Partner Details

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 


 Sponsored Events

Date Title
May 23, 2017 Webinar

Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application.

May 09  ‑  May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Dec 08, 2016 Webinar

The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.

May 10  ‑  May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

May 03, 2016 Webinar

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything from customer experience andoperational processes to business models and IT focus. Even software development is being digitally transformed. This leads to new security and privacy challenges: In IoT and digital transformation, organizations have to deal with more identities and relations than ever before. The attack surface increases constantly every day.

Jan 19, 2016 Webinar

How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged access management (PAM).

Jan 12, 2016 Webinar

Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, IAM must integrate well into the existing landscape. Depending on their current infrastructure and requirements, organizations therefore might want to start at different points with IAM. Successful implementations demand a holistic, unified view.

May 05  ‑  May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

May 13  ‑  May 16, 2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

Jan 16, 2014 Webinar

Zugriffsrechtsmanagment - Risiken erfolgreich minimieren

Aussagen von Auditoren zu Risiken durch privilegierte Nutzer sind nicht wirklich nötig, um ein besonderes Augenmerk auf privilegierte Zugriffe zu werfen.

May 14  ‑  May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Dec 04, 2012 Webinar

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

Nov 29, 2012 Webinar

Reach the Next Maturity Level in your IAM Deployment – Beyond Classical Provisioning

Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest Software (now part of Dell) Principal Solutions Architect Paul Walker will contribute a number of best practice examples and talk about his experience from migrating existing provisioning environments to up-to-date flexible and future-proof solutions.

Apr 17  ‑  Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Nov 15, 2011 Webinar

Why Access Governance Moves the Risk and Reward Balance in your Favour

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

Sep 27, 2011 Webinar

Why Managing Privileged Users Benefits your Business

In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.

May 10  ‑  May 13, 2011 Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Dec 13, 2010 Webinar

Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.

Dec 09, 2010 Webinar

Building Operational Governance for SharePoint 2010

During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.

Nov 26, 2010 Webinar

Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.

May 04  ‑  May 07, 2010 Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.

May 04  ‑  May 07, 2010 Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.

Jan 21, 2010 Webinar

How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need

Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?

Dec 10, 2009 Webinar

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

Nov 19, 2009 Webinar

Pass Your Next Compliance Audit With Confidence

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

Nov 11, 2009 Webinar

Single Sign-on for SAP Environments

The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.

Aug 20, 2009 Webinar

Vereinfachung der Berechtigungsanalyse und -Verwaltung

In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.

May 05  ‑  May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Dec 04, 2008 Webinar

Enterprise Role Management

Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.

Nov 18  ‑  Nov 19, 2008 Conference

Governance, Risk Management & Compliance (GRC) Forum 2008

Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto höher die Aufwände (und Kosten) für Compliance. Für die erfolgreiche Einführung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten Identity Management Strategie darauf auszulegen, aussagekräftige Informationen zur Verfügung zu stellen, und andererseits durch einen Risk-orientierten Compliance-Ansatz die Kunst der Beschränkung auf das Wesentliche zu üben. Die Kuppinger Cole Governance, Risk Management & Compliance (GRC) Jahresveranstaltung 2008 fokussiert Strategien und Vorgehensweisen, Technologien und Werkzeuge, die Ihre Unternehmensführung in die Lage versetzen, wettbewerbs- und kostenrelevante Entscheidungen in Kenntnis aller wesentlichen Informationen und Risiken zu treffen - ohne dass Ihre Compliancekosten ausufern.

Oct 31, 2008 Webinar

Enterprise Role Management - die 5 wichtigsten Regeln

Die Berechtigungsvergabe auf Basis von Business-Rollen ist ein wesentlicher Bestandteil des Identity Managements und wichtige Grundlage für eine GRC-Strategie. Ist das so? Geht es auch ohne? Fakt ist, dass sehr viele Projekte, bei denen das Rollenmanagement eine wichtige oder die Hauptrolle spielt, entweder aus Budget- und Zeitrahmen laufen, oder gar scheitern. In diesem Webinar sprechen wir über die 5 wichtigsten Regeln für ein erfolgreiches Enterprise Role Management.

Apr 22  ‑  Apr 25, 2008 Congress

European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.

May 07  ‑  May 10, 2007 Congress

1st European Identity Conference

Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning

May 07  ‑  May 10, 2007 Congress

European Identity Conference 2007

Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning

 Reports

Date Title Price
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Jun 02, 2016

Executive View: One Identity Manager v7.0.1 - 70894

One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the…

€190.00
Apr 22, 2015

Executive View: Dell One Identity Cloud Access Manager - 71250

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and…

€190.00
May 06, 2014

Vendor Report: Dell IAM - 70812

While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and…

€495.00
Oct 17, 2012

Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager - 71000

This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle…

€295.00
Aug 22, 2012

Snapshot: Quest One Identity Manager Data Governance Edition - 70722

Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It…

€190.00
Dec 01, 2011

Product Report: Quest One Identity Manager 5 - 70133

In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically…

€195.00
Sep 20, 2010

Product Report: Quest Defender

Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong…

€95.00
Aug 16, 2010

Product Report: Quest Defender

Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine…

€95.00
Jul 05, 2010

Product Report: Völcker ActiveEntry 4.1

Völcker Informatik AG based in Berlin has established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity…

€95.00
May 21, 2010

Product Report: Völcker ActiveEntry 4.1

Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity und Access Management-Markt etabliert.…

€95.00
Nov 09, 2009

Product Report: Quest Single Sign-On solutions for SAP

The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between…

€95.00
Oct 07, 2009

Product Report: Quest Single Sign-On solutions for SAP

Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen…

€95.00
Jul 16, 2009

Product Report: Quest ActiveRoles Server

Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for…

€95.00
May 01, 2009

Product Report: Quest ActiveRoles Server

Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für…

€95.00
Oct 29, 2008

Product Report: ipg rolmine® 1.1

Die aktuellen Marktanalysen von Kuppinger Cole machen deutlich, dass sich das Rollenmanagement in den vergangenen drei Jahren zu einem Kernthema für das Identity und Access Management…

€95.00

 Webcasts

Date Language Title
May 24, 2017

Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the t...

Dec 09, 2016

The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.

May 23, 2016

Jackson Shaw - The Internet of Things One Year Later

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In this session Jackson will highlight how the IoT landscape has changed from a risk & security perspective for both consumers and enterprises, how it is driving digital transformation and why it is even more important for you to be planning your IoT strategy now.

May 04, 2016

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything from ...

Jan 20, 2016

How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged acces...

Jan 13, 2016

Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, ...

May 13, 2015

Jackson Shaw - The Convergence of IT, Operational Technology and the Internet of Things

Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw discusses the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.

Jan 16, 2014

Zugriffsrechtsmanagement - Risiken erfolgreich minimieren

Aussagen von Auditoren zu Risiken durch privilegierte Nutzer sind nicht wirklich nötig, um ein besonderes Augenmerk auf privilegierte Zugriffe zu werfen.

Dec 05, 2012

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

Nov 30, 2012

Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning

Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest Software (...

Nov 15, 2011

Why Access Governance Moves the Risk and Reward Balance in your Favour

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these p...

Sep 28, 2011

Why Managing Privileged Users Benefits your Business

In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA...

Dec 14, 2010

Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.

Dec 10, 2010

Building Operational Governance for SharePoint 2010

During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best...

Nov 28, 2010

Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansä...

Dec 11, 2009

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

Nov 19, 2009

Pass Your Next Compliance Audit With Confidence

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with y...

Nov 11, 2009

Single Sign On for SAP Environments

The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Marti...

Aug 20, 2009

Vereinfachung der Berechtigungsanalyse und -Verwaltung

In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punkt...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity & Cloud Conference 2012

Language:
English
Registration fee:
€1980.00 $2376.00
Mastercard Visa PayPal Invoice
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Apr 17 - 20, 2012 Munich, Germany

Key Topics

  • Making Information Security a Strategic Priority

  • Planning, Managing & Governing IAM & Cloud

  • How to Efficiently Protect Critical Infrastructures

  • Service-focused IT in the Age of Cloud Computing

  • Cloud Provider Assessment, Governance and Audit

  • Evaluating and Reducing the Risks of Cyber Crime

  • Mobile Privacy and Security

  • Cloud Computing Contracts & Law

  • Data Protection and Privacy

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00