English   Deutsch   Русский   中文    
Research
Advisory Note
May 26, 2015
10 Information Security topics that were central at European Identity & Cloud Conference 2015
Executive View
May 26, 2015 by Martin Kuppinger
ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The product works in a task-centric way with a modern UI, backed by ITMC’s long experience in implementing IAM&IAG in an efficient way.
Executive View (Deutsch)
May 26, 2015 by Martin Kuppinger
ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es ermöglicht...
Executive View (Deutsch)
May 26, 2015 by Martin Kuppinger
Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter...
Blog
May 21, 2015 by Martin Kuppinger
Consent and Context: They are about to change the way we do IT. This is not only about security, where context already is of growing relevance. It is about the way we have to construct most applications and services, particularly the ones dealing with consumer-related data and PII in the broadest...
Blog
May 21, 2015 by Matthias Reinwarth
The more elderly amongst us might remember a family of portable, magnetic disk based storage media, with typical capacities ranging from 320 KB to 1.44 MB, called Floppy Disc. These were introduced in the early 1970s then faced their decline in the late 1990s, with today’s generation of...
Blog
May 19, 2015 by Martin Kuppinger
Recently, I have had a number of conversations with end user organizations, covering a variety of Information Security topics but all having the same theme: There is a need for certain security approaches such as strong authentication on mobile devices, secure information sharing, etc. But the...
Leadership Brief
May 19, 2015 by David Goodman
Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising that...
Analysts' View
May 12, 2015
There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data into...
Executive View
May 12, 2015 by Alexei Balaganski
Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection...
 
Events & Podcasts
Congress
Nov 04 - 05, 2015 in Melbourne, Australia
Australasian Identity, Cloud & Security Summit 2015, taking place November 4th – 5th, 2015 at the RACV Club Summit Centre & Hotel in Melbourne Australia is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future...
Webinar
Jun 02, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Webinar
Jun 16, 2015 10:00
„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.
Webinar
Jun 17, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a consequence...
Webinar
Jun 23, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.
Webinar
Jun 25, 2015 4:00pm CET, 10:00am ET, 7:00am PT
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Webinar
Sep 08, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a...
Podcast
May 22, 2015
The European Identity & Cloud Awards 2015 were presented by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as...
Podcast
May 19, 2015
Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein...
Podcast
May 19, 2015
Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.
Podcast
May 15, 2015
SAML, OpenID, OpenID Connect, WS-Federation all support identity federation – cross domain authentication. But, can we always expect all the parties in a connected environment to support SAML, OpenID or OpenID Connect? Most of the federation systems we see today are in silos. It can be a...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Analytics
There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data into information with value. These analytics are now being widely adopted by organizations to improve their performance. However what are the security and governance aspects of the use of these tools?
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole