Privileged Access Management

Product Report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM…

Webcast

Privileged Cloud Identity Management

Kuppinger Cole Webinar recording

Webinar

Nov 30, 2010: Privileged Cloud Identity Management

In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche…

Webcast

Privileged User Management: Wer kontrolliert die Admins?

Kuppinger Cole Webinar recording

Product Report

Product Report: CA Access Control – Privileged User and Password Management

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity…

Webinar

Oct 08, 2010: Privileged User Management: Wer kontrolliert die Admins?

Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im Fokus dieses Webinars. Zunächst wird Martin Kuppinger einen Einblick in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über den Lösungsmarkt geben. Danach wird Klaus…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00