Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
A Compass for Choosing the Right Fraud Reduction Intelligence PlatformApr 16, 20204:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole Analyst Chat: How to Protect Data in a Hostile World
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money.
Language: English • Duration: 46:57 • Resolution: 800x600
Leadership Brief: The Information Protection Life Cycle and Framework: Acquire and Assess - 80371
Executive View: IRM-Prot-On - 71313
Executive View: Micro Focus Access Manager - 80311
Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80400
Executive View: CyberArk Privilege Cloud - 80122
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning