News Archive

Executive View

Executive View: SAP Fraud Management - 71182

SAP Fraud Management leverages the power and speed of the SAP HANA platform to detect fraud earlier, improve the accuracy of detection and uses predictive analytics to adapt to changes in fraud patterns.

More

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 72534

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

More

Executive View

Executive View: eperi Encryption Gateway - 70619

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data  encryption with out-of-the-box support for popular SaaS applications.

More

Blog

The Sweet Spot for Blockchains: Registries

A couple of days ago, DIACC (Digital ID & Authentication Council of Canada) together with IBM Canada and the Province of British Columbia released information about a PoC (Proof of Concept) for moving corporate registrations to a blockchain-based register. The PoC, which used the Hyperledger Fabric, was for both corporate registries of a single province and across multiple jurisdictions. Such registries, be it corporate registries, land register, or other types of decentralized ledgers, are the sweet spot for blockchains. Registration is decentralized. The registries and ledgers must...
More

Executive View

Executive View: SailPoint SecurityIQ - 70849

SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the broad support for unstructured data stores such as file servers, NAS devices, and SaaS data stores.

More

Webinar

Oct 24, 2017: Compliance als Vorteil: Technische Anforderungen der GDPR für moderne digitale Unternehmen

Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen,...
More

Advisory Note

Buyer’s Guide: Ransomware Protection - 72599

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for ransomware protection.

More

Advisory Note

Advisory Note: Understanding and Countering Ransomware - 70282

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual users as well have been victims of ransomware. The purpose of this Advisory Note is to analyze the concept of ransomware, elaborate on its global reach and provide concrete advice on what to do if hit by ransomware.

More

Executive View

Executive View: Thycotic Secret Server - 71060

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set.

More

Blog

A Short History of EIC - Europe's Leading Event on Digital ID & Transformation

More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors, domain experts, thought leaders and analysts. I remember Dick Hardt giving an incredibly visionary keynote on "User-Centrism - The Solution to the Identity Crisis?" at EIC 2007 - a topic which still is highly relevant. Or the legendary keynote panel back in 2008 on the question whether there is a difference between the European way of doing IAM and the rest of the world, moderated by KuppingerCole's...
More

Webinar

Oct 05, 2017: Top Considerations for Selecting an Identity and Access Management as a Service Vendor

As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high. More

Executive Dinner

Oct 11, 2017: Executive Dinner in Frankfurt

KuppingerCole personally invites you - the region’s top security executives - to a valuable evening of networking, interaction, engagement and quality dining experience. Each of our Executive Dinners takes place in a top quality, 5-star venue. The evening will include a superb three-course dinner menu complete with canapes, wines, and soft beverages. Join leading IT security C-level executives from local enterprise, and an exclusive solution provider sponsor for the evening. More

Executive Dinner

Oct 04, 2017: Executive Dinner in Munich

KuppingerCole personally invites you - the region’s top security executives - to a valuable evening of networking, interaction, engagement and quality dining experience. Each of our Executive Dinners takes place in a top quality, 5-star venue. The evening will include a superb three-course dinner menu complete with canapes, wines, and soft beverages. Join leading IT security C-level executives from local enterprise, and an exclusive solution provider sponsor for the evening. More

Executive View

Executive View: Auth0 Customer Identity Management - 71053

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly customizable to meet a variety of business requirements.    

More

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients et aux consommateurs. Si la connaissance de ces derniers gagne globalement en pertinence, la majeure partie des informations n‘en reste pas moins stockée sur des systèmes organisés en silo. Les nouvelles réglementations (notamment le règlement GDPR européen...
More

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003

La « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité opérationnelle et l‘infrastructure informatique sous-jacente. L’infrastructure informatique doit évoluer pour prendre en charge les nouvelles exigences des métiers en termes d‘agilité, d‘innovation et de sécurité. La gestion des identités...
More

Executive Dinner

Oct 04 - Dec 15, 2017: Executive Dinner Series 2017

KuppingerCole personally invites you - the region’s top security executives - to a valuable evening of networking, interaction, engagement and quality dining experience. Each of our Executive Dinners takes place in a top quality, 5-star venue. The evening will include a superb 3 course dinner menu complete with canapes, wines and soft beverages at “No Charge”. Join leading IT security C level executives from local enterprise, and an exclusive solution provider sponsor for the evening. Using our expertise, we have set the overarching title theme for the evening as well as formulated...
More

Leadership Brief

Leadership Brief: Lösungen für die Personalknappheit in Ihrem Cyber Defense Center - 70268

Ausreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den  IT - Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus drei Elementen: Ausbildung. Dienstleistungen. Werkzeuge.

More

Webinar

Oct 17, 2017: Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations and to provide frictionless user experience. CIAM solutions allow businesses and public-sector agencies to gather more information about the consumers while maintaining compliance with the current and upcoming data protection regulations like the EU GDPR and PSD2. More

Executive View

Executive View: Deep Secure Content Threat Removal Platform - 71311

The Content Threat Removal  Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero - day attacks and prevents data loss, all transparent to end users.

More

Webinar

Sep 26, 2017: The Crucial Role of Identity in Securing Industrial IoT

As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security. More

Blog

General Data Protection Regulation – Rather an Evolution Than Revolution

Guest post by Tim Maiorino, Counsel of Osborne Clarke The newest EU legislation on data protection is the General Data Protection Regulation (GDPR) which will be enforceable from May 26th 2018. It will bring several important changes, altering the requirements of data protection law in the European Union. The GDPR will replace the EU-Directive on Data Protection and, by extension, all transposing national regulation. The GDPR´s objective is to harmonise data protection legislation across the EU and to “protect the fundamental rights of natural persons to the protection of...
More

Leadership Brief

Leadership Brief: Schutz gegen Ransomware - 70336

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

More

Leadership Brief

Leadership Brief: Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten - 70340

Mit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs zentrale Aktivitäten, die innerhalb der IT unternommen werden sollten, um auf die Erfüllung dieser Anforderungen vorbereitet zu sein.

More

Leadership Compass

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre Bedürfnisse optimal geeignetes Privilege Management - Produkt zu finden

More

Webinar

Sep 19, 2017: Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation

Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as...
More

Blog

Tomorrow’s Customer Journey Starts In The Buyer's Head

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab The world of customer journeys is a terrible mess. The linear path to purchase does not exist. “Predictable shopping patterns, once so fundamental to marketing and advertising strategy, have gone by the wayside. Persona- and demography driven strategies now fall short – the winners in this new era are the brand and retailers who’ve put a plan in place to meet actual shoppers anywhere along their path to purchase,” says BazaarVoice. Even though marketers claim to understand, use...
More

Congress

May 15 - 18, 2018: European Identity & Cloud Conference 2018

Get to the place where the Digital Transformation is alive. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture out of best practice discussion, visionary presentations and networking with a future orientated community. More than 800 participants consisting out of end users and world wide leading vendors, thought leaders and analyst get together in Munich to be inspired by a high-class list of international top-speakers. More

Executive View

Executive View: Microsoft Azure Stack - 72592

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases.

More

Webinar

Sep 20, 2017: The New Role of IAM in the Age of Digital Transformation

Organizations are under pressure to change in the current age of Digital Transformation. One of the key differentiators of innovative digital business models and thus new revenue streams is the profoundly changed relationship to customers and consumers. Creating innovative consumer services, collecting and managing better customer information and even just optimizing the reach of everyday marketing activities – all this depends on the ability to manage consumer identities in a flexible, scalable and secure way. More

Blog

Finally: Building up Trust as a Foundation for Sustainable Business Strategies

It seems almost ironical, but the currently and constantly growing number of legal and regulatory requirements might be the important (and first actually working) catalyst for changing the attitude of organizations towards privacy. While the true rationale behind it are most probably the substantial fines that come with several of these regulations, first and foremost the GDPR. The value of customer data, from basic account data to detailed behavioural profiles is undisputed. And whether information is really the new oil in the digitalized economy or if comparisons are misleading anyway:...
More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Connected Consumer Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]