Rosenheimer Platz 4 • 81669 München • Deutschland
Phone: +49 89 29 03 60
Fax: +49 89 29 03 68 10 8
Deloitte provides audit, tax, consulting and financial advisory services for companies and institutions of all sectors. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte has in the region of 200,000 professionals, all committed to becoming the standard of excellence.
In the service area Cyber Risk we offer our clients outstanding services through the combination of professional competence with regulatory knowledge and technical expertise. Cyber Risk Services cover the complete lifecycle – including the comprehensive Identity & Access Management advisory and implementation portfolio, as well as services around Cyber Readiness, Threat Intelligence, Security Operations and Incident Management. Our clients benefit from the award-winning industry and implementation experience of our consultants.
|May 13 ‑ May 16, 2014||
European Identity & Cloud Conference 2014
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]