English   Deutsch  

News Archive

 Subscribe in a reader

2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007

News
Date Title Type
24.07.14 BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States… Executive Views
23.07.14 On Tuesday, security company Trend Micro has unveiled a long and detailed report on "Operation Emmental", an ongoing attack on online banking sites in several countries around the world. This attack is able to bypass the popular mTAN two-factor authentication scheme, which uses SMS messages… Blog
18.07.14 Dieses Seminar vermittelt Ihnen die grundlegenden und brachenspezifischen Regelungen für Ihre Cloud-Strategie und informiert Sie über die heutigen und künftigen Anforderungen an Datensicherheit und Datenschutz. Sie tragen Verantwortung für die Planung, Einführung und das Management von… Leadership Seminar
18.07.14 Dieses Seminar vermittelt Ihnen die grundlegenden und brachenspezifischen Regelungen für Ihre Cloud-Strategie und informiert Sie über die heutigen und künftigen Anforderungen an Datensicherheit und Datenschutz. Sie tragen Verantwortung für die Planung, Einführung und das Management von… Leadership Seminar
18.07.14 Realtime Security Analytics: Worauf Sie beim Einstieg achten müssen. Erhalten Sie einen Überblick zur Echtzeit-Überwachung mit Hilfe von Big Data Tools und lernen Sie wie Sie die datenschutzrechtlichen Regulatorien im Kontext der Netzwerküberwachung einhalten. Leadership Seminar
18.07.14 Realtime Security Analytics: Worauf Sie beim Einstieg achten müssen. Erhalten Sie einen Überblick zur Echtzeit-Überwachung mit Hilfe von Big Data Tools und lernen Sie wie Sie die datenschutzrechtlichen Regulatorien im Kontext der Netzwerküberwachung einhalten. Leadership Seminar
18.07.14 So, unless you've been hiding under a rock this week, you've definitely heard about a historical global partnership deal forged between IBM and Apple this Tuesday. The whole Internet's been abuzz for the last few days, discussing what long-term benefits the partnership will bring to both… Blog
18.07.14 Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT… Executive Views
17.07.14 Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market. Leadership Compass
16.07.14 Cloud computing allows individuals, businesses and the public sector to store their data and carry out data processing in remote data centers, saving on average 10-20%. Yet there is scope for improvement when it comes to the trust in these services. The new EU-guidelines, developed by a… Blog
15.07.14 The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity… Leadership Compass
14.07.14 Since launching its Web Services in 2006, Amazon has been steadily pushing towards global market leadership by continuously expanding the scope of their services, increasing scalability and maintaining low prices. Last week, Amazon has made another big announcement, introducing two major… Blog
14.07.14 Die Ergon Informatik AG ist ein in Zürich ansässiges Unternehmen. Neben einem großen Unternehmensbereich für Software-Individualentwicklungen ist Ergon schon seit vielen Jahren auch als Anbieter von Standard-Software am Markt präsent und hat eine signifikante Zahl… Executive Views
14.07.14 Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single sign-on service for multiple devices and for cloud-based applications. The company is VC funded and has… Executive Views
10.07.14 It really didn't take long after my last blog post on SCADA security for an exciting new development to appear in the press. Several security vendors, including Symantec and F-Secure, have revealed new information about a hacker group "Dragonfly" (or alternatively "Energetic bear") that has… Blog
07.07.14 In a press release on June 26 th , the European Commission announced the publication of new guidelines “to help EU businesses use the Cloud”. These guidelines have been developed by a Cloud Select Industry Group as part of the Commission’s European Cloud… Executive Views
07.07.14 There is a growing demand from organizations for tighter communication and collaboration with external parties and, in some cases, customers. At the same time the rapid growth of cloud services is driving the need for robust and flexible authentication solutions. As the network boundary… Executive Views
04.07.14 Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services… Podcast
04.07.14 Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means turning Big Data into Smart Information. However the realization of this vision is based on existing systems and infrastructure which contains… Leadership Seminar
03.07.14 In a press release on June 26th, the European Commission announced the publication of new guidelines "help EU businesses use the Cloud".  These guidelines have been developed by a Cloud Select Industry Group as part of the Commission's European Cloud Strategy to increase trust in these… Blog
03.07.14 Earlier this year, I published the Buyer's Guide: Access Governance and Provisioning. That document provides condensed information about key selection criteria for Identity Provisioning and Access Governance products, while also posing questions that buyers should ask of vendors. I focused… Blog
01.07.14 Big Data is often characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. These properties are usually referred to as volume, velocity and variety. However there are two other important… Advisory Notes
01.07.14 Office 365 is a popular cloud-based office productivity service built around Microsoft Office platform. Initially released in 2011, it has gone through a major upgrade in 2013 and is currently offered with different plans for home, small business, midsize and enterprise customers.… Blog
01.07.14 Most organizations have a Microsoft Active Directory in place. The Active Directory (or, in short, AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as… Blog
30.06.14 If you have attended our European Identity and Cloud Conference this May, you have probably noticed that, as opposed to the previous years, a significantly bigger part of the agenda and a substantial number of expo stands has been devoted to practical "down to earth" aspects of IT security.… Blog
25.06.14 The challenges you face are not getting any easier. You need to provision user access efficiently and effectively and maintain regulatory compliance while simultaneously protecting company assets by identifying and eliminating risk. It’s a daunting task. How can you quickly and easily assess… Podcast
23.06.14 NetIQ is part of the Attachmate Group, which consists of a number of business units, including Novell and Attachmate. NetIQ is the entity, which now markets the former Novell Identity and Access Management products. The core product of NetIQ today is NetIQ Identity Manager, formerly known… Executive Views
23.06.14 CA SiteMinder® in conjunction with CA SiteMinder® Federation provides secure single sign-on and access management to Web applications and Web services either on-premise, at a partner’s site or in the cloud, from a web browser or a mobile device. Executive Views
23.06.14 EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG… Product Reports
20.06.14 Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. Seminar
20.06.14 Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. Seminar
20.06.14 Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. Seminar
19.06.14 Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. Seminar
18.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
18.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
17.06.14 It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential? Webinar
16.06.14 Vom Legacy Provisioning zu einer zukunftsfähigen IAM Infrastruktur. Bestimmen Sie den “Reifegrad” Ihrer gegenwärtigen Provisioninglösung aus technischer und organisatorischer Perspektive Der Blick über das reine Provisioning hinaus: Welche Rolle spielen Access Governance und Cloud… Leadership Seminar
16.06.14 Fit für die Zukunft: Wie Sie für die IAM Infrastruktur Ihres Unternehmens die optimale Balance zwischen Sicherheit und Produktivität finden. Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. Enterprise Single Sign-On, Identity… Leadership Seminar
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
16.06.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
12.06.14 Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them… Webinar
10.06.14 Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services… Webinar
04.06.14 Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific… Vendor Reports
04.06.14 Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most… Executive Views
04.06.14 Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network… Leadership Compass
03.06.14 Most organizations have Microsoft Active Directory in place. The Active Directory (AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange… Advisory Notes
03.06.14 The Beta Systems Software AG (Beta Systems) SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different systems based on defined processes and… Executive Views
03.06.14 Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen… Executive Views
02.06.14 The challenges you face are not getting any easier. You need to provision user access efficiently and effectively and maintain regulatory compliance while simultaneously protecting company assets by identifying and eliminating risk. It’s a daunting task. How can you quickly and easily assess… Webinar
02.06.14 This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access… Advisory Notes
31.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
30.05.14 Vom Legacy Provisioning zu einer zukunftsfähigen IAM Infrastruktur. Bestimmen Sie den “Reifegrad” Ihrer gegenwärtigen Provisioninglösung aus technischer und organisatorischer Perspektive Der Blick über das reine Provisioning hinaus: Welche Rolle spielen Access Governance und Cloud… Leadership Seminar
30.05.14 Fit für die Zukunft: Wie Sie für die IAM Infrastruktur Ihres Unternehmens die optimale Balance zwischen Sicherheit und Produktivität finden. Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. Enterprise Single Sign-On, Identity… Leadership Seminar
30.05.14 Kim Cameron, Microsoft Scott David, University of Washington (Seattle) - School of Law Ladar Levison, Lavabit Nat Sakimura, Nomura Research Institute Podcast
30.05.14 Amar Singh, KuppingerCole John Bradley, OpenID Foundation, Kantara Steven Hope, Winfrasoft Anthony Nadalin, Microsoft Mike Neuenschwander, iC Consult Americas Bart Renard, VASCO Data Security Podcast
30.05.14 Marcel van Galen, Qiy Foundation Peter Mark Graham, Verizon Enterprise Solutions Dr. Maciej Machulak, Cloud Identity Limited Drummond Reed, Connect.Me Podcast
30.05.14 Mike Small, KuppingerCole Ian Glazer, salesforce.com Dr. Michael B. Jones, Microsoft Christian Patrascu, Oracle Corp. Daniel Raskin, ForgeRock Don Schmidt, Microsoft Podcast
30.05.14 Scott David, University of Washington (Seattle) - School of Law Dr. Michael B. Jones, Microsoft Dr. Karsten Kinast LL.M., KuppingerCole Ladar Levison, Lavabit Amar Singh, KuppingerCole Podcast
30.05.14 Chinese philosopher Confucius is said to be the originator of the saying "the journey is the reward". What does it mean? In its historic meaning, it says that by moving forward people will benefit, even while they might not reach perfection. Applied to projects, it means that continuous… Blog
30.05.14 Cloud computing provides an unparalleled opportunity for new businesses to emerge and for existing businesses to reduce costs and improve the services to their customer.  However the revelations of Snowden and the continuing disclosure of state sponsored interception and hacking undermine… Blog
30.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
30.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 EIC Awards ceremony at the European Identity & Cloud Conference 2014 May 14, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
29.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
28.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
28.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
26.05.14 Last Wednesday, eBay Inc. has announced that their user database has been compromised, and hackers were able to get away with "encrypted passwords and other non-financial data" of more than 145 million of eBay customers. eBay has informed us that financial information has not been affected… Blog
26.05.14 In a panel discussion I had at EIC 2014 with Roy Adar, Vice President of Product Management at CyberArk, Roy brought up an interesting number: according to research, attacks start on average 200 days before they are detected. Taking into account the Gaussian distribution behind this… Blog
26.05.14 EIC, the European Identity & Cloud Conference, took place for the 8 th time in Munich May 13 th to 16 th , 2014. The conference focuses on Information Security and Privacy. It covers a broad range of topics in four parallel tracks, complemented by parallel roundtables, pre-conference… Advisory Notes
20.05.14 European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. Congress
15.05.14
Gestern Abend hat das Analystenunternehmen KuppingerCole im Rahmen der achten European Identity & Cloud Conference (EIC) in München den European Identity & Cloud Award 2014 in mehreren Kategorien verliehen. Dieser Award zeichnet herausragende Projekte und Initiativen in den Bereichen…
Article
15.05.14 The European Identity & Cloud Awards 2014 were presented last night by KuppingerCole at the 8th European Identity & Cloud Conference (EIC). These awards are honoring outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC),… Article
14.05.14 Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany Podcast
13.05.14 Identity and Access Management (IAM) is in constant flux. The merging into IAM of Access Governance and Access Control is a relatively new phenomenon with a high rate of growth. Based on new offerings and changing demand, KuppingerCole predicts several major changes in that market. We… Advisory Notes
13.05.14 Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more. Advisory Notes
13.05.14 Organizations depend upon the IT systems and the information that they provide to operate and grow. However the information that they contain and the infrastructure upon which they depend is under attack. Statistics show that most data breaches are detected by agents outside of the… Advisory Notes
13.05.14 How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected. Advisory Notes
13.05.14 Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have… Executive Views
09.05.14 A few days ago, while announcing their new Advanced Threat Protection initiative, Piero DePaoli, Symantec's director of product marketing has made a provocative statement, proclaiming that 'AV is dead'. His colleague Brian Dye said that antivirus software only catches around 45% of malware… Blog
07.05.14 Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On… Executive Views
07.05.14 Omada, a Danish vendor, started as a provider of advanced Identity and Access Management solutions and services back in 2000. The core product of the company is its Omada Identity Suite. Omada focuses on adaptable business-centric and collaborative features such as workflows, attestation and… Executive Views
06.05.14 The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors,… Podcast
06.05.14 Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On… Executive Views
06.05.14 When looking at today’s IT, it is driven by some major evolutions. Everything which is done in IT has to take these evolutions into account. One is Social Computing. The second evolution is Mobile Computing. The third evolution is Cloud Computing. All these trends affect IT… Blog
06.05.14 While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product… Vendor Reports
02.05.14 There can be many reasons to why a business embarks on a journey to improve its Information Security. There is however one reason which consistently recurs: “Because the auditors says that we need to…” Regulatory requirements include penalties for non-compliance but… Advisory Notes
30.04.14 Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external users such as customers and partners is not easy. This new ABC – the Agile Business: Connected – is the challenge. Podcast
29.04.14 Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about more than a single technology. Podcast
25.04.14 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… Executive Views
23.04.14 Have you seen this WSJ article? This is great news for privacy, human rights and a profound public security based on individual freedom: nations can no longer require IT and telecom companies to store communication data about all customers and communication partners - at least there need to… Blog
22.04.14 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking, to… Executive Views
22.04.14 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… Executive Views
21.04.14 Two weeks have passed since the day the Heartbleed Bug has been revealed to the world, and people around the world are still analyzing the true scale of the disaster. We've learned quite a lot during these two weeks: After Cloudflare initially expressed doubt that the bug can really leak… Blog
10.04.14 In this KuppingerCole Webinar, we will look at Enterprise Single Sign-On (E-SSO) and the alternatives. Starting with the use cases for single sign-on and related scenarios, we will analyze the technical alternatives. We look at various aspects such as the time for implementation, the reach… Podcast
10.04.14 Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts… Leadership Compass
09.04.14 Many organizations currently consider migrating away from their current Identity Provisioning solution. There are many reasons to do so: vendors became acquired and the roadmap changed; the requirements have changed and the current solution does not appear being a perfect fit anymore; a lot… Podcast
08.04.14 As just about every security-related publication has reported today, a critical vulnerability in OpenSSL has been discovered yesterday. OpenSSL is a cryptographic software library, which provides SSL/TSL encryption functionality for network traffic all over the Internet. It's used by Apache… Blog
08.04.14 Enterprise Key and Certificate Management (EKCM) is made up of two niche markets that are converging. This process still continues, and as with all major change of IT market segments, is driven by customer requirements. These customer requirements are driven by security and compliance… Leadership Compass
08.04.14 Since the documents leaked last year by Edward Snowden have revealed the true extent of NSA powers to dig into people's personal data around the world, the topic of protecting internet communications has become of utmost importance for government organizations, businesses and private… Blog
08.04.14 In IBM's view the kinds of IT applications that organizations are creating is changing from internal facing systems to external facing systems.  IBM calls these kinds of systems "systems of record" and "systems of engagement" respectively.  The systems of record represent the traditional… Blog
04.04.14 NextLabs is a US-based vendor with headquarters in San Mateo, CA, and a strong footprint as well in the APAC (Asia/Pacific) region. The company focuses on what they call “Information Risk Management”. In fact, the focus is more on Information Risk Mitigation, i.e. practical… Executive Views
04.04.14 The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors,… Webinar
03.04.14 Access Governance ist inzwischen eine etablierte Disziplin innerhalb der Governance- und Informationssicherheitsorganisation von Unternehmen. Mit Access Intelligence-Funktionen werden vermehrt zusätzliche Analysedienste bereitgestellt, mit deren Hilfe man besondere Risiken beispielsweise… Podcast
01.04.14 A few days ago, I was I was travelling in a local train, together with a business partner, from my office in Germany to an event in another city. We both learned a lot about the real world challenges of face recognition. While I already had a 24-hour ticket for travelling in and around that… Blog
01.04.14 VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In… Vendor Reports
25.03.14 "To cloud or not to cloud?" - this is no longer the question. It is rather to what extent and depth enterprises leverage cloud computing. With identity and access management (IAM) solutions for their internal IT systems, enterprises have achieved a high level of security, transparency and… Podcast
25.03.14 Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can… Podcast
21.03.14 Thank you for attending and see you next year! Podcast
20.03.14 Die “Identity Explosion” stellt Unternehmen vor neue Herausforderungen. Statt sich beim IAM (Identity und Access Management) primär um die Mitarbeiter zu kümmern, muss man im „Extended Enterprise“ auch Geschäftspartner und oftmals Millionen von Kunden verwalten und ihnen kontrollierten… Podcast
20.03.14 The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity… Advisory Notes
20.03.14 KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your… Advisory Notes
16.03.14 Pre-Program: Identity and Access Management - Where to Start? Morning: Access Governance for both on premises applications and Cloud & Mobile Afternoon: Dynamic Externalised Authorisation Management with the move from Role to Policy Based Access control. Seminar
15.03.14 Join us for an Identity and Access Management seminar day jointly supported by KuppingerCole (Asia Pacific) and the Shenzhen IT Compliance Association. Seminar
14.03.14 Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal… Advisory Notes
14.03.14 Recently  a spotlight has been shed on the need for investing in Information Security solutions. The increase in cyber-attacks, the consistently high level of internal challenges, the appearance of more sophisticated types of long-running attacks (sometimes called Advanced Persistent… Blog
13.03.14 Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can… Webinar
13.03.14 Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external users such as customers and partners is not easy. This new ABC – the Agile Business: Connected – is the challenge. Webinar
12.03.14 The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information. Podcast
10.03.14 Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and… Advisory Notes
10.03.14 Unlike the majority of their competitors, Venafi came from an ECM background to become a market leader in their field. Their main competition evolved from EKM devices and HSM manufacturers’ acquisition and consolidation of products. As a result Venafi has a well-developed software… Executive Views
10.03.14 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… Executive Views
07.03.14 Recently there have been posters in London Underground stations warning users of Oyster Cards – the Transport for London (TfL) NFC enabled electronic travel wallet – that there is a risk of "card clash".  These posters warn that they need to keep other contactless NFC payment… Blog
06.03.14 Recently, the FIDO Alliance announced that PayPal and Samsung were enabling consumer payments with fingerprint authentication on the new Samsung Galaxy S5. My valued colleague Dave Kearns and I have written various posts about the FIDO Alliance and the impact we expect they will have on the… Blog
06.03.14 Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway... Executive Views
05.03.14 A few days ago, Tokyo-based Bitcoin exchange Mt. Gox appeared to be in trouble. When looking at their website Friday morning, I only found meaningless announcements. They are "working very hard to find a solution to our recent issues". Looking at the situation realistically, chances are… Blog
05.03.14 Agility is a key capability of successful organizations. Agility is the ability to quickly adapt the organization and the business model to new customer demands, innovations, and a changing competitive landscape. We live in a time where virtually all business relies on IT. Whether this is… Blog
05.03.14 The Connected Enterprise is opening new opportunities for business, for innovation and for growth – it is a fundamentally important imperative for today's business world. But it does not come for free: there are a number of caveats to circumvent, risks to address and changes to… Blog
04.03.14 IBM has recently made a number of major announcements and these are linked.  In December 2013 IBM announced the acquisition of FiberLink a privately held mobile management and security company.  Then on January 23rd it announced that Lenovo plans to acquire IBM's x86 server business. … Blog
04.03.14 Smart information is big data analyzed to provide answers to business questions. SAP HANA is the new runtime backend for SAP Enterprise Applications. It provides high performance database through “in-memory” processing and storage and is especially suited for instant analytics… Executive Views
28.02.14 Access Governance ist inzwischen eine etablierte Disziplin innerhalb der Governance- und Informationssicherheitsorganisation von Unternehmen. Mit Access Intelligence-Funktionen werden vermehrt zusätzliche Analysedienste bereitgestellt, mit deren Hilfe man besondere Risiken beispielsweise… Webinar
28.02.14 My last post focused on the challenges and the potential of SDN (Software Defined Networking) and SDCI (Software Defined Computing Infrastructures) for improving Information Security. APIs are being used to control more devices from a central point, bringing agility to networks, virtual… Blog
28.02.14 There are various approaches to Secure Information Sharing (SIS), as I have explained in previous posts. However, which one is the best? As always, there is no simple answer. It depends on the requirements of the customers. Nevertheless, the various product categories have their strengths… Blog
27.02.14 Why Identity Federation, Cloud IAM, and API Management help organizations in meeting their business needs for agile business processes that connect the organization to their business partners and customers and manage access to Cloud applications. The need for a new organizational structure… Advisory Notes
27.02.14 The news of the bug in Apple operating systems has spread this week. As Seth Rosenblatt wrote on cnet, Apple's culture of secrecy again has delayed a security response. While there is a patch available for iOS, the users of OS X still have to wait. I have written before about the risks… Blog
25.02.14 When looking at the core IAM (Identity and Access Management) market with its main product categories of Identity Provisioning and Access Governance, some customers and vendors currently raise the question of whether there is still a need to keep these product categories separate or whether… Blog
25.02.14 Secude is a Swiss-based vendor with a long history in Information Security. Among other accomplishments, they developed today’s SAP NetWeaver Single Sign-On product that then was acquired by SAP and became part of SAP’s own security portfolio... Executive Views
25.02.14 "To cloud or not to cloud?" - this is no longer the question. It is rather to what extent and depth enterprises leverage cloud computing. With identity and access management (IAM) solutions for their internal IT systems, enterprises have achieved a high level of security, transparency and… Webinar
24.02.14 A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining Access Governance and Dynamic Authorization Management. Providing connectivity to target systems… Product Reports
24.02.14 A while ago, I wrote about the changing market for Secure Information Sharing. I also recently published a report on Microsoft Azure RMS, one of the most important products in that market segment, and further reports will follow. The first question is: What is Secure Information Sharing… Blog
21.02.14 Microsoft Rights Management Services (RMS) is a solution that might help Secure Information Sharing become a topic for the masses, at least at the enterprise level. I just recently wrote a report on the product. However, as with any Information Security technology - especially ones that are… Blog
20.02.14 In my new report "Entitlement & Access Governance", published yesterday, I introduce a new term and abbreviation: EAG for Entitlement & Access Governance. Thanks to Dave Kearns for proposing that term - I like it because it reflects what this is about. EAG describes approaches that… Blog
20.02.14 CA Technologies is amongst the largest infrastructure software vendors worldwide. They offer a broad portfolio of products in the IAM market segment, including CA IdentityMinder™ (formerly CA Identity Manager) as their solution for Identity Provisioning. IdentityMinder™ is built… Product Reports
19.02.14 Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance… Advisory Notes
19.02.14 SAP HANA is the new runtime backend for SAP Enterprise Applications, and is especially suited for instant analytics on the data managed by the applications. This Executive View presents an overview on the security of SAP HANA and gives recommendations on how to address potential weaknesses... Executive Views
18.02.14 Unternehmen verändern sich schneller denn je. Die Zusammenarbeit mit Kunden und Geschäftspartnern in neuen Geschäftsmodellen führt zu immer neuen Anforderungen an die IT. Diese muss reagieren und die Business-Innovationen unterstützen, statt sie zu behindern. BYOI (Bring Your Own Identity)… Podcast
17.02.14 The challenge of all organizations in these days of connected businesses and their need for agility in changing markets – the new ABC: Agile Business, Connected – is creating new challenges for IT. One of these challenges is securely sharing information. Webinar
14.02.14 Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about more than a single technology. Webinar
14.02.14 In this KuppingerCole Webinar, we will look at Enterprise Single Sign-On (E-SSO) and the alternatives. Starting with the use cases for single sign-on and related scenarios, we will analyze the technical alternatives. We look at various aspects such as the time for implementation, the reach… Webinar
14.02.14 NIST (the US National Institute of Standards and Technology) has now released the final version of their Cybersecurity Framework for Critical Infrastructures. As requested, this is not a set of new regulations or fundamentally new concepts for security, but, to quote my colleague Prof. Dr.… Blog
14.02.14 Industry networks for secure collaboration are not a new thing. The evolution of these networks started back in the late ‘90s for some industries. While the initial focus sometimes was more about B2B marketplaces, enabling secure collaboration and managing the identities of the… Executive Views
14.02.14 SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There… Executive Views
13.02.14 Secure Information Sharing is the number one challenge these days in Information Security. Organizations on the one hand must enable flexible collaboration with business partners as part of their evolution towards agile, connected businesses. On the other hand, the increasing Information… Executive Views
12.02.14 Many organizations currently consider migrating away from their current Identity Provisioning solution. There are many reasons to do so: vendors became acquired and the roadmap changed; the requirements have changed and the current solution does not appear being a perfect fit anymore; a lot… Webinar
10.02.14 It is a common scenario in organizations that the marketing department, business development, or the sales department asks the IT department to support social logins on some of the corporate websites, including eCommerce sites. Admittedly, IT also sometimes proposes such functionality,… Blog
06.02.14 Recently, there have been various articles on the NSA and GCHQ (Britain's Government Communications Headquarter) collecting date from "leaky apps", including data from Angry Birds, Google Maps, Facebook, Flickr, or Twitter. Surprise? No! Look at another story in that context: There have… Blog
06.02.14 Due to their natural coupling, SDN and virtual networking are often confused, but are not the same thing. Virtual networking is the ability for networks to exist in a virtual state - removing hardware, as with SDN. This already happens in the majority of networks, VLANs being used as a… Blog
04.02.14 A recent discussion in the "Identity Management Specialists Group" on LinkedIn had the title "On point. Agree. Gartner says attributes are the new role for identity?" I wondered a little about a rather old discussion appearing again. In fact, there rarely has been pure role-based access… Blog
04.02.14 It's a new year, and there are some new changes coming to KuppingerCole, especially in the material that will come into your inbox. First, some background. After the past year or so we've been growing by leaps and bounds with new offices in Europe and the Asia-Pacific area as well as new… Blog
04.02.14 Akamai is a software platform, originally built on Linux, and able to run on commodity hardware. According to Akamai’s own metrics, at any one time between 15% and 30% of web traffic is going between Akamai servers. It is not a separate network, running as it does over the Internet… Product Reports
30.01.14 As part of a series of blogs concentrating on the market of Software-defined infrastructures such as SDN (Software Defined Networking) or SDCI, I am currently looking into SDN, and the implications that it is will have for the network market in general over the coming months. It helps to… Blog
29.01.14 Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. Business & Technology Breakfast
28.01.14 Geschäftliche Informationen machen einen wesentlichen Teil des Unternehmenswertes aus. Diese Informationen sind aber gefährdeter als jemals zuvor. Diese Gefahr entsteht aber keineswegs nur durch externe Angriffe, sondern in hohem Maße immer noch durch interne Anwender mit umfassenden Berechtigungen. Podcast
28.01.14 Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them. Advisory Notes
27.01.14 The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of… Leadership Compass
22.01.14 This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly… Leadership Compass
17.01.14 This week the UK government launched the Cyber Street programme to improve the cyber security of UK residents and SMEs.  This is complemented by a Cyber to the Citizen initiative from the BCS - (The UK Chartered Institute for IT). The background to this is the continuing concern that most… Blog
16.01.14 Aussagen von Auditoren zu Risiken durch privilegierte Nutzer sind nicht wirklich nötig, um ein besonderes Augenmerk auf privilegierte Zugriffe zu werfen. Podcast
15.01.14 It was recently reported that Google has bought Nest Labs, a manufacturer of home automation sensors and devices with, currently, two products: a digital thermostat and a Smoke + CO Alarm. Why is it, then, that somebody would spend 3.2 Billion USD for a company producing home appliances… Blog
10.01.14 Brainwave is a French vendor and their product Brainwave Identity GRC is focused on what they describe as identifying and mitigating the user risks. Compliance is an important driver for the acquisition of IAM technology and Brainwave Identity GRC is focused squarely on this need. It… Executive Views
07.01.14 Happy New Year everyone! We've just come through what's probably the biggest gift giving month of the year - most of you, I'm sure, unwrapped more than one present. So let me ask a couple of questions. If there was a pretty package, with no tag identifying the giver - would you open it? If… Blog
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Extending your Active Directory to the Cloud
There are new options now to extend the existing AD to the cloud and to serve new business demand of on-boarding, off-boarding, and managing business partners and customers – delivered by Microsoft and other players in the market. This creates a situation for organizations using AD in which they should start reviewing and rethinking their Active Directory strategy.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole