Latest Research, Upcoming Webinars and Events
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network. More
Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open to abuse. Deep Identity has developed an easy-to-use solution that adopts a role-based provisioning process that is particularly powerful in the SAP environment. More
Mit der steigenden Nachfrage von Unternehmen nach engerer Kommunikation und Kollaboration mit externen Partnern und Kunden wächst auch der Bedarf an professionellem Web Access Management und Identity Federation. Geeignete Lösungen ermöglichen sichere Zugänge von und auf externe Systeme, auch aus der Cloud. Um die Vielzahl an Anforderungen für eine sichere Kommunikation und Kollaboration erweiterter und vernetzter Unternehmen nahezu lückenlos mit IT abzudecken und gleichzeitig agil zu bleiben, sind Standardinfrastrukturen notwendig. More
Also, the IoT is becoming an increasingly important topic for IAM: Managing identities of things and relationships between people and things is challenging the traditional view on IAM, making it a central building block to make business processes secure, efficient and agile at the same time. In this crash course, we will go through technology, trends, organizational aspects, and the solution market in a condensed and intense way, dealing all aspects related to IAM. We will also look at latest developments and trends. The KuppingerCole IAM Crash Course is not limited to technology. It More
KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.
KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.
Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.
A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Last week, Microsoft has announced the general availability of the Azure Security Center – the company’s integrated solution for monitoring, threat detection and incident response for Azure cloud resources. Initially announced last year as a part of Microsoft’s new cross-company [...]
When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]