English   Deutsch   Русский   中文    
• 4 days, over 100 sessions across 4 tracks
• All the top names of the industry under one roof
• Over 600 attendees mean great networking opportunities
Find out more ▸
Research & Podcasts
Sep 30, 2015
It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence...
Sep 23, 2015 by Alexei Balaganski
When I first read about the newly discovered kind of OS X and iOS malware called XcodeGhost, quite frankly, the first thing that came to my mind was: “That’s the Albanian virus!” In case you don’t remember the original reference, here’s what it looks like: I can...
Sep 22, 2015
Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.
Sep 22, 2015 by Martin Kuppinger
With the announcement of the IBM Cloud Security Enforcer, IBM continues its journey towards integrated solutions. What had started a while ago in the IBM Security division with integrating identity and analytical capabilities, both from the former IBM Tivoli division and the CrossIdeas...
Executive View
Sep 22, 2015 by Alexei Balaganski
Waterfall Unidirectional Security Gateway technology combines specialized security hardware with a broad range of supported industrial protocols and applications to provide a level of network security unattainable by traditional firewalls.
Leadership Brief
Sep 22, 2015 by Bruce Hughes
From 2013 to 2014 data breaches nearly doubled. Well known consumer brands, financial institutions, retail chains and government agencies have all been affected. Organisations need to rethink or strengthen their data privacy strategies to cope with this rising threat. Lack of action and well...
Advisory Note
Sep 18, 2015 by Matthias Reinwarth
Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.
Executive View
Sep 18, 2015 by Alexei Balaganski
Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.
Podcast (Deutsch)
Sep 17, 2015
Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig...
Podcast (Deutsch)
Sep 15, 2015
In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die Grenzen...
Events & Webinars
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Oct 20, 2015 09:00-17:00 in Wiesbaden
Die digitale Transformation steht für den Beginn eines Zeitalters, in dem praktisch alle Aspekte unseres Lebens mit Informationstechnologie in Berührung kommen. Cyberangriffe und die damit verbundenen Risiken sind ein fester Bestandteil dieses Zeitalters geworden. Die Chancen der digitalen...
Oct 08, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,...
Oct 13, 2015 1:00pm - 5:00pm AEST in Melbourne, Australia
KuppingerCole (asia Pacific) is pleased to announce a special Chief Security Officer and Security Analyst afternoon seminar immediately prior to the Australasian Information Security Annual conference (AISA) welcoming drinks. The numbers are strictly limited and a discount rate applies to AISA...
Oct 15, 2015 2:00pm CEST, 1:00pm GMT
Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall functionality,...
Oct 21, 2015 10:00
Das Internet hat ganze Industriezweige und Geschäftsmodelle revolutioniert und darüber hinaus unsere Arbeitsweise grundlegend verändert. Über Jahrzehnte gewachsene Arbeitsabläufe und Geschäftstätigkeiten wurden innerhalb kürzester Zeit ausgehebelt. Unternehmen öffnen sich zunehmend den Vorteilen...
Oct 22, 2015 5:00pm CEST, 11:00am EST, 8:00am PST
A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation...
Oct 27, 2015 16:00
Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten...
Oct 29, 2015 4:00pm CET, 11:00am EDT, 8:00am PDT
One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as possible, to continuously adopt new business models and to open up new communication channels with...
Nov 17, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate...
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
IAM 3.0/4.0
With changing architecture paradigms and with the identity of people, things and services being at the core of upcoming security concepts, maintaining identity and Access Governance is getting more and more a key discipline of IT security.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole