News Archive

Leadership Brief

GDPR and PSD2: Challenges and opportunities for CIAM

GDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations.
This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst John Tolbert held on June 20, 2017 during the Cloud Identity Summit in Chicago.
More

Executive View

Executive View: PingIdentity’s PingDirectory - 70294

PingDirectory provides a flexible and scalable base for IAM and customer IAM.  With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs.

More

Webcast

Luca Martelli - The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era

Data, People and Software security: how does them relate to the GDPR security principles? In this new attack landscape, network-centric security is no longer enough because threats come from inside and outside the network. Oracle Identity SOC is an identity-centric, context-aware intelligence and automation framework for security operations centers, backed by advanced user behavior analytics and machine learning to spot compelling events that require automated remediation.

More

Leadership Compass

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.

More

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

More

Advisory Note

Advisory Note: Identity in IoT - 70282

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding notions of digital identity has been problematic to date, but identity management solutions are on the horizon that will improve usability and security for IoT.

More

Blog

Beyond simplistic: Achieving compliance through standards and interoperability

"There is always an easy solution to every problem - neat, plausible, and wrong. (H.L. Mencken) Finally, it's beginning: GDPR gains more and more visibility. Do you also get more and more GDPR-related marketing communication from IAM and security vendors, consulting firms and, ehm, analyst companies? They all offer some pieces of advice for starting your individual GDPR project/program/initiative. And of course, they want you to register your personal data (Name, company, position, the size of a company, country, phone, mail etc...) for sending that ultimate info package over to you....
More

Webcast

André Koot - From RBAC to ABAC in a Pragmatic Way

An Expert Stage presentation at the European Identity and Cloud Conference 2017

More

Webcast

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes its own security controls and separate technology stack for enforcing them. An alternative approach – data-centric security – is in fact nothing new and quite simple in theory: instead of managing...
More

Webcast

Denis Joannides - Empowering the Digital Insurers

In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including governance and shares his lessons learned.

More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]