Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
Language: English • Duration: 58:08 • Resolution: 1280x720
SOC as a Service
BMC Helix ITSM
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Database and Big Data Security
Leveraging Your Organization's Expertise: Departmental IAM Services for the Business
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity