Search

Page 28 of 537 results

Report

Product Report: CA GovernanceMinder™ - 70837

by Martin Kuppinger

... controls, sometimes complemented by adding real-time monitoring information about information access ... analytical capabilities based on Business Intelligence technology. Access Request Management as ... to rate products: ● ● Security Functionality ● ● Integration Interoperability ● Usability Security – security is measured by ... the degree of security within the product. Information Security ... has a consistent internal security model. The security features provided by the ...

Report

Leadership Compass: Identity Provisioning - 70949

by Martin Kuppinger

... end-user requests almost in real time from a small web interface, this ... what some vendors call Access Intelligence, i.e. advanced analytical capabilities beyond what ... improving the integrated Access Governance/Intelligence functionality, based on a separate offering ... called Garancy Access Intelligence Manager, which is not within ... adding enhanced Access Governance and Intelligence functionality. Support for role management ... formation of an IBM Security Business Unit some time ago, when Tivoli ...

Report

Leadership Compass: Enterprise Key and Certificate Management - 70961

by Rob Newby

... driven by security and compliance needs. Up until recent times, compliance has ... driven by security and compliance needs. Up until recent times, compliance has ... spend a lot of time working out customers’ real needs before guiding them ... for Microsoft SQL Server encryption, real-time full duplex key mirroring and ... , who have spent time and money developing a security background story and go ... encryption, privileged user access control, security intelligence and application-level encryption libraries ...

Report

Product Report: CrossIdeas IDEAS - 70897

by Martin Kuppinger

... Governance, and Identity and Access Intelligence, i.e. advanced analytics. The ... requests of applications in real time. Applications need to ... products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured ... by the degree of security within the product. Information Security ... as weaknesses in security. Known security vulnerabilities and hacks ... IDEAS, the following ratings apply: Security  Functionality  Integration  Interoperability ...

Report

Executive View: Axiomatics Policy Management Suite - 70895

by Graham Williamson

... major query options for a real-time lookup on an identity provider ... Integration with J2EE, Spring Security and Java servlets is supported ... authorization into its identity intelligence tools Relationships are also ... legal issues related to information security and technology, KuppingerCole do ... com The Future of Information Security – Today KuppingerCole supports IT ... neutral view on these information security market segments, covering all ... Management, eID cards, Cloud Security and Management, and Virtualization. ...

Report

Leadership Compass: Privilege Management - 70960

by Peter Cummings

... to rate products: ● Security ● Interoperability ● Functionality ● Usability ● Integration Security – security is measured by ... banks and large amounts of intelligence related data has been leaked ... the target source supplied in real-time by the Privilege Management Solution ... not be a bad investment of time. Security Functionality Integration Interoperability Usability Positive ... infrastructures and mobile applications. The real-time management of passwords is also ...

Report

Executive View: Gigya Identity Enterprise - 70299

by John Tolbert

... cyber threat and compromised credential intelligence to reduce misuse of accounts ... Protected Identity (NPI), which provides real-time analysis and alerting on in ... legal issues related to information security and technology, KuppingerCole do not ... 6 of 7 The Future of Information Security – Today KuppingerCole supports IT professionals ... neutral view on the information security market segments, covering all relevant ... as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting ...

Report

Product Report: iT-CUBE agileSI - 70349

by Martin Kuppinger

... SAP security Simple configuration, based on SAP standards Continuous, near real-time analytics ... for SAP environments security Configuration might become ... defined by iT-CUBE as “Security Intelligence for SAP customers”. It is ... add new capabilities for security analytics, both real-time as well as historical ... tools aggregate security information out of logs and real-time events from ... – with SIEM tools: • Advanced security analytics and real-time analysis is required for ...

Report

Product Report: SAP Business Objects GRC Access Control

by Sachar Paulus

... Provisioning (CUP), since this enables real-time risk analysis of planned authorization ... different levels (management, administrator etc.) security “What-if” scenarios (simulation risk ... been integrated into the Business Intelligence offering as a result of the ... a suite of applications that implement security controls for the authorizations in ... risk analysis and resolution like security administrators, business process owners and ... generated “out of the box”. Security administrators, business process owners and ...

Report

Executive View: Omada Identity Suite - 70828

by Martin Kuppinger

... analytical capabilities based on Business Intelligence technology. ● Access Request Management ... to the standard data model real time or via batch. The ... issues related to information security and technology, KuppingerCole do ... of 7 The Future of Information Security – Today KuppingerCole supports IT professionals ... for identity focused information security, both in classical and ... view on these information security market segments, covering all ... Management, eID cards, Cloud Security and Management, and Virtualization. ...