Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged access management (PAM).
Language: English • Duration: 54:52 • Resolution: 1280x720
Redefining Access Governance: A broader perspective
Ping Identity’s PingFederate
Cisco Zero Trust Security
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity