Executive View
SecZetta Third-Party Identity Risk Solution
Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...
Executive View
Gurucul Predictive Risk Analytics
Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that...
Analyst Advice
Business Resilience Management (Crisis Roadmap for Beginners...
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Buyer's Compass
Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...
Executive View
Soterion for SAP
Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both o...
Leadership Brief
Mitigating Availability & Security Risks in Centralized Dig...
Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised...
Advisory Note
Cyber Risk – Choosing the Right Framework
As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks...
Advisory Note
Trends in Privileged Access Management for the Digital Enter...
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...
Advisory Note
Why High-Profile Digital Transformation Initiatives Fail: Ho...
A growing number of organizations are adapting their products, processes and strategies to capitalize on the benefits of digital technology, but some high-profile Digital Transform...
Whitepaper
Grundlagen des Privileged Access Managements
Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell...
Leadership Brief
Why Adaptive Authentication Is A Must
Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devi...
Whitepaper
Moving towards a holistic Cyber Risk Governance approach
The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...
Advisory Note
Security Organization, Governance, and the Cloud
The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...
Executive View
Deep Secure Content Threat Removal Platform
The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while elim...
Executive View
Semperis Directory Services Protector for Active Directory
Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...
Executive View
TechDemocracy Intellicta
A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...
Executive View
IBM Security Access Manager (ISAM)
As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access...
Executive View
Saviynt Identity Governance and Administration (IGA)
Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User...
Leadership Brief
A Practical Approach to Enterprise Security Architecture (ES...
An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected...
Leadership Brief
Access Reviews Done Right
Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum...
Leadership Brief
Responding to Cyber Incidents
The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protec...
Advisory Note
GRC Reference Architecture
GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals. GRC is concerned with s...
Executive View
Ideiio IGA
Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfoli...
Executive View
Exostar Supplier Risk Management
Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along th...
Advisory Note
Big Data Security, Governance, Stewardship
An ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their e...