English   Deutsch   Русский   中文    

KuppingerCole News

15.06.11 KuppingerCole on Identity Management

Review European Identity Conference (EIC) and CLOUD 2011

Thanks to 500+ attendees, speakers, sponsors, exhibitors and press members, you have turned EIC and CLOUD 2011 into an unforgettable event.

We hope that you had a good trip back and will remember EIC and CLOUD 2011 as a conference having met its role as a major platform to create, continue and intensify the dialog between thought leaders and users, between business and technology. Intensive discussions inside the sessions and outside, exchange of experiences and ideas - we all hope, that you could carry away enough inspirations for your upcoming projects.

Access to Presentations
We have now uploaded all currently available presentations to the conference website.

Please note that presentations and other event materials are available only to registered participants of European Identity Conference 2011. You need to log in to be able to download them.

Photos
We have put online a photo gallery. In order to get higher resolutions of a photo, just click it. If you want to have your photos added to this gallery, please send them to Levent Kara, lk@kuppingercole.com

Interview Videos
During EIC and CLOUD 2011, our analysts interviewed many of the speakers. We have already uploaded some of them to our Podcast section.

European Identity Award 2011

Thank you for attending and contributing. See you again next year from April 17th until 20th, 2012.


KuppingerCole Quick Poll - Compliance as a driver for IAM?

Please take part in our 30 seconds quick poll.

Take the Poll

Thanks!


Tim Cole: RSA Hack: Don’t panic, keep calm!

Following the successful hacking attack against EMC Corp’s RSA Security Division in March of this year, and especially since news of subsequent attacks against large military contractors such as Lockheed Martin, L-3 and Northrop Grumman, which seem to have been based on data stolen from RSA, companies and organizations around the world that use the popular RSA “SecurID” token system are both confused and worried. They are demanding to know whether they can still trust the system and what they are supposed to do now that every SecurID token must be considered potentially compromised...
more...


Martin Kuppinger: Healing the Breach at RSA

It must have hurt: RSA, one of the world’s biggest names in IT Security, recently was forced to admit that there had been a successful attack against the “seeds” that are a part of their hallmark RSA SecurID Token system. These seeds store secret information that enables the system to assemble one-time passwords. Nobody really knows how serious the breach of security has been, and RSA isn’t talking, but there nevertheless are lessons to be learned for the entire industry...
more...


Free KuppingerCole Snapshots

For an overview of the latest snapshots, visit http://www.kuppingercole.com/snapshots


New Reports

Advisory Note - Authorization in the Cloud
Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that…
more...

Advisory Note - RSA SecurID
As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time passwords)…
more...

Advisory Note – Strong Authentication
This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…
more...

Advisory Note – IAM and GRC Market Evolution 2011/2012
IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market...
more...

More current Reports

For an overview of the latest reports, visit http://www.kuppingercole.com/reports


KuppingerCole Blogs

Martin Kuppinger

Sailpoint and BMC – how to move forward?

Symlabs now part of Quest

Be prepared for BYOD

Tim Cole

IT Security’s little “Pulchinella Secret”

Pretzels in the Cloud


Craig Burton

How to Spot an Unnecessary Identity Fail

Mono Resurrects Itself as Xamarin

Mike Small

Classify Your Data [Not Protectively Marked]

Symantec Bets on Virtual Workspaces and Mobility

Sachar Paulus

News from the Analyst Summit in London


Free KuppingerCole Podcasts

The KuppingerCole Podcasts are recordings of past webinars that respectively cover individual aspects of Governance, Risk Management and Compliance, Identity and Access Management, IT Security, Cloud Computing and other core IT issues. Each podcast lasts 50 to 60 minutes and will treat current key issues. The podcasts are available at the link specified below.

To the free Podcasts


Current Events

April 17th - 20th 2012, Munich
European Identity Conference and CLOUD 2012
European Identity Conference (EIC) is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as Identity Management, Governance, Risk Management and Compliance (GRC), both in "classical" and in Cloud Computing environments. With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe and beyond...
more...


Visit us on Facebook, LinkedIn and Twitter

KuppingerCole is now on Facebook, LinkedIn and Twitter and we want to connect with you.

Become a “fan” of our page and we’ll use this as a tool to keep you abreast of important news, event and webinar opportunities and other important updates.

KuppingerCole on Facebook

KuppingerCole on LinkedIn

KuppingerCole on Twitter

top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole