English   Deutsch  
Research
Blog
Jul 23, 2014 by Alexei Balaganski
On Tuesday, security company Trend Micro has unveiled a long and detailed report on "Operation Emmental", an ongoing attack on online banking sites in several countries around the world. This attack is able to bypass the popular mTAN two-factor authentication scheme, which uses SMS messages to...
Blog
Jul 18, 2014 by Alexei Balaganski
So, unless you've been hiding under a rock this week, you've definitely heard about a historical global partnership deal forged between IBM and Apple this Tuesday. The whole Internet's been abuzz for the last few days, discussing what long-term benefits the partnership will bring to both...
Executive Views
Jul 18, 2014 by Mike Small
Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT systems. ...
Leadership Compass
Jul 17, 2014 by Martin Kuppinger
Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market.
Blog
Jul 16, 2014 by Karsten Kinast
Cloud computing allows individuals, businesses and the public sector to store their data and carry out data processing in remote data centers, saving on average 10-20%. Yet there is scope for improvement when it comes to the trust in these services. The new EU-guidelines, developed by a Cloud...
Leadership Compass
Jul 15, 2014 by Martin Kuppinger
The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access...
Blog
Jul 14, 2014 by Alexei Balaganski
Since launching its Web Services in 2006, Amazon has been steadily pushing towards global market leadership by continuously expanding the scope of their services, increasing scalability and maintaining low prices. Last week, Amazon has made another big announcement, introducing two major new...
Executive Views
Jul 14, 2014 by Martin Kuppinger
Die Ergon Informatik AG ist ein in Zürich ansässiges Unternehmen. Neben einem großen Unternehmensbereich für Software-Individualentwicklungen ist Ergon schon seit vielen Jahren auch als Anbieter von Standard-Software am Markt präsent und hat eine signifikante Zahl von...
Executive Views
Jul 14, 2014 by Martin Kuppinger
Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single sign-on service for multiple devices and for cloud-based applications. The company is VC funded and has...
Blog
Jul 10, 2014 by Alexei Balaganski
It really didn't take long after my last blog post on SCADA security for an exciting new development to appear in the press. Several security vendors, including Symantec and F-Secure, have revealed new information about a hacker group "Dragonfly" (or alternatively "Energetic bear") that has...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar
Jul 30, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
Webinar
Sep 11, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
Seminar
Sep 24, 2014 13:00 - 17:00 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Sep 25, 2014 8:30 - 17:00 in München
Vom Legacy Provisioning zu einer zukunftsfähigen IAM Infrastruktur. Bestimmen Sie den “Reifegrad” Ihrer gegenwärtigen Provisioninglösung aus technischer und organisatorischer Perspektive Der Blick über das reine Provisioning hinaus: Welche Rolle spielen Access Governance und Cloud...
Leadership Seminar
Oct 01, 2014 8:30 - 17:00 in Frankfurt
Fit für die Zukunft: Wie Sie für die IAM Infrastruktur Ihres Unternehmens die optimale Balance zwischen Sicherheit und Produktivität finden. Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. Enterprise Single Sign-On, Identity...
Leadership Seminar
Oct 07, 2014 09:00 - 17:00 in London, UK
Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means turning Big Data into Smart Information. However the realization of this vision is based on existing systems and infrastructure which contains known...
Podcast
Jul 04, 2014
Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services such...
Podcast
Jun 25, 2014
The challenges you face are not getting any easier. You need to provision user access efficiently and effectively and maintain regulatory compliance while simultaneously protecting company assets by identifying and eliminating risk. It’s a daunting task. How can you quickly and easily assess...
Podcast
May 29, 2014
EIC Awards ceremony at the European Identity & Cloud Conference 2014 May 14, 2014 at Munich, Germany
Podcast
May 28, 2014
Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Extending your Active Directory to the Cloud
There are new options now to extend the existing AD to the cloud and to serve new business demand of on-boarding, off-boarding, and managing business partners and customers – delivered by Microsoft and other players in the market. This creates a situation for organizations using AD in which they should start reviewing and rethinking their Active Directory strategy.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole