English   Deutsch   Русский   中文    

Events

Upcoming events
Webinar
Sep 01, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities,...
Webinar
Sep 08, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a...
Leadership Seminar
Sep 16, 2015 in München
Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur.
Leadership Seminar
Sep 17, 2015 in München
Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.

Past events
Webinar
Jun 25, 2015 4:00pm CEST, 10:00am ET, 7:00am PT
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Watch now 
Webinar
Jun 23, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.
Watch now 
Webinar
Jun 17, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a consequence...
Watch now 
Webinar
Jun 16, 2015 10:00
„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.
Watch now 
Webinar
Jun 02, 2015 4:00pm CEST, 10:00am EDT, 7:00am PDT
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Watch now 
Webinar
May 19, 2015 10:00
Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein...
Watch now 
Webinar
May 19, 2015 6:30am CET, 8:30am GST, 12:30pm SGT, 2:30pm AEST
Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.
Watch now 
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Webinar
Apr 30, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Security and the Internet of Everything and Everyone from Industrial Control Systems, through wearable tech, to “smart” devices for home, office and car there is an explosion of “things” being added to the network. But not just things. Our corporate nets are adding partners and their employees,...
Watch now 
Webinar
Apr 28, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk efficiency...
Watch now 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
User Empowerment / Life Management
For most organizations, supporting user empowerment means simplified access to information and less friction by privacy discussions. Yes, the users can revoke access – but companies also might build far better relationships with customers and thus minimize that risk. There are compelling business cases today. And, in contrast to 2012, the world appears being ready for solutions that force user empowerment.
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole