English   Deutsch   Русский   中文    

Events

Upcoming events
Congress
May 10 - 13, 2016 in Munich, Germany
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Congress
Sep 21 - 23, 2016 in Frankfurt, Germany
Digital Finance World (DFW) on September 21-23, 2016 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Seminar
May 09, 2016 in Munich, Germany
What is it that creates such a fast and strong hype around the blockchain topic? The fear of missing out the biggest innovation since the internet? The notion that this time it could really be that one big thing turning everything upside down? Anyway, the industry is on the move, following the...
Webinar
May 17, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become...
Webinar
May 19, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
The definition, implementation and maintenance of an adequate set of policies is a major task for many areas of today’s organizations. However, continuously ensuring compliance to these policies and providing adequate documentation of evidence is even more challenging. Keeping computer security...
Webinar
May 24, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central...
Webinar
Jun 07, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance.
Webinar
Jun 14, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against...
Webinar
Jun 23, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud...

Past events
Webinar
May 03, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything from...
Watch now 
Webinar
Apr 28, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the...
Watch now 
Webinar
Apr 26, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk...
Watch now 
Webinar
Apr 21, 2016 16:00
Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der Zugang...
Watch now 
Webinar
Apr 19, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining information...
Watch now 
Webinar
Apr 14, 2016 4:00pm AEST
Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and telcos...
Watch now 
Webinar
Apr 12, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the concept of adaptive authentication and Adaptive Policy-based Access Management (APAM). He will also explain why it is crucial for proper access to information that authentication...
Watch now 
Webinar
Apr 05, 2016 4:00pm CEST, 10:00am EDT, 7:00am PDT
SAP systems contain the most precious assets of an enterprise. They can however get lost, manipulated or destroyed in less than a minute. Examples are a) theft of sensitive customer data on a large scale by simple download, b) illegitimately elevated access rights: A user creates fictive other...
Watch now 
Webinar
Mar 31, 2016 4:00pm AEST
What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate?
Watch now 
Webinar
Mar 22, 2016 11:00
Informations- und Entscheidungsprozesse von Kunden haben sich dramatisch verändert. Dies hat in Unternehmen zu einem gesteigerten Interesse an digitaler Transformation von Geschäftsprozessen geführt. Beziehungen und Vernetzung sind heute Kern jedes Geschäftsmodells. Sie fließen in zentrale...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole