Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
GDPR as opportunity to build trusted relationships with consumersMar 16, 20174:00pm CET, 11:00am EDT, 8:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole in the press
GDPR and Customer Data - Eyes on the Stars and Feet on the Ground
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Or sign in with
Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.
Privilege Management is getting broader, both horizontally and vertically. Horizontally by covering not only the administration of passwords and the login, but by a full support for managing privileged sessions at runtime. Vertically by not only focusing on few highly privileged users, but all types of privileged users, well beyond the IT administrators.
Language: English • Duration: 55:45 • Resolution: 1280x720
Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283
Executive View: Ping Identity’s PingFederate - 70284
Executive View: SAP Fraud Management - 71182
Executive View: CensorNet Cloud Security Platform - 72529
Leadership Compass: Adaptive Authentication - 71173
Operational Technology, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Adaptive Authentication & Authorization
Entitlement & Access Governance