English   Deutsch   Русский   中文    

Events

Upcoming events
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Leadership Seminar
Jan 29, 2015 in London, UK
Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means turning Big Data into Smart Information. However the realization of this vision is based on existing systems and infrastructure which contains known...
Leadership Seminar
Mar 11, 2015 in Vienna, Austria
An overall view on IAM/IAG and the various subtopics - define your own "big picture" for your future IAM infrastructure.
Leadership Seminar
Mar 12, 2015 in Vienna, Austria
Your business is changing. The IoT, mobile users, tight interaction with customers, mobility, etc.: Information Security has to enable this transformation by mitigating security risks.

Past events
Webinar
Dec 16, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Fuelled by the exponentially growing number of mobile devices, as well as by increasing adoption of cloud services, demand for various technologies that enable sharing information securely within organizations, as well as across their boundaries, has significantly surged. This demand is no longer...
Watch now 
Webinar
Dec 11, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Access Intelligence: Enabling insight at any time – not one year after, when recertifying again Imagine you have less work and better risk mitigation in your Access Governance program. What sounds hard to achieve can become reality, by complementing traditional approaches of Access Governance...
Watch now 
Webinar
Dec 09, 2014 4:00pm CET, 10:00am EST, 7:00am PST
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Watch now 
Webinar
Dec 04, 2014 16:00
Das Digitalzeitalter, die Verschmelzung der digitalen mit der „wirklichen“, der analogen Welt, verändert unser Geschäft grundlegend und irreversibel. Bestehende Geschäftsmodelle an die neuen Anforderungen anzupassen und neue Chancen wirksam und effizient zu nutzen, ist die große Herausforderung...
Watch now 
Leadership Seminar
Nov 27, 2014 in Frankfurt
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.
Leadership Seminar
Nov 26, 2014 in Frankfurt
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Webinar
Nov 25, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Privacy Impact Assessments (PIAs) are already or soon will be a legal requirement in many jurisdictions or sectors (i.e. payment cards sector). They provide a great help for institutions to focus on privacy and data flows and therefore provide an interesting entry point into an overall discussion...
Webinar
Nov 20, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Security in SAP environments is a key requirement of SAP customers. SAP systems are business critical. They must run reliably, they must remain secure – despite a growing number of attacks. There are various levels of security to enforce in SAP environments. It is not only about user management,...
Watch now 
Webinar
Nov 18, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Continued proliferation of cloud technologies offering on-demand scalability, flexibility and substantial cost savings means that more and more organizations are considering moving their applications and databases to IaaS or PaaS environments. However, migrating sensitive corporate data to a 3rd...
Watch now 
Webinar
Nov 11, 2014 11:00am CET
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Cyber Security
The reality is, regardless of size and product, your company can and will be attacked. If you are “cyber boring” you will be attacked so that the attackers can use your IT systems as a launchpad for another target. Know your attackers so you can start planning on how to best defend your organisation.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole