English   Deutsch   Русский   中文    
Research
Blog
Dec 15, 2014 by Karsten Kinast
The cloud is reality – but still legally controversial in the details. So what do we need to consider for the future with regard to liability, especially as there are few practical alternatives for data management in the cloud and many already see the cloud as unmatched in value from an economic...
Blog
Dec 11, 2014 by Martin Kuppinger
Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source for identity information, Identity Management has to address a far more complex environment today....
Blog
Dec 10, 2014 by Alexei Balaganski
Yesterday, culminating over 20 months of hard work, FIDO Alliance has published final 1.0 drafts of their Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F) specifications, apparently setting a world record in the process as the world’s fastest development of a standard in...
Executive View
Dec 09, 2014 by Dave Kearns
The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market...
Blog
Dec 08, 2014 by Alexei Balaganski
Or, if your Latin is a bit rusty, “who is guarding the guards themselves”? This was actually my first thought when I’ve read an article published by Heise Online. Apparently, popular security software from Kaspersky Lab, including at least their Internet Security and Antivirus, is still...
Blog
Dec 08, 2014 by Martin Kuppinger
There is a lot of talk about disruptive technology and disruptive innovation – not only in the context of fundamental technology changes, but also in the context of innovating your business by being disruptive. Cloud Computing has a potential for fostering such innovation in business, for...
Analysts' View
270 IT Security experts took part in the recent KuppingerCole digital risk and security awareness study. The results of this study will be published in December 2014. The results of the survey are not unexpected: 85.6% of the participants have seen an increase in the number of cyber security...
Executive View
Nov 28, 2014 by Martin Kuppinger
In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren...
Blog
Nov 26, 2014 by Alexei Balaganski
As if IT security community hasn’t had enough bad news recently, this week has begun with a big one: according to a report from Symantec, a new, highly sophisticated malware has been discovered, which the company dubbed “Regin”. Apparently, the level of complexity and customizability of the...
Advisory Note
Nov 17, 2014 by Mike Small
The vision for the Internet of Everything and Everyone is for more than just an Internet of Things; it makes bold promises for the individual as well as for businesses. However the realization of this vision is based on existing systems and infrastructure which contain known weaknesses.
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Leadership Seminar
Jan 29, 2015 09:00 - 17:00 in London, UK
Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means turning Big Data into Smart Information. However the realization of this vision is based on existing systems and infrastructure which contains known...
Leadership Seminar
Mar 11, 2015 08:30 - 17:00 in Vienna, Austria
An overall view on IAM/IAG and the various subtopics - define your own "big picture" for your future IAM infrastructure.
Leadership Seminar
Mar 12, 2015 08:30 - 17:00 in Vienna, Austria
Your business is changing. The IoT, mobile users, tight interaction with customers, mobility, etc.: Information Security has to enable this transformation by mitigating security risks.
Podcast
Dec 17, 2014
Fuelled by the exponentially growing number of mobile devices, as well as by increasing adoption of cloud services, demand for various technologies that enable sharing information securely within organizations, as well as across their boundaries, has significantly surged. This demand is no longer...
Podcast
Dec 12, 2014
Access Intelligence: Enabling insight at any time – not one year after, when recertifying again Imagine you have less work and better risk mitigation in your Access Governance program. What sounds hard to achieve can become reality, by complementing traditional approaches of Access Governance...
Podcast
Dec 10, 2014
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Podcast
Dec 05, 2014
Das Digitalzeitalter, die Verschmelzung der digitalen mit der „wirklichen“, der analogen Welt, verändert unser Geschäft grundlegend und irreversibel. Bestehende Geschäftsmodelle an die neuen Anforderungen anzupassen und neue Chancen wirksam und effizient zu nutzen, ist die große Herausforderung...
Podcast
Nov 27, 2014
European Identity & Cloud Conference 2015, taking place May 5 – 8, 2015 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany, is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of...
Podcast
Nov 21, 2014
Security in SAP environments is a key requirement of SAP customers. SAP systems are business critical. They must run reliably, they must remain secure – despite a growing number of attacks. There are various levels of security to enforce in SAP environments. It is not only about user management,...
Podcast
Nov 19, 2014
Continued proliferation of cloud technologies offering on-demand scalability, flexibility and substantial cost savings means that more and more organizations are considering moving their applications and databases to IaaS or PaaS environments. However, migrating sensitive corporate data to a 3rd...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Cyber Security
The reality is, regardless of size and product, your company can and will be attacked. If you are “cyber boring” you will be attacked so that the attackers can use your IT systems as a launchpad for another target. Know your attackers so you can start planning on how to best defend your organisation.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole