Whitepaper
Grundlagen des Privileged Access Managements
Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell...
Whitepaper
Understanding Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to...
Executive View
One Identity Safeguard Suite
Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital...
Leadership Brief
Defending Against Ransomware
Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layere...
Whitepaper
Privileged Access Management requirements for Small to Mediu...
Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...
Executive View
Devolutions PAM Solution
Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...
Executive View
AWS Control Tower
Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern i...
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...
Whitepaper
Oracle Identity Cloud Service: Identity for Business Applica...
Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...
Whitepaper
KRITIS – Understanding and protecting critical infrastructur...
Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensiv...
Whitepaper
KRITIS - Kritische Infrastrukturen verstehen und schützen
Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unter...
Leadership Compass
IDaaS Access Management
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...
Whitepaper
Privileged Access Governance
Privileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of pri...
Whitepaper
IAM for Healthcare: It’s time to act
Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...
Executive View
Xton Technologies Access Manager
Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared...
Executive View
WALLIX Bastion
The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls f...
Executive View
BeyondTrust Password Safe
BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbe...
Executive View
BeyondTrust Password Safe
BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for detection and mitigation of security threat...
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...
Executive View
CyberArk Privileged Session Manager for Cloud
Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...
Executive View
Krontech SingleConnect
Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to...
Executive View
Thycotic Privilege Manager
Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a dire...
Whitepaper
PATECCO Privileged Access Management Services
Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining...
Executive View
SSH.COM PrivX
SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-ba...
Executive View
VeriClouds Identity Threat Protection Platform
Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against...
Executive View
CA Privileged Acces Management Suite
CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...
Executive View
Centrify Next-Gen Access Platform
Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...
Executive View
One Identity Safeguard
One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...
Advisory Note / Architecture Blueprint
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...
Executive View
ARCON Privilege Account Management Suite
ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privi...
Executive View
Micro Focus Privileged Account Manager
With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...
Executive View
BeyondTrust PowerBroker for Unix & Linux
PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowo...
Executive View
Osirium: Privileged Access Management
Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of...
Executive View
BeyondTrust PowerBroker for Unix & Linux
BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for...
Executive View
STEALTHbits® Products Overview
Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions...
Executive View
ManageEngine Password Manager Pro
ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution...
Executive View
BeyondTrust PowerBroker PAM
BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...
Whitepaper
Protecting the keys to your kingdom against cyber-attacks an...
All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...
Advisory Note
KRIs and KPI for Access Governance
This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of t...
Executive View
Thycotic Secret Server
Thycotic Secret Server is a mature enterprise-class offering for Privilege Management, supporting the key areas of the market such as Shared Account and Privileged Password Managem...
Leadership Brief
Schutz gegen Ransomware
Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.