English   Deutsch

Events

Upcoming events
Congress
13.05. - 16.05.2014 in Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Seminar
20.05.2014 in Singapore
Pre-Program: Identity and Access Management - Where to Start? Morning: Access Governance for both on premises applications and Cloud & Mobile Afternoon: Dynamic Externalised Authorisation Management with the move from Role to Policy Based Access control.
Seminar
22.05.2014 in Shenzhen, China
Join us for an Identity and Access Management seminar day jointly supported by KuppingerCole (Asia Pacific) and the Shenzhen IT Compliance Association.
Seminar
23.05.2014 in Hong Kong
Pre-Program: Identity and Access Management - Where to Start? Morning: Access Governance for both on premises applications and Cloud & Mobile Afternoon: Dynamic Externalised Authorisation Management with the move from Role to Policy Based Access control.
Seminar
17.06.2014 in Melbourne, Australia
Pre-Program: Getting Started with Identity and Access Management. Morning: Access Governance; how to control On Premise, Cloud and Mobile applications, and Dynamic Externalised Authorisation Management. Afternoon: Moving to the Cloud, practical steps to managing identities and recommendations...
Business & Technology Breakfast
18.06.2014, 7:30am - 9:30am in Sydney, Australia
Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure.
 
Upcoming webinars
Webinar
29.04.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about more than a single technology.
Webinar
30.04.2014, 6:00pm CET, 12:00pm EDT, 9:00am PDT
Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external users such as customers and partners is not easy. This new ABC – the Agile Business: Connected – is the challenge.
Webinar
06.05.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the...

Past events
Webinar
10.04.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
In this KuppingerCole Webinar, we will look at Enterprise Single Sign-On (E-SSO) and the alternatives. Starting with the use cases for single sign-on and related scenarios, we will analyze the technical alternatives. We look at various aspects such as the time for implementation, the reach...
WATCH NOW 
Webinar
08.04.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
Many organizations currently consider migrating away from their current Identity Provisioning solution. There are many reasons to do so: vendors became acquired and the roadmap changed; the requirements have changed and the current solution does not appear being a perfect fit anymore; a lot of...
WATCH NOW 
Webinar
03.04.2014, 11:00 Uhr
Access Governance ist inzwischen eine etablierte Disziplin innerhalb der Governance- und Informationssicherheitsorganisation von Unternehmen. Mit Access Intelligence-Funktionen werden vermehrt zusätzliche Analysedienste bereitgestellt, mit deren Hilfe man besondere Risiken beispielsweise durch...
WATCH NOW 
Webinar
25.03.2014, 4:00pm CET, 11:00am EDT, 8:00am PDT
"To cloud or not to cloud?" - this is no longer the question. It is rather to what extent and depth enterprises leverage cloud computing. With identity and access management (IAM) solutions for their internal IT systems, enterprises have achieved a high level of security, transparency and...
WATCH NOW 
Webinar
24.03.2014, 4:00pm CET, 11:00am EDT, 8:00am PDT
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase...
WATCH NOW 
Webinar
20.03.2014, 11:00 Uhr
Die “Identity Explosion” stellt Unternehmen vor neue Herausforderungen. Statt sich beim IAM (Identity und Access Management) primär um die Mitarbeiter zu kümmern, muss man im „Extended Enterprise“ auch Geschäftspartner und oftmals Millionen von Kunden verwalten und ihnen kontrollierten Zugriff...
WATCH NOW 
Webinar
11.03.2014, 6:00pm CET, 1:00pm EDT, 10:00am PDT
The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.
WATCH NOW 
Business & Technology Breakfast
05.03.2014, 7:30am - 9:30am HKT in Hong Kong
Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure.
Seminar
19.02.2014, 7:30am - 4:30pm AEDT in Canberra, Australia
Deep dives into technology & architectures: The Identity & Access Management Experts Day is the place, where you meet with Identity & Access Management experts for in-depth discussion on the future of Identity Management, Cloud Computing and Information Security.
Webinar
18.02.2014, 11:00 Uhr
Unternehmen verändern sich schneller denn je. Die Zusammenarbeit mit Kunden und Geschäftspartnern in neuen Geschäftsmodellen führt zu immer neuen Anforderungen an die IT. Diese muss reagieren und die Business-Innovationen unterstützen, statt sie zu behindern. BYOI (Bring Your Own Identity) und...
WATCH NOW 
Business & Technology Breakfast
18.02.2014, 7:30am - 9:00am AEDT in Melbourne, Australia
Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now, is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers and...
Webinar
28.01.2014, 11:00 Uhr
Geschäftliche Informationen machen einen wesentlichen Teil des Unternehmenswertes aus. Diese Informationen sind aber gefährdeter als jemals zuvor. Diese Gefahr entsteht aber keineswegs nur durch externe Angriffe, sondern in hohem Maße immer noch durch interne Anwender mit umfassenden Berechtigungen.
WATCH NOW 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole