English   Deutsch   Русский   中文    
• 4 days, over 100 sessions across 4 tracks
• All the top names of the industry under one roof
• Over 600 attendees mean great networking opportunities
Find out more ▸
Advisory Note
Aug 28, 2015 by Dave Kearns
The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.
Executive View
Aug 26, 2015 by Martin Kuppinger
The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.
Leadership Compass (Deutsch)
Aug 19, 2015 by Matthias Reinwarth and Martin Kuppinger
Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen signifikant...
Aug 19, 2015 by Alexei Balaganski
Offering Windows 10 as a free upgrade was definitely a smart marketing decision for Microsoft. Everyone is talking about the new Windows and everyone is eager to try it. Many of my friends and colleagues have already installed it, so I didn’t hesitate long myself and upgraded my desktop and...
Executive View
Aug 19, 2015 by Alexei Balaganski
Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.
Aug 18, 2015 by Matthias Reinwarth
Windows 10 comes with the promise of changing computing from ground up. While this might be marketing speak in many aspects that might be true for one central aspect of daily computing life: secure user authentication for the operating system, but also for websites and services. Microsoft goes...
Aug 13, 2015 by Mike Small
Together with many others I received an offer from Microsoft to upgrade my Windows 7 desktop and Windows 8.1 laptop to Windows 10. Here is my initial reaction to successfully performing this upgrade with a specific focus on the areas of privacy and security. As always when considering security...
Executive View
Aug 13, 2015 by Martin Kuppinger
ForgeRock OpenAM provides a comprehensive offering for managing access, beyond traditional Web Access Management and Identity Federation, adding support also for e.g. connected things and a variety of other capabilities, providing high scalability supporting the requirements of the emerging...
Leadership Brief
Aug 13, 2015 by Mike Small
Organizations are using the new technologies of cloud, social media and smart devices. The job of the CISO is to enable the organization to securely exploit these in an affordable way.  
Executive View (Español)
Aug 12, 2015 by Alexei Balaganski
Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a tiempo...
Events & Podcasts
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Oct 20, 2015 09:00-17:00 in Wiesbaden
Die digitale Transformation steht für den Beginn eines Zeitalters, in dem praktisch alle Aspekte unseres Lebens mit Informationstechnologie in Berührung kommen. Cyberangriffe und die damit verbundenen Risiken sind ein fester Bestandteil dieses Zeitalters geworden. Die Chancen der digitalen...
Sep 01, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities,...
Sep 08, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a...
Sep 15, 2015 10:00 (CEST)
In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die Grenzen...
Sep 17, 2015 10:00
Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig...
Sep 22, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.
Jun 29, 2015
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Jun 24, 2015
Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.
Jun 18, 2015
Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a consequence...
Jun 16, 2015
„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Consumer Identities
When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole