English   Deutsch   Русский      

Media Coverage

Understanding IT Risk Management In 4 Steps X 3
Nov 19, 2013 Understanding IT Risk Management In 4 Steps X 3

A risk management matrix combines the probability of harm and the severity of harm. In IT terms that means authentication, context, and process.

If you had to protect a million dollars in gold, would you spend $3 million to do it? In certain circumstances, you might.

If you wanted to steal a million dollars in gold, would you spend $3 million to do it? Many would answer, "of course not."

But, again, in certain circumstances they would be wrong. I’ll explain in a moment, but first some background. What I’m talking about is a discipline called IT risk management. Risk management began in the financial markets where the risk was about stocks and securities. By extension, it was applied to an organization’s digital resources. That aspect falls under the purview of the Chief Information Security Officer (CISO) for your enterprise.

By Dave Kearns 19 November 2013
InformationWeek


Read more 

Security Think Tank: Procurement and security are uneasy bedfellows
Nov 11, 2013 Security Think Tank: Procurement and security are uneasy bedfellows

Back doors in software can put customer and employee data at risk; poorly coded software can cause outages, brand damage and loss of data; viruses and Trojans in unchecked downloads can cause havoc and untold damage, including handing access to malicious third parties who then have unfettered access to systems.

By Rob Newby 11 November 2013
UK Computer Weekly


Read more 

Securing Big Data
Sep 30, 2013 Securing Big Data

Big data can create business value by solving emerging business challenges. However, big data also creates security challenges that need to be considered by organisations adopting or using big data techniques and technologies says Mike Small, FBCS CITP. There is now an enormous quantity of data in a wide variety of forms that is being generated very quickly. However, the term big data is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data.

The term big data needs to be understood as data that has greater volume, variety or velocity than can be comfortably processed using the technology that you already have. Big data comes from a number of sources both internal and external. Many organisations have accumulated large amounts of data that they are not exploiting. There is an even larger amount of data that is held in publicly available sources, like government databases, social media, as well as data that organisations would be willing to share. In addition the inbuilt instrumentation of smart systems generates a massive amount of, as yet, untapped data. To realise its potential value big data needs to be transformed into smart information , which can then be used to improve planning and increase efficiency as well as to create new kinds of products.

By Mike Small September 2013
BCS Magazine IT Now 


Read more 

The future of cloud
Sep 25, 2013 The future of cloud

We asked senior figures in the industry to come together to debate the future of cloud computing in a round table. Present were: Daniel Power, EMEA sales director, Onelogin; Matt Price, VP and general manager EMEA, Zendesk; Mike Small, fellow analyst, KuppingerCole and member of ISACA; Simon Wilcox, director, Digital Craftsmen; Jonathan Wisler, general manager EMEA, Softlayer; and Virginia Blackburn, moderator.

By Virginia Blackburn 25 September, 2013
Quelle: MEDIAPLANET


Read more 

EMC Nabs Aveksa, a Player in Identity Management
Jul 08, 2013 EMC Nabs Aveksa, a Player in Identity Management

Tech giant EMC made an interesting acquisition today that is likely to increase attention not on itself, but on another company in the same space.

EMC said today that it had acquired Aveksa, a privately held company that specializes in identity management. It’s based in Waltham, Mass., and has significant operations in India. First reports of the deal came from the Times of India, which said EMC paid $225 million. Aveksa will become part of RSA, the security division of EMC.

By Arik Hesseldahl 8 July 2013
AllThings D


Read more 

Security Think Tank: Prism – Sitting duck or elaborate honeypot?
Jul 02, 2013 Security Think Tank: Prism – Sitting duck or elaborate honeypot?

As I write, a handful of slides have been published, appearing to detail websites that are being monitored by the US National Security Agency (NSA), including Google, Facebook, Yahoo, Hotmail, Apple and Skype. What appears to be an acronym – Prism – appears throughout, along with the official seals and protective markings to suggest it is a bona fide US government presentation...

By Rob Newby 2 July 2013
UK Computer Weekly


Read more 

Cloud choices: How to select the right hosted services
May 24, 2012 Cloud choices: How to select the right hosted services

The cloud provides an alternative way of procuring IT services that offers many benefits, including increased flexibility as well as reduced cost. It extends the spectrum of IT service delivery models beyond managed and hosted services to a form that is packaged and commoditised. 

By Mike Small 24 May 2012
UK Computer Weekly


Read more 

Impressions from European Identity Conference 2012
Apr 25, 2012 Impressions from European Identity Conference 2012

This year’s European Identity & Cloud Conference took place from 17.-20. April with the last day being a workshop day to deepen some of the topics. The event is one of the most important IAM meetings in the world and continues to increase its impact. Almost 600 visitors from allover the world and 40 exhibitors constituted to a 35% growth. As every year the vendor landscape showed some dynamics with NetIQ acquiring Novell’s IAM business, ATOS taking over Siemens IT Solutions and Services (DirX), new rising stars appearing like ForgeRock, Symplified and The Dot Net Factory to name a few, Ping Identity expanding its presence and big companies like VMWare participating for the first time.

April 25, 2012
SSOCircle


Read more 

Quest Acquires Bitkoo For Cloud Identity Management
Dec 20, 2011 Quest Acquires Bitkoo For Cloud Identity Management

Quest Software Monday announced its acquisition of access-control technology vendor Bitkoo. Terms of the deal were not disclosed.

Quest is pitching the acquisition as a way to provide its customers with a more centralized and nuanced approach for handling authentication in multiple environments: inside the enterprise, including for databases--down to individual rows and columns--and SharePoint installations, as well as for cloud-based applications and Web services.

By Mathew J. Schwartz 20 December 2011
InformationWeek


Read more 

UBS Finds Risk Management Stress Test Costly
Oct 26, 2011 UBS Finds Risk Management Stress Test Costly

UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.

By Mathew J. Schwartz 26 October 2011
InformationWeek


Read more 

Impressions from European Identity Conference 2011
Jun 16, 2011 Impressions from European Identity Conference 2011

This year's European Identity Conference (EIC2011), a fixed star in the digital identity world took place in Munich, Germany, from 10.-12. May and a supplemental workshop day on the 13th. As last year the conference also hosted the Cloud 2011. In terms of venue the conference made a leap into the future from the venerable Deutsche Museum to the Dolce Ballhaus-Forum, a modern hotel and conference center north of Munich. Needless to say that the conference was well organized by KuppingeCole and newly introduced supplemental offerings like the World Cafe unconference or a crash course in international privacy and IT security law.

May 15, 2011
SSOCircle


Read more 

Confused By RSA's Clarification?
Jun 09, 2011 Confused By RSA's Clarification?

While RSA has offered to replace some tokens, many customers still don't know how or why their SecurID tokens may pose a security risk.

Could attackers break into your SecurID two-factor authentication system?

Despite the open letter issued this week by RSA chairman Art Coviello, many of the company's customers remain confused about exactly what attackers stole from RSA in March, and what risk that information might pose to their enterprise, even if they're not a defense contractor.

By Mathew J. Schwartz 09 June 2011
InformationWeek   


Read more 

WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category
May 18, 2011 WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category

WSO2, the lean enterprise middleware company, today announced that it has been awarded the European Identity Award 2011 in the Cloud Provider Offerings category by analyst group KuppingerCole. The award recognizes WSO2 for WSO2 Identity as a Service, citing the multi-tenant open source cloud service for its OpenID and XACML support and its innovative features, including the ability to migrate from on-premise to a full cloud service. This award was presented on May 11, at the European Identity Conference 2011 in Munich.

Business Wire


Read more 

Trust, respect and personal datastores
May 17, 2011 Trust, respect and personal datastores

On the final day of last week's European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks.

By Dave Kearns 17 May 2011
Network World   


Read more 

Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)
May 13, 2011 Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)

Kim Cameron, a Microsoft distinguished engineer and outspoken advocate of Internet privacy, left the company last week.

In a video interview yesterday, he says that Microsoft is on the right track, but he's worried that user privacy will get lost in the shuffle as big Internet companies like Microsoft, Google, and Facebook fight for market share.

By Matt Rosoff 13 May 2011
Business Insider


Read more 

Springtime in Munich
Apr 13, 2011 Springtime in Munich

One of the things I love about the European Identity Conference is the willingness of the organizers, Kuppinger Cole + Partner, to explore new formats instead of tired old presentations.
Last year, for example, one of my sessions was "a Conversation with Kim Cameron." Kim and I and two microphones. No set agenda, just exploring identity.

By Dave Kearns 13 April 2011
Network World  


Read more 

SecurID Customers Advised To Prepare For Worst Case
Mar 22, 2011 SecurID Customers Advised To Prepare For Worst Case

EMC's RSA hasn't detailed exactly what was stolen, so security experts advise the authentication system's customers to implement a more layered network defense.

How serious is the security threat posed by the theft of inside information about SecurID, the two-factor authentication system sold by EMC division RSA? "It is important enough that it required an official note to the stock markets," said Martin Kuppinger, founder and principal analyst at KuppingerCole, in a blog post...

By Mathew J. Schwartz 22 March 2011
InformationWeek
 


Read more 

What's happening - Upcoming events in the IdM/IAM arena
Mar 15, 2011 What's happening - Upcoming events in the IdM/IAM arena

May promises to be really busy, and a challenge for anyone hoping to visit all the venues. First up is the European Identity Conference (EIC) in Munich (May 10-13). EIC is my favorite European conference and one of my two favorites anywhere. This is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as identity management; governance, risk management and compliance (GRC); and service oriented architecture (SOA), both in "classical" environments as well as in private, public and hybrid cloud environments. I'll be there once again along with many speakers whose names are familiar from this newsletter (Kim Cameron, Tim Cole, Nishant Kaushik, Jackson Shaw, Martin Kuppinger, et al); you should be too. Sign up online so you aren't disappointed...

By Dave Kearns 15 March 2011
Network World


Read more 

Security is holding back virtualisation
Dec 13, 2010 Security is holding back virtualisation

Virtualisation security is still a thorny problem for implementers, says a survey from Kuppinger Cole.

Security is the biggest worry for virtualisation project leaders, according to a report from Kuppinger Cole, an analyst firm that focuses on information security. 

Forty per cent of respondents said they believed that a virtual environment was harder to secure than a physical one.

By Eric Doyle 10 December 2010
IT PRO


Read more 

The case for XLDAP
Jun 11, 2010 The case for XLDAP

There's still one or two issues to bring up from last month's European Identity Conference, which I want to get to this week -- one from a panel I was on and another from one I wasn't on.

Kuppinger-Cole senior analyst Sebastian Rohr inveigled me to sit on his panel "Directory Services in the Cloud" where, among other issues, we explored exchanging directory data in an XML-enabled world. I rashly suggested that Directory Services Markup Language (DSML) was sufficient for this purpose. But I didn't count on Australia's Andrew Ferguson to be lurking behind a screen where I couldn't see him.

By Dave Kearns 04 June 2010
Network World


Read more 

Impressions from European Identity Conference 2010
May 20, 2010 Impressions from European Identity Conference 2010

Three days of conference plus a Workshop day packed full with IAM and GRC topics and even more. The KuppingerCole European Identity Conference EIC2010 was a great success. In my opinion the best EIC I have seen, although there were some confusion and unexpected changes that let me miss some of the presentations I was eager to visit. But that can be easily excused looking at the choice and quality of speakers. KuppingerCole again did a very good job in gathering many of the leading heads in Identity Management and GRC. The only thing I missed were people from Google like Eric Sachs, who did a lot in the OAuth and OpenId space the last years.

SSOCircle  Blog


Read more 

Munich fuel
May 12, 2010 Munich fuel

To get through the intense European Identity Conference last week in Munich (thanks, Kuppinger Cole folks!), I had to make sure to drink lots of fluids. I’m referring, of course, to coffee, beer, and one extraordinary whisky (thanks, Ping Identity folks!)...

By Eve Maler 12 May 2010
Blog Eve Maler


Read more 

Information Cards at the 2010 European Identity Conference
May 11, 2010 Information Cards at the 2010 European Identity Conference

Munich, Germany -- Information Cards and ICF members were very active in the European Identity Conference (EIC) in Munich this past week. To begin with, ICF board member Kim Cameron accepted the European Identity Award for “Best Innovation” on behalf of Microsoft for its U-Prove minimal disclosure technology. The award was shared with IBM for its similar Idemix technology. Both solutions were lauded by EIC host Kuppinger Cole as pioneering efforts in enhancing online privacy and security.

By Drummond Reed 10 May 2010
Drummond Reed's blog


Read more 

EIC 2010: An outsider’s view
May 11, 2010 EIC 2010: An outsider’s view

I stumbled into the European Identity Conference 2010 actually only by accident, more being a web developer than an enterprise IT guy (although having to do with it in terms of connecting e.g. Plone to an LDAP server in our bigger clients). But I don’t regret that I actually did!

By mrtopf 11 May 2010
Blog mrtopf.de


Read more 

Smartsoft'a Avrupa'dan ödül
May 10, 2010 Smartsoft'a Avrupa'dan ödül

SMARTSOFT'un Oracle işbirliğiyle ortaklaşa geliştirdiği ve sinir (nöral) ağlarının kullanıldığı risk tabanlı doğrulama ve yetkilendirme operasyonlarına olanak sağlayan çözümü ile SMARTSOFT - ORACLE - ŞEKERBANK işbirliği "En İyi Kurum İçi Proje" dalında ödül kazandı.Dijital kimlik yönetimi alanındaki seçkin projelere, inovasyonlara ve gelişmelere yönelik Avrupa Kimlik Ödülleri, Kimlik ve Erişim Yönetimi (IAM) ve Yönetişim, Risk Yönetimi ve Uyumluluk (GRC) alanlarında Avrupa'nın önde gelen merkezlerinden Münih kentinde düzenlenen 2010 Avrupa Kimlik Konferansı'nda coşkulu bir törenle KUPPINGER COLE araştırma grubu tarafından sahiplerine sunuldu.

By Mehmet Göksu 10 May 2010
Computerworld


Read more 

MetricStream to Showcase Its GRC Platform at the European Identity Conference
May 07, 2010 MetricStream to Showcase Its GRC Platform at the European Identity Conference

Palo Alto, CA -- (SBWIRE) -- 05/07/2010 -- MetricStream, the market leader in Enterprise Governance, Risk, Compliance (GRC) and Quality Management solutions is showcasing its GRC Platform at Cloud 2010, a European Identity Conference(EIC) on “Cloud Computing - Thought Leadership and Best Practices” hosted by Kuppinger Cole in Munich, Germany from May 4 to 7, 2010.

By  SBWIRE
Read more 

A security event without leaving your home
Jan 27, 2010 A security event without leaving your home

Last fall I was twice put in the quandary of choosing between two conferences going on simultaneously. In September there was Digital ID World in Las Vegas and The Experts Conference in Berlin. While November saw both the Cloud Computing Expo and the Internet Identity Workshop sharing the same week. I thought I could shuttle between Cloud Computing and IIW, since they were being held only 5 miles apart, but in reality that was a no go...
 
By Dave Kearns 27 January 2010
Network World 

Read more 

Time to move the discussion past authentication
Oct 27, 2009 Time to move the discussion past authentication

A couple of notes I read last week seemed to go together so nicely that I thought I'd share hem with you in hopes of stimulating your own thought processes. One came from a discussion of the LinkedIn cloud computing group while the other was a blog post by old friend Martin Kuppinger...

By Dave Kearns 27 October 2009
Network World


Read more 

Identity in the cloud
Jul 24, 2009 Identity in the cloud

I spent a pleasant hour talking with Martin Kuppinger (of Kuppinger Cole + Partner) about "Externalizing Identity into the Cloud: Identity Services in Cloud and Outsourcing Environments" -- and we even had a surprise guest.

By Dave Kearns 24 July 2009
Network World


Read more 

EIC 2009, and a New Focus on Identity in the Cloud
Jun 03, 2009 EIC 2009, and a New Focus on Identity in the Cloud

From May 5th to May 8th I attended the 3rd European Identity Conference (EIC). As a testimonial on the front page says, it was “a wonderful and informative event, well run and useful in so many ways.” (If I quote a page quoting me, is that recursion or delegation?)

I attended the first two EICs and, while I greatly enjoyed them, each conference has been better than the last. EIC strikes a good balance between providing a forward looking vision of what identity management technology should provide for business, and what practical solutions are available now.

By Dale Olds 03 June 2009
Blog Dale Olds


Read more 

Recognizing standards
May 19, 2009 Recognizing standards

One of the highlights of the recent European Identity Conference was the conferring of the European Identity Awards, which recognize outstanding projects, innovations and additional developments in standards -- an area that should get even more recognition.

By Dave Kearns 19 May 2009
Network World


Read more 

The regional, cultural and national differences of identity management
May 13, 2009 The regional, cultural and national differences of identity management

Last week's European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what's happening worldwide. I had the opportunity to host panel discussions that included people from Germany, Holland, Sweden, Norway, France, Italy, the U.K., Belgium, Canada, the U.S., Australia and India. It's a wonderful way to discover that although identity management theory is pretty much the same the whole world over, the practice, or implementation, of that theory has many regional, cultural and national differences.

By Dave Kearns 13 May 2009
Network World


Read more 

Heady days at EIC in Munich
May 12, 2009 Heady days at EIC in Munich

What a week… Along with lots of other people in the identosphere, I had a great opportunity to attend the Kuppinger Cole European Identity Conference in Munich all last week. Here are some stories, impressions, and links.

By Eve Maler 12 May 2009
Blog Eve Maler


Read more 

Five Things that Stuck Out to Me at the European Identity Conference 2009
May 12, 2009 Five Things that Stuck Out to Me at the European Identity Conference 2009

As promised in my last blog entry, here are my top 5 observations from last week's European Identity Conference 2009, put on by the Germany analyst firm Kuppinger Cole.  The conference Web site is here -  http://www.id-conf.com/eic2009 where you can find conference podcasts, Twitter postings and more.

By Matthew Gardiner 12 May 2009
Blog CA Community


Read more 

ICF Achievements at the EIC
May 10, 2009 ICF Achievements at the EIC

This week the Information Card Foundation marked two significant developments at the European Identity Conference: the formation of the German-language chapter of the ICF, and receiving the European Identity Award for Best New Standard.

By Mike Jones 10 May 2009
Blog Mike Jones


Read more 

EIC 2009
May 10, 2009 EIC 2009

Just back from another fine European ID Conference in Munich. The combination of the venue (the Forum at the Deutsches Museum), the speakers and our great hosts from Kuppinger-Cole + Partner (Martin, Tim, Joerg, Felix, Sebastian, Levent, Gabi, Bettina and all their cohorts) makes this an event ne plus ultra.

By Dave Kearns 10 May 2009
The Virtual Quill


Read more 

Project Aristotle Wins EIC Award
May 08, 2009 Project Aristotle Wins EIC Award

I am happy to announce that Project Aristotle won an award for “Best new or improved standard” at the European Identity Conference. The win is shared with the Open Authentication (OAuth) and the Information Card Foundation (ICF).

By ArisId 08 May 2009


Read more 

European Identity Conference 2009
Apr 08, 2009 European Identity Conference 2009

This year I finally have a chance of attending the European Identity Conference in Munich. I would have been already delighted to go there just as attendee, the lineup of speakers is phenomenal and the chances of good networking appear really promising.

By Vittorio Bertocci April 8th, 2009
Vibro.NET


Read more 

Microsoft again delays identity management server
Mar 25, 2009 Microsoft again delays identity management server

Upgrade to Microsoft's ILM software has been years in development and now will not ship before January 2010

By John Fontana 25 March 2009
Network World


Read more 

Identity management in Western Europe is alive and well
Jan 26, 2009 Identity management in Western Europe is alive and well

Because I'm based in California's Silicon Valley, a long stone's throw from Oracle HQ and surrounded by dozens of identity management vendors, my view of the global marketplace can be skewed. While I try to make up for this by visiting conferences and trade shows outside the United States (I’ll be at the European ID Conference in Munich this May), I do rely on readers and friends to keep me posted about things of interest in their areas. Today, we'll hear from one identity management player in Western Europe who has reported on the state of the industry there.

By Dave Kearns 26 January 2009
Network World


Read more 

Making a case to the board
Jan 12, 2009 Making a case to the board

Proving security's worth is not always the easiest job. Once you've invested in systems, trained staff, secured the perimeter, secured the interior, put in monitoring and maintenance programmes, chosen what, if anything, to outsource, run penetration tests and more, what's the result? No-one gives out their password on the phone, catches a virus on their PC, leaves unencrypted data on the train or suffers any kind of a security breach. If all goes right, nothing happens.

By Rob Buckley 12 Jan. 2009
SC Magazine Australia/NZ


Read more 

Building an Identity Bus, Part 2
May 07, 2008 Building an Identity Bus, Part 2

Thoughts on how to move the Identity Bus forward

Last time out I told you about an informal discussion I had with Microsoft's Kim Cameron, Novell's Dale Olds, Quest's Jackson Shaw hosted by Kuppinger-Cole's Felix Gaehtgens all about the so-called "Identity Bus." I said that we reached a conclusion about the best way to move forward, but perhaps it's better to say we identified a couple of paths that might be worth taking.

By Dave Kearns 05 May 2008
Network World


Read more 

Building an Identity Bus, Part 1
May 05, 2008 Building an Identity Bus, Part 1

Identity Bus discussion at the European Identity Conference

One of the most interesting "panel discussions" I had at the European Identity Conference didn't have anyone in the audience. Kuppinger & Cole senior analyst Felix Gaehtgens gathered Microsoft's Kim Cameron, Quest's Jackson Shaw (former colleagues at Zoomit) and Novell's Dale Olds for a video interview (which may or may not show up at the KCP Web site) about the "Identity Bus" .

By Dave Kearns 05 May 2008
Network World


Read more 

Putting Context in Identity
Apr 30, 2008 Putting Context in Identity

An overview of some panel discussions from the 2nd annual European Identity Conference

I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity."

By Dave Kearns 30 April 2008
Network World


Read more 

European Identity Awards
Apr 29, 2008 European Identity Awards

The recent European Identity Conference 2008 featured the presentation of Kuppinger Cole’s European Identity Awards. Vendors, integrators, consultants and user companies were asked for nominations. For each category, three outstanding projects and innovations were nominated as finalists. Here is how Kuppinger Cole framed the results:

By Kim Cameron 29 April 2008
Kim Cameron´s Identity Weblog


Read more 

Virtual Corporate Business Cards
Apr 27, 2008 Virtual Corporate Business Cards

Martin Kuppinger is one of the key analysts behind the amazing European Identity Conference just held in Munich.  This was "User Centric Meets Enterprise Identity Management" with a twist: our European colleagues have many things to contribute to the discussion about how they fit together...

By Kim Cameron 27 April 2008
Kim Cameron´s Identity Weblog


Read more 

Context in identity
Apr 24, 2008 Context in identity

Sessions worth attending at the 2nd annual European Identity Conference

Today I want to talk about a company I mentioned a year ago, with all intentions of telling you more about them. But even as I try to get them into today's newsletter, there's a timely issue to tell you about first, especially if you're in Munich this week for the 2nd annual European Identity Conference.

By Dave Kearns 24 April 2008
Network World


Read more 

Identity 2.0 products gaining ground
Mar 12, 2008 Identity 2.0 products gaining ground

Identity 2.0 technologies are leading the way in identity management, according to research from industry analysts.
Analyst group Kuppinger Cole and Partner analysed the 10 predominant topics and trends in identity management in 2008.

Clement James, vnunet.com, 12 Mar 2008
Personal Computer World


Read more 

ID management enters the application stack
Mar 12, 2008 ID management enters the application stack

Businesses are looking to simplify the process of managing identities, according to analysts

The complexity of managing governance, risk and compliance (GRC) activities is driving firms to integrate identity and role management into the application stack.

According to analyst group Kuppinger Cole & Partners, identity management and role management have become so fundamental to enterprises' ability to manage GRC that business leaders are looking at new ways to simplify the process.

Gareth Morgan, IT Week 12 March 2008
Personal Computer World


Read more 

Analyst: Open-ID ist eine Business-Technologie
Feb 14, 2008 Analyst: Open-ID ist eine Business-Technologie

Web-Single-Sign-on ist auch für Firmen interessant

Analysten begrüßen den nahenden Durchbruch bei der Webregistrierungs-Technik Open-ID. Sie wird zwar derzeit vor allem im Blog-Umfeld eingesetzt, birgt aber auch Business-Potenziale. Dazu muss die Technologie für das User-centric Identity Management aber noch reifen.

Autor: Armin Barnitzke 14.02.2008
Computer Zeitung


Read more 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Cloud Provider Assurance
Using the cloud involves an element of trust between the consumer and the provider of a cloud service; however, it is vital to verify that this trust is well founded. Assurance is the process that provides this verification. The first step towards assuring a cloud service is to understand the business requirements for it. The needs for cost, compliance and security follow directly from these requirements. There is no absolute assurance level for a cloud service – it needs to be just as secure, compliant and cost effective as dictated by the business needs –– no more and no less.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole