ... Limited interoperability with 3rd party security tools and a limited partner ... – 71135 Advisory Note: Real-Time Security Intelligence - 71033 Advisory Note: Security Organization, Governance, and the ...

Executive View

Executive View: Balabit Shell Control Box

by Alexei Balaganski

... into other areas of security intelligence with products like Shell ... recently announced Contextual Security Intelligence Suite, an integrated Real-time Security Intelligence Platform providing detection ... routed.   If Blindspotter, the real-time user behavior analytics solution recently ... eyes authorization enables additional real-time control over their actions. ... a time-consuming and costly process involving a team of security experts ... products in the Contextual Security Intelligence suite Integration with third ...