English   Deutsch   Русский   中文    

Events

Upcoming events
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Conference
Jan 28 - 30, 2015 in Shenzhen, China
The Digital Risk and Security Conference 2015, taking place January 28–30th 2015 at the Intercontinental Hotel, Shenzhen, China, is where you will learn the latest in identity management, cloud technology and compliance requirements in the software industry. Thought leaders and experts in...
Webinar
Nov 04, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Imagine you could use just one card to access your company building and to authenticate to your computer. Imagine you had only one process for all access, instead of having to queue at the gate waiting for new cards to be issued and having to call the helpdesk because the system access you...
Leadership Seminar
Nov 05, 2014 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Nov 06, 2014 in München
Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.
Webinar
Nov 11, 2014 11:00am CET
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To...
Webinar
Nov 18, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Continued proliferation of cloud technologies offering on-demand scalability, flexibility and substantial cost savings means that more and more organizations are considering moving their applications and databases to IaaS or PaaS environments. However, migrating sensitive corporate data to a 3rd...
Webinar
Nov 20, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Security in SAP environments is a key requirement of SAP customers. SAP systems are business critical. They must run reliably, they must remain secure – despite a growing number of attacks. There are various levels of security to enforce in SAP environments. It is not only about user management,...
Leadership Seminar
Nov 26, 2014 in Frankfurt
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Nov 27, 2014 in Frankfurt
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.

Past events
Webinar
Oct 16, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Many IAM projects struggle or even fail because demonstrating their benefit takes too long. Quick-wins that are visible to the end users are a key success factor for any IAM program. However, just showing quick-wins is not sufficient, unless there is a stable foundation for IAM delivered as...
Watch now 
Leadership Seminar
Oct 01, 2014 in Frankfurt
Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.
Leadership Seminar
Sep 30, 2014 in Frankfurt
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Sep 25, 2014 in München
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.
Leadership Seminar
Sep 24, 2014 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Webinar
Sep 24, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
Most organisations fail to plan identity management in the Cloud. They adopt a variety of software-as-a-service solutions each requiring its own identity repository with a periodic synchronisation that fails to provide sufficient governance over de-provisioned accounts. This webinar looks at the...
Watch now 
Webinar
Sep 23, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training impost...
Watch now 
Webinar
Sep 11, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to...
Watch now 
Webinar
Jul 30, 2014 8:00am GST, 12:00pm SGT, 2:00pm AEST
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
Watch now 
Webinar
Jul 03, 2014 4:00pm CET, 10:00am EDT, 7:00am PDT
Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services such...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
How Mature is your IAM Program
Maturity Models come of age already. They themselves have matured considerably. Like many other methodologies they have followed a certain hype cycle characteristics and have by now arrived on a plateau of general acceptance. Nevertheless rating the maturity of IAM/IAG programs is not easy. Therefore some questions arise when a maturity model is to be employed. What are these questions?
KuppingerCole Maturity Assessement Program
KC MAP offers a standardized approach to rate the status of current IT programs from both the Business and IT perspective. KC MAP identifies and prioritizes the fields of activity, delivers focused advice for further IT spending, advises on the current trends that are relevant to your organization.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole