English   Deutsch   Русский   中文    
Research
Blog
Oct 16, 2014 by Martin Kuppinger
Cloud IAM is moving forward. Even though there is no common understanding of which features are required, we see more and more vendors – both start-ups and vendors from the traditional field of IAM (Identity and Access Management) – entering that market. Aside from providing an alternative to...
Blog
Oct 14, 2014 by Martin Kuppinger
The market for Cloud IAM and in particular Cloud User and Access Management – extending the reach of IAM to business partners, consumers, and Cloud applications through a Cloud service – is growing, both with respect to market size and service providers. While there were a number of start-ups...
Advisory Note
Oct 13, 2014 by Mike Small
The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business...
Advisory Note
Oct 13, 2014 by Amar Singh
KuppingerCole Maturity Level Matrixes for the major market segments within IAM (Identity and Access Management) and IAG (Identity and Access Governance). Foundation for rating the current state of your IAM/IAG projects and programs.
Leadership Compass
Oct 09, 2014 by Martin Kuppinger
Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.
Executive View
Oct 08, 2014 by Dave Kearns
Both Cloud computing and Identity and Access Management (IAM) can trace their beginnings to the late 1990’s. Cloud computing began as “web services” then developed into Software as a Service (SaaS) later expanding to cover areas such as Platform as a Service (PaaS) and...
Analysts' View
Maturity Models come of age already. They themselves have matured considerably. Like many other methodologies they have followed a certain hype cycle characteristics and have by now arrived on a plateau of general acceptance. Nevertheless rating the maturity of IAM/IAG programs is not easy....
Blog
Sep 30, 2014 by Alexei Balaganski
GlobalSign, one of the world’s biggest certificate authorities and a leading provider of digital identity services, has announced today that it has acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management solutions. Last year,...
Blog
Sep 29, 2014 by Alexei Balaganski
Half a year has passed since the discovery of the dreaded Heardbleed bug, and the shock of that incident, which many have dubbed the most serious security flaw in years, has finally begun to wear off. Then the security community has been shocked again last week, when details of a new critical...
Blog
Sep 27, 2014 by Mike Small
UK CESG, the definitive voice on the technical aspects of Information Security in UK Government, has published draft versions of guidance for “public sector organizations who are considering using cloud services for handling OFFICIAL information”. (Note that the guidelines are still at a draft...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Conference
Jan 28 - 30, 2015 in Shenzhen, China
The Digital Risk and Security Conference 2015, taking place January 28–30th 2015 at the Intercontinental Hotel, Shenzhen, China, is where you will learn the latest in identity management, cloud technology and compliance requirements in the software industry. Thought leaders and experts in...
Webinar
Nov 04, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Imagine you could use just one card to access your company building and to authenticate to your computer. Imagine you had only one process for all access, instead of having to queue at the gate waiting for new cards to be issued and having to call the helpdesk because the system access you...
Leadership Seminar
Nov 05, 2014 13:00 - 17:00 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Nov 06, 2014 8:30 - 17:00 in München
Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.
Webinar
Nov 11, 2014 11:00am CET
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To...
Webinar
Nov 18, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Continued proliferation of cloud technologies offering on-demand scalability, flexibility and substantial cost savings means that more and more organizations are considering moving their applications and databases to IaaS or PaaS environments. However, migrating sensitive corporate data to a 3rd...
Podcast
Oct 16, 2014
Many IAM projects struggle or even fail because demonstrating their benefit takes too long. Quick-wins that are visible to the end users are a key success factor for any IAM program. However, just showing quick-wins is not sufficient, unless there is a stable foundation for IAM delivered as...
Podcast
Sep 24, 2014
Most organisations fail to plan identity management in the Cloud. They adopt a variety of software-as-a-service solutions each requiring its own identity repository with a periodic synchronisation that fails to provide sufficient governance over de-provisioned accounts. This webinar looks at the...
Podcast
Sep 23, 2014
Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training impost...
Podcast
Sep 11, 2014
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
How Mature is your IAM Program
Maturity Models come of age already. They themselves have matured considerably. Like many other methodologies they have followed a certain hype cycle characteristics and have by now arrived on a plateau of general acceptance. Nevertheless rating the maturity of IAM/IAG programs is not easy. Therefore some questions arise when a maturity model is to be employed. What are these questions?
KuppingerCole Maturity Assessement Program
KC MAP offers a standardized approach to rate the status of current IT programs from both the Business and IT perspective. KC MAP identifies and prioritizes the fields of activity, delivers focused advice for further IT spending, advises on the current trends that are relevant to your organization.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole