European Identity & Cloud Conference 2016
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Australasian Next Generation Cyber Security
Nov 30, 2015 in Melbourne, Australia
Digital Disruption & Transformation in Industry and Government A Joint event with the Australian Information Industries Association (AIIA) November 30, 2015 at the RACV Club Melbourne, Australia
Protecting the keys to your kingdom against cyber-attacks and insider threats
Dec 15, 2015 5:00pm CET, 11:00am EST, 8:00am PST
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.
Dell Identity Manager 7.0: Why things have changed
Jan 12, 2016 4:00pm CET, 10:00am EDT, 7:00am PDT
IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus,...
All upcoming events
The Seven Keys to a Successful Privileged Account Management Strategy
Nov 17, 2015 4:00pm CET, 10:00am EST, 7:00am PST
How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate...
Controlling Access through Centralized Authorization
Nov 12, 2015 5:00pm CET, 11:00am EST, 8:00am PST
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices...
Forget Firewalls – Enterprise Data is your New Perimeter
Oct 29, 2015 4:00pm CET, 11:00am EDT, 8:00am PDT
One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as possible, to continuously adopt new business models and to open up new communication channels with...
Intelligente Protokollierung von Aktivitäten
Oct 27, 2015 16:00
Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten...
One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation
Oct 22, 2015 5:00pm CEST, 11:00am EST, 8:00am PST
A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation...
Internet Security as a Service: Weltweit sicher und kostengünstig im Netz agieren, Shadow-IT vorbeugen und Cloud-Enablement vorantreiben
Oct 21, 2015 10:00
Das Internet hat ganze Industriezweige und Geschäftsmodelle revolutioniert und darüber hinaus unsere Arbeitsweise grundlegend verändert. Über Jahrzehnte gewachsene Arbeitsabläufe und Geschäftstätigkeiten wurden innerhalb kürzester Zeit ausgehebelt. Unternehmen öffnen sich zunehmend den Vorteilen...
Next Generation Cyber Security
Oct 20, 2015 in Wiesbaden
Die digitale Transformation steht für den Beginn eines Zeitalters, in dem praktisch alle Aspekte unseres Lebens mit Informationstechnologie in Berührung kommen. Cyberangriffe und die damit verbundenen Risiken sind ein fester Bestandteil dieses Zeitalters geworden. Die Chancen der digitalen...
Universal SSO: Strategies & Standards for Single Sign-on Across Web and Native Applications
Oct 15, 2015 2:00pm CEST, 1:00pm GMT
Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall functionality,...
Cyber Security in 2015-2016
Oct 13, 2015 in Melbourne, Australia
KuppingerCole (Asia Pacific) is pleased to announce a special Chief Security Officer and Security Analyst afternoon seminar immediately prior to the Australasian Information Security Annual conference (AISA) welcoming drinks. The numbers are strictly limited and a discount rate applies to AISA...
7 common symptoms of IAM & IAG diseases - the causes and how to heal them
Oct 08, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,...
All past events
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
RTSI asnd Future SOC
Statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. Real Time Security Intelligence (RTSI) seeks to remedy this.
Trusted Independent Advice in CLoud ASSurance including a detailed analysis of the Cloud Assurance management tasks in your company.
KuppingerCole on Facebook
KuppingerCole on Twitter
KuppingerCole on Google+
KuppingerCole on YouTube
KuppingerCole at LinkedIn
Our group at LinkedIn
Our group at Xing
General Terms and Conditions
© 2003-2015 KuppingerCole