News Archive

Executive View

Executive View: Entrust IdentityGuard for Enterprise - 71321

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and logical assets.

More

Webcast

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Just like traditional IAM, CIAM requires identity governance to verify and maintain the required quality of the identity attributes collected from consumers. “Quality over quantity” should be your motto from now on: not only it ensures that the data your marketing and business analytics are based on is valid and up-to-date, it automatically reduces the risk of compliance violations, which in case of GDPR can be very costly. Given the widely varied level of trustworthiness of various customer-generated data (remember, “on the Internet, nobody knows you're a dog”),...
More

Blog

Cryptography’s Darkest Hour

For anyone working in IT security, this week surely did not start well. Not one, but two major cryptography-related vulnerabilities have been disclosed, and each of them is at least as massive in scale and potential consequences as the notorious Heartbleed incident from 2014. First, a Belgian researcher Mathy Vanhoef from the University of Leuven has published the details of several critical weaknesses discovered in WPA2 – the de-facto standard protocol used for securing modern Wi-Fi networks. By exploiting these weaknesses, an attacker can launch so-called key reinstallation attacks...
More

Blog

The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry

The EU’s General Data Protection Regulation (GDPR) will force many changes in technology and processes when it comes into effect in May 2018.  We have heard extensively about how companies and other organizations will have to provide capabilities to: Collect explicit consent for the use of PII per purpose Allow users to revoke previously given consent Allow users to export their data Comply with users’ requests to delete the data you are storing about them Provide an audit trail of consent actions Software vendors are preparing, particularly those providing...
More

Whitepaper

Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for practically every organization. Understanding the risk posture and providing transparency while aligning cyber security efforts with corporate strategies is a major challenge. The current lack of standards and overarching strategic concepts needs to be overcome by establishing a sustainable, holistic Cyber Risk Governance framework.

More

Webcast

The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018

Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection regulations like GDPR, which will profoundly change the way personal information collection is regulated, you must be especially careful and well-prepared for hot inter-departmental discussions concerning your future CIAM plans. Remember: even an inadvertent violation of the new compliance regulations can be...
More

Leadership Brief

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

More

Webcast

Top Considerations for Selecting an Identity and Access Management as a Service Vendor

As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high....
More

Executive View

Executive View: Ubisecure Identity Server - 70838

Ubisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs.

More

Executive View

Executive View: Axiomatics Data Security - 70345

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules for access to corporate data.

More

Advisory Note

Advisory Note: Redefining Access Governance - Beyond annual recertification - 72529

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact on your infrastructure.

More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25 th , 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]