Quantcast
Browsing latest articles
Browse All 11 View Live

Novell enters PAM market – the first deal in the next wave of acquisitions in...

Novell has announced that they have acquired the technology for privileged account management (PAM) from Fortefi Ltd. PAM addresses the need to better manage privileged accounts. It is a broad field,...

View Article


Privileged Account Management

Over the course of the last few months, PAM (Privileged Account Management), also called PIM (Privileged Identity Management) or PUM (Privileged User Management) became increasingly popular. The main...

View Article


There are many facets of Privileged Account Management

The PAM/PIM/PUM (Privileged Account/Identity/User Management; I prefer PAM) market is one of the boom markets in IT. I’ve blogged about that recently (here and here). And I’ve talked with many vendors...

View Article

Why is IBM TIM 5.1 just a minor release?

IBM yesterday has announced its Tivoli Identity Manager 5.1. If you read the list of new features you might end up with the same question like me: Why is it only version 5.1, e.g. a minor (.1) release...

View Article

Is PAM (or PIM or PUM) moving into Provisioning?

These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for...

View Article


Will IBM change the way we do PAM (or PIM or PUM)?

I’ve blogged several times about PAM (Privileged Account/Access Management) in the last few months, stating that I expect more integration of PAM with existing IAM applications (Here, here, here, and...

View Article

Creating new attack surfaces in VMs and Network Security devices

There is a good reason to add functionality to specific types of devices, especially in the network. Doing security at the edge can be highly efficient. Thus, implementing for example PEPs (Policy...

View Article

Virtualization vs. Security

Some days ago, a vendor talked at an analyst meeting about the relationship between virtualization and security. The argument was: At the hypervisor you can combine network security management, server...

View Article


Quest further extends its IAM portfolio – e-DMZ adds PxM capabilities

Quest today announced that they will acquire e-DMZ Security, a PxM (Privileged Access, Account, Identity, User Management) vendor. That comes to no surprise given that PxM has been one of the last...

View Article


Database Security – a strategic perspective

In the recent months I’ve done a lot of research around database security, talking with vendors like Oracle, IBM (Guardium), Sentrigo (now McAfee), Imperva, Bitkoo, and some others as well as with...

View Article

Is there really no way to avoid shared user accounts?

In various discussions over the past month, mainly in the context of Privilege Management, I raised the (somewhat provocative) claim that shared accounts are a bad thing per se and that we must avoid...

View Article
Browsing latest articles
Browse All 11 View Live