News Archive

Webcast

Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not...
More

Blog

Why I Sometimes Wanna Cry About the Irresponsibility and Shortsightedness of C-Level Executives When It Comes to IT Security

WannaCry counts, without any doubt, amongst the most widely publicized cyber-attacks of the year, although this notoriety may not necessarily be fully justified. Still, it has affected hospitals, public transport, and car manufacturing, to name just a few of the examples that became public. In an earlier blog post, I was looking at the role government agencies play. Here I look at businesses. Let’s look at the facts: The exploit has been known for a while. A patch for the current Windows systems has been out for months, and I’ve seen multiple warnings in the press indicating...
More

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for incorporating interoperable and future-proof risk-based biometric authentication into mobile and web applications.

More

Blog

Why I Sometimes Wanna Cry About the Irresponsibility and Shortsightedness of Government Agencies

Just a few days ago, in my opening keynote at our European Identity & Cloud Conference I talked about the strong urge to move to more advanced security technologies, particularly cognitive security, to close the skill gap we observe in information security, but also to strengthen our resilience towards cyberattacks. The Friday after that keynote, as I was travelling back from the conference, reports about the massive attack caused by the “WannaCry” malware hit the news. A couple of days later, after the dust has settled, it is time for a few thoughts about the consequences....
More

Webcast

Architecting a Digital Strategy for PSD2 and Open Banking

PSD2 and the Open Banking Standard are regulatory mandates being applied to the banking industry by the European Banking Authority (EBA) and Competition & Markets Authority (CMA) across Europe and in the UK respectively. The regulations require that banks operating across the region expose open APIs to allow other banks and third parties to access the data they hold on customers, when the customer has given their explicit consent. Designed to improve choice for customers, create more competition and stimulate innovation in the finance sector, the introduction of 'open banking' in the...
More

Webinar

Jun 27, 2017: How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels. More

Webinar

Jun 28, 2017: Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain onpremises, must be constantly accessible to mobile workers, external contractors or support engineers. More

Executive View

Executive View: Symantec Advanced Threat Protection - 71155

Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint protection and threat intelligence technologies with advanced security analytics capabilities.

More

Webcast

Impressions of the European Identity & Cloud Conference 2017

Blog

When Are We Finally Going to Do Something About Ransomware?

Just as we have returned from our annual European Identity and Cloud Conference, where we’ve spent four days talking about cybersecurity, identity management and privacy protection with top experts from around the world, we faced the news from Great Britain, where the latest large-scale ransomware attack has nearly shut down IT systems in at least 16 hospitals. Medical workers have been completely locked out of their computers. Patient records, test results, blood banks were no longer available. Critical patients had been rushed to other hospitals for emergency surgeries, while...
More

Webinar

Jun 22, 2017: Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed...
More

Webcast

Martin Kuppinger's EIC 2017 Summary

Press Release

European Identity & Cloud Awards 2017

Wiesbaden, May 11, 2017 – Last night the European Identity & Cloud Awards 2017 were presented by KuppingerCole at the 11th European Identity & Cloud Conference (EIC). The awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security.   Numerous projects have been nominated by vendors and end-user companies during the last 12 months. The winners have been chosen by KuppingerCole analysts from among the most outstanding examples of applications and ideas in the...
More

Webcast

Prof. Dr. Sachar Paulus - Closing Keynote

Webcast

Scott Carlson - Just trust everyone and we will be fine, right?

Why can’t you simply trust your employees to do the right thing? What benefit to the business comes from technical security controls?  In this session, we will realistically consider which projects can reduce risk most quickly, which layers of security are most important, and how things like privilege management, vulnerability control, over-communicating, and reducing the attack surface can help.

More

Webcast

Prof. Dr. Heiko Beier - Know your Customer: Deep Level Understanding of Customer Interaction with Smart Data Analytics

Webcast

Dr. Sridhar Muppidi - The Cognitive Era of Identity & Access Management

The Identity & Access Management we have known is changing rapidly. In addition to users, IAM should factor in applications, devices & things; It must evolve with digital business in mind; It must handle the complexity for monitoring and controlling access to not only demonstrate compliance but also to mitigate cyber risks. IAM should allow us to apply continuous learning, reasoning and human interact-ability. This will enable us to better handle the dynamic and ever growing requirements of today’s IAM.

More

Webcast

Hans Peter Bigl - Distributed IT: Secure Cloud Identity Management

Webcast

Nishant Kaushik - At the Intersection of Security, Innovation and Privacy: Invisible Identity

We’ve reached an interesting crossroads in identity management, as it transitions from being a niche area of interest to a major pillar in corporate IT. Balancing competing but complementary concerns of security, innovation and privacy requires a rethink of how we’ve traditionally used identity in IT. Invisible Identity is an architectural and functional imperative to make identity simply disappear from people’s sight, moving into the background as a silent protector and enabler. But this move is fraught with challenges, whether they be concerns about privacy or choices...
More

Webcast

European Identity & Cloud Awards Ceremony

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole Analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security.

More

Webcast

Ian Glazer - The Next Step for Identity Professionals: De-weaponizing Identity Systems

As the identity industry has grown it has become more valuable to all stakeholders: our customers, our enterprises, and our employees. With this growth identity professionals have become more valuable as well, and we have recognized this increase in value by starting to professionalize our industry. Attackers, too, have noticed identity’s increased value, specifically the value of identity systems, and have begun turning identity systems meant to deliver value into weapons used to cause harms both large and small.

More

Webcast

Mark McGovern - Seeing through the Sandstorm: Recognizing Innovation

Today, Identity is a fast moving technology that attracts an unprecedented amount of attention from business leaders, investors and entrepreneurs. At times, it seems like only two things are moving faster (1) business expectations and (2) marketing noise. Being able to recognize true innovation and accelerate its adoption is critical to success, but it’s also incredibly hard. It requires a strategy that considers the unique challenges posed by Identity systems, the forces driving the market’s development of future capabilities, the risk posed by the new technology, and the...
More

Webcast

Victor Ake, Allan Foster - Digital Identity for the Internet of Things: Security, Privacy and Consent Challenges

IoT is a new digital channel to provide more products and services. However Security, Privacy and Consent in such environment are a major concern. To provide a secure interaction we need a “Holistic Identity” strategy, where identities represent humans, devices, things and their relationships; and privacy and consent management are also part of the strategy. Without Identity there are no security nor privacy, and this goes for all kind of entities! To implement a Digital Transformation strategy, it is necessary to provide more channels to face customers and citizens. The IoT is...
More

Webcast

Joni Brennan - Accelerating Canada’s Digital ID Ecosystem Toward a More Trusted Global Digital Economy

Webcast

Daniel Buchner - Blockchain-Anchored Identity: A Gateway to Decentralized Apps and Services

Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.

More

Webcast

Balázs Némethi - Financial Inclusion & Disenfranchised Identification

Webcast

PATECCO's Thoughts on IAM in Relation to Service Based Digital Business Technologies

An interview during the European Identity & Cloud Conference 2017

More

Webcast

Jackson Shaw - When will Identity and Access Management be Digitally Transformed?

Tired of paying hundreds of thousands or millions of dollars for IAM projects that don’t show benefit or eventually are considered failures? Us too! So we decided to do something about it. “Digital transformation is the profound and accelerating transformation of business activities, processes, competencies and models to fully leverage the changes and opportunities of digital technologies.” We took this to heart and radically changed our approach to our own customer IAM, how we (and our customers) connect to SaaS properties and how we leverage machine learning, advanced...
More

Webcast

Martin Kuppinger - Opening Keynote

Webcast

Prof. Dr. Udo Helmbrecht - Cybersecurity Strategies in the EU

Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on Network and Information Security (NIS). The keynote will provide an outline on emerging EU policy legislative context addressing improved capabilities, cooperation, crisis management and preparedness at EU Level. The second part of the keynote will focus on initiatives and synergies to support EU policy implementation that will on the one hand stimulate the competitiveness and...
More

Webcast

Doc Searls - When the Customer Becomes the First Party

The time is coming when customers have the upper hand, and companies agree to their terms rather than the other way around. Doc Searls, leader of the VRM (Vendor Relationship Management) movement, co-author of "The Cluetrain Manifesto", and author of "The Intention Economy: When Customers Take Charge", will explain how customer independence and empowerment will make the GDPR’s dreams come true—for both regulators and companies, as well as for customers themselves.

More

Webcast

William Mougayar - State of Business in Blockchains

Where we are, and where we are going in blockchain implementations and strategies. What are the implications for various industry sectors and stage of enterprise adoption? How to think about new blockchain-based business models?

More

Webcast

Pamela Dingle - The Age of Federated Accountability

We are about to enter a decade where critical business-grade information is protected by the OAuth 2.0 framework. Congratulations are not yet in order. Our mission for the next decade is to not repeat our own identity history, and instead to build a system that is provably secure through test-driven automation and that takes a vicious approach to detecting anomalies.

More

Webcast

Dakota Gruener - ID2020 - Identity as a Cornerstone in Global Development

Webcast

Mia Harbitz - Motivations and Constraints of Actors in the Field of Identity Management

An identity of some sort is necessary for almost all daily interactions in developed countries, and is becoming increasingly necessary in many developing nations. To interact with the public sector, it is imperative for an individual to have a legal identity that is anchored in a legally established, standardized, verifiable, and trustworthy source. All countries in the world have such repositories, and they exist either as civil registries or civil identification registers (or both). The 198 countries reviewed in this study have a civil registry and 171 have civil identification registers...
More

Webcast

Alex Simons - Identity Imperatives in the World of Cloud and Devices

The tectonic shift of enterprise IT to a world of cloud and devices is upon us. As enterprises around the world look to embrace the incredible opportunities and address the competitive pressures this tectonic shift creates, they are discovering that digital identity is the cornerstone technology of a successful modern IT estate. This tectonic shift brings a new set of identity design and architectural imperatives that legacy systems are poorly suited to address. Alex will discuss these trends, the new set of design and architectural imperatives they create and give examples of how these...
More

Webcast

Richard Struse - Let Them Chase Our Robots

The economics of cybersecurity have long favored the attacker. Adversaries skillfully harness automation to increase their advantage while benefiting from their victim’s fragmented and uncoordinated defenses. Automated Cyber Threat Intelligence (CTI) ecosystems hold the promise of changing these economics in favor of the defender. This keynote will highlight the promises of CTI along with the challenges we still must overcome if we are to realize the full potential of this opportunity.

More

Webcast

Dirk Backofen - Managed Secure Identity for Enterprises, IoT & Consumers

Secure and unambiguous identities will be the next currency in the online world. Whether for information exchange or for online commerce in the consumer and the business segment, a secure identity will become more and more relevant over the coming years. A broad range of new services can be built up on this central element. This talk will provide information about the relevant technologies and the future business models.

More

Webcast

Analyst Panel: The Future Role of Identity in Digital Transformation

Webcast

Patrick Parker - Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows

Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today. In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques...
More

Webcast

Jason Rose - Anonymous to Known: How to Grow Your Business by Mastering Customer Identity Management

You can’t sell to strangers. Customer identity and access management (CIAM) is the emerging technology that transforms unknown online visitors into known and loyal customers. Find out how CIAM can help your organization build trusted and lasting customer relationships. By progressively identifying online users from initial website visit to the creation of a full customer profile — businesses can build consent-based relationships that respect the new rules as outlined in the forthcoming GDPR. The great power delivered by CIAM also demands great responsibility. Learn how to...
More

Webcast

Dr. J.R. Reagan - Designing Industry 4.0

Around the world, industries are experiencing a digital transformation that is accelerated by exponentially growing technologies. The networking of ’internet of things, services, data and people’ will fundamentally change the future of individual companies, as well as transform market dynamics across a whole range of industries. This talk how to design for success in this new environment and the impact technology will have in shaping it.

More

Press Release

KuppingerCole’s 11th European Identity and Cloud Conference 2017

Wiesbaden, May 08, 2017The European Identity & Cloud Conference, taking place May 9 – 12, 2017 at the Infinity Ballhaus Forum Unterschleissheim, Munich/Germany, is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. For the 11th time, the EIC will offer high-class presentations to more than 700 participants from worldwide companies.

More

Blog

The New Role of Privilege Management

Privilege Management or PxM, also referred to by some vendors as Privileged Account Management, Privileged User Management, Privileged Identity Management, or a number of other terms, is changing rapidly, in two areas: Privilege Management is not only an IAM (Identity & Access Management) topic anymore, but as well a part of Cyber Defense. The focus of Privilege Management is shifting from session access to session runtime control. Thus, the requirements for vendors as well as the starting point of product selection is at least getting broader, and sometimes even changing...
More

Webinar

Jun 01, 2017: (Big) Data Security: Protecting Information at the Source

The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property. More

Conference

Feb 28 - Mar 01, 2018: Digital Finance World 2018

Welcome to the new world of Digital Finance: DFW - Digital Finance World, Frankfurt, February 28 – March 01, 2018 - is the place for finance innovators from traditional players to meet with Fintechs and Start-ups to shape the Future. Here you can interact with a targeted and engaged financial audience, enjoy an unparalleled content depth, and get guidance for critical decisions on the digital transformation of your enterprise. More

Conference

Feb 06 - 07, 2018: Next Generation Marketing Executive Summit 2018

At the Next Generation Marketing Executive Summit 2018 (February 6-7, 2018 in Frankfurt | Germany) you learn how to deliver a tailored customer experience with smart systems and on multiple devices. Find a balance between privacy, data protection and customer suitability. Take a step into the future and see how new (marketing) technologies can help you to become top of the market. Register now for NGme 2018 and become a Next Generation Marketing Expert. More

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their credentials associated with users, applications, and other system assets across  an enterprise‘s entire technology environment including on - premises, cloud and hybrid environments, as well as securing CI/CD tools and DevOps envir onments

More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]