Privilege Management

Webcast

Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance…

Leadership Compass

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege…

Webinar

Jun 22, 2017: Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators…

Blog

The New Role of Privilege Management

Privilege Management or PxM, also referred to by some vendors as Privileged Account Management, Privileged User Management, Privileged Identity Management, or a number of other terms, is changing rapidly, in two areas: Privilege Management is not only an IAM (Identity & Access…

Webcast

Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud.…

Executive View

Executive View: Centrify Privilege Service - 71326

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

Webinar

Feb 21, 2017: Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. This…

Blog

Grizzly Steppe – what every organization needs to do

On December 29th, the FBI together with CERT finally released a Joint Analysis Report on the cyber-attacks on the US Democratic Party during the US presidential election.  Every organization, whether they are based in the US or not, would do well to read this report and to ensure that…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00