Dynamic Authorization Management

Executive View

Executive View: IBM Security Policy Management - 70953

Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool…

Webinar

Jul 30, 2014: Identity Managed Data Loss Prevention – sleep well at night

It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?

Leadership Compass

Leadership Compass: Dynamic Authorization Management - 70966

Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network…

Blog

Dynamic Authorization Management and ABAC: The journey is the reward

Chinese philosopher Confucius is said to be the originator of the saying “the journey is the reward”. What does it mean? In its historic meaning, it says that by moving forward people will benefit, even while they might not reach perfection. Applied to projects, it means that continuous…

Executive View

Executive View: Oracle Entitlements Server (OES) 11gR2 - 70831

Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway...

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Top 5 Recommendations for Reducing Cyber Risks in 2020

The turn of the year has been an occasion for many cybersecurity news outlets to talk about trends and challenges in cybersecurity. Despite the importance of knowing what the trends and challenges are, we want to give you some hands-on recommendations to increase security for your company. Of course the following recommendations are just a selection out of many possible measures. We are happy to discuss with you in more detail the implications for your concrete business model. 1. Beyond [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00