Securent milestones signal increasing demand as leading enterprises adopt Entitlement Management
MOUNTAIN VIEW, Calif. -- Securent, Inc., the award-winning leader in Entitlement Management, today outlined several key milestones that signal both the company's success in the marketplace and the fast-growing importance of Entitlement Management to security- and compliance-conscious businesses around the globe. The Securent Entitlement Management SolutionTM (EMS) enables organizations to meet their application and data security requirements by securing access to sensitive applications and information with unmatched fine-grained, policy-driven controls and visibility.
According to Burton Group, entitlement management is a key component of identity-based access controls, one of the hottest areas of the Identity Management (IdM) market. This is being driven by CIOs, CSOs and enterprise architects calling upon maturing Entitlement Management solutions that meet the demands created by the who-can-access-what and who-had-access-to-what-when-and-where regulatory requirements as defined by Sarbanes-Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry (PCI) Data Security Standard, the Gramm-Leach-Bliley Act (GLBA), Basel Capital Accord (Basel II), and the National Association of Securities Dealers Rule 2711 (NASD 2711).
"Clearly, we are in the right place at the right time, as the world's leading companies have realized that Entitlement Management is the answer to the mushrooming access control problem. With our production-hardened solution in use by a growing number of Fortune 1000 organizations, Securent EMS continues to tackle some of the most pressing security and compliance challenges faced by enterprises today," said Rajiv Gupta, CEO of Securent.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024