English   Deutsch      
Research
Executive View
Aug 18, 2014 by Martin Kuppinger
In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT...
Executive View
Aug 18, 2014 by Rob Newby
Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the database firewall component and the databases themselves. It also collects audit data from other sources such...
Executive View
Aug 14, 2014 by Martin Kuppinger
In contrast to common application servers, WSO2 provides a more comprehensive platform, adding on the one hand features such as event processing and business rule management, but on the other hand also providing strong support for security features. The latter includes WSO2 API Manager, which...
Executive View
Aug 14, 2014 by Alexei Balaganski
Druva’s approach to information protection is quite unique among traditional solutions, since instead of maintaining a centralized data storage and enabling secure access to it from outside, inSync maintains a centralized snapshot of data backed up from all endpoints and operates on this...
Blog
Aug 08, 2014 by Martin Kuppinger
Controls in security and GRC (Governance, Risk Management, and Compliance) systems are commonly structured in preventive, detective, and reactive controls. When we look at IAM/IAG (Identity and Access Management/Governance), we can observe a journey from the initial focus on preventive controls...
Blog
Aug 07, 2014 by Alexei Balaganski
Large-scale security breaches are nothing new. Last December we’ve heard about the American retail chain Target’s network hack, when over 40 million credit cards and 70 million addresses have been stolen. This May, eBay announced that hackers got away with more than 145 million of their customer...
Blog
Aug 05, 2014 by Mike Small
Using the cloud involves an element of trust between the consumer and the provider of a cloud service; however, it is vital to verify that this trust is well founded. Assurance is the process that provides this verification. This article summarizes the steps a cloud customer needs to take to...
Blog
Aug 05, 2014 by Martin Kuppinger
The recent US court decision has added to the concerns of EU customers (and of other regions such as APAC) regarding the use of Cloud services from US-based providers. The decision orders Microsoft to turn over a customer’s emails stored in Ireland to the US government. The decision required the...
Executive View
Aug 04, 2014 by Mike Small
The word risk is in common use and means different things to different people. This range of use of the word risk makes for potential misunderstandings. This is especially the case where IT related risks are being discussed in a business context. This report is intended to introduce IT...
Blog
Jul 31, 2014 by Martin Kuppinger
A while ago I blogged about IBM being back as a leader in the IAM/IAG (Identity Access Management/Governance) market. Today the news that IBM is to acquire CrossIdeas, an Italian vendor in the Access Governance market, hit the wire. CrossIdeas is a key player in Access Governance in its home...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar
Sep 11, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
Webinar
Sep 23, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training impost...
Seminar
Sep 24, 2014 13:00 - 17:00 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Sep 25, 2014 8:30 - 17:00 in München
Vom Legacy Provisioning zu einer zukunftsfähigen IAM Infrastruktur. Bestimmen Sie den “Reifegrad” Ihrer gegenwärtigen Provisioninglösung aus technischer und organisatorischer Perspektive Der Blick über das reine Provisioning hinaus: Welche Rolle spielen Access Governance und Cloud...
Leadership Seminar
Oct 01, 2014 8:30 - 17:00 in Frankfurt
Fit für die Zukunft: Wie Sie für die IAM Infrastruktur Ihres Unternehmens die optimale Balance zwischen Sicherheit und Produktivität finden. Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. Enterprise Single Sign-On, Identity...
Leadership Seminar
Oct 07, 2014 09:00 - 17:00 in London, UK
Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means turning Big Data into Smart Information. However the realization of this vision is based on existing systems and infrastructure which contains known...
Podcast
Jul 30, 2014
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
Podcast
Jul 04, 2014
Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services such...
Podcast
Jun 25, 2014
The challenges you face are not getting any easier. You need to provision user access efficiently and effectively and maintain regulatory compliance while simultaneously protecting company assets by identifying and eliminating risk. It’s a daunting task. How can you quickly and easily assess...
Podcast
May 29, 2014
EIC Awards ceremony at the European Identity & Cloud Conference 2014 May 14, 2014 at Munich, Germany
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Cloud Provider Assurance
Using the cloud involves an element of trust between the consumer and the provider of a cloud service; however, it is vital to verify that this trust is well founded. Assurance is the process that provides this verification. The first step towards assuring a cloud service is to understand the business requirements for it. The needs for cost, compliance and security follow directly from these requirements. There is no absolute assurance level for a cloud service – it needs to be just as secure, compliant and cost effective as dictated by the business needs –– no more and no less.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole