KuppingerCole Quick Poll - SAP CUA and SAP NW IDMPlease take part in our 30 seconds quick poll on SAP CUA and SAP NW IDM.
Take the Poll
Free Webinar: Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.
Webinar: Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
Date: Tuesday, March 29th, 2011, 6pm CET, 9am PT, 12pm ET
Speakers: Martin Kuppinger (KuppingerCole), Subbu Devulapalli (Oracle)
Preventing unauthorized user access to sensitive application functions and data is a growing IT security challenge. Recent compliance regulations and modern security mandates require IT stakeholders to establish granular access privileges and enforce segregation of duties to protect sensitive business information from unauthorized users. But historically, authorization logic has been coupled with application business logic resulting in higher development costs, longer time to market, reduced IT agility, and difficult compliance. Learn how a combination of externalized authorization controls with an entitlement-centric approach to identity management ensures that enterprise-wide security policies can be consistently applied, easily audited, quickly deployed, and fine-grained enough to fortify security throughout your enterprise infrastructure.
In this webinar, Martin Kuppinger, Founder and Principal Analyst at Kuppinger Cole, will talk about the status and evolution of the market for Entitlement Management, the role XACML plays and what XACML can’t solve, real-world architectural consideration and approaches. He also will discuss the main drivers. Followed by Martin, Subbu Devulapalli, Principal Product Manager for Oracle Entitlements Server, will talk about solutions and real-world use cases that demonstrate how organizations can externalize authorization to ensure dependable enterprise security for heterogeneous environments.
This Webinar is supported by Oracle.
Martin Kuppinger: 10 Rules for Securing the Cloud
Security is the hottest topic in town when considering moving your business to the Cloud, especially if you plan to use an external provider or, even worse, more than one provider. How do you make sure your data are “secure” out there? Here are ten simple rules to follow in if you want to stay on the safe side of Cloud Computing...
Sachar Paulus: Opening the Door to Cloud Security
„Security“ and „Cloud“ are often seen as mutually exclusive. Many CIOs live in fear losing control over their data despite the claims by cloud providers that sensitive information is in fact in safe hands with them. But once data gets replicated, it gets harder and harder to keep them under lock and key...
Martin Kuppinger: Access Governance Sets the Stage for Information Security and Compliance
Vendor Research Note - Avatier
Avatier is a vendor in the Identity and Access Management (IAM) market which provides an integrated set of tools to cover core requirements in that market. The AIMS (Avatier Identity Management Suite) supports features like role mining, password management and reset, user provisioning, recertification of access and access requests. With this offering, AIMS fits into the Enterprise Identity Provisioning market segment, which is at the core of most IAM implementations...
Advisory Note: Cloud Computing - Cloud Security Management
The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way. The Cloud is not a single model but covers a wide spectrum from applications shared between multiple tenants to virtual servers used by one customer and hosted internally. The information security risks associated with Cloud computing depend upon both the service model and the delivery model adopted. The common security concerns across this spectrum are ensuring the confidentiality, integrity and availability of the services and data delivered through the Cloud environment. For an overview of Cloud Computing see Kuppinger Cole Research Note #70140 “Cloud Computing Overview”...
Advisory Note: Database Governance
Database Governance is the set of policies, procedures, practices and organizational structures ensuring the execution of database related activities in an organization according to defined strategies and controls. Database Governance is required to enforce Information Security for structured data held in databases...
Vendor Report: Symantec Cloud Security
The Cloud is an environment which allows the delivery of IT services in a standardized way. This standardization makes it possible to optimize the procurement of IT services from both external and internal providers. The information security risks associated with Cloud computing depend upon both the service model and the delivery model adopted. The Cloud covers a wide spectrum from shared applications delivered over the internet to virtual servers hosted internally. The common security concerns across this spectrum are ensuring the confidentiality, integrity and availability of the services and data delivered through the Cloud environment...
KuppingerCole Top Trends 2011
As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix of internal as well as external IT services...
More current Reports
For an overview of the latest reports, visit http://www.kuppingercole.com/reports
Prof. Dr. Sachar Paulus
Free KuppingerCole Podcasts
The KuppingerCole Podcasts are recordings of past webinars that respectively cover individual aspects of Governance, Risk Management and Compliance, Identity and Access Management, IT Security, Cloud Computing and other core IT issues. Each podcast lasts 50 to 60 minutes and will treat current key issues. The podcasts are available at the link specified below.
To the free Podcasts
29. March, 2011 Free Webinar
Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
31. March, 2011 Free Webinar
Access Management: Simplify Access to Web- and Cloud-based Applications without Compromising Security
12. April, 2011 Free Webinar
Reliable Protection for Information in Databases
14. April, 2011 Free Webinar
Business-Centric, Cloud-Aware Identity and Access Management
May 10th - 13th 2011, Munich
European Identity Conference 2011 and CLOUD 2011
European Identity Conference (EIC) is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as Identity Management, Governance, Risk Management and Compliance (GRC), both in "classical" and in Cloud Computing environments. With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe and beyond...
Visit us on Facebook and Twitter
KuppingerCole is now on Facebook, LinkedIn and Twitter and we want to connect with you.
Become a “fan” of our page and we’ll use this as a tool to keep you abreast of important news, event and webinar opportunities and other important updates.
KuppingerCole on Facebook
KuppingerCole on LinkedIn
KuppingerCole on Twitter