KuppingerCole Quick Poll - Today: Access Governance
Are you thinking about an Access Governance initiative? Have you already started or completed an Access Governance project? Participate in this quick poll to understand how your approach measures up against your peers.
Please click on the link below to participate in the Quick Poll.
Take the Poll
Free Webinar: The Business Value of Log Management Best Practices
Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.
Webinar: The Business Value of Log Management Best Practices
Date: Wednesday, Jan. 26th, 2011, 3pm CET, 9am EST
Speakers: Martin Kuppinger (KuppingerCole), Pascal Oetiker (Novell)
Due to a consistently tightening framework of legal and governance requirements, and due to a continuous strive for process quality improvements, information extracted from log data is more and more becoming a valuable source not only for IT security departments, but also for HR, the legal department, internal audit, finance, engineering and even (or: first and foremost) marketing and sales.
In this webinar you will learn, how to create additional business value through creating and implementing log management best practices.
- How to efficiently manage an increasing amount of log data and save storage costs
- What the best possible approach to log management best practices for your individual situation is
- How to significantly increase information security and pro-actively avoid damages from new threats
- Seamlessly include cloud service logs into your enterprise log management
- Showing organisations how to add value to an existing SIEM deployment by centralising log management
Kuppinger Cole´s Principal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.
This Webinar is supported by Novell.
Martin Kuppinger: Access Governance Sets the Stage for Information Security and Compliance
Rights Management may not exactly be something new, but the rising demands from internal and external auditors are putting it back in center stage. Organizations are being forced to adopt systematic, open and replicable processes for creating, assigning, and monitoring rights within their systems, not only to ease the admins’ workloads, but also to achieve their compliance goals...
Sachar Paulus: Without standards for DRM and IRM Cloud Security will remain a daydream
IT Security in and for the Cloud is one of today’s hottest topics. Unfortunately, it is almost as complicated as the Cloud itself, spanning from Identity Management and logging intelligence to data encryption. This article explores the various scenarios and demonstrates both strengths and weaknesses.
Vendors both like to invent and employ hype expressions to describe their technologies, and it is clear why: They want to make their products stand out from the rest. It's been that way since the earliest days of modern computing, and it goes especially for the field of IT Security. Remember "Endpoint Security" or "Perimeter Defense"? But now, with Cloud Computing all the rage, the industry is straining to reach new heights of hyperbole...
Martin Kuppinger: Cloud Computing – Service Integration Smarts for CIOs
Product Report: Cyber-Ark Privileged Identity Management Suite (PIM)
From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment...
Product Report: Zscaler Cloud Security
Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention...
More current Reports
For an overview of the latest reports, visit http://www.kuppingercole.com/reports
SAP invests in security technology
SAP recently announced that the they will buy most technology assets from the Swiss-German security specialist SECUDE. The developers and other resources will as well move to SAP, ensuring that as well the software as the “brain”ware is available to SAP. SECUDE provides solutions around SAP for strong authentication, single sign-on, and event management specifically to SAP environments. There is a long-term relationship between both companies, SECUDE being a supplier for many SAP customers in the areas mentioned....
Lessons enterprises should learn from the recent wiki-leak
There has been a lot of discussion around Wikileaks publishing an incredible amount of data which has been classified as confidential by the US Government. I don’t want to discuss this from specifically – many people have done this before, with fundamentally different conclusions. More interesting is what this means for private organizations, especially enterprises. Wikileaks has threatened some of them: The russian oligopolies, the finance industry in general...
Cloud Security – the market is evolving
Winter holiday season is almost over, and business claims its attention back – it was a nice time with family, good food, and so on. But the world didn’t stop, so we had to spend some time to look at a number of products. I would like to mention two here, especially because they help us getting closer to the Secure Cloud...
Free KuppingerCole Podcasts
The KuppingerCole Podcasts are recordings of past webinars that respectively cover individual aspects of Governance, Risk Management and Compliance, Identity and Access Management, IT Security, Cloud Computing and other core IT issues. Each podcast lasts 50 to 60 minutes and will treat current key issues. The podcasts are available at the link specified below.
To the free Podcasts
26. Jan., 2011 Free Webinar
The Business Value of Log Management Best Practices
Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices...
May 10th - 13th 2011, Munich
European Identity Conference 2011 and CLOUD 2011
European Identity Conference (EIC) is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as Identity Management, Governance, Risk Management and Compliance (GRC), both in "classical" and in Cloud Computing environments. With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe and beyond...
Visit us on Facebook and Twitter
KuppingerCole is now on Facebook, LinkedIn and Twitter and we want to connect with you.
Become a “fan” of our page and we’ll use this as a tool to keep you abreast of important news, event and webinar opportunities and other important updates.
KuppingerCole on Facebook
KuppingerCole on LinkedIn
KuppingerCole on Twitter