English   Deutsch   Русский   中文    

Events

Upcoming events
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Seminar
Mar 02, 2015 in Melbourne, Australia
This Executive Luncheon & Afternoon seminar will provide an overall view on Identity & Access Management and Identity & Access Governance IAM/IAG and the various subtopics to allow you to - define your own "big picture" for your future IAM infrastructure.
Business & Technology Breakfast
Mar 02, 2015 in Melbourne, Australia
Companies today must manage their migration to the Cloud. Too many organisations find that they are already using Cloud services before they have planned their movement from “on-premise” applications to hosted services.
Webinar
Mar 05, 2015 4:00pm CET, 10:00am EST, 7:00am PST
Are your operational technology (OT) networks hosting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems, well secured? For many organizations, the answer is still “no”. Information security generally focuses on Information Technology (IT) networks and...
Webinar
Mar 10, 2015 4:00pm CET, 10:00am EST, 7:00am PST
Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the Cloud...
Webinar
Apr 14, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged...
Webinar
Apr 23, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for...

Past events
Webinar
Feb 12, 2015 4:00pm CET, 10:00am EST, 7:00am PST
More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.
Watch now 
Webinar
Dec 16, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Fuelled by the exponentially growing number of mobile devices, as well as by increasing adoption of cloud services, demand for various technologies that enable sharing information securely within organizations, as well as across their boundaries, has significantly surged. This demand is no longer...
Watch now 
Webinar
Dec 11, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Access Intelligence: Enabling insight at any time – not one year after, when recertifying again Imagine you have less work and better risk mitigation in your Access Governance program. What sounds hard to achieve can become reality, by complementing traditional approaches of Access Governance...
Watch now 
Webinar
Dec 09, 2014 4:00pm CET, 10:00am EST, 7:00am PST
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Watch now 
Webinar
Dec 04, 2014 16:00
Das Digitalzeitalter, die Verschmelzung der digitalen mit der „wirklichen“, der analogen Welt, verändert unser Geschäft grundlegend und irreversibel. Bestehende Geschäftsmodelle an die neuen Anforderungen anzupassen und neue Chancen wirksam und effizient zu nutzen, ist die große Herausforderung...
Watch now 
Leadership Seminar
Nov 27, 2014 in Frankfurt
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.
Leadership Seminar
Nov 26, 2014 in Frankfurt
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Webinar
Nov 25, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Privacy Impact Assessments (PIAs) are already or soon will be a legal requirement in many jurisdictions or sectors (i.e. payment cards sector). They provide a great help for institutions to focus on privacy and data flows and therefore provide an interesting entry point into an overall discussion...
Webinar
Nov 20, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Security in SAP environments is a key requirement of SAP customers. SAP systems are business critical. They must run reliably, they must remain secure – despite a growing number of attacks. There are various levels of security to enforce in SAP environments. It is not only about user management,...
Watch now 
Webinar
Nov 18, 2014 4:00pm CET, 10:00am EST, 7:00am PST
Continued proliferation of cloud technologies offering on-demand scalability, flexibility and substantial cost savings means that more and more organizations are considering moving their applications and databases to IaaS or PaaS environments. However, migrating sensitive corporate data to a 3rd...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Mobile Enterprise
It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but “know” much more about their owners: current and past location, contents of their private text messages, photos and other sensitive information, as well as their online banking credentials and other financial data. They are also always connected to the Internet and thus are especially vulnerable to hacking and malware exploits.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole