English   Deutsch   Русский   中文    

News Archive

 Subscribe in a reader

2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007

News
Date Title Type
Apr 29, 2016 In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against… Webinar
Apr 29, 2016 Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for… Executive View
Apr 29, 2016 Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to… Webcast
Apr 28, 2016 BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products… Executive View
Apr 28, 2016 A feature-rich customer identity management platform providing strong analytics and tools for business-oriented decision-making processes while enabling compliance with legal and regulatory requirements and an adequately high level of security. Executive View
Apr 28, 2016 In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to… Executive View
Apr 28, 2016 Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change… Executive View
Apr 27, 2016 While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk… Webcast
Apr 25, 2016 The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance. Webinar
Apr 22, 2016 Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der… Webcast
Apr 22, 2016 KuppingCole has written previously on the benefits of adaptive authentication and authorization, and the need for authentication challenges that go beyond the password. These benefits fall largely under the categories of an improved user experience, since the user only gets challenged for… Blog
Apr 21, 2016 The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are relevant both as a complement to and a replacement for standard SIEM… Executive View
Apr 21, 2016 Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior. Executive View
Apr 20, 2016 Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining… Webcast
Apr 19, 2016 For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with… Executive View
Apr 14, 2016 Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and… Webcast
Apr 13, 2016 While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk… Webinar
Apr 13, 2016 Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der… Webinar
Apr 13, 2016 In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the concept of adaptive authentication and Adaptive Policy-based Access Management (APAM). He will also explain why it is crucial for proper access to information that… Webcast
Apr 12, 2016 Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system… Advisory Note
Apr 05, 2016 SAP systems contain the most precious assets of an enterprise. They can however get lost, manipulated or destroyed in less than a minute. Examples are a) theft of sensitive customer data on a large scale by simple download, b) illegitimately elevated access rights: A user creates fictive… Webcast
Apr 04, 2016 Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything… Webinar
Mar 31, 2016 The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the overwhelming proliferation of mobile devices put enormous pressure on modern businesses to become… Webinar
Mar 31, 2016 What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate? Webcast
Mar 30, 2016 Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to… Webinar
Mar 24, 2016 Cayosoft Administrator is an integrated solution for simplifying and automating management of Active Directory and Office 365 environments, including hybrid deployments. It replaces multiple native and legacy tools with a unified modern administrative console and a self-service web portal. Executive View
Mar 24, 2016 LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected… Executive View
Mar 22, 2016 Informations- und Entscheidungsprozesse von Kunden haben sich dramatisch verändert. Dies hat in Unternehmen zu einem gesteigerten Interesse an digitaler Transformation von Geschäftsprozessen geführt. Beziehungen und Vernetzung sind heute Kern jedes Geschäftsmodells. Sie fließen in zentrale… Webcast
Mar 21, 2016 Comprehensive framework for identity administration and governance in today's cloud-based, on-premises and hybrid infrastructures for both enterprise- and internet-scale environments. Executive View
Mar 21, 2016 Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market. Leadership Compass
Mar 15, 2016 Nicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und… Webcast
Mar 14, 2016 Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining… Webinar
Mar 10, 2016 Customer's information and decision making processes have changed dramatically. This has contributed to the increase in companies turning to Digital and Business Transformation. Relationships and connections are at the heart of any business. They foster new ideas, growth and opportunities,… Webcast
Mar 09, 2016 In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe the concept of adaptive authentication and Adaptive Policy-based Access Management (APAM). He will also explain why it is crucial for proper access to information that… Webinar
Mar 08, 2016 Regulatory compliance does not end at your perimeter. Moving to the Cloud will not get you rid of implementing Access Governance and a well thought-out reporting. Furthermore, moving to the Cloud might make administration more complex, not easier. Proven and established tools in your AD… Webcast
Mar 08, 2016 The definition, implementation and maintenance of an adequate set of policies is a major task for many areas of today’s organizations. However, continuously ensuring compliance to these policies and providing adequate documentation of evidence is even more challenging. Keeping computer… Webinar
Mar 03, 2016 On March 1st OpenSSL published a security advisory CVE-2016-0800, known as “DROWN”. This is described as a cross-protocol attack on TLS using SSLv2 and is classified with a High Severity. The advice given by OpenSSL is: “We strongly advise against the use of SSLv2 due not… Blog
Mar 02, 2016 This webinar follows the lifecycle of a document: Digital contracts go through many phases throughout their existence. From the production of the document, through presentation, revisions, and then being signed by the involved parties. But the journey doesn't end there. If the contract is… Webcast
Mar 01, 2016 As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are… Analysts' View
Mar 01, 2016 Yesterday at the RSA Conference, IBM has officially confirmed what’s already been a rumor for some time – the company is planning to acquire Resilient Systems for an undisclosed amount. Resilient Systems, a relatively small privately held company based in Cambridge, MA, is well… Blog
Mar 01, 2016 With RSA kicking off this week, security experts from around the world are getting ready for a flurry of announcements from security vendors. Last Friday, it was Microsoft’s turn, and the company’s CISO Bret Arsenault has publicly announced some interesting news. The motto of the… Blog
Feb 29, 2016 YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed… Executive View
Feb 29, 2016 Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already changing profoundly. Communication with customers no longer happens over traditional websites. It… Blog
Feb 29, 2016 SAP systems contain the most precious assets of an enterprise. They can however get lost, manipulated or destroyed in less than a minute. Examples are a) theft of sensitive customer data on a large scale by simple download, b) illegitimately elevated access rights: A user creates fictive… Webinar
Feb 24, 2016 On February 23rd, 2016, Thycotic, one of the leading vendors in the area of Privilege Management (also commonly referred to as Privileged Account Management or Privileged Identity Management) announced the acquisition of Arellia. Arellia delivers Endpoint Security functionality and, in… Blog
Feb 24, 2016 Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with… Executive View
Feb 24, 2016 Mapping existing policies to system-specific checks and initiating mitigating measures in case of deviations are major challenges for organizations relying on the use of IT systems. Enforcive CPC as an IT-GRC solution provides template-based compliance checks, alerting mechanisms and… Executive View
Feb 22, 2016 The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central… Webinar
Feb 19, 2016 Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when accessed and modified externally. The Intralinks VIA product provides a powerful solution that balances the user… Executive View
Feb 18, 2016 What new risks and solutions will blockchain technologies bring to user identification and authentication, the Internet of Things (IoT), Digital Rights Management and Life Management Platforms (LMP)? Is the use of blockchain technologies always appropriate? Webinar
Feb 18, 2016 Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and… Webinar
Feb 10, 2016 Informations- und Entscheidungsprozesse von Kunden haben sich dramatisch verändert. Dies hat in Unternehmen zu einem gesteigerten Interesse an digitaler Transformation von Geschäftsprozessen geführt. Beziehungen und Vernetzung sind heute Kern jedes Geschäftsmodells. Sie fließen in zentrale… Webinar
Feb 09, 2016 To understand what this newsletter is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult concept, but it’s best if we’re all on the same page, so to speak. Analysts' View
Feb 09, 2016 Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users, their access and roles. akquinet offers a full-featured product suite for GRC and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive… Executive View
Feb 08, 2016 The European Identity & Cloud Conference 2016 , taking place May 10 – 13, 2016 at the Dolce Ballhaus Forum Unterschleissheim, Munich/Germany , is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as… Webcast
Feb 04, 2016 Sometime last autumn I started researching the field of Micro-Segmentation, particularly as a consequence of attending a Unisys analyst event and, subsequently, VMworld Europe. Unisys talked a lot about their Stealth product, while at VMworld there was much talk about the VMware NSX product… Blog
Feb 04, 2016 Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that focus on network traffic or technical vulnerabilities this solution focuses on identity, access and user… Executive View
Jan 29, 2016 Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre… Leadership Compass
Jan 29, 2016 Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich… Webcast
Jan 28, 2016 The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within the Financial Sector, the benefits that can be achieved, the challenges and the changes to expect from this… Advisory Note
Jan 28, 2016 Nicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und… Webinar
Jan 25, 2016 Intermedia AppID® Enterprise is a cloud based identity management platform for web applications. This provides a solution to many of the security and compliance needs of the agile connected business. As well as adding value to the cloud and hosting services provided by Intermedia it is… Executive View
Jan 22, 2016 Nexis contROLE bietet ein effizientes und komfortables Role Lifecycle Management in Kombination mit Role Analytics, entweder als Standalone-Lösung oder als Add-on zu vorhandenen Identity and Access Management-Infrastrukturen. Executive View
Jan 21, 2016 Regulatory compliance does not end at your perimeter. Moving to the Cloud will not get you rid of implementing Access Governance and a well thought-out reporting. Furthermore, moving to the Cloud might make administration more complex, not easier. Proven and established tools in your AD… Webinar
Jan 20, 2016 After an “extended holiday season” (which for me included spending a vacation in Siberia and then desperately trying to get back into shape) it’s finally time to resume blogging. And the topic for today is the cloud platform for IoT services from AWS, which went out of beta… Blog
Jan 20, 2016 IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention. Executive View
Jan 20, 2016 Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing. Executive View
Jan 20, 2016 The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged… Webcast
Jan 15, 2016 Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise… Executive View
Jan 15, 2016 On April 18th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors followed. The danger of another catastrophe can’t be ignored. In a city like San Francisco,… Blog
Jan 13, 2016 Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein… Leadership Brief
Jan 13, 2016 IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company.… Webcast
Jan 13, 2016 Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of… Leadership Brief
Jan 12, 2016 With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay… Analysts' View
Jan 12, 2016 One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.   Leadership Brief
Jan 05, 2016 CXP Group and KuppingerCole are pleased to invite you to the first Blockchain Seminar in Paris. The working language of the seminar will be english. Seminar
Jan 05, 2016 On November 30th, 2015 the final version of the standard ISO/IEC 27017 was published.  This standard provides guidelines for information security controls applicable to the provision and use of cloud services.  This standard has been some time in gestation and was first released as… Blog
Jan 04, 2016 Nexis contROLE provides effective and convenient role lifecycle management combined with role analytics as either a stand-alone solution or as an add-on to existing Identity and Access Management infrastructures. Executive View
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole