English   Deutsch

Past events

2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007

2014
Webinar
10.04.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
In this KuppingerCole Webinar, we will look at Enterprise Single Sign-On (E-SSO) and the alternatives. Starting with the use cases for single sign-on and related scenarios, we will analyze the technical alternatives. We look at various aspects such as the time for implementation, the reach...
WATCH NOW 
Webinar
08.04.2014, 4:00pm CET, 10:00am EDT, 7:00am PDT
Many organizations currently consider migrating away from their current Identity Provisioning solution. There are many reasons to do so: vendors became acquired and the roadmap changed; the requirements have changed and the current solution does not appear being a perfect fit anymore; a lot of...
WATCH NOW 
Webinar
03.04.2014, 11:00 Uhr
Access Governance ist inzwischen eine etablierte Disziplin innerhalb der Governance- und Informationssicherheitsorganisation von Unternehmen. Mit Access Intelligence-Funktionen werden vermehrt zusätzliche Analysedienste bereitgestellt, mit deren Hilfe man besondere Risiken beispielsweise durch...
WATCH NOW 
Webinar
25.03.2014, 4:00pm CET, 11:00am EDT, 8:00am PDT
"To cloud or not to cloud?" - this is no longer the question. It is rather to what extent and depth enterprises leverage cloud computing. With identity and access management (IAM) solutions for their internal IT systems, enterprises have achieved a high level of security, transparency and...
WATCH NOW 
Webinar
24.03.2014, 4:00pm CET, 11:00am EDT, 8:00am PDT
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase...
WATCH NOW 
Webinar
20.03.2014, 11:00 Uhr
Die “Identity Explosion” stellt Unternehmen vor neue Herausforderungen. Statt sich beim IAM (Identity und Access Management) primär um die Mitarbeiter zu kümmern, muss man im „Extended Enterprise“ auch Geschäftspartner und oftmals Millionen von Kunden verwalten und ihnen kontrollierten Zugriff...
WATCH NOW 
Webinar
11.03.2014, 6:00pm CET, 1:00pm EDT, 10:00am PDT
The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information.
WATCH NOW 
Business & Technology Breakfast
05.03.2014, 7:30am - 9:30am HKT in Hong Kong
Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure.
Seminar
19.02.2014, 7:30am - 4:30pm AEDT in Canberra, Australia
Deep dives into technology & architectures: The Identity & Access Management Experts Day is the place, where you meet with Identity & Access Management experts for in-depth discussion on the future of Identity Management, Cloud Computing and Information Security.
Business & Technology Breakfast
18.02.2014, 7:30am - 9:00am AEDT in Melbourne, Australia
Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now, is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers and...
Webinar
18.02.2014, 11:00 Uhr
Unternehmen verändern sich schneller denn je. Die Zusammenarbeit mit Kunden und Geschäftspartnern in neuen Geschäftsmodellen führt zu immer neuen Anforderungen an die IT. Diese muss reagieren und die Business-Innovationen unterstützen, statt sie zu behindern. BYOI (Bring Your Own Identity) und...
WATCH NOW 
Webinar
28.01.2014, 11:00 Uhr
Geschäftliche Informationen machen einen wesentlichen Teil des Unternehmenswertes aus. Diese Informationen sind aber gefährdeter als jemals zuvor. Diese Gefahr entsteht aber keineswegs nur durch externe Angriffe, sondern in hohem Maße immer noch durch interne Anwender mit umfassenden Berechtigungen.
WATCH NOW 
Business & Technology Breakfast
23.01.2014, 7:30am - 9:00am SGT in Singapore
Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. Join KuppingerCole APAC in this...
Webinar
16.01.2014, 11:00 Uhr
Aussagen von Auditoren zu Risiken durch privilegierte Nutzer sind nicht wirklich nötig, um ein besonderes Augenmerk auf privilegierte Zugriffe zu werfen.
WATCH NOW 

2013
Webinar
19.12.2013, 5:00pm CET, 11:00am EST, 8:00am PST
With an increasing number of fraud incidents, customer data losses and other breaches on one side, and the disappearance of the classical perimeter because of the need to finally extend the enterprise to partners and customers on the other side, introducing Big Data for Security Analytics seems...
WATCH NOW 
Webinar
10.12.2013, 6:00pm CET, 12:00pm EST, 9:00am PST
In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important to...
WATCH NOW 
Webinar
04.12.2013, 4:00pm CET, 10:00am EST, 7:00am PST
Many organizations have started their journey into the world of IAM several years ago.
WATCH NOW 
Business & Technology Breakfast
03.12.2013, 07:30 - 10:00 AEDT in Canberra, Australia
Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. Join KuppingerCole APAC in this...
Conference
27.11. - 28.11.2013 in Frankfurt, Germany
The Information Risk & Security Summit Frankfurt 2013, taking place on November 27 – 28, 2013 at the Frankfurter Innovationszentrum FIZ Conference Lab, Frankfurt/Germany, offers an unseen combination of thought leadership and interactive session formats, tackling the most demanding questions IT...
Webinar
19.11.2013, 5:00pm CET, 11:00am EST, 8:00am PST
Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It is not...
WATCH NOW 
Webinar
05.11.2013, 4:00pm CET, 10:00am EST, 7:00am PST
The cloud is a hot topic and most SDOs (Standards Defining Organizations) have at least one initiative in this area. This plethora of initiatives has confronted the users of cloud services as well as CSPs (Cloud Service Providers) with a jungle of frameworks, standards, advice and certifications....
WATCH NOW 
Webinar
22.10.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Identity Information Quality has been a challenge since the early days of IAM, and it remains top of the list in many projects. Good quality of identity information is the foundation of any information security initiative. In this webinar, we will discuss strategies and solutions to improve...
WATCH NOW 
Webinar
17.10.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Managing access to information and services deployed anwhere for employees, partners and customers in any context on any type of device owned by any party involved - there couldn´t be a much more challenging task. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce...
WATCH NOW 
Webinar
15.10.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
The ever increasing challenge of meeting regulatory compliance is putting more and more pressure on your information security budget? Then it may be time to include some legal arguments to convince your management that you need to spend more on information security. In this webinar,...
WATCH NOW 
Webinar
09.10.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Information Security is hard to measure. If your security strategy fits well into your organization´s needs, then the risks are low and there is hardly anything happening that you could measure. Or, the other way round - the more you can measure, the more your job is at risk. True? Join us in...
WATCH NOW 
Webinar
08.10.2013, 11:00 Uhr
Die neuesten Enthüllungen über die Angriffe westlicher Geheimdienste, allen voran der NSA, auf kryptografische Implementierungen sorgen verbreitet für Unsicherheit darüber, wie man sich mit welchen heute verfügbaren Werkzeugen noch wirksam vor dem Ausspionieren schützen kann. In diesem Webinar...
WATCH NOW 
Webinar
08.10.2013, 10:00 Uhr
Die NSA und ihre Helfer in Europa und Deutschland haben gewaltige Möglichkeiten, sich in Ihr berufliches und privates digitales Leben unbemerkt einzuschleichen. Die jüngsten Enthüllungen zur Entschlüsselungspraxis der NSA und den Zugriff auf Smartphones steigern einerseits die Beunruhigung....
WATCH NOW 
Webinar
04.10.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Cloud services are outside the direct control of the customer organization and their use places control of the IT service and infrastructure in the hands of the CSP (Cloud Service Provider). A structured approach is essential to ensure organizational readiness for the cloud, to select the right...
WATCH NOW 
Webinar
26.09.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for...
WATCH NOW 
Webinar
24.09.2013, 5:00pm CEST, 11:00am EDT, 8:00am PDT
Today’s businesses have to be far more agile than ever before. Competing on global scale, economic turmoil, rapid innovation and other factors put pressure on organizations. One of the results is that businesses have to be better connected with other businesses and customers than ever before....
WATCH NOW 
Webinar
17.09.2013, 14:00 Uhr
Die NSA und ihre Helfer in Europa und Deutschland haben gewaltige Möglichkeiten, sich in Ihr berufliches und privates digitales Leben unbemerkt einzuschleichen. Die jüngsten Enthüllungen zur Entschlüsselungspraxis der NSA und den Zugriff auf Smartphones steigern einerseits die Beunruhigung....
Webinar
23.07.2013, 4:00pm CEST, 10:00am EDT, 2:00pm GMT
Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and...
WATCH NOW 
Webinar
09.07.2013, 16:00 Uhr
Das organisierte und systematische Ausspionieren von Privatpersonen und Unternehmen durch staatliche Einrichtungen ist zwar nicht neu und keineswegs auf US-Einrichtungen beschränkt. Aber es ist durch die jüngsten Enthüllungen in Zusammenhang mit dem PRISM Projekt der US-Sicherheitsbehörde NSA...
WATCH NOW 
Webinar
03.07.2013, 4:00pm CEST, 10:00am EDT, 2:00pm GMT
With the recent unveiling of systematic and large scale espionage activities conducted by US government agencies, the level of trust into cloud services run and controlled by 3rd parties has reached a new low. Google, Facebook, Skype, Apple, Verizon and many other service providers did open their...
WATCH NOW 
Webinar
06.06.2013, 4:00pm CEST, 10:00am EDT, 2:00pm GMT
Martin Kuppinger and Craig Burton will discuss about how the "Computing Troika" Cloud, Mobile and Social Computing will necessarily influence SAP´s products and Services strategies.
WATCH NOW 
Congress
14.05. - 17.05.2013 in Munich/Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar
10.05.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as...
WATCH NOW 
Webinar
26.04.2013, 11:00 Uhr
Das Benutzer- und Berechtigungsmanagement ist ein Thema für Unternehmen jeder Größenordnung. Während große Unternehmen meist schon seit längerer Zeit den Schritt hin zu einer zentralen Infrastruktur für IAM (Identity and Access Management) gemacht haben, ist die Situation im Mittelstand häufig...
WATCH NOW 
Webinar
23.04.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within...
WATCH NOW 
Webinar
16.04.2013, 4:00pm CEST, 10:00am EDT, 7:00am PDT
The world of Identity and Access Management is growing in scope, and must change and adapt faster than ever before. CIOs are under pressure to shift from employee-centric IAM to consumer-facing IAM that drives top-line revenue. As a result, they are quickly learning that legacy enterprise IAM...
WATCH NOW 
Webinar
09.04.2013, 16:00 CEST, 10:00am EDT
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s key topics and speakers.
WATCH NOW 
Webinar
21.03.2013, 16:00 CET, 11:00am EDT, 8:00am PDT
Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to...
WATCH NOW 
Webinar
19.03.2013, 15:00 CET, 10:00am EDT
Join KuppingerCole Senior Analyst Mike Small and TITUS CTO Steph Charbonneau in this Webinar to learn the Major causes of information loss and leakage and how to avoid them by bringing structure to Information through Information Stewardship.
WATCH NOW 
Webinar
15.03.2013, 11:00 Uhr
In diesem Webinar beschreibt KuppingerCole Principal Analyst Martin Kuppinger unterschiedliche Architekturkonzepte, verfügbare Produkte und deren mögliche Rolle in IAM / GRC-Gesamtlösungen im SAP-Umfeld. Richtig gemacht, können Unternehmen durch einen integrativen Ansatz für IAM und GRC ihre...
WATCH NOW 
Webinar
12.03.2013, 4:00pm CET, 11:00am EST
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s Agenda and speakers.
WATCH NOW 
Webinar
07.03.2013, 11:00 Uhr
Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue...
WATCH NOW 
Webinar
31.01.2013, 3:00pm CET, 9:00am EST
The convergence of Cloud, Mobile and Social Computing create strong new opportunities and change the way we use Information Technology, shifting the control into the hands of the users. Governing identity and access in such a complex environment is key to success. Join us in this webinar to...
WATCH NOW 
Webinar
22.01.2013, 4:00pm CET, 10:00am EST
The European Identity & Cloud Conference (EIC) 2013 once again will be Europe´s most important event exploring the future of information technology. Join us in this webinar for a compehensive preview on this year´s key topics and speakers.
WATCH NOW 

2012
Webinar
12.12.2012, 4pm CET, 10am EST, 7am PST
SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the...
WATCH NOW 
Webinar
04.12.2012, 16:00 CET, 10am EST, 7am PST
Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.
WATCH NOW 
Webinar
30.11.2012, 11:00 Uhr
Herkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing...
WATCH NOW 
Webinar
29.11.2012, 4pm CET, 10am EST, 7am PST
Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest Software...
WATCH NOW 
Webinar
08.11.2012, 4:00pm CET, 10:00am EST
Selecting your Cloud Service Provider right and making sure that he steadily delivers on his promise - this needs processes in place at your organization enabling a structured way of selecting an appropriate cloud service from a myriade of offerings availabe in the market, and laying the...
WATCH NOW 
Webinar
06.11.2012, 16:00 CET, 10am EST
Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access...
WATCH NOW 
Webinar
30.10.2012, 17:00 CET, 12:00 ET
Big players like salesforce.com entering the market: Will this redefine the way we do IAM and solve our challenges in the days of Cloud Computing, Mobile Computing, and Social Computing?
WATCH NOW 
Webinar
24.10.2012, 16:00 CEST, 10:00am EDT, 14:00 GMT
Given the importance of Identity Management and Governance as a foundation for efficient security and compliance processes, organizations are evaluating the future viability of their existing implementations, but are equally concerned that switching vendors will be a costly, time-consuming...
Webinar
16.10.2012, 16:00 CEST, 10:00am EDT
In an API Economy, everyone and everything has an API. That means 26 billion APIs by the year 2015. What is your organization doing to prepare for this fundamental shift in IT infrastructure? Join KuppingerCole´s Distinguished Analyst Craig Burton and Layer 7 Technologies CTO Scott Morrison in...
WATCH NOW 
Webinar
09.10.2012, 16:00 Uhr
Als böten traditionelle Infrastrukturen mit ihren Schwachstellen und Angriffspunkten nicht bereits genügend Risiken, machen IT-Konsumerisierung, Social Media im Unternehmen und alle damit verbundenen Veränderungen die Ungewissheit zum Standard. Traditionelles Risk Management stößt hier an seine...
WATCH NOW 
Webinar
27.09.2012, 11:00 Uhr
Komplexe Organisationsstrukturen, Legionen unterschiedlicher Zielplattformen und -Systeme, kombiniert mit einer großen Zahl schlecht dokumentierter Legacy-Systeme - das Management privilegierter Benutzerkonten und die von solchen Konten ausgehenden hohen Risiken für die Informationssicherheit...
WATCH NOW 
Webinar
19.09.2012, 11:00 Uhr
Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue...
WATCH NOW 
Webinar
18.09.2012, 16:00 CEST, 10am EDT, 14:00 GMT
A plethora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,”...
WATCH NOW 
Webinar
14.09.2012, 16:00 CEST, 10am EDT
Is SAML a dead protocol or just a walking Zombie ready to consume all enterprise brains? Or is it yet alive and well both in legacy and the future? Attend this webinar to join the discussion KuppingerCole´s Distinguished Analyst Craig Burton about health and well being of the Federated sign-on...
WATCH NOW 
Conference
13.09.2012, 9:00 - 17:00 Uhr
Mit Macht drängt die „Generation Y“ auf den Arbeitsmarkt und übernimmt Verantwortung in den Unternehmen. Aufgewachsen mit dem Internet, geübt im Umgang mit den neuesten mobilen Gadgets und daran gewöhnt, dass ein neuer Kontakt nur einen Mausklick entfernt ist, egal ob Kollege/Kollegin, Partner,...
Training
14.08.2012, 16:00 CEST, 10am EDT, 14:00 GMT
This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in...
WATCH NOW 
Webinar
07.08.2012, 17:00 CEST, 11:00 EDT, 15:00 GMT
A phletora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,”...
WATCH NOW 
Webinar
17.07.2012, 18:00 CEST, 12:00 EDT, 16:00 GMT
Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the individuals. In...
WATCH NOW 
Webinar
17.07.2012, 11:00 Uhr
Social Networking steckt noch in den Kinderschuhen, der eher suboptimal sich entwickelnde Kurs der Facebook-Aktie mag ein Indiz dafür sein. Social Networking wie wir es heute kennen, basiert in der überwiegenden Zahl der Geschäftsmodelle darauf, dass die Nutzer weitgehend auf Privatspäre und...
WATCH NOW 
Training
10.07.2012, 17:00 CEST, 11:00 EDT, 15:00 GMT
Enterprise Role Management still is a key topic when it comes to efficiently manage large groups of users. The art of clearly defining projects for role discovery and implementation, architecture model development and lifecycle maintenance with regards to scope and resources is your most...
WATCH NOW 
Webinar
03.07.2012, 11:00 Uhr
Nie war es wichtiger als heute, genau darüber Bescheid zu wissen, wer wozu berechtigt ist und wer was getan hat. In diesem Webinar geht es um das intelligente Management von Zugriffsrechten. Um Risiken zu reduzieren, Compliance sicherzustellen und um den Anwendern selbst die Möglichkeit zu geben,...
WATCH NOW 
Training
27.06.2012, 16:00 CEST, 10am EDT, 14:00 GMT
The rise of cloud computing has changed the rules for optimising your IT strategy. However within cloud computing there are many choices. Making the right choices can save time and money making the wrong choices can increase risks. This training will look at how to choose the right cloud for...
WATCH NOW 
Webinar
26.04.2012, 16:00 - 17:00 CEST, 10:00am ET, 7:00am PT
How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on...
WATCH NOW 
Congress
17.04. - 20.04.2012 in Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar
29.03.2012, 19:00 CEST / 10:00am PT / 1:00pm ET
Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.
WATCH NOW 
Webinar
22.03.2012, 16:00 CET, 8:00am PT, 11:00pm ET
With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security...
WATCH NOW 
Webinar
21.03.2012, 17:00 CET, 9:00am PT, 12:00pm ET
IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.
WATCH NOW 
Webinar
13.03.2012, 16:00 CET, 11:00am ET
Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the...
WATCH NOW 
Webinar
28.02.2012, 11:00 Uhr
Access Governance – dieser Begriff steht für Lösungen, mit denen sich Zugriffsrechte besser steuern und kontrollieren lassen. Die regelmäßige Re-Zertifizierung und damit Überprüfung von Zugriffsberechtigungen gehört ebenso dazu wie analytische Funktionen für den Status von Zugriffsberechtigungen...
WATCH NOW 
Webinar
21.02.2012, 17:00 CET / 8:00am PT / 11:00am ET
Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on the...
WATCH NOW 
Webinar
16.02.2012, 11:00 Uhr
Auch wenn häufig viel zu leichtfertig der Begriff "Cyberwar" verwendet wird (denn Tote gibt es nur im wirklichen Krieg) - die Bedrohungslage durch Online-Kriminalität ist immens geworden. Security Information and Event Management (SIEM) stellt Ihnen wirksame Mittel dagegen zur Verfügung und hilft...
WATCH NOW 
Webinar
09.02.2012, 2:00pm CET / 1:00pm GMT
With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user...
WATCH NOW 
Webinar
02.02.2012, 14:00 Uhr
In diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend...
WATCH NOW 
Webinar
26.01.2012, 17:00 CET / 8:00am PT / 11:00am ET
2011 was, once again, a bad year for privacy as data breaches releasing usernames, passwords, credit card details and even medical records continued to make news right through the end of the year. Time has proven that no amount of imposed regulation can protect privacy in the face of a determined...
WATCH NOW 

2011
Webinar
15.12.2011, 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
"Simple Cloud Identity Management (SCIM) appears to be our best chance for any sort of public provisioning standard, something we desperately need and have needed for years", says Dave Kearns. Join him, Ping Identity CTO Patrick Harding and SailPoint CTO Darran Rolls for this webinar on the...
WATCH NOW 
Webinar
13.12.2011, 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
Three main (business) trends are driving technology in all areas: Social Computing, Mobile Computing and Cloud Computing. Looking behind the curtain, we see that these three trends with strong impact on everything around us are based on yet another trend, which is enabling companies to build...
WATCH NOW 
Webinar
01.12.2011, 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more...
WATCH NOW 
Webinar
22.11.2011, 16:00 Uhr
Verantwortung kann nicht delegiert werden. Es sind die Mitarbeiter der Fachabteilungen, die gegenüber Aufsichtsorganen, Prüfern und Justiz in der Verantwortung stehen und letztlich auch in die Haftung genommen werden. Alleine schon deshalb (aber natürlich auch, weil sie näher am Prozess sind und...
WATCH NOW 
Workshop
17.11.2011, 09:00 - 17:00 Uhr in Frankfurt
Seit mehr als 2 Jahren befinden wir uns in einer Cloud Computing Hype-Phase, und ein Ende ist nicht in Sicht. Im Gegenteil: es gibt kaum ein Unternehmen, in dem IT Professionals nicht unter mehr oder weniger starkem Druck ihres Top Managements das Cloud Computing Zeitalter einleuten und bereits...
Webinar
15.11.2011, 12:00 CET / 11:00am GMT
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these...
WATCH NOW 
Webinar
10.11.2011, 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.
WATCH NOW 
Webinar
10.11.2011, 8:00am PT / 11:00pm ET / 4:00pm GMT / 5:00pm CET
Apart from defining the difference between identity and context, the second of the Radiant Logic webinar series with KuppingerCole Senior Analyst Dave Kearns as guest speaker will clarify why context virtualization is critical in the authorization and profile management realm. For both internal...
Webinar
03.11.2011, 8:00am PT / 11:00am ET / 3:00pm GMT / 16:00 CET
The time when you will ultimatively have to demonstrate PCI DSS 2.0 compliance is getting closer now. We therefore would like to invite you to join us in this webinar to have a look at how you can certify fast and at reasonable cost. Don´t miss this webinar and its great speaker lineup:...
WATCH NOW 
Webinar
25.10.2011, 15:00 Uhr
Sie sind hoffentlich gut erholt und wohl behalten zurück aus Ihrem Urlaub? Dann wünschen wir Ihnen, dass Ihre Vertretung gute Arbeit geleistet hat und Ihr Erholungseffekt nicht alsbald durch liegen gebliebene Arbeit aufgezehrt wird. Gute Arbeit kann eine Vertretung allerdings nur dann wirklich...
WATCH NOW 
Webinar
13.10.2011, 16:00 CEST / 7:00am PT / 10:00am ET
In this webinar, KuppingerCole's co-founder and Principle Analyst Martin Kuppinger will talk about the key elements of a pro-active security risk management strategy. Then, Dr. Torsten George from Security and Operational Risk Management pioneer Agiliance will describe the elements of a properly...
WATCH NOW 
Workshop
12.10.2011, 09:00 - 13:00 in Nürnberg
Wertvolles Expertenwissen zum Kernthema Cloud Security bietet Ihnen dieser halbtägige Intensiv-Workshop, den wir Ihnen während der IT-Security Messe it-sa 2011 (11.-13. Oktober 2011, Halle 12 auf dem Nürnberger Messegelände) bieten. Als Teilnehmer dieses Workshops erhalten Sie eine kostenfreie...
Webinar
06.10.2011, 16:00 CEST / 7:00am PT / 10:00am ET
In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will...
WATCH NOW 
Webinar
28.09.2011, 11:00 CEST
Overcoming the inherent security and identity management challenges is key to a successful move into the cloud. In this webinar, KuppingerCole's Senior Analyst, Sebastian Rohr, will give suggestions for successful adoption of cloud computing that overcome the inherent security and identity...
WATCH NOW 
Webinar
27.09.2011, 12:00 CEST
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management...
WATCH NOW 
Webinar
22.09.2011, 16:00 CEST / 7:00am PT / 10:00am ET
Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For...
WATCH NOW 
Webinar
15.09.2011, 16:00 CEST / 7:00am PT / 10:00am ET
In this webinar, KuppingerCole's co-founder and Principle Analyst Martin Kuppinger will give you an overview on how to stay compliant in a multi-regulatory environment. Followed by Martin, Cognosec CEO Oliver Eckel will reveal best practices of managing compliance in today's multi-regulatory world.
WATCH NOW 
Webinar
25.08.2011, 17:00 CET, 8:00am PDT
In this webinar, directory expert and Senior KuppingerCole Analyst Dave Kearns will explore the challenges of identity integration and how to solve them through identity & context as a service. Dave will be joined by Lauren Selby from Radiant Logic, who will talk about Radiant Logic´s approach to...
Webinar
30.06.2011, 18:00 CEST, 09:00 US/Pacific
In a recent blog entry , KuppingerCole´s principal analyst Martin Kuppinger wrote, that the acronym BYOD stands for IT departments accepting that they’ve lost against their users. Now we have to see, how we can make the best out of it and minimize the risks involved with private mobile devices...
WATCH NOW 
Seminar
13.05.2011, 9:00-14:00 in Munich, Germany
2011 brings new opportunities for identity services in the enterprise & consumer markets. Gain state-of-identity insight through a series of presentations of common scenarios from diverse market leaders.
Congress
10.05. - 13.05.2011 in Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Seminar
10.05.2011, 9:00 - 13:00 in Munich, Germany
The OpenID Foundation's 2011 series of OpenID Summits focus is on use cases and topics of interest to key developers, executives and analysts in the identity industry. The OpenID Summit in Munich will focus on global adoption dynamics and the evolution of OpenID technologies. It is a free event...
Webinar
03.05.2011, 3pm CET, 9am ET, 2pm GMT
Database Security is one of the key elements within any IT security strategy, given that several of the most severe incidents in IT are related to attacks against databases and that most of the critical and sensitive information in organizations is stored in databases. Database firewalls...
WATCH NOW 
Webinar
19.04.2011, 4pm CET, 10am ET, 3pm GMT
How to best deploy Identity and Access Management today? There is an increasing number of opportunities, including hosted and cloud-based options. And there is an increasing number of services in the cloud which have to become integrated into the IAM ecosystem. Thus the question is: How to best...
WATCH NOW 
Webinar
14.04.2011, 16:00 CET
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce you into the key elements of a future-proof and cloud-ready Identity and Access Management strategy and how to deal with hybrid cloud environments. Following Martin, Ralf Knöringer and Rudolf Wildgruber from...
WATCH NOW 
Webinar
12.04.2011, 4pm CET, 10am ET, 3pm GMT
How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls...
WATCH NOW 
Webinar
31.03.2011, 15:00 CET, 9am EST
The role of web access management has changed and nowadays serves as a central layer of protection for many different services, enabling federations and allowing versatility for users. Join us in this webinar to learn, how to transform your traditional web access management into such a central...
WATCH NOW 
Webinar
29.03.2011, 6pm CET, 9am PT, 12pm ET
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this...
WATCH NOW 
Webinar
24.03.2011, 10:00 Uhr
Datenschutz - ein notwendiges Übel? In zahlreichen Unternehmen ist dieses Thema auch heute in der Tat noch eine Randerscheinung, obwohl mit der gesteigerten öffentlichen Wahrnehmung und damit einher gehenden Sensibilisierung jeder bekannt werdende Verstoß zu einer fundamentalen Schädigung der...
WATCH NOW 
Webinar
15.03.2011, 3pm CET, 10am EST
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and...
WATCH NOW 
Webinar
10.03.2011, 11:00am CET
Internal Audit (IA), traditionally a vehicle preserving assets and ensuring compliance, has been expanding it´s scope into a means for business process improvement and operational excellence, while at the same time it has to cope with an increasing number of high-impact risks. The challenge is,...
WATCH NOW 
Webinar
03.03.2011, 18:00 CET, 12:00 EST
Externalizing and centralizing authorization from applications has recently gained momentum, as related standards like XACML have matured and experiences shared by early adopters have been positive. Obviously, potential benefits from a standardized method for authorization are tremendous....
WATCH NOW 
Webinar
22.02.2011, 10:00 Uhr
Cloud Computing findet jenseits der traditionellen physischen Grenzen, dem sogenannten Perimeter" statt, der den Mittelpunkt traditioneller Sicherheitsansätze bildete. In dem Maße, in dem sensitive Unternehmensdaten und Anwendungen zunehmend in die Cloud abwandern, steigt die Unsicherheit...
WATCH NOW 
Webinar
18.02.2011, 10:00 Uhr
Es gibt eine ganze Reihe von Gründen, warum das Thema Berechtigungsmanagement aktuell in der Unternehmenspraxis eine große Rolle spielt. Einerseits, weil es die Basis bildet für den Umgang mit Informationsrisiken (Stichwort Wikileaks), andererseits aber natürlich auch, weil es bei vielen...
WATCH NOW 
Webinar
26.01.2011, 3pm (CET), 2pm (UK)
Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will...
WATCH NOW 

2010
Webinar
16.12.2010, 5:00pm CET, 11:00am EST
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is...
WATCH NOW 
Webinar
13.12.2010, 5:00pm CET, 11:00am EST
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.
WATCH NOW 
Webinar
09.12.2010, 5:00pm CET, 11:00am EST
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best...
WATCH NOW 
Webinar
02.12.2010, 15:00 CET, 2pm UTC
Cloud Computing is adding a number of challenges to IT governance. In this opening session to the 2010 Kuppinger Cole Cloud Computing Virtual Conference, Martin Kuppinger will talk about the 5 key challenges to be aware of, if you want to extend your IT governance to cloud computing.
WATCH NOW 
Webinar
02.12.2010, 17:00 CET, 4pm UTC
IT security is in a challenging transition period. On the one hand, threats are real and they are growing more and more sophisticated. On the other hand, the promise of cloud computing is trying to transform computing into an ubiquitous utility. The IT services world is going through a...
WATCH NOW 
Webinar
02.12.2010, 18:00 CET, 5pm UTC
When applications and information move beyond the perimeter, they become more vulnerable and cause privacy related issues. How can we make sure that cloud services live in a controlled environment? Do we need to reinvent the governance whell or is Cloud governance just an extension of your...
WATCH NOW 
Webinar
02.12.2010, 16:00 CET, 3pm UTC
Before jumping into the cloud, you should know about the risks, so that you can ask the right questions to your provider. In this webinar session, we will discuss the main risk areas of cloud computing, such as data location, transparency, privileged user access, Recovery and data segregation,...
WATCH NOW 
Webinar
30.11.2010, 11:00 Uhr
In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche...
WATCH NOW 
Webinar
26.11.2010, 11:00 Uhr
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen...
WATCH NOW 
Webinar
26.11.2010, 17:00 CET, 11am EST
Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like?...
WATCH NOW 
Webinar
23.11.2010, 15:00 CET, 9am EST
In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will...
WATCH NOW 
Webinar
19.11.2010, 16:00 CET, 10am EST
This webinar will highlight how organizations can manage risk better across their IT and business processes, thus enabling them to determine potential impact considering both IT and business controls.
WATCH NOW 
Webinar
18.11.2010, 10:00 - 10:45
So stark die Resonanz zum Thema Cloud Computing auch sein mag - so klafft doch häufig noch eine starke Lücke zwischen dem Anspruch, die interne IT durch Zugabe von Cloud Services flexibler und kostengünstiger zu gestalten, und der praktischen Umsetzung. Dafür gibt es mehrere Gründe. Einerseits...
WATCH NOW 
Webinar
18.11.2010, 11:00 - 11:45
Zwischenzeitlich haben sich sehr viele Unternehmen dafür entschieden, Dienste aus der Cloud zu nutzen. Teilweise auch schon seit Jahren, bevor der Begriff des Cloud Computing überhaupt entstanden war. Wenn es aber um die Verteilung unternehmenskritischer Informationen geht, dann ist die...
WATCH NOW 
Webinar
18.11.2010, 14:00 - 14:45
Unternehmensweit gelten dieselben Sicherheitsrichtlinien, egal von wo aus die Anwender arbeiten und wo die von ihnen genutzten Dienste zur Verfügung gestellt werden. Nahtlose Integration von Cloud Services in das Sicherheitskonzept Ihres Unternehmens und eine Identität für alles, deren Sicherheit...
WATCH NOW 
Webinar
18.11.2010, 15:00 - 15:45
Wenn sich interne und externe Benutzer an Diensten anmelden müssen, die mal in der privaten und mal in der öffentlichen (public) Cloud laufen, wird es auf den ersten Blick viel komplexer, eine verlässliche Authentifizierung durchzuführen. Doch ist das wirklich so? Oder bieten nicht die heute...
WATCH NOW 
Webinar
16.11.2010, 17:00 CET, 11am EST
Martin Kuppinger of KuppingerCole will discuss the trends around authentication strategies, the breadth of options available today, and the future evolution towards a centralized layer for context-based authentication and authorization - for all types of users and for all types of services and...
WATCH NOW 
Webinar
12.11.2010, 14:00 Uhr
SharePoint-Umgebungen tendieren dazu, sich den GRC-Anforderungen Ihres Unternehmens widersetzen zu wollen. In diesem Webinar beschreibt Martin Kuppinger einen holistischen Ansatz zur Einbung Ihrer SharePoint-Umgebung in ein unternehmensweites GRC und Identity Management. Dr. martin Kuhlmann von...
WATCH NOW 
Webinar
11.11.2010, 17:00 CET, 11am EST
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have...
WATCH NOW 
Webinar
28.10.2010, 11:00
Martin Kuppinger von KuppingerCole geht in diesem Webinar auf die Trends im Bereich der Access Governance und die Rolle, die Access Governance in GRC-Strategien spielen kann und muss ein. Er definiert Anforderungen an Access Governance-Lösungen und liefert eine Checkliste für die Auswahl solcher...
WATCH NOW 
Webinar
25.10.2010, 16:00 CEST, 2pm UTC
Medium-to-large enterprises face specific challenges in implementing identity management. Quite often, solutions are tailored for very large companies, making deployments an uneasy fit. In this Webinar, Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can...
WATCH NOW 
Webinar
22.10.2010, 17:00 CET
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar,...
WATCH NOW 
Expo
19.10. - 21.10.2010 in Nürnberg
Die IT-Security-Messe it-sa 2010 in Nürnberg bietet als Fachmesse die ideale Plattform, um sich in einem boomenden IT-Sicherheits-Markt erfolgreich zu positionieren. Das Messekonzept der it-sa ist für Besucher eine attraktive Kombination aus erfahrbarer Fachkompetenz, praktischer Demonstration...
Seminar
19.10.2010, 09:45 - 16:00
Innerhalb weniger Jahre hat sich das Cloud Computing zu einem dominierenden Trend entwickelt, der sich zudem wie kaum ein Trend zuvor verändernd auf die IT-Infrastruktur auswirkt. Im Gegensatz zu typischen, Technologie-getriebenen Trends, geht die Nachfrage nach Cloud Computing Services von den...
Webinar
14.10.2010, 11:00 Uhr
In diesem Webinar führt Martin Kuppinger in die Thematik des Cloud Computing ein und stellt eine Checkliste für den optimalen und vor allem sicheren Einstieg in die Public Cloud vor. Mit Mani Pirouz wird dann ein Vertreter des erfolgreichen Cloud Computing Pioniers salesforce.com eine Reihe von...
WATCH NOW 
Webinar
12.10.2010, 2pm CEST, 12pm UTC
In this webinar, Martin Kuppinger will give an overview on the current and future role of identity federation in hybrid cloud infrastructures with a focus on SAP environments. He will be followed by Keith Grayson from SAP, who will be talking on SAP user management optimization through SAML 2.0.
WATCH NOW 
Webinar
08.10.2010, 11:00 Uhr
Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im Fokus dieses Webinars. Zunächst wird Martin Kuppinger einen Einblick in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über den Lösungsmarkt geben. Danach wird Klaus Hild...
WATCH NOW 
Conference
04.10. - 06.10.2010 in Düsseldorf
The Experts Conference (TEC) Europe is coming to Düsseldorf in 2010! TEC 2010 Europe delivers world-class training and networking - for the experts, by the experts - and teaches better, more innovative ways to run and manage the technologies that drive your organization every day! In addition to...
Conference
04.10. - 06.10.2010 in Düsseldorf
The Experts Conference (TEC) 2010 kommt dieses Jahr nach Düsseldorf! TEC 2010 Europe bietet erstklassiges Training und Networking – für Experten, von Experten – und vermittelt Ihnen Wissen über effektive, innovative Möglichkeiten, die Technologien, die tagtäglich Ihre Geschäftsprozesse...
Webinar
30.09.2010, 15:00 CEST, 1pm UTC, 9am EDT
Not only since cloud computing has become a hype, traditional perimeters have been more and more disappearing. Managing risks and securing compliance in such "cloudy" environments has become a critical priority. At the same time, an ever increasing number of different systems and devices create...
WATCH NOW 
Webinar
29.09.2010, 11:00 Uhr
Die meisten Unternehmen verfügen über eine zentrale Active Directory-Infrastruktur. Deshalb spricht viel dafür, darauf aufzubauen, um beispielsweise auch andere Systemumgebungen zu verwalten. So kann man bei geringem Integrationsaufwand noch mehr aus der ohnehin vorhandenen Infrastruktur machen...
WATCH NOW 
Webinar
22.09.2010, 16:00 Uhr
In diesem Webinar umreißt Martin Kuppinger ein Szenario, wie sich unter Verwendung der Microsoft Security Lösungen eine ganzheitliche Identity Management Infrastruktur erstellen lässt. Anschliessend geht Dr. Martin Kuhlmann (Omada) darauf ein, wie eine solche Lösung in der Praxis umgesetzt wird.
WATCH NOW 
Webinar
17.09.2010, 15:00 CEST, 1pm UTC, 2pm BST
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit...
WATCH NOW 
Webinar
14.09.2010, 16:00 CEST, 2pm UTC
In this webinar, Martin Kuppinger will talk about security in virtualized environments and the developments happening in this space. How does state-of-the-art security in virtual environments look like? And what should be a future roadmap that works?
WATCH NOW 
Webinar
02.07.2010, 14:00
In this webinar, Kuppinger Cole´s founder and chief analyst will talk about his research findings for a recent report on vendors, which are, from the KuppingerCole perspective, Hidden Gems in the markets which we are analyzing. “Hidden Gems” are vendors which are (still) relatively small,...
WATCH NOW 
Seminar
30.06.2010, 14:00 - 14:30
Wie kann man Informationen in allen Nutzungssituationen ("at rest, in move, in use") optimal und zuverlässig schützen? Information Rights Management ist hier einer der strategisch wichtigsten Ansätze und ein Kernelement in Strategien für die Informationssicherheit.
Webinar
29.06.2010, 17:00 CEST, 11am EDT
How to gain more flexibility and efficiency in an environment where requirements change very fast, and where users and services cannot be classified any more as easy as being "internal" or "external". This Webinar is about key decision criteria for lean entitlement management and provisioning...
WATCH NOW 
Congress
04.05. - 07.05.2010 in Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress
04.05. - 07.05.2010 in Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.
Congress
04.05. - 07.05.2010 in München
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich...
Workshop
04.05.2010, 09:00 - 13:00 in München
This workshop will review User Managed Access (UMA) benefits, use cases, progress to date, and next steps. It is co-located with the European Identity Conference. Registration for the workshop is free.
Workshop
04.05.2010, 09:00 - 13:00 in Munich
This Cloud Computing introduction and tutorial is invaluable for delegates who wish to learn and increase their knowledgebase. It is aimed at all stakeholders who have an influence on policy and the impact on commercial and business applications and services.
Webinar
26.04.2010, 16:30-17:30 CEST, 10:30am Eastern
In this webinar, we will look at the SharePoint Security and the SharePoint Security Add-On market, with specific focus on what you need to fulfill the GRC requirements in SharePoint environments and how to do that integrated with other information systems.
WATCH NOW 
Webinar
21.04.2010, 17:00-18:00 CEST, 11am Eastern
As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications.
WATCH NOW 
Webinar
15.04.2010, 17:00-18:00 CET, 11am Eastern
As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling...
WATCH NOW 
Webinar
26.03.2010, 15:00 -16:00 CET, 10am Eastern
There is an increasing number of tools to manage cloud environments. Some are, in fact, more tools to manage virtualized environments, whilst others focus more on service management issues. More and more of these tools promise to support hybrid environments as well. However the question arises...
WATCH NOW 
Webinar
26.03.2010, 16:00 - 17:00 CET, 11am Eastern
There is an increasing number of offerings around Identity Management, Cloud Security, and Cloud Governance in the market. Some of these are well-known and established, others are new. Martin Kuppinger will provide an overview of the different elements of cloud security (for private, hybrid, and...
WATCH NOW 
Webinar
26.03.2010, 17:00-18:00 CET, 12pm Eastern
Martin Kuppinger will discuss in this presentation risk-based approaches to manage cloud security. The issue, from his perspective, isn’t that the cloud is inherently insecure. The real issue is to deal in appropriate way with the specifics of the cloud – which includes not only security but as...
WATCH NOW 
Webinar
25.03.2010, 15:00 -16:00 CET, 10am Eastern
Cloud Computing frequently is discussed mainly as a security risk. However, there is as well the view that the cloud is or might be more secure than on-premise IT solutions. Martin Kuppinger will look at risks of cloud computing, the status and outline the points which you should look at when...
WATCH NOW 
Webinar
25.03.2010, 16:00 - 17:00 CET, 11am Eastern
There are many standards out there for the cloud. SAML (Security Assertion Markup Language) for federation, SPML (Service Provisioning Markup Language), and many others. But there are as well many standards missing, either directly related to security or in some relation to security – like...
WATCH NOW 
Webinar
25.03.2010, 17:00-18:00 CET, 12pm Eastern
Many companies are telling that they tend to start with a “private” cloud instead of going to the “public” cloud. Besides the question whether hybrid IT environments aren’t reality today, this panel will discuss the specific security risks of internal clouds, especially around the changes from...
WATCH NOW 
Webinar
24.03.2010, 17:00-18:00 CET, 12pm Eastern
Attestation should not be a point solution, but an element within a larger information security architecture. In this Webinar, we will talk about where access certification is today and what is changing – and what has to change. We will describe maturity levels with respect to access...
WATCH NOW 
Webinar
18.03.2010, 17:00-18:00 CET, 12pm Eastern
While companies are moving toward growth in 2010, IT budgets are still under intense scrutiny. IT departments are being asked to keep their networks and applications secure while still allowing end users to not be weighed down by policies and time consuming procedures with often a reduction in...
WATCH NOW 
Webinar
10.02.2010, 15:00 -16:00 CET, 9am Eastern
Controlling access to information and to target applications, is the key element of a security policy. Access management includes multiple elements, such as access control, access delegation, access policy definition and access reporting. In this virtual panel, we will look into how access...
WATCH NOW 
Webinar
10.02.2010, 16:00 - 17:00 CET, 10am Eastern
Expert panel showcasing best practices migrating to a holistic auth(z) and auth(n) strategy.
WATCH NOW 
Webinar
10.02.2010, 17:00-18:00 CET, 11am Eastern
Once having an identity management infrastructure in place, maximising this significant investment through expanding the infrastructure´s reach would be a good idea. In this webinar, we look into the possibilities on how to integrate the customer into your identity management strategy.
WATCH NOW 
Webinar
09.02.2010, 15:00 -16:00 CET, 10am Eastern
Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of...
WATCH NOW 
Webinar
09.02.2010, 16:00-17:00 CEST, 10am Eastern
IT organisations are facing an increasing pressure to reduce costs, while at the same time compliance requirements increase and management is asking for more flexible solutions to faster react on new business requirements. In this Webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole,...
WATCH NOW 
Webinar
09.02.2010, 17:00-18:00 CET, 11am Eastern
Versatile authentication flexibly integrates a variety of open and proprietary authentication methods into one security layer, and strongly simplifies the implementation of multiple authentication methods in complex environments. In this panel, Dave Kearns will discuss with several authentication...
WATCH NOW 
Webinar
21.01.2010, 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
WATCH NOW 
Webinar
14.01.2010, 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst...
WATCH NOW 

2009
Webinar
10.12.2009, 14:00 - 15:00
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning
WATCH NOW 
Webinar
09.12.2009, 16:00 - 17:00 CET, 10am Eastern
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by...
WATCH NOW 
Webinar
09.12.2009, 17:00-18:00 CET, 11am Eastern
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole...
WATCH NOW 
Webinar
09.12.2009, 18:00 - 19:00 CET, 12am Eastern
What is the best approach to do access governance? Should you start with attestation to understand where the problems are? Or should you first have a management infrastructure in place which allows to control access across different systems and use access governance approaches then to improve the...
WATCH NOW 
Webinar
08.12.2009, 15:00 -16:00 CET, 9am Eastern
Access Governance is commonly associated with “recertification” or “attestation” as approaches for a recurring review of existing access controls by the responsible managers in IT and business. But knowing the problems isn’t sufficient – enforcing changes and implementing continuous processes for...
WATCH NOW 
Webinar
08.12.2009, 16:00 - 17:00 CET, 10am Eastern
Access Governance is a key element in every strategy for information and system security as well as IT Governance. However, there are many different approaches from system-level access control management tools for ERP systems with some SoD support up to “Enterprise GRC” solutions which focus on...
WATCH NOW 
Webinar
08.12.2009, 17:00-18:00 CET, 11am Eastern
How to do Access Governance right? Which are the key success factors you have to focus on for as well quick-wins as long-term success? This session explains how to solve the access governance needs best.
WATCH NOW 
Webinar
19.11.2009, 17:00-18:00 CEST, 11am Eastern
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with...
WATCH NOW 
Webinar
11.11.2009, 17:00-18:00 CET, 11am Eastern
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar,...
WATCH NOW 
Webinar
27.10.2009, 16:00 CET, 11am EDT
SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA...
WATCH NOW 
Webinar
23.10.2009, 14:00 - 15:00
Es gibt kaum einen Anwender, der nicht schon einmal sein Passwort vergessen hat und das Helpdesk mit einem Passwort Reset beschäftigen musste. Die Arbeit des Helpdesk nimmt exponentiell zu, wenn die Anwender sich mehrere unterschiedliche Passwörter für unterschiedliche Anwendungen merken müssen,...
WATCH NOW 
Webinar
13.10.2009, 16:00 CEST
Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving...
WATCH NOW 
Webinar
09.10.2009, 14:00 - 15:00
Nicht nur in grossen Unternehmen ist die Benutzerverwaltung durch ständige Änderungen und Ergänzungen eine ressourcenzehrende Herausforderung. Auch wenn die Prozesse für die Provisionierung von Benutzerkonten in den unterschiedlichen Anwendungen sauber definiert sind - manuelles Arbeiten birgt...
WATCH NOW 
Webinar
29.09.2009, 16:00 CEST
In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with...
WATCH NOW 
Seminar
22.09.2009, 9:00 - 14:00
Zuverlässigkeit ist das wichtigste Merkmal einer guten Identitäts- und Sicherheitsmanagementlösung. Mit der schriftlichen Niederlegung der Management- und Sicherheitsverfahren allein ist es aber nicht getan – Sie müssen die Gewissheit haben, dass Sie mit der gewählten Lösung auch alle Richtlinien...
Webinar
21.09.2009, 17:00-18:00 CEST, 11am Eastern
The reason companies are considering cloud computing is to avoid the expense involved in building or acquiring the infrastructure, and to some extent managing it. However, without paying attention to the security and governance implications, those cost savings will actually evaporate when they...
WATCH NOW 
Webinar
18.09.2009, 14:00 - 15:00
Auf dem Papier ist es in der Regel gar nicht so schwierig, durch entsprechende Richtlinien einen zufriedenstellenden Grad an Sicherheit zu erreichen. Jedoch zehren in der Praxis fehlende Ressourcen, enge Budgets und nicht zuletzt die immer komplexer werdende Infrastruktur an einer effizienten Um-...
WATCH NOW 
Webinar
17.09.2009, 16:00 CEST
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits...
WATCH NOW 
Webinar
20.08.2009, 14:00 - 15:00
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in...
WATCH NOW 
Webinar
14.08.2009, 14:00 - 15:00
In diesem kostenlosen Webinar gehen wir darauf ein, wie eine ideale Basis für ein konsistentes Access Management geschaffen werden kann und wie man dieses schrittweise weiterentwickelt.
WATCH NOW 
Webinar
22.07.2009, 17:00-18:00 CEST, 11am Eastern
Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications....
WATCH NOW 
Webinar
25.06.2009, 17:00-18:00 CEST
In this free webinar, you’ll learn how an integrated identity governance approach can more effectively improve your risk posture with enterprise-wide policy enforcement, access certifications and role management across all relevant systems. By having a single view into user access rights, you...
WATCH NOW 
Webinar
09.06.2009, 14:00 - 15:00
In diesem Webinar wird auf den quantitativen und qualitativen Nutzen von Enterprise Single Sign-On-Projekten in Verbindung mit starker Authentifizierung eingegangen.
WATCH NOW 
Congress
05.05. - 08.05.2009 in Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Workshop
05.05.2009, 10:00-13:00 in Munich
Webinar
23.04.2009, 14:00 - 14:45
Konfrontiert mit einer zunehmenden Flut an Passworten für Benutzerkonten in einer steigenden Zahl an Anwendungen, gewinnt das unternehmensweite Single Sign-on zunehmend an Bedeutung. Einerseits zur Steigerung der Produktivität und zur Reduzierung der Helpdesk-Kosten, andererseits aber auch für...
WATCH NOW 
Webinar
03.04.2009, 16:30 -17:00
As the recession is severely hitting most industries, type and quality of security threats are changing quickly. In this webinar, Martin Kuppinger will describe these threats and their impact on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and...
WATCH NOW 
Webinar
26.03.2009, 17:00 - 17:45
Besides having been around as a buzzword for quite some time now, current economic challenges seem to strongly increase interest in leveraging cloud computing for the enterprise, finding new competitive advantages, and of course reducing investments into internal infrastructures. In this webinar,...
WATCH NOW 
Webinar
19.03.2009, 14:00 - 14:45
Der Umgang mit privilegierten Benutzerkonten, wie beispielsweise "ROOT", birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung...
WATCH NOW 
Webinar
11.03.2009, 17:00 - 17:45
In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk...
WATCH NOW 
Webinar
05.03.2009, 17:00 CET, 4pm UTC
In this webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole give an overview on an automated and risk-based approach to access certification, followed by a discussion with industry thought leaders on how to significantly improve the operational efficiency and accuracy of the...
WATCH NOW 
Webinar
02.03.2009, 16:00 - 16:45
Martin Kuppinger gibt in diesem Webinar Hinweise aus der Beratungspraxis und der Analyse von Kuppinger Cole für die optimierte Gestaltung von IAM-Projekten.
Webinar
26.02.2009, 17:00 CET, 4pm UTC
The webinar will discuss the questions and outline the future trends for business roles, business rules, and claims.
Webinar
19.02.2009, 17:00 CET, 4pm UTC
The webinar will discuss risk management trends as well as the evolution of the market for risk management tools.
WATCH NOW 
Webinar
13.02.2009, 15:00 - 15:45
Martin Kuppinger nennt und erläutert zehn Gründe dafür, warum man gerade jetzt in IAM und GRC investieren sollte, um die IT besser und Unternehmen leistungs- und wettbewerbsfähiger zu machen und Risiken zu reduzieren.
WATCH NOW 
Webinar
12.02.2009, 17:00 CET, 4pm UTC
In this Webinar, Kuppinger Cole´s Principal Analyst Martin Kuppinger will highlight the challenges of risk based segregation of duties management, and will discusses technology solutions for continuous monitoring that deliver affordable and effective compliance.
WATCH NOW 
Webinar
05.02.2009, 14:00 Uhr
Martin Kuppinger stellt in diesem Webinar den aktuellen Kuppinger Cole Report zu diesem Thema vor und beschreibt die Verwendung dieser KRIs für einen risikobasierten Management-Ansatz. Im Anschluß daran wird Thomas Reeb, Vorstand econet AG, über seinen Ansatz einer Key Performance Indicator...
WATCH NOW 
Webinar
29.01.2009, 17:00 CET, 4pm UTC
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.
WATCH NOW 
Webinar
21.01.2009, 17:00 CET - 17:45 (16:00 UTC)
Service-Oriented Security aligns with the overall Application-Centric approach of Identity and Access Management solutions - with the goal of providing a comprehensive, standards-based, developer-friendly platform. By leveraging and sharing many of the common Identity "Services", Service-Oriented...
WATCH NOW 
Webinar
20.01.2009, 17:00 - 17:45 CET (16:00 UTC)
The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of...
WATCH NOW 

2008
Webinar
18.12.2008, 17:00 - 17:45 (16:00 UTC)
The final Kuppinger Cole Webinar in 2008 will provide a conclusion of what we have observed in our research during 2008 - trends, interesting vendors and concepts, emerging standards, remarkable best practices. Based on this, we will also talk about our view on what we expect to happen in 2009.
WATCH NOW 
Webinar
04.12.2008, 17:00 - 18:30 CET (08:00am PT, 16:00 UTC
Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In...
WATCH NOW 
Seminar
26.11. - 27.11.2008 in München
In einer jungen Disziplin wie der des Identity Management ist es ganz besonders wichtig, sich regelmäßig über aktuelle Entwicklungen zu informieren und sich mit Projektverantwortlichen anderer Unternehmen auszutauschen. Diese 2-tägige, von Martin Kuppinger moderierte Veranstaltung kombiniert...
Conference
18.11. - 19.11.2008 in Frankfurt am Main
Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto höher die Aufwände (und Kosten) für Compliance. Für die erfolgreiche Einführung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten...
Webinar
13.11.2008, 13:30 - 14:30
Die Beweggründe für die Einführung eines unternehmensweiten Rollenmanagements sind sehr unterschiedlich. Während es bei vielen Unternehmen häufig zunächst um die Reduktion von Komplexität geht, stehen in anderen Unternehmen Compliance-Aspekte im Mittelpunkt. Entsprechend unterschiedlich ist die...
WATCH NOW 
Webinar
13.11.2008, 19:00 - 20:00 CET (10:00am PT, 12:00am MT, 18:00 U
Since a few years, several industry luminaries are trying to define a better way to handle Identity in the Enterprise and on the Internet. What came out of extensive discussions within the industry was the identity metasystem. Microsoft has just released "Geneva", the first version of its...
Webinar
06.11.2008, 15:00 - 16:00
Unterschiedliche Rogue Trading Vorfälle und die Finanzmarktkrise haben es nochmals deutlich gezeigt: Das traditionelle Risikomanagement scheint nicht dazu geeignet zu sein, Unternehmen vor selbstvernichtendem Handeln zu bewahren. Einerseits war es im operativen Geschäft wohl häufig so, dass man...
Webinar
31.10.2008, 14:00 - 15:00
Die Berechtigungsvergabe auf Basis von Business-Rollen ist ein wesentlicher Bestandteil des Identity Managements und wichtige Grundlage für eine GRC-Strategie. Ist das so? Geht es auch ohne? Fakt ist, dass sehr viele Projekte, bei denen das Rollenmanagement eine wichtige oder die Hauptrolle...
Webinar
31.10.2008, 8:30 AM PST / 11:30 AM EST / 4:30 PM CET
Microsoft has just announced the "Geneva" Claims-based Access Platform, a comprehensive, open and interoperable identity metasystem. Join this free Webinar to have Felix Gaehtgens give you the straight talk on Geneva and separate the buzz from the FUD (fear, uncertaincy and doubt).
WATCH NOW 
Webinar
24.10.2008, 13:00 - 14:00
Dieses Webinar führt Sie in das Konzept einer GRC-Plattform ein und gibt Ihnen einen Überblick über die wichtigsten Kriterien für die Einführung einer solchen Plattform.
Webinar
08.10.2008, 14:00-15:00
KCP hat aus den Erfahrungen einer Reihe von IAM-Strategieprojekten, aus den Gesprächen mit vielen weiteren Anwendern und aus den Diskussionen mit Herstellern eine IAM-Roadmap entwickelt, die Entwicklungsrichtlinien und Reifegrade von IAM-Infrastrukturen aufzeigt.
Webinar
02.10.2008, 16:00-17:00
Once every month, Kuppinger Cole provide a webinar with latest news in identity management & GRC, accompanying our pdf newsletter exclusively released for customers. Registration is free for all our customers.
Webinar
02.10.2008, 15:00 - 16:00
During this webinar, Martin Kuppinger will present the key results of the Kuppinger Cole Trend Report IAM and GRC 2009-2019.
Webinar
04.07.2008, 15:00 - 16:00
Unified Communications (UC), also die Integration von Kommunikation und Unternehmensanwendungen, ist nicht unbedingt neu; Anbieter wie beispielsweise Siemens bewegen sich seit vielen Jahren in diesem Marktsegment. Doch ist in den vergangenen Monaten einiges an Bewegung in diesen Markt gekommen,...
Conference
07.06. - 08.06.2008 in Bremen
Das Identitycamp Bremen wird das erste Barcamp in Deutschland speziell zum Themenbereich Identity 2.0, Single-Sign-On, Reputationsmanagement, Beziehungsmanagement, Privacy 2.0 und Verwandtes sein.
Congress
22.04. - 25.04.2008 in Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world...
Expo
22.04.2008, 09:00 - 18:00 in Munich
Visit the Identity Management Expo 2008 and discover a wide range of solutions for business, public sector and health sector. From provisioning to security, from federation to user centric - Identity Management Expo 2008 is your source for finding the right solution and partner. The Identity...
Workshop
22.04.2008, 09:00 - 13:00 in Munich
Co-located with the European Identity Conference 2008, Liberty Alliance will be hosting a workshop with worldwide renown identity management thought leaders like Conor Cahill (Intel), Fulup Ar Fol (Sun), Robin Wilton (Sun) and Patrick Harding (Ping Identity), and with great best practices from...
Conference
21.04. - 22.04.2008 in Munich
VRM, or Vendor Relationship Management, is the reciprocal of CRM or Customer Relationship Management. It provides customers with tools for engaging with vendors in ways that work for both parties. VRM 2008 is an unconference, where the content of the sessions is created and managed by the...
Webinar
25.01.2008, 14:00-15:00
Der Blick auf den Return einer Investition in das Identity und Access Management ist ein wesentliches Entscheidungshilfe bei der Planung von Investitionen in die IT-Infrastruktur. Dabei zeigt die Praxis, dass RoI-Berechnungen in der Regel nur dann auch tatsächlich erreichbar sind, wenn...

2007
Webinar
30.11.2007, 15:00 - 16:00
Die Identity Management-Marktstudie 2007/2008 hat einerseits gezeigt, dass Provisioning weiterhin das Investitionsthema Nr. 1 im Identity Management-Markt ist. Gleichzeitig planen aber mehr als 5% der Unternehmen den Ersatz ihrer bisherigen Lösungen - ein sicheres Indiz dafür, dass manche...
Seminar
21.11.2007, 09:30 - 17:00 in München
Mit dem Zukauf von Maxware hat SAP für Aufsehen gesorgt. Dennoch stellt sich die Frage, welcher Ansatz für das Identity Management der richtige ist, wenn (neben anderen IT-Systemen) SAP-Systeme eingesetzt werden.
Webinar
15.11.2007, 14.00 Uhr - 15.00 Uhr
SAP hat nach dem Kauf von MaXware inzwischen eine Roadmap vorgestellt, in der die zukünftige Positionierung von Identity Management-Technologien bei SAP beschrieben ist, sowohl im Kontext von SAP NetWeaver als auch von SAP GRC-Lösungen. Kuppinger Cole + Partner gibt einen Überblick über die...
Seminar
14.11.2007, 09:00 - 17:00 in München
Das unternehmensweite Risikomanagement, das nachhaltige Steuern des Unternehmens durch Kodizes und Richtlinien (?Governance?) und das systematische Streben nach dem Einhalten externer und interner Regelwerke (?Compliance?) verändern grundlegend die Anforderungen der Unternehmensführung an...
Webinar
13.07.2007, 10:30-11:30
KCP hat aus den Erfahrungen einer Reihe von IAM-Strategieprojekten, aus den Gesprächen mit vielen weiteren Anwendern und aus den Diskussionen mit Herstellern eine IAM-Roadmap entwickelt, die Entwicklungsrichtlinien und Reifegrade von IAM-Infrastrukturen aufzeigt.
Webinar
06.07.2007, 14:00 - 15:00
SAP hat angekündigt, den norwegischen Identity Management-Spezialisten Maxware zu übernehmen. Welche Konsequenzen hat diese Übernahme für die Identity Management Strategie von SAP?
Webinar
26.06.2007, 14:00 - 15:00
Externe Workflows, SPML 2.0 oder die verstärkte Integration von Rollenmanagement-Funktionen in Provisioning-Werkzeugen und Federation-Ansätze sind nur einige der Trends, die den Provisioning-Markt prägen.
Conference
07.05. - 10.05.2007 in München
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Conference
07.05. - 10.05.2007 in Munich
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole