English   Deutsch   Русский   中文    

Events

Upcoming events
Congress
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Congress
Sep 21 - 23, 2016 in Frankfurt, Germany
Digital Finance World (DFW) on September 21-23, 2016 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Webinar
Mar 01, 2016 4:00pm CET, 10:00am EST, 7:00am PST
This webinar follows the lifecycle of a document: Digital contracts go through many phases throughout their existence. From the production of the document, through presentation, revisions, and then being signed by the involved parties. But the journey doesn't end there. If the contract is valid...
Webinar
Mar 08, 2016 3:00pm CET, 9:00am EDT
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about general benefits of next-generation auditing, alerting, reporting and management solutions for analyzing user and administrator activities across various sources of unstructured...
Seminar
Mar 09, 2016 in Paris, France
CXP Group and KuppingerCole are pleased to invite you to the first Blockchain Seminar in Paris. The working language of the seminar will be english.
Webinar
Mar 10, 2016 4:00pm CET, 10:00am EDT, 7:00am PDT
In this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the urgent need for digital transformation for nearly any business. He will then present eight fundamentals for digital risk mitigation and say why security and privacy by design enable agile...
Webinar
Mar 15, 2016 10:00
Nicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und...
Webinar
Mar 22, 2016 11:00
In diesem Webinar erläutert Martin Kuppinger, Gründer und Prinzipal Analyst bei KuppingerCole, warum es für fast jedes Unternehmen dringend nötig ist eine digitale Transformation vorzunehmen. Er erklärt die acht Grundsätze zur Abschwächung von digitalen Risiken und erläutert, warum Sicherheit und...
Seminar
May 09, 2016 in Munich, Germany
What is it that creates such a fast and strong hype around the blockchain topic? The fear of missing out the biggest innovation since the internet? The notion that this time it could really be that one big thing turning everything upside down? Anyway, the industry is on the move, following the...

Past events
Webinar
Jan 28, 2016 11:00
Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich sein....
Watch now 
Webinar
Jan 19, 2016 4:00pm CET, 3:00pm GMT
The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged...
Watch now 
Webinar
Jan 12, 2016 4:00pm CET, 10:00am EST, 7:00am PST
IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus,...
Watch now 
Webinar
Dec 15, 2015 5:00pm CET, 11:00am EST, 8:00am PST
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.
Watch now 
Seminar
Nov 30, 2015 in Melbourne, Australia
Digital Disruption & Transformation in Industry and Government A Joint event with the Australian Information Industries Association (AIIA) November 30, 2015 at the RACV Club Melbourne, Australia
Webinar
Nov 17, 2015 4:00pm CET, 10:00am EST, 7:00am PST
How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate...
Watch now 
Webinar
Nov 12, 2015 5:00pm CET, 11:00am EST, 8:00am PST
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices...
Watch now 
Webinar
Oct 29, 2015 4:00pm CET, 11:00am EDT, 8:00am PDT
One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as possible, to continuously adopt new business models and to open up new communication channels with...
Watch now 
Webinar
Oct 27, 2015 16:00
Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten...
Watch now 
Webinar
Oct 22, 2015 5:00pm CEST, 11:00am EST, 8:00am PST
A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Adaptive Authentication & Authorization
It’s called “adaptive” because it adapts to the circumstances at the time of the authentication ceremony and dynamically adjusts both the authentication factors as well as the facet(s) of the factors chosen. This is all done as part of the risk analysis of what we call the Adaptive Policy-based Access Management (APAM) system.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole