Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
The Compelling Need for Privileged IT Process AutomationMay 29, 20194:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Oct 22, 2019: Customer Identities as One of the Most Valuable Assets of a Company
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization control infrastructures have developed their own segment in the security market. There is a need for more than just one technology to meet different needs of the market, especially in the areas of administration and governance - both dictate the need for an authorization solution. Furthermore, customers face challenges in several areas – the main one is having no insight into what data and functionalities users are able to access. And while there is a constant need for businesses to continuously modify, extend, and modernize their processes and business models, there is a lack of adequate and agile data access control and management functionality.
RBAC (Role Based Access Control) has proven handy for adding manageability and assurance to coarse- or medium-grained authorization but break down in the face of dynamic environments or complex access policies. Attribute-based access control (ABAC) has gained adherents but is in fact just another piece of the puzzle. Policy-based Access Control (PBAC) is an emerging model that seeks to help enterprises address the need to implement actionable access control schemes based on corporate policy and governance requirements. In general, PBAC can be considered the harmonization and standardization of the ABAC and RBAC models at an enterprise level in support of specific governance objectives.
Language: English • Duration: 01:00:00 • Resolution: 1280x720
Leadership Brief: Do I Need Endpoint Detection & Response (EDR)? - 80187
Executive View: Kaspersky Endpoint Security for Business - 80180
Whitepaper: ForgeRock Identity Platform for PSD2 & API Security - 80049
Leadership Compass: Database and Big Data Security - 79015
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning