Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Mitigate Identity-Related Breaches in the Era of Digital TransformationMar 21, 20194:00pm CET, 11:00am EDT, 8:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Oslo, We Have a Problem!
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Big Data technologies were invented to store and rapidly process the vast amount of data available today into useful “Smart” Information. What is common across these technologies is that their initial aims are focused on data processing capabilities rather than security and compliance. One particular concern is the lack of control over identity and access especially in the area of administration. This was fine when the application of the tools was confined to experimental or small scale usage. Now that they are being widely deployed for commercial purposes this is no longer satisfactory.
Big Data technologies need to be managed and secured in the same way as the other components in the IT infrastructure.
Language: English • Duration: 59:07 • Resolution: 1280x720
Executive View: Thycotic Privilege Manager - 80004
Executive View: Kleverware IAG - 80042
Whitepaper: PATECCO Privileged Access Management Services - 80037
Executive View: Thales Vormetric Application Crypto Suite - 79069
Executive View: Ilantus Compact Identity - 80052
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning