Partner Details

Cybercriminals are growing in number and sophistication, rendering traditional perimeter solutions powerless against today’s advanced threats.

IBM Security, with 6,000 dedicated professionals in more than 130 countries, delivers intelligent, integrated security technology and services to out-think cybercriminals, discover advanced threats and prevent breaches. We focus on the most critical needs of our clients: optimizing their security program; stopping advance threats; safeguarding their critical assets; and securing cloud and mobile.

Watch a video about IBM Verify
Watch a video about CIS
Watch a video about IGI


 Sponsored Events

Date Title
May 09  ‑  May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Nov 10, 2016 Webinar

Beyond Usernames and Passwords: 3 Steps to Modern Authentication

There are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile.

Sep 29, 2016 Webinar

Cloud Access Security and Enterprise Mobility – better together

Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.

May 10  ‑  May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Oct 22, 2015 Webinar

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation of business is now raising the impact of this explosion - which means that we have to transform our understanding of identities and access.

Jun 02, 2015 Webinar

Ground Control to Major CRO: Is Identity Governance a risky experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.

May 05  ‑  May 08, 2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Dec 09, 2014 Webinar

Access Governance for today’s agile, connected businesses

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.

May 13  ‑  May 16, 2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

Dec 04, 2013 Webinar

Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?

Many organizations have started their journey into the world of IAM several years ago.

May 14  ‑  May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Apr 23, 2013 Webinar

Bridging (the gap between) Access Governance and Privileged User Management … and they lived happily ever after!

Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Identity Management lectures, but ultimately treated as different technologies and implementation projects.

Dec 12, 2012 Webinar

Expand your GRC Controls to Cover all Systems – how to Make SAP GRC Work in a Heterogeneous World

SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the core business environment, auditors have started looking at other environments as well – for example the Microsoft Windows and SharePoint infrastructure which holds most of the unstructured data. In addition, there are several industries and many organizations which have a series of other core business applications in place which they need to integrate in the GRC approach as well.

Nov 30, 2012 Webinar

Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die Zukunft

Herkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing wirksam begegnen zu können. In diesem Webinar lernen Sie, wie sich Access Governance weiterentwickeln muss und welche Rolle die dynamische Zugriffssteuerung in Zukunft spielen wird.

Apr 26, 2012 Webinar

Quantifying Access Risk: How to Sell the Access Governance Project to your CFO

How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money.

Apr 17  ‑  Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Mar 13, 2012 Webinar

Access Risks - from SAP to the Outer Space: an Identity & Access Governance Journey

Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the benefits of an Enterprise wide Identity & Access Governance implementation.

Sep 22, 2011 Webinar

Integrating Access Governance and Entitlement Management

Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example, the new US Dodd-Frank Act is 6 times the size of its predecessor, the 2002 Sarbanes Oxley Act. Responding to these new set of laws forces enterprises and organizations to improve the transparency and flexibility of their access governance procedures. In this webinar, we will explore the diverse drivers and new that are shaping the evolution of access governance strategies, as well as discussing how they can be implemented within a dynamic authorization management environment.

May 10  ‑  May 13, 2011 Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.

May 04  ‑  May 07, 2010 Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.

Sep 17, 2009 Webinar

Minimizing Business Risks through Enterprise Single Sign-on

Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.

May 05  ‑  May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Jan 29, 2009 Webinar

Cutting Costs through Lean Role Management

In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.

Apr 22  ‑  Apr 25, 2008 Congress

European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.

May 07  ‑  May 10, 2007 Congress

1st European Identity Conference

Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning

May 07  ‑  May 10, 2007 Congress

European Identity Conference 2007

Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning

 Reports

Date Title Price
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and…

€1295.00
Jun 09, 2017

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management…

€1295.00
Mar 09, 2017

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers…

€1295.00
Feb 08, 2017

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

€1295.00
Nov 23, 2016

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

€1295.00
Jul 22, 2016

Executive View: IBM QRadar Security Intelligence Platform - 72515

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and…

€190.00
Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses…

€190.00
Jan 20, 2016

Executive View: IBM Cloud Security Enforcer - 71523

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

€190.00
Mar 30, 2015

Executive View: IBM SoftLayer – Security and Assurance - 71281

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide…

€195.00
Aug 25, 2014

Executive View: IBM Security Policy Management - 70953

Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first…

€190.00
Jun 04, 2014

Executive View: IBM Security QRadar® - 70980

Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit…

€190.00
Mar 10, 2014

Executive View: IBM Security Access Manager for Enterprise Single Sign-On - 71068

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in…

€190.00
Feb 24, 2014

Product Report: CrossIdeas IDEAS - 70897

A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining…

€495.00
Oct 02, 2013

Executive View: IBM SmartCloud Services - 70785

IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand. …

€190.00
Jun 12, 2013

Executive View: IBM Security Intelligence with Big Data - 70743

Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT…

€190.00
Jan 29, 2013

Snapshot: IBM InfoSphere Guardium V 9.0 - 70632

IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores,…

€190.00
Jul 11, 2012

Product Report: CrossIdeas IDEAS - 70620

CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM (Identity and Access Management). Formerly known as Engiweb…

€295.00
Sep 14, 2011

Product Report: CrossIdeas IDEAS - 70271

CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM. Formerly known as Engiweb Security, the company was renamed…

€195.00
Feb 09, 2011

Snapshot: IBM Tivoli Live – service manager - 70386

IBM Tivoli Live - service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management…

free
Sep 17, 2010

Product Report: IBM Tivoli Identity Manager

The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on…

€95.00
Apr 29, 2010

Product Report: Engiweb IDEAS

Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with…

€95.00
Mar 27, 2009

Product Report: Engiweb IDEAS

Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with…

€95.00

 Webcasts

Date Language Title
Nov 11, 2016

Beyond Usernames and Passwords: 3 Steps to Modern Authentication

There are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile.

Sep 30, 2016

Cloud Access Security and Enterprise Mobility - Better Together

Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden...

Oct 23, 2015

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation o...

Jun 03, 2015

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing nee...

May 15, 2015

Dr. Jan Camenisch - Cryptography for the People

As our lives are becoming increasingly digital, we all need to protect and manage our personal digital assets including family pictures, health information, contact data, calendar entries, and digital identity information. We store and use these information at different places using different devices. In this talk, Dr. Camenisch reviews the state of the art in cryptography in terms of how it can help us to protect and manage our data on different devices and in the cloud. He discusses what features the different cryptographic mechanisms provide and to what extend they can be used in practice or how far out they are.

May 14, 2015

Ravi Srinivasan - Digital Identities = Security Threats. Is your IAM Program Ready?

Digital Identities are transforming the way companies architect their IT environment. They adapt and optimize by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering their networks to access corporate information. As such, Identity has become a key security parameter that businesses can control. Watch this session to learn how organizations can manage the identity context across all security domains by implementing a threat-aware approach to IAM.

Jan 20, 2015

Mastering the Digitalization of Business: Digital Identities and the Cloud

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution.

Dec 10, 2014

Access Governance for Today's Agile, Connected Businesses

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing nee...

Dec 04, 2013

Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?

Many organizations have started their journey into the world of IAM several years ago.

Apr 25, 2013

Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!

Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Ident...

Dec 13, 2012

Expand your GRC Controls to Cover all Systems - How to Make SAP GRC Work in a Heterogeneous World

SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the cor...

Dec 03, 2012

Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die Zukunft

Herkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing wir...

Apr 26, 2012

Quantifying Access Risk: How to Sell the Access Governance Project to your CFO

How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identi...

Mar 14, 2012

Access Risks - from SAP to the Outer Space: an Identity & Access Governance Journey

Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the...

Sep 22, 2011

Integrating Access Governance and Entitlement Management

Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example...

Sep 18, 2009

Minimizing Business Risks through Enterprise SSO

Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits pr...

Jan 30, 2009

Cutting Costs through Lean Role Management

In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity & Cloud Conference 2017

Language:
English
Registration fee:
€1980.00 $2376.00
Mastercard Visa PayPal Invoice
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 09 - 12, 2017 Munich, Germany

Key Topics

  • Next-Generation Identity-Based Security and Cognitive Technologies

  • Building an Information Architecture for the Agile Enterprise

  • Privacy by Design: A Practical Approach to Reaching GDPR-Readiness

  • Delivering Value to the Connected Customer

  • Knowing & Managing the Risk of Service-Based Digital Business Technologies

  • Integrating & Securing the Internet of Things

  • Blockchain, Blockchain, Blockchain

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00