English   Deutsch   Русский   中文    
• 4 days, over 80 sessions across 5 tracks
• All the top names of the industry under one roof
• Over 600 attendees mean great networking opportunities
Find out more ▸
An optimal combination of thought leadership, best practices, discussions
and strategic guidance on the future of security in the world of digital business
Find out more ▸
Executive View
Apr 01, 2015 by Matthias Reinwarth
ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of...
Executive View
Mar 30, 2015 by Mike Small
IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report...
Advisory Note
Mar 30, 2015 by Amar Singh
Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand and...
Executive View
Mar 27, 2015 by Mike Small
This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 
Executive View
Mar 27, 2015 by Martin Kuppinger
A solução Prot-On para o Compartilhamento Seguro de Informações (Secure Information Sharing) fornece uma solução importante para a proteção de arquivos de dados não estruturados localmente, compartilhados com parceiros e armazenados...
Leadership Compass
Mar 26, 2015 by Mike Small
This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS service...
Executive View
Mar 23, 2015 by Alexei Balaganski
Imprivata OneSign® is an integrated authentication and access management solution with a strong focus on the healthcare industry. It provides fast and secure access to workstations, virtual desktops and applications by combining strong authentication with enterprise single sign-on.
Mar 23, 2015 by Amar Singh
Why Not Just Switch off every piece of electric device and live in a cave.  I am on the record on several occasions for coming out in support of the UK government’s cyber initiatives including the Ten Steps to Cyber Security (Ten Steps) and their more recent Cyber Essentials.So, I was...
Mar 23, 2015 by Amar Singh
I was about to file The Register’s mobile security article into my “just another article on mobiles and security” when I noticed what I believe to be a half-witted quote. So, in context. The Register published an article titled “Banks defend integrity of passcode-less...
Executive View
Mar 19, 2015 by Matthias Reinwarth
Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing and...
Events & Podcasts
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Nov 02 - 05, 2015 in Melbourne, Australia
Asia Pacific Identity, Cloud & Security Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Apr 14, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged...
Apr 16, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to external...
Apr 21, 2015 11:30am - 4:30pm in Canberra, Australia
This Executive Luncheon & Afternoon seminar will provide an overall view on Identity & Access Management and Identity & Access Governance IAM/IAG and the various subtopics to allow you to - define your own "big picture" for your future IAM infrastructure.
Apr 21, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of these...
Business & Technology Breakfast
Apr 21, 2015 8:30am - 10:00am in Canberra, Australia
Companies today must manage their migration to the Cloud. Too many organisations find that they are already using Cloud services before they have planned their movement from “on-premise” applications to hosted services.
Mar 11, 2015
Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the Cloud...
Mar 06, 2015
Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks and...
Feb 13, 2015
More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.
Jan 20, 2015
How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but...
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Internet of Things
It is its scale and interoperability that fundamentally differentiate the Internet of Things from existing isolated networks of various embedded devices. And this scale is truly massive. Extrapolating the new fashion of making each and every device connected, it is estimated that by 2020, the number of “things” in the world will surpass 200 billion and the IoT market will be worth nearly $9 trillion.
KuppingerCole EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole