English   Deutsch   Русский   中文    
Research
Executive View
Sep 05, 2014 by Martin Kuppinger
Bei Enterprise Single Sign-On (E-SSO) handelt es sich um eine etablierte Technologie, die trotz der Fortschritte im Bereich Identity Federation auch heute noch eine wichtige Rolle spielt. Dies gilt auch im Hinblick auf die wachsende Zahl von Cloud-SSO-Lösungen, die als lokale, als...
Analysts' View
Over the last couple of years, challenges in the IT industry have led to the emergence of the “next-generation SIEM” or rather a completely new technology called Real-time Security Intelligence (RTSI). Although the market is still in its early stage, it is already possible to...
Blog
Sep 02, 2014 by Alexei Balaganski
Information security is just as old as Information Technology itself. As soon as organizations began to depend on IT systems to run their business processes and to store and process business information, it has become necessary to protect these systems from malicious attacks. First concepts of...
Blog
Sep 01, 2014 by Mike Small
A number of users of Microsoft’s OneDrive cloud storage system have reported problems on the Microsoft community relating to synchronizing files between devices. So far, I have not seen an official response from Microsoft. This can be very disconcerting so, in the absence of a response from...
Executive View
Aug 25, 2014 by Graham Williamson
Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool to...
Executive View
Aug 22, 2014 by Alexei Balaganski
CA Technologies is a multinational publicly held software company headquartered in New York, USA. Founded in 1976 to develop and sell mainframe software, over the decades CA Technologies has grown significantly via a series of strategic acquisitions. Although it used to produce consumer...
Executive View
Aug 18, 2014 by Martin Kuppinger
In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT...
Executive View
Aug 18, 2014 by Rob Newby
Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the database firewall component and the databases themselves. It also collects audit data from other sources such...
Executive View
Aug 14, 2014 by Martin Kuppinger
In contrast to common application servers, WSO2 provides a more comprehensive platform, adding on the one hand features such as event processing and business rule management, but on the other hand also providing strong support for security features. The latter includes WSO2 API Manager, which...
Executive View
Aug 14, 2014 by Alexei Balaganski
Druva’s approach to information protection is quite unique among traditional solutions, since instead of maintaining a centralized data storage and enabling secure access to it from outside, inSync maintains a centralized snapshot of data backed up from all endpoints and operates on this...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Conference
Jan 28 - 30, 2015 in Shenzhen, China
The Digital Risk and Security Conference 2015, taking place January 28–30th 2015 at the Intercontinental Hotel, Shenzhen, China, is where you will learn the latest in identity management, cloud technology and compliance requirements in the software industry. Thought leaders and experts in...
Webinar
Sep 23, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training impost...
Leadership Seminar
Sep 24, 2014 13:00 - 17:00 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Webinar
Sep 24, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
Most organisations fail to plan identity management in the Cloud. They adopt a variety of software-as-a-service solutions each requiring its own identity repository with a periodic synchronisation that fails to provide sufficient governance over de-provisioned accounts. This webinar looks at the...
Leadership Seminar
Sep 25, 2014 8:30 - 17:00 in München
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.
Leadership Seminar
Oct 01, 2014 8:30 - 17:00 in Frankfurt
Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.
Podcast
Sep 11, 2014
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
Podcast
Sep 01, 2014
What does it actually mean to be in the real time? It's really the convergence of three areas: SIEM (Security Incident and Event Management), forensics and Big Data. Big Data itself is still an area with the lack of clarity around it, but put simply, it's the ability to process large amounts of...
Podcast
Sep 01, 2014
Organizations depend upon their IT to run their business and to grow their profits into the future. Yet these IT systems are under a constant attack. Unfortunately, many of there attacks are only detected by outsiders rather than internally. Real-time Security Intelligence is a solution that's...
Podcast
Jul 30, 2014
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole