Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
KuppingerCole’s Evaluation of Leading Vendors in the Identity API Platforms MarketOct 23, 20194:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules are deployed independently and only communicate over standard protocols or APIs, they lend themselves to continuous delivery and continuous integration processes, reducing costs and risks of developing new features. However, with an increasing number of microservices, the complexity of adding security and identity capabilities to each of them can quickly get out of hand. By externalizing and centralizing identity and access management, organizations can ensure a secure and consistent identity and access management across on-premises and cloud infrastructures, as well as promote DevOps best practices.
Language: English • Duration: 59:26 • Resolution: 1280x720
Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123
Executive View: Optimal IdM - Optimal Cloud - 80162
Executive View: Curity Identity Server - 80159
Executive View: Devolutions PAM Solution - 80070
Executive View: AWS Control Tower - 80219
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning