News Archive

Executive View

Executive View: PingAccess - 71507

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web Access Management products with its ability to provide policy- and context-driven access control to…

Webcast

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things,…

Webcast

Proof of Identity for Refugees and Beyond: Blockchain Identity for the World

Recent research estimates that there are 1.5 billion individuals who do not have any means to prove their legal identity. Failing states lacking to perform even the most basic administrative tasks, supressed ethnic groups, and of course all those who have to flee their home due to conflicts…

Webcast

How to Make the Blockchain a Reality

Blockchain is not yet ready to support industrial use cases. In this panel session we discuss the requirements across industries and how to improve and accelerate the maturity of this shared ledger technology through an open and coordinated approach.

Webcast

Dr. Jutta Steiner - Blockchains Beyond the Hype

For the last few months, every day there has been a new announcement of a major corporate (successfully ?) trialing blockchain technology in a Proof-of-Concept. For anyone outside of the blockchain space and hype, it has become difficult to discern the signal from the noise. We give a brief…

Webcast

Sebastien Meunier - Blockchain – a New Compliance Paradigm?

One of the most promising use-case for distributed ledgers in financial services is the implementation of compliance and risk management solutions. In this session, we will analyze how the blockchain technology can be used to build trusted registries of identity and ‘know your…

Webcast

Ivan Niccolai - Blockchain, Identity, Cybersecurity

How is trust established without trusted third parties? Although it is not possible to offer a prediction of how distributed ledger technology with change society, the assertion that new and publically-accessible technology such as the internet, file sharing and social networks would…

Blog

There Is No Such Thing as an API Economy

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Webcast

Patrick Parker - Reimagining Identity and Access Management Processes with Algorithms

We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine. The machine-reengineering revolution will leverage powerful algorithms and…

Webcast

Jason Rose - Balancing Personalization and Trust in the Age of the Customer

In this session, find out how customer-obsessed businesses are increasing their audiences and creating trusted, customized experiences across devices and platforms in exchange for first-party data. We provide case studies of how leading brands are leveraging customer identity and access…

Webcast

Dr. Carsten Bange - How Big Data Technology can help Increasing Cyber Attack Resilience

Big Data meets Security: Analyzing systems logs to understand behavior has become one of the main applications of big data technology. Open source initiatives as well as commercial tools and applications for big data integration, collection and analytics become more important building…

Webcast

Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver…

Webcast

Jackson Shaw - The Internet of Things One Year Later

Last year we had our first discussion of risk and value related to IoT. Over the last 12 months we have gone from “What is this IoT?” to IoT becoming a driver of digital transformation. All of the major platform (PaaS) players have made IoT a key part of their strategies. In…

Webcast

Kim Cameron - The Cloud is Rewiring the World: What Does it Mean for Identity?

The Cloud is turning out to have important “emergent properties” – features not previously observed in computing systems, never imagined by cloud architects, and not yet widely discussed or understood.  They will be key to determining which strategies prevail in…

Webcast

Henning Christiansen - Driving Digital Expansion at Axel Springer while improving Cybersecurity through Identity & Access Management

Axel Springer becoming a truly digital publisher and further investing in digital expansion. Meaning and selling of Identity and Access Management in a media company like Axel Springer. A way to bundle forces and gain buy-in from related parties and sponsors. Increasing importance of…

Webcast

Isabel María Gómez González - The Secret Keys for the New Age of the CISO

How many times do you change your hat per day? In the new age, the CISOs will change their roles as much as they can for making decisions about how to affront new risks. Compliance, Governance, legislation, data protection, cybersecurity, intelligence, cyberdefense, cyberfusion…. how…

Webcast

Paul Grassi - From Digital Transformation to Perpetual Disruption

Transitioning the NSTIC from the 2nd goal to the 4th and how we plan to finish the job, as, US President Barack Obama stated it, NSTIC was really a 10-year effort. In this keynote, Paul Grassi talks about modularization and performance-based standards, future proofing by leveraging a…

Webcast

Christian Loeffler - From Shadow IT to an IDaaS Solution

In this keynote session, Christian Loeffler talks about: project conduction, architecture definition, IDaaS election and implementation,key challenges for business and IT, lessons learned.

Webcast

Paul Simmonds - The Trust Conundrum

It's all too easy to pretend to be someone else, whether it's organised crime, social engineers, hackers or paedophiles. The financial impact of this impersonation runs to 100's of billions of dollars per annum. As a result business costs increase, not only because of the increasing losses,…

Webcast

Sebastien Meunier - From Exploration to Implementation – Preparing for the Next Steps of Blockchain

Blockchain technology is certainly at the peak of the hype cycle. In this keynote, Sebastien will give you the keys to understand the reality of blockchain beyond the myths and anticipate the next steps.

Webcast

John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely…

Webcast

Ensuring Compliance Through Automation

The definition, implementation and maintenance of an adequate set of policies is a major task for many areas of today’s organizations. However, continuously ensuring compliance to these policies and providing adequate documentation of evidence is even more challenging. Keeping computer…

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Webcast

The Future of Authentication - Killing the Password

We all understand that the concept of username/password to control access is insecure and out of date in a world where anything is connected and a new approach is needed. But how can we make the password obsolete?

Press Release

Rückblick auf die 10. European Identity and Cloud Conference 2016

Wiesbaden, 18. Mai 2016 – Am letzten Freitag endete die von KuppingerCole in München veranstaltete 10. European Identity & Cloud Conference 2016, Europas führende Veranstaltung für Identity and Access Management (IAM), Governance, Risk Management and Compliance…

Press Release

Review of the 10th European Identity and Cloud Conference 2016

Wiesbaden, May 18 th 2016 – Last Friday KuppingerCole wrapped up their 10 th European Identity & Cloud Conference , Europe’s leading event for Identity and Access Management (IAM) , Governance , Risk Management and Compliance (GRC) , as well as Cloud Security , in…

Webcast

Martin Kuppinger's EIC 2016 summary

KuppingerCole's Founder and Principal Analyst Martin Kuppinger provides his summary of this year's European Identity & Cloud Conference.

Webcast

The Future of Mobile Authentication: Strong, Adaptive, Intelligent

The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become…

Webinar

Jun 16, 2016: No Real Security Without Multi-Factor Authentication Everywhere

Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience, since with Multi-Factor Authentication (MFA) channels, the reduced dependence on passwords allows…

Blog

Free MFA on Windows for the masses

Cion Systems, a US-based IAM (Identity and Access Management) vendor, recently released a free service that allows Windows users to implement  two-factor authentication. It works only for Windows and supports either a PIN code sent via SMS (not available in all countries) or a standard…

Press Release

Winners of the European Identity & Cloud Awards 2016

Munich, May 12, 2016  – KuppingerCole presented  The European Identity & Cloud Awards 2016  last night at the 10th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM),…

Press Release

Gewinner des European Identity & Cloud Awards 2016

München, 12. Mai, 2016  – KuppingerCole hat gestern Abend bei der 10. European Identity & Cloud Conference (EIC) die European Identity & Cloud Awards 2016 vergeben. Die Preise ehren herausragende Projekte und Initiativen in Identity & Access Management (IAM),…

Webcast

Impressions of the European Identity & Cloud Conference 2016

Thank you for attending the European Identity & Cloud Conference 2016. See you next year!

Webcast

Brendan M. Peter - How Regulation is Driving Digital Transformation and Putting a New Perspective on Identity

We see a development towards the open enterprise with multiple access points to critical information. At the same time, customers and consumers want to make sure their information is kept confidential and secure. As result, there is an increasing focus on identity and access management.…

Webcast

Martin Kuppinger - The new role of the CI(S)O 2020: Enable disruptive innovation

Don’t only survive the Digital Transformation. Become the Transformational Leader. There rarely has been so much disruptive change driven by innovations in IT ever before. Distributed Ledgers and Blockchain are at the forefront of these changes and will massively impact the…

Webcast

Dr. Karsten Kinast - Making Sense of the EU General Data Protection Regulation

The cloud is coming to your business, like it or not. With cloud-based systems come inherent challenges. These are further complicated as personal data subject to privacy regulation inevitably moves into the cloud. This combination, putting private information into the cloud, creates risk…

Webcast

European Identity & Cloud Awards 2016

The European Identity & Cloud Awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last…

Blog

Winners of the European Identity & Cloud Awards 2016

KuppingerCole presented The European Identity & Cloud Awards 2016 last night at the 10th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as…

Press Release

Analystenfirma KuppingerCole verkündet Partnerschaft mit US-amerikanischen Security Architects Partners

Wiesbaden, 11. Mai 2016  – Die Europäische Analystenfirma KuppingerCole ist eine Partnerschaft mit Security Architects Partners eingegangen. Das US-amerikanische Beratungshaus wurde von Dan Blum, vormals Analyst bei der Burton Group und bei Gartner, gegründet. Er gilt…

Press Release

Analyst Firm KuppingerCole announces partnership with U.S.-based Security Architect Partners

Wiesbaden, May 11, 2016  – The European analyst firm KuppingerCole Ltd. partners with U.S.-based security consulting firm Security Architect Partners. Security Architect Partners has been founded by former Burton Group and Gartner analyst Dan Blum, a Founder of Security…

Webcast

Ian Glazer - The Moments Ahead for Identity

Remember when we used to pay for a TCP/IP stack? It’s hard to believe that companies used to pay for networking stacks, but we did. And once network stacks became free, the networking profession didn’t die out… instead it flourished. Today, the identity industry is going…

Webcast

Eve Maler - The Connected Consumer – Risks and Rewards

Everyone operates on the risk-reward continuum. It's true for CEOs, CMOs, CPOs, CIOs...and consumers. What does this mean for each of them in a digitally connected world, when the lines have blurred not only between organization A and organization Z, but also between cars and clouds,…

Webcast

Dr. Sridhar Muppidi - Security Starts with Identity and Access

People are the weak link in security. Most data breaches start with bad actors using stolen user credentials and this is fundamentally an identity problem. For too long Identity & Access Management has been viewed as silo often walled off from the security group but this must change.…

Webcast

Lessons learnt from the Ukraine's ‘Lights Out’ Attack

When cyber attackers can bring down something as impactful as the power grid, the way we think about security needs to change. Michael Kleist of CyberArk explains more.

Webcast

Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of Identity & Access Management

It is probably the greatest group of current and former analysts with IAM focus from all around the world who will come together for this plenary panel at EIC 2016 and discuss the future of identity & access management in the Age of Digital Transformation, where agility is key…

Webcast

PATECCO's Thoughts on IAM in Relation to B2B and B2C

Tune in to PATECCOs interview with Martin Kuppinger in regards to managing Customer and Partner Identities in a hybrid world. Listen to some Do’s and Don’ts out of previous projects.

Webcast

Thom Langford - Making Security the Competitive Advantage for your Enterprise

Security is as Security does. It is it’s own benefit and it’s own justification. We need to use shock and awe tactics to get the business to do what we want to ensure the security of the business. Right? NO! We are not the special flower of the business, we are just one part…

Webcast

Dr. Emilio Mordini - In a Wilderness of Mirrors: Do we still need Trust in the Online World?

Trust always involves some level of vulnerability on the actions of another. When we trust others, we are relying on them and consequently we are making ourselves more vulnerable. A bit naively, some scholars argue that trust decisions are based on a cost/benefit analysis, which is maybe…

Webcast

André Durand - Navigating a Moment of Change, Disruption & Inflection in Identity & Security

Webcast

Mia Harbitz - Identity Management, Governance and Forced Migration

New thinking is required with regards to identity management for forced migrants and the role supranational institutions can play to help solve some of the problems regarding aid distribution and settlement.

Press Release

KuppingerCole extends team of analysts with seasoned experts Paul Simmonds and Dan Blum

Wiesbaden, May 10th, 2016 – The independent analyst company KuppingerCole announces that two well-known analysts have joined their team. Paul Simmonds, best known as CEO of the Global Identity Foundation and Dan Blum, Principal Consultant at Security Architects Partners and formerly…

Press Release

KuppingerCole erweitert sein Analystenteam um die erfahrenen Experten Paul Simmonds und Dan Blum

Wiesbaden, 10. Mai, 2016 – Das unabhängige Analystenhaus KuppingerCole hat heute die Erweiterung seines Teams um zwei bekannte Analysten verkündet. Paul Simmonds, bestens bekannt als Leiter der Global Identity Foundation, und Dan Blum, Chefberater bei Security Architects…

Press Release

10. European Identity and Cloud Conference 2016 startet morgen

München, 9. Mai 2016 – Unter dem Motto „Enabling Agility and Innovation in the Age of Digital Transformation“ (Agilität und Innovation im Zeitalter der Digitalen Transformation ermöglichen) startet morgen in München die European Identity &…

Press Release

10th European Identity and Cloud Conference 2016 is approaching

Munich, May 9, 2016 – Under the motto „Enabling Agility and Innovation in the Age of Digital Transformation “ the European Identity & Cloud Conference 2016, Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and…

Leadership Brief

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

Leadership Brief

Leadership Brief: The 5 Biggest IAM Myths - 72001

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

Webinar

Jun 23, 2016: Managing Risk through Cloud App Authentication and 360° Control

The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud…

Blog

Bridging the Gap Between IT, OT and Business in the Digital Transformation Age

The Digital Transformation age is focussed on integrating digital technologies such as social, mobile, manufacturing, cloud computing etc.  It will inherently lead to new types of innovation and creativity and is already having far reaching application across business, government,…

Webcast

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Executive View

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: CyberArk Privileged Threat Analytics - 71540

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now…

Quicklinks

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Internet of Things & Industry 4.0

Internet of Things the intelligent connectivity of smart devices by which objects can sense one another and communicate, thus changing how where and by whom decisions about our physical world are made. Manufacturing companies are currently implementing this “intelligent connectivity of smart devices” in their factories and on the shop floor. To distinguish these applications of the IoT from those among consumers and other realms, the term Industrial Internet of Things is often used. (...)