English   Deutsch   Русский   中文    
Research
Blog
Sep 30, 2014 by Alexei Balaganski
GlobalSign, one of the world’s biggest certificate authorities and a leading provider of digital identity services, has announced today that it has acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management solutions. Last year,...
Blog
Sep 29, 2014 by Alexei Balaganski
Half a year has passed since the discovery of the dreaded Heardbleed bug, and the shock of that incident, which many have dubbed the most serious security flaw in years, has finally begun to wear off. Then the security community has been shocked again last week, when details of a new critical...
Blog
Sep 27, 2014 by Mike Small
UK CESG, the definitive voice on the technical aspects of Information Security in UK Government, has published draft versions of guidance for “public sector organizations who are considering using cloud services for handling OFFICIAL information”. (Note that the guidelines are still at a draft...
Executive View
Sep 05, 2014 by Martin Kuppinger
Bei Enterprise Single Sign-On (E-SSO) handelt es sich um eine etablierte Technologie, die trotz der Fortschritte im Bereich Identity Federation auch heute noch eine wichtige Rolle spielt. Dies gilt auch im Hinblick auf die wachsende Zahl von Cloud-SSO-Lösungen, die als lokale, als...
Analysts' View
Over the last couple of years, challenges in the IT industry have led to the emergence of the “next-generation SIEM” or rather a completely new technology called Real-time Security Intelligence (RTSI). Although the market is still in its early stage, it is already possible to...
Blog
Sep 02, 2014 by Alexei Balaganski
Information security is just as old as Information Technology itself. As soon as organizations began to depend on IT systems to run their business processes and to store and process business information, it has become necessary to protect these systems from malicious attacks. First concepts of...
Blog
Sep 01, 2014 by Mike Small
A number of users of Microsoft’s OneDrive cloud storage system have reported problems on the Microsoft community relating to synchronizing files between devices. So far, I have not seen an official response from Microsoft. This can be very disconcerting so, in the absence of a response from...
Executive View
Aug 25, 2014 by Graham Williamson
Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool to...
Executive View
Aug 22, 2014 by Alexei Balaganski
CA Technologies is a multinational publicly held software company headquartered in New York, USA. Founded in 1976 to develop and sell mainframe software, over the decades CA Technologies has grown significantly via a series of strategic acquisitions. Although it used to produce consumer...
Executive View
Aug 18, 2014 by Martin Kuppinger
In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Conference
Jan 28 - 30, 2015 in Shenzhen, China
The Digital Risk and Security Conference 2015, taking place January 28–30th 2015 at the Intercontinental Hotel, Shenzhen, China, is where you will learn the latest in identity management, cloud technology and compliance requirements in the software industry. Thought leaders and experts in...
Leadership Seminar
Sep 30, 2014 13:00 - 17:00 in Frankfurt
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Oct 01, 2014 8:30 - 17:00 in Frankfurt
Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.
Webinar
Oct 16, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Many IAM projects struggle or even fail because demonstrating their benefit takes too long. Quick-wins that are visible to the end users are a key success factor for any IAM program. However, just showing quick-wins is not sufficient, unless there is a stable foundation for IAM delivered as...
Webinar
Nov 11, 2014 11:00am CET
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To...
Leadership Seminar
Nov 12, 2014 13:00 - 17:00 in Stuttgart
Erhalten Sie einen Überblick zur Echtzeit-Überwachung mit Hilfe von Big Data Tools und lernen Sie wie Sie die datenschutzrechtlichen Regulatorien im Kontext der Netzwerküberwachung einhalten.
Podcast
Sep 24, 2014
Most organisations fail to plan identity management in the Cloud. They adopt a variety of software-as-a-service solutions each requiring its own identity repository with a periodic synchronisation that fails to provide sufficient governance over de-provisioned accounts. This webinar looks at the...
Podcast
Sep 23, 2014
Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training impost...
Podcast
Sep 11, 2014
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
Podcast
Sep 01, 2014
What does it actually mean to be in the real time? It's really the convergence of three areas: SIEM (Security Incident and Event Management), forensics and Big Data. Big Data itself is still an area with the lack of clarity around it, but put simply, it's the ability to process large amounts of...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole