Article No. / Date
Articles
wp80332de

Whitepaper

Grundlagen des Privileged Access Managements

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell...

lb80209

Leadership Brief

Responding to Cyber Incidents

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protec...

lb80195

Leadership Brief

Access Reviews Done Right

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum...

ev80077

Executive View

Ideiio IGA

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfoli...

ev79074

Executive View

Exostar Supplier Risk Management

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along th...

ev70370

Executive View

Saviynt Identity Governance and Administration (IGA)

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User...

ev79066

Executive View

IBM Security Access Manager (ISAM)

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access...

an72582

Advisory Note

GRC Reference Architecture

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals. GRC is concerned with s...

ev70362

Executive View

TechDemocracy Intellicta

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...

ev79054

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...

an72565

Advisory Note

Big Data Security, Governance, Stewardship

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their e...

ev79056

Executive View

Deep Secure Content Threat Removal Platform

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while elim...

an72564

Advisory Note

Security Organization, Governance, and the Cloud

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...

lb70222

Leadership Brief

A Practical Approach to Enterprise Security Architecture (ES...

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected...

wp70360

Whitepaper

Moving towards a holistic Cyber Risk Governance approach

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...

lb72008

Leadership Brief

Why Adaptive Authentication Is A Must

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devi...

top