English   Deutsch   Русский   中文    
Research
Leadership Brief
Sep 03, 2015 by Mike Small
As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.
Leadership Brief
Sep 03, 2015 by Mike Small
IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   
Advisory Note
Sep 02, 2015 by Martin Kuppinger
Digital Transformation is on its way. Unstoppable, inevitable, with increasing speed. Organizations have to react, in particular for avoiding unpredictable risks. Digital Risk Mitigation is a key success factor in the digital transformation of businesses.
Executive View
Sep 02, 2015 by Mike Small
An overview of how to use certification to assist in selecting a cloud service provider. 
Advisory Note
Aug 28, 2015 by Dave Kearns
The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.
Executive View
Aug 26, 2015 by Martin Kuppinger
The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.
Leadership Compass (Deutsch)
Aug 19, 2015 by Matthias Reinwarth and Martin Kuppinger
Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen signifikant...
Blog
Aug 19, 2015 by Alexei Balaganski
Offering Windows 10 as a free upgrade was definitely a smart marketing decision for Microsoft. Everyone is talking about the new Windows and everyone is eager to try it. Many of my friends and colleagues have already installed it, so I didn’t hesitate long myself and upgraded my desktop and...
Executive View
Aug 19, 2015 by Alexei Balaganski
Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.
Blog
Aug 18, 2015 by Matthias Reinwarth
Windows 10 comes with the promise of changing computing from ground up. While this might be marketing speak in many aspects that might be true for one central aspect of daily computing life: secure user authentication for the operating system, but also for websites and services. Microsoft goes...
 
Events & Podcasts
Congress
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Conference
Oct 20, 2015 09:00-17:00 in Wiesbaden
Die digitale Transformation steht für den Beginn eines Zeitalters, in dem praktisch alle Aspekte unseres Lebens mit Informationstechnologie in Berührung kommen. Cyberangriffe und die damit verbundenen Risiken sind ein fester Bestandteil dieses Zeitalters geworden. Die Chancen der digitalen...
Webinar
Sep 08, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a...
Webinar
Sep 15, 2015 10:00 (CEST)
In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die Grenzen...
Webinar
Sep 17, 2015 10:00
Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig...
Webinar
Sep 22, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.
Webinar
Sep 24, 2015 10:00
Das Internet hat ganze Industriezweige und Geschäftsmodelle revolutioniert und darüber hinaus unsere Arbeitsweise grundlegend verändert. Über Jahrzehnte gewachsene Arbeitsabläufe und Geschäftstätigkeiten wurden innerhalb kürzester Zeit ausgehebelt. Unternehmen öffnen sich zunehmend den Vorteilen...
Podcast
Sep 02, 2015
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities,...
Podcast
Jun 29, 2015
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Podcast
Jun 24, 2015
Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.
Podcast
Jun 18, 2015
Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a consequence...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Consumer Identities
When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole