English   Deutsch  
 

Choosing the Right Cloud


Adopting Cloud computing can save money, but it is important to choose the right Cloud solution for your business need. KuppingerCole have produced a Scenario Report – Understanding Cloud Computing to help you make the right choice.
 

Past top stories
Date Title
18.04.12 European Identity Award 2012
The European Identity Awards 2012 honoring outstanding projects and initiatives in Identity Management, GRC (Governance, Risk Management and Compliance) and Cloud Security were presented yesterday by the analyst group KuppingerCole at their annual event, the European Identity Conference 2012 in Munich. Winners were chosen from a shortlist of exemplary projects and initiatives compiled…
MORE 
14.02.12 Data Protection and the Cloud
Nowhere is the uncertainty surrounding data protection currently greater than with regard to cloud services. Microsoft is on the right track with its extensive implementation of the EU standard contract clauses, writes Martin Kuppinger.
MORE 
18.11.11 Is cloud computing worth the hassle?
Cloud computing provides organisations with an alternative way of obtaining information technology services and offers many benefits including increased flexibility as well as cost reduction. But man many organisations are reluctant to adopt the cloud because of concerns over information security and a loss of control over the way IT services are delivered. These fears have been…
MORE 
15.11.11 Duqu follows Stuxnet - the next attack on the industry
Last week Duqu, a new Trojan, became known to us readily coined by security experts and media as Stuxnet 2.0. Stuxnet and Duque, however, probably are only the tip of the iceberg and the precursors of new attack scenarios, which will keep us busy from now on.
MORE 
06.10.11 Scenario: Understanding Identity and Access Management
In the second document from our series outlining KuppingerCole’s basic positions on key issues surrounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with current trends and ramifications for corporate IT systems. IAM is primarily…
MORE 
05.10.11 DigiNotar and RSA hackings demonstrate need for multi-level IT security
The attacks on SSL certificate authorities such as DigiNotar or GlobalSign threaten significant aspects of SSL-based security on the Internet. They also demonstrate yet again that security concepts should be multi-layered and never have a “single point of failure”.
MORE 
29.08.11 Planning future-proof IT Security projects
In IT, proper planning is all-important. If it is neglected, chaos ensues. Identity & Access Management (IAM) is a good case in point: As more and more enterprises recognize that it is not enough to simply concentrate on digital IDs and handling access requests, the Golden Rule of IT projects comes into play: „Think big – start small“.
MORE 
22.08.11 Ignorance is no excuse
Looking back on the spectacular security breaches of the past few months it is almost impossible to avid the feeling that enterprises and organizations around the world have their heads stuck firmly in the sand, at least as far as Information Security goes.
MORE 
08.07.11 How can IT keep a grip on mobile devices?
Bring Your Own Device (or “BYOD” for short) is another IT hype word making the rounds nowadays, but it isn’t really all that new. Many employees have been bringing their smartphones or iPads to work for quite some time now, with the company’s explicit or implicit consent – at least as long as access with such devices hasn’t be fully blocked. IT…
MORE 
10.06.11 RSA Hack: Don’t panic, keep calm!
Following the successful hacking attack against EMC Corp’s RSA Security Division in March of this year, and especially since news of subsequent attacks against large military contractors such as Lockheed Martin, L-3 and Northrop Grumman, which seem to have been based on data stolen from RSA, companies and organizations around the world that use the popular RSA “SecurID”…
MORE 
12.05.11 European Identity Award 2011
The European Identity Award 2011 honoring outstanding projects and initiatives in Identity Management was presented on Wednesday by the analyst group KuppingerCole at their annual event, the European Identity Conference 2011  in Munich. Winners were chosen from a shortlist of exemplary projects and initiatives compiled by the analysts at KuppingerCole during the last…
MORE 
04.05.11 Craig Burton Joins KuppingerCole
Craig Burton, founder of Burton Group, is joining the KuppingerCole team, as Distinguished Analyst. Burton will add new impulses to the research agenda and liaise directly with KuppingerCole's customers in North America. "Craig Burton is one of the best-known names in our industry," said Tim Cole, co-founder of KuppingerCole. "Thanks to his well-established network…
MORE 
13.04.11 KuppingerCole Quick Poll - Compliance as a driver for IAM?
Please take part in our 30 seconds quick poll on Compliance as a driver for IAM. Click here to begin
MORE 
07.02.11 Opening the Door to Cloud Security
„Security“ and „Cloud“ are often seen as mutually exclusive. Many CIOs live in fear losing control over their data despite the claims by cloud providers that sensitive information is in fact in safe hands with them. But once data gets replicated, it gets harder and harder to keep them under lock and key.
MORE 
25.01.11 Access Governance Sets the Stage for Information Security and Compliance
Rights Management may not exactly be something new, but the rising demands from internal and external auditors are putting it back in center stage. Organizations are being forced to adopt systematic, open and replicable processes for creating, assigning, and monitoring rights within their systems, not only to ease the admins’ workloads, but also to achieve their compliance goals.
MORE 
07.12.10 Without standards for DRM and IRM Cloud Security will remain a daydream
IT Security in and for the Cloud is one of today’s hottest topics. Unfortunately, it is almost as complicated as the Cloud itself, spanning from Identity Management and logging intelligence to data encryption. This article explores the various scenarios and demonstrates both strengths and weaknesses.
MORE 
15.10.10 Cloud Computing: Thinking inside the box
The problem with Cloud Computing is that no two experts can agree what it really is, right? Wrong! As of Sunday evening, we at least have two major players singing from the same psalm book.
MORE 
27.07.10 The Risks of Local Password Management
In the run-up to the Black Hat meeting next week in ORT, hackers have announced that they will pulic demonstrate how to compromise the password storage system used by  Firefox in its popular browser. Using so-called cross site scripting attacks (XSS), they want to prove that storing passwords locally is inherently dangerous. Well, so what else is new? The real question is: How can we…
MORE 
13.07.10 The new Swift agreement contains the seeds of new security issues
The European Parliament has passed the controversial new Swift agreement following intense debate aimed at dispelling worries about data protection. In fact, nothing much was changed, and the amount of data to be forwarded to US authorities involved in the “war of terrorism” remains mind-boggling.
MORE 
05.07.10 How Data Leaks Through Twitter
If you’re a soccer fan, thinking back to the year 1986 will probably remind you of the nail-biting final between Germany and Argentina that the South Americans narrowly won (unlike the devastating 0:4  loss they received this year, but that’s only by the way). If you are a data protection professional, however, harking back to 1986 will probably conjure up memories of the…
MORE 
21.06.10 Choosing the right Identity Provider
It isn’t exactly a new idea, but designing your Identity and Access Management (IAM) with your users in mind always makes sense. But how about your customers and suppliers? After all, they, too, increasingly need to gain admittance to some of your internal applications and data. Unfortunately, internal directories usually aren’t up to the job, so choosing the right identity…
MORE 
25.05.10 Trends from the European Identity Conference
The European Identity Conference (EIC), which has become the foremost gathering point for the identity community Europe, focused this year on a number of current topics in the areas of identity and security. A new track dedicated to cloud computing shed new light on application scenarios with special reference to security issues. Attendees and experts agreed that this will be the make or…
MORE 
05.05.10 Kuppinger Cole analysts present European Identity Award 2010
European Identity Award for outstanding projects, innovations and advancements in the field of digital identity management was presented by the analyst group Kuppinger Cole at a festive ceremony at the European Identity Conference 2010, the leading European venue for Identity and Access Management (IAM) and Governance, Risk Management and Compliance (GRC) in Munich. Awards were given in…
MORE 
21.04.10 Why enterprises shouldn’t economize on IT security
We’ve all been there before: helpdesks deluged by calls from irate users, constant complaints about buggy apps, complicated login procedures or passwords no one can remember. Much-overdue investments in security patches and updates for heirloom software have to be postponed time and again because maintenance and support eat up all the money, and still the boss is under pressure to…
MORE 
02.04.10 Protecting the “I” in “IT”
Companies spend substantial sums on IT security, but for some reason it seems they aren’t getting much bang for their bucks. The reason, of course, it that they are putting them in point solutions instead of investing them in clear and proven strategies.
MORE 
08.03.10 Can authentication be both strong and flexible?
Whether you want to place a bid at eBay, check your bank balance online or your credit rating at Schufa or Experian, or access your corporate SAP account: Instead of asking you to please enter your user name and password, chances are the system nowadays will demand some other method of authentication like a token or a smartcard, or it may offer to scan your finger or iris.
MORE 
02.03.10 Microsoft releases its privacy-enabling U-Prove technology
Microsoft has just announced the availability of U-Prove - an innovative privacy-enabling technology that it acquired almost exactly two years ago. This is a significant announcement, because of two reasons: first of all, the technology is in our opinion a gigantic enabler for many applications that have been held back because of privacy concerns, and second because Microsoft is releasing…
MORE 
25.02.10 Barcelona Deja-vu
It’s the phone industry’s dirty little secret: As humble “handys” (as German’s quaintly persist in calling mobile handsets) morph themselves into miniature editions of full-fledged computers, the danger of its being attacked by hackers or compromised by malware is growing, cancer-like and unseen. And while many people were discussing security issues this at…
MORE 
18.02.10 GRC and IT Security - where is the link?
GRC became one of the really hot topics in business and IT, especially in larger organizations, over the course of the last few years. However, there is a lot of confusion about the terms associated with GRC. In many organizations, few people have a clear view of what GRC involves and requires, and few organizations have an organizational structure for GRC with clearly defined…
MORE 
13.02.10 "Cloud-readiness" – What it means for software developers
Everybody’s up in the air about clouds, but few seem to really know where they’re heading. Most existing applications aren’t ready for the cloud quite yet, especially since the realization seems to be sinking in that building security into the cloud is no trivial pursuit.
MORE 
26.01.10 Risk and Services take center stage among IT managers
Simplicity – not to be confused with oversimplification – is the key to successful management. By focusing on the critical issues of risk and services, companies can be sure they have to two most important topics covered.
MORE 
30.12.09 Why CIO should put GRC on the New Year’s resolution list
GRC (Governance, Risk Management, Compliance) is one of the best-known and least understood buzzwords in IT today. As is too often the case, a variety of stakeholders have seized on the expression and defined it any way they choose. Nevertheless, GRC belongs right up there on your list of New Year’s resolutions because it is (or should be) an essential part of overall IT strategy. 
MORE 
14.12.09 CapEx and OpEx – the latest thing in IT buzzwords
Talking with IT decision makers these days, it seems that two new terms keep cropping up, namely the abbreviations “CapEx” and “OpEx”. They stand, of course, for “capital expenditures” and “operational expenditures”. Both have been borrowed from economic parlance but are now widely used in IT Speak, too.
MORE 
01.12.09 No Information Security Without Identity
IT professionals often have trouble convincing the budget managers that the often costly projects in Identity and Access Management (IAM) are really necessary. That should come as no surprise, since most of them belong to the category “IT infrastructure”, and it’s always hard to show a true ROI on something as fundamental as that. However, in lean times like these the…
MORE 
19.11.09 Show me your terrorists!
I just came back from a meeting of the German chapter of IAPP, the International Association of Privacy Professionals, and the words of the chairman, Dr. Jyn Schultze-Melling, a lawyer with the firm Nörr, Stiefenhofer & Lutz, still ring in my ears: “We are sacrificing employee privacy on the altar of anti-terrorism.”
MORE 
19.10.09 How to fight „GRC Anarchy“
GRC (Governance, Risk Management, Compliance) has become a leading issue not only for IT professionals, but for senior management as well. However, it isn’t always clear who’s in charge. Responsibility for GRC is set to become a major issue in the coming months.
MORE 
06.10.09 Identity Management: Challenge Outsourcing
Outsourcing and offshoring are a fact of life in many companies, but for some, when it comes to managing user identities and access rights or enforcing rules on governance, risk management and compliance, these are still very early days indeed.
MORE 
01.10.09 GRC – a heavily segmented market
GRC – Governance, Risk Management, Compliance. A typical buzzword, but well established right now. However, the problem of all emerging markets associated with a buzzword arises here as well: There are many different vendors with different types of offerings, all claiming to solve the GRC problem. But: The GRC problem has many facets and is (beyond “we have to manage risk, we…
MORE 
18.08.09 Novell takes off into the Cloud
Novell has very recently announced a new product entitled "Cloud Security Services" - a comprehensive set of software that allows cloud providers to connect customers to their infrastructure in a safe and efficient way. This product is the first one that is not marketed to enterprises - instead it is sold to cloud service providers, who will license it for their customers.
MORE 
17.08.09 Is PAM (or PIM or PUM) moving into Provisioning?
These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for Privileged Account Management (PAM). That’s interesting. I’ve blogged some time ago about the possibility of provisioning vendors starting to acquire PAM vendors and adding these…
MORE 
08.07.09 Google's latest bombshell: the Chrome operating system!
The news from Google  hit like a bombshell. Google is launching an operating system, called Chrome OS (like its web browser). According to the press release, the system will be shipping on Netbooks in the second half of next year. As is to be expected, the operating system will be open source. Chrome OS will be built on top of a Linux kernel, and will "use its own windowing…
MORE 
01.07.09 Integralis set to become the security arm of NTT
By acquiring the Munich-based IT security specialist Integralis AG, the Japanese telco giant NTT (Nippon Telephone & Telegraph) plans to become a major player in the world-wide market for managed security and identity management solutions.  Integralis (511 employees, €167 million Turnover) will be integrated as a separate division within NTT’s Communications subsidiary…
MORE 
26.06.09 Saving with security
This is true in many areas. Single solutions popularly labeled and sold under the name “Data Leakage Protection/Prevention” are mostly just conscience salvers. They may deal with a certain concern, but don’t solve the overall security problem. In fact most of them leave gaping holes. Most of the issues addressed by DLP products can be resolved through group policy rules…
MORE 
07.05.09 Awards for outstanding Identity management projects
Analyst company Kuppinger Cole confers European Identity Award 2009 On the occasion of the European Identity Conference 2009 (EIC), the leading European event for Identity and Access Management (IAM) and GRC (Governance, Risk Management, and Compliance), the analyst firm Kuppinger Cole conferred the European Identity Award. The award recognizes outstanding projects as well as…
MORE 
29.04.09 10 Top Trends 2009 for IAM and GRC
As in the past years, Kuppinger Cole has worked out 10 top trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). Things are going forward in 2009, despite the economic crisis – even more, especially GRC vendors are benefiting from the crisis and the increasing investments in GRC. The need for Risk Management is well understood now.
MORE 
22.04.09 How could a future Oracle-Sun Identity Management Stack look like?
On the 20th of April, news of Oracle's intention to acquire of Sun Microsystems took most people by surprise. Reactions predictably covered the whole spectrum, with an abundance of comments going each way between delight and dismay. We've been asked for comments by customers and journalists over the last days, and have talked with several customers of both companies. Obviously, both Sun…
MORE 
03.04.09 Compliance as a risk?
GRC (Governance, Risk Management, and Compliance) has become a core issue for any CIO over the course of the last few years. SOX brought popularity to IT compliance – and nowadays everyone seems to talk about GRC. But sometimes, the approaches chosen seem to increase risk instead of mitigating it.
MORE 
08.01.09 Two new surveys on the RoI of IAM
We’ve created two questionnaires around RoI issues of IAM (Identity and Access Management). Both are lean, with only a few questions – it shouldn’t take much time to provide the answers to us. We greatly appreciate your participation.
MORE 
06.01.09 ArisID is born – a next generation Identity Framework for Developers
The Liberty Alliance has announced the availability of ArisID and Project Aristotle. In a recent Webcast , Oracle's Phil Hunt presented ArisID and demonstrated its usefulness to software developers. This innovation makes it easier to develop applications that are becoming increasingly less dependent on where identity information is stored, making applications easier to deploy in an…
MORE 
19.12.08 Virtualization – changing the IT world
Over the last few years, virtualization has become a main topic of IT. Even though it isn’t a new concept, there have been many changes which affect IT in various areas, from data center design and operations to software delivery and future business models.
MORE 
16.12.08 Enterprise Role Management
The Kuppinger Cole definition of generic GRC tools which support a consistent platform approach to GRC requirements, includes role management capabilities as one of the core functional areas. To efficiently implement GRC, organizations should consider an enterprise role management approach.
MORE 
15.12.08 ArisID is born – a next generation Identity Framework for Developers
The Liberty Alliance has announced the availability of ArisID and Project Aristotle. In a recent Webcast , Oracle's Phil Hunt presented ArisID and demonstrated its usefulness to software developers. This innovation makes it easier to develop applications that are becoming increasingly less dependent on where identity information is stored, making applications easier to deploy in an…
MORE 
05.12.08 Sharepoint – a security risk?
There is an increasing number of security tools which support Microsoft Sharepoint. That is an indicator of Microsoft’s success in this market – but it is as well an indicator for security issues around Sharepoint. The problem is that these security issues are conceptual issues. They are about securing information on different levels – the information objects like…
MORE 
27.11.08 The need for an integrated risk management
During our GRC Forum 2008 which we’ve held in Frankfurt, one of the important discussions was around the way risk management should be implemented. There was broad agreement on the thesis that IT Risk Management and Enterprise Risk Management can’t be separated – at least not beyond the part which deals with strategic risks.
MORE 
04.11.08 Ping Identity moves into the cloud
At this years "Dreamforce" - the yearly conference for Salesforce.com customers, Ping Identity has announced a new product: PingConnect. This latest offering is an on-demand service for Internet single sign-on for SaaS (Software as a service) applications. In other words: a hosted, managed service that lets enterprises extend single sign-on to SaaS applications.
MORE 
27.10.08 Microsoft's new Identity Platform is called Geneva
Microsoft is making several important announcements in the identity management area at this week's Professional Developer's conference. What many are eagerly awaiting is the final decision on SAML 2.0 protocol support (the answer to that is yes, and it is available in beta as of today). This however is just one small detail. The real news is that Microsoft's is shifting gears with respect…
MORE 
20.10.08 Governance, Risk Management, Compliance
GRC (Governance, Risk Management, Compliance) is presently a core topic for every mid-sized and large organization. The number of regulations is growing. Auditors are focusing on Corporate Governance and IT Governance, are asking for risk managements and are looking on access controls and other specific IT aspects.
MORE 
30.09.08 Sun's new Access Manager is now OpenSSO Enterprise
Two months after unveiling the new strategy for its OpenSSO platform, Sun releases the next version of Access Manager. In keeping with Sun traditions, it's time for another product renaming exercise - from now on Access Manager will be known as OpenSSO Enterprise, and this version will incorporate the latest features from the OpenSSO Express version.
MORE 
29.09.08 Managed Identity Services: Talking the Talk with Covisint
At the last Digital ID World conference, I bumped into Douglas Anter by sheer luck at the Ping Identity party. He is responsible for Public and Analyst Relations at Compuware, the company that owns Covisint. Whether I would have some time for a briefing, he asked. You bet! I said.
MORE 
24.09.08 Trend Report IAM and GRC 2009-2019
Investments in IAM and GRC have to solve current needs - but what about the future? With IAM and GRC building the cornerstones of a holistic security infrastructure, decisions within these areas are fundamentally influencing corporate IT and therefore should remain valid beyond a scope of some two or five years from now. For sure, things will change and technologies will evolve. But there…
MORE 
18.09.08 Ping Identity repositions itself by adding important SaaS Features
On September 9th, Ping Identity announced the availability of version 5.2 of PingFederate. This comes on the heels of Ping Identity’s acquisition of the SXIP Access product from Vancouver based SXIP in March. Ping Identity had acquired SXIP Access in order to extend its reach in the lucrative Software-as-a-Service (SaaS) market. Customers subscribing to services such as Google Apps…
MORE 
12.09.08 Motion in the authentication market
With today's completion of the takeover of the SafeWord product family of Secure Computing by Aladdin, a new mobility has entered the dynamic market for strong authentication mechanisms, which has already been expanding in the past three to four years.
MORE 
29.07.08 Sun unveils new models for OpenSSO
Sun has just announced a revamp of its business model around its access management products. Previously, Sun had maintained its Access Manager product as the official commercial release available for customers who wanted a stable product with support. In parallel, OpenSSO was the development branch of what would eventually become Access Manager in a subsequent release. Whilst OpenSSO was…
MORE 
17.07.08 Microsoft releases new "Zermatt" Identity Developer Framework
Microsoft has launched a new developer framework codenamed "Zermatt" on July 9th. It is currently in beta, and the first final version is expected towards the end of this year. This framework consists of a comprehensive set of libraries that facilitate the use of "claims" in applications - in Microsoft's words: make them "claims-aware". This greatly…
MORE 
26.06.08 First Analysis of Microsoft ILM 2
Some days ago, Microsoft announced at its Tech-Ed conference for IT professionals the start of the beta program for its Identity Lifecycle Manager (ILM) Version 2 beta 3. The current version is called “ILM 2007”, and ILM 2 is touted as a significant enhancement. ILM 2 is Microsoft’s most recent addition to its identity management portfolio.
MORE 
24.06.08 Beyond Microsoft…
Information Cards, also abbreviated Infocards, are the technical foundation for, amongst others, Microsoft CardSpace and The Higgins Project driven by Novell. They will gain momentum significantly due the announcement of the Information Card Foundation (ICF). Amongst the founding members are Equifax, Google, Microsoft, Novell, Oracle, PayPal, Aristotle, ATE Software, BackgroundChecks.com,…
MORE 
20.06.08 Project Concordia shows important step in Federation Interoperability
At the RSA conference in San Francisco 2008 in the second week of April, several vendors demonstrated new interoperability between previously incompatible federation protocols. Through Project Concordia, a new project co-sponsored by the Liberty Alliance and several other vendors, several profiles were shown that showed seamless integration of SAML, WS-Federation and CardSpace. This…
MORE 
09.05.08 Hitachi-ID: Good strategy, great new opportunities, but no shopping spree!
I've recently briefed by Hitachi-ID (ex M-Tech) about what's going on now that they are operating under a new banner. On the line were the Shohams (Gideon and Idan) as well as the new Chief Strategy Officer Masata Saito. We started going over the acquisition again - no surprise there as it's been all over the news: M-Tech has been acquired by Hitachi, and is now run as a separate…
MORE 
05.05.08 Building an Identity Bus MORE 
29.04.08 After the conference is before the conference...
Now the EIC 2008 is history. Numerous participants, exciting lectures, interesting discussions in Panels and also during the breaks...the conference offered everything.
MORE 
18.03.08 IBM acquires Encentuate to boost SSO capabilities
On March 13th, IBM announced that it has acquired Encentuate, a maker of enterprise single-sign-on software, session management and strong authentication components. Enterprise single-sign-on works at the desktop session and application level, and is typically implemented as a set of modules that are inserted at the operating system level to intercept and manage requests for passwords.
MORE 
07.03.08 10 top trends in Identity Management
As in the past years, the analysts Kuppinger Cole + Partner have worked out 10 top trends in Identity Management. Some developmental aspects of Identity Management have already raised attention in the last few weeks. This includes HP´s exit from the market, but also and in particular the substantially improved support  for OpenID as one of the most important standards of…
MORE 
25.02.08 Data basis – essential fundament of Identity Management
As the 2007 version, the KPC Identity Management Roadmap 2008 provides a multi-level structure for the development of Identity Management – starting from the basic aspects that rather address an administrative view, via a growing service orientation reaching up to a business perspective and business control which typically allows the information owner to define the way in which…
MORE 
04.02.08 Context-based Authentication
In the past few years, the approach of risk-based authentication has gained in importance, particularly in banking. The goal is to anticipate possible attacks on the basis of information gained from Fraud Detection solutions used for authentication, and – in these cases – to refrain from authentication.
MORE 
22.11.07 Who is suitable for attesting entitlements?
Among the prevailing issues within Identity Management also ranges the problem of attesting. Its topicality has been pushed by growing auditing requirements, thus being tightly linked to GRC /Governance, Risk Management, Compliance). In detail: Attesting means the regular verification of the correctness of Entitlements by persons in charge with this job. Undoubtedly, this is a reasonable…
MORE 
09.11.07 An intelligent approach to mobile security
Security in the area of mobile devices is one of the most predominant of present challenges. Some approaches do exist, such as large cards which are moved into the slot for SD chips, inconveniently projecting, or Soft Certificates providing security only to a certain extent – particularly on systems which are per se unsecure.
MORE 
22.10.07 Can Service Orientation Make Sourcing More Flexible?
A question I discussed in all depth in the past weeks, partly during the KCP workshop “Identity Management in SAP environments“, is whether service orientation in identity management can enhance flexibility in sourcing or, in other words: “Can I exchange products more easily in an environment of consistent service orientation?“
MORE 
28.09.07 Identity Theft ? state of affairs
Identity Theft is anything but new, but still an exigent as well as unsolved problem. Only recently, Reto Hartinger, initiator of internet-briefing-ch, told me about a rather glaring case of Identity Theft, described and discussed in detail in his blog
MORE 
25.07.07 How can trust be managed?
Undoubtedly, Identity Federation is one of the most topical approaches of IT. It allows identity data to be commonly used beyond the boundaries of applications and enterprises. Authentication and authorization can be separated, but in order to do so, trusts must be defined first.
MORE 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Extending your Active Directory to the Cloud
There are new options now to extend the existing AD to the cloud and to serve new business demand of on-boarding, off-boarding, and managing business partners and customers – delivered by Microsoft and other players in the market. This creates a situation for organizations using AD in which they should start reviewing and rethinking their Active Directory strategy.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole