News Archive

Blog

Wow for VAAU!

Ok, nothing is more boring than yesterdays news, I guess! Despite this oh so true statement, especially in the blogosphere, I would like to rant about SUN's recent acquisition of VAAU, a small company that offers tools around role mining and role engineering as well as compliance. I had the sincere pleasure to work with some of the VAAU EMEA people and found both their tools and their approach to be very exciting. SUN in Germany is also very excited - at least the SUN guys I talked to lately - and they are eager to put their new tools to work exclusively, bearing in mind that VAAU was...

Blog

Hello World...

Welcome to my world of Digital Identity - hopefully it will be as entertaining (and hopefully at least slightly insightful) for you to read as it is for me to write! First of all, I would like to post my vision own of digital identities - which might slightly differ from what others think... there are some people out there who have rather far fetched visions, driving the future of how our digital lives will look like in some five to ten years or even beyond that. What I would like to sketch is rather short sighted for being called a vision, nonetheless this is far from being reality,...

Blog

The rise and fall of social networks

There is a broad discussion around the use of identity information at StudiVZ these days. They have changed their agreements with their users and will present personalized adverts. That has lead to an intensive discussion in their user community. Another interesting change can be found at Xing since some two weeks: At the starting page you can now directly see not only the number of new contacts of your contacts (like at LinkedIn) but the names of the new contacts. I personally found that change a little bit to open. For sure you can look up the contact lists of your contacts as long as...

Blog

Customer Identities at Vodafone

Today, I had to put an end to a story lasting for months now, where I tried to change my mobile phone contract I have had at Vodafone since 1996, through cancelling any contract which may exist under my name/my address/my bank account number/my customer number(s).  It all started, when my employer was generous enough to take over my phone contract. Therefore, invoice address and bank account information had to be changed. I wanted to take this occasion and get rid of some add-ons I had been chased to subscribe to through aggressive telemarketing, which I actually never used and did not...

Webinar

Jan 25, 2008: Der RoI des Identity Management

Der Blick auf den Return einer Investition in das Identity und Access Management ist ein wesentliches Entscheidungshilfe bei der Planung von Investitionen in die IT-Infrastruktur. Dabei zeigt die Praxis, dass RoI-Berechnungen in der Regel nur dann auch tatsächlich erreichbar sind, wenn quantitative Betrachtungen durch qualitative Aspekte und unternehmensspezifische Kennzahlen ergänzt werden.

Blog

Identity Risk Management - a cool thing

Recently I complained about the insufficient use of existing technologies. But there are some out there who do a better job. Sailpoint is one of these vendors. They are, together with some few others like Aveksa, in the process of establishing the new market segment of "Identity Risk Management". That is a discipline within GRC which deals specifically with risks which are in some way or another identity-related - which are most of the risks, by the way. It's about answering questions like "who is allowed to do what", but in detail and not only high-level. And with a high degree of...

Blog

The CIO agenda's business drivers

Recently I've posted on my view of the CIO's agenda. There are a clear reasons why these four key topics are relevant. What drives business? Earning money, e.g. revenues. Optimizing costs, e.g. optimizing the gap between income and costs and thus the net income. Avoiding problems and penalties. Earning moneys requires that a business is flexible enough to adopt to a changing competitive/market environment and to react fast. Optimizing costs is about efficient internal structures. Avoiding problems and penalties is about Corporate Governance and the entire GRC field (Governance, Risk...

Blog

System Lifecycle Management - survival of the smartest

One of the IT market segments I'm observing for a quite long time ist the System lifecycle management market, including software distribution, OS installation, inventory, patch management and some other technologies. There are few segments which are that crowded. If I count the vendors/brands which compete in the central European region I end up with something aroung 20 at least. Given this number of competitors it is obvious that not all of them will survive. There will be the big ones to survive - and there will be the smart ones. There are some different strategies to observe: Moving...

Vendor Report

Vendor Report: BHOLD

BHOLD is a specialized vendor focussing on Enterprise Authorization Management, i.e. the administration of authorizations to access IT systems from business level. In our opinion, this clearly defined and addressed orientation is responsible for BHOLD´s unique position in the market. Therefore, BHOLD is not seen as a typical vendor of Enterprise Role Management products, although the BHOLD portfolio also covers this functionality...

Blog

The CIO agenda – the four key initiatives

The topic I discuss probably most often as well with vendors and system integrators as with end users is how to sell IAM. The problem behind this is that IAM is mainly seen as an infrastructure element (which IAM is). The potential business value is often quite unclear, as well as many people just don’t know that they need IAM even because they are using different terms. The CRM don’t see their system in the context of IAM even while it’s the biggest identity store in most companies – just an example. One thing I’m intensively working on is a business-related argumentation which starts...

Blog

Trying to find the next niche

This afternoon I had an analyst briefing with one of the vendors which offspring the market segment formerly known as system management which is usually defined today as client or system lifecycle management. This change has been definitely necessary because system management covered a very broad range of different technologies. But the system lifecycle management segment, which exists for a while, is as well pretty heterogeneous. There are vendors which still mainly support software distribution, OS installation, patch management, and some other administrative functionalities. There are...

Blog

The shortcomings of common SOA security approaches

These days I have written a report on the relationship between IAM (Identity and Access Management) and SOA (Service oriented Architecture/Applications). One major aspect of this relationship is around end-to-end-security, e.g. securing the interaction of a user with an application (and the application which implements a business process) up to the backend systems like databases. That is inevitable because using a service in the context of an user identity or an user role is the only way for consistent, externalized security instead of coded security where some return of a service is...

Blog

MDM, EAI, IAM, Data Quality

At a workshop I have held yesterday I had an interesting conversation about some aspects of IAM - especially the way, IAM products are developed without reuse of existing technologies. The discussion isn't really new to me. I have discussed some of the aspects some five or six years ago with one of the leading IAM vendors. A fruitless discussion, by the way. MDM, e.g. Master Data Management, is a concept for building and maintaining master data, for example for supplier data or material data. There is no real difference to what meta directory services are providing. The only real...

Blog

Why IT cost management requires IAM

Have you ever thought about assigning the IT costs in a correct manner? Services and IAM will help you. Services are a means for a more granular view on what IT provides. That is true as well for the IT infrastructure services which are, for example, covered in ITIL. It is true as well for the services used in SOA concepts. But services aren't sufficient. The assignment of IT costs requires the knowledge about the user. Who is using which services in which frequency? This question has to be answered as well. That means, that you have to know in the context of which user a service runs or -...

Blog

UK Public Services Pushing Identity Theft to a new Level

According to BBC news, UK Chancellor Alistair Darling has admitted "loss" of 25m records by UK Revenue and Customs. 2 disks containing personal information including names, birth dates, National Insurance Numbers and bank account details of 25 million people, essentially of all families resident in the UK with at least one child under 16. He added, that there has been no evidence that this data has fallen into the hands of bad guys, but adviced those 25 million people to watch their bank accounts. Translated from political into real world language, this means that those disks have indeed...

Blog

Sun is back...

It has been quiet around Sun Microsystems at least in the IAM space for some time. Being one of the companies pushing the market some four years ago, especially with their Waveset acquisition, there hasn't been that much news for some time. For sure there were still a lot of improvements in the product. But other vendors like Oracle and SAP have had much more attention - especially due to their acquisitions. And some interesting things Sun has done like their early entry into the audit space or their virtual directory technology never obtained much attention, for different reasons. The...

Blog

Proofing the need for an application security infrastructure (budget)

One of the emerging topics in the broader IAM space integrates GRC and Identity Management: Identity Risk Management, including aspects like Identity Risk Metrics. Identity Risk Metrics are used to measure specific aspects of Identity Management. These metrics can be mapped to risks and thus serve as a means to detect and, in the next step, reduce risks. Such metrics can be defined in many areas. May be the most interesting are Application Risk Metrics – in the context of digital identities. Elements of this category are things like Usage of central identity stores (instead of...

Blog

Talking the talk with IBM's Tom Noonan

Tom Noonan of IBM ISS talks a mean speech. Yet somehow I came away slightly unconvinced from a press and analyst briefing he gave on Monday at ISS headquarters in Atlanta. Maybe one reason was that he hardly used the term “identity” as he described in some detail how he perceives the world of IT security and threat management. Instead he has a lot to say about security becoming a utility, about disconnected parts and the need for a “security ecosystem” where the products of each and every vendor can work together to provide seamless and coherent protection of both data (the “new currency”,...

Advisory Note

Die Identity Management-Strategie von SAP

Der Report analysiert die aktuell vorgestellte Identity Management-Strategie von SAP und bewertet diese. Dabei wird sowohl auf die technische Ebene als auch die Service-Orientierung und Business-Orientierung einschließlich der Verbindung zu GRC-Ansätzen eingegangen. Der Report liefert einen top-aktuellen, detaillierten Einblick und eine Einschätzung der SAP-Strategie in diesem Bereich und hilft beim Alignment von bisherigen Identity Management-Strategien.

Webinar

Nov 15, 2007: Die Identity Management-Strategie von SAP

SAP hat nach dem Kauf von MaXware inzwischen eine Roadmap vorgestellt, in der die zukünftige Positionierung von Identity Management-Technologien bei SAP beschrieben ist, sowohl im Kontext von SAP NetWeaver als auch von SAP GRC-Lösungen. Kuppinger Cole + Partner gibt einen Überblick über die Strategie und bewertet diese.

Blog

IAM and the midsize market

The ones who are reading our newsletter or the articles at our website for some time know that IAM for the midsize market, e.g. the not that big corporations, is one of my favourite topics. Today I had an interesting discussion with a vendor who raised the question which vendor will dominate that market. There are four options: SAP Microsoft IBM The rest SAP is a favourite for customers which are still using SAP as their strategic ERP platform. Microsoft enters the customers via the Active Directory. IBM is still there, at least at most of the midsize companies. Thus, everyone else...

Webinar

Nov 30, 2007: Auswahlkriterien für Provisioning-Produkte

Die Identity Management-Marktstudie 2007/2008 hat einerseits gezeigt, dass Provisioning weiterhin das Investitionsthema Nr. 1 im Identity Management-Markt ist. Gleichzeitig planen aber mehr als 5% der Unternehmen den Ersatz ihrer bisherigen Lösungen - ein sicheres Indiz dafür, dass manche Provisioning-Projekte die an sie gestellten Erwartungen nicht erfüllt haben.

Blog

How shall a GRC solution look like?

There are plenty of GRC solutions out there. Products for one specific regulations, industry-specific solutions, and more and more solutions which claim to address the entire GRC problem. The level ranges from paper-based methodologies to more or less complex Excel sheets and complex frameworks. I'm mainly interested in the generic solutions which try to address the entire problem. Many solutions address some part of the problem, but you will need dozens of different products to solve your GRC requirements. That leads to a complex, expensive infrastructure. Thus, a strategy for a generic...

Blog

Why SSO is so popular in these days...

Our upcoming Identity Management market report 2007/2008 shows some interesting results. Not to surprising, at least most of them, but nevertheless pretty interesting. One important information is where the money will be spent next year. For sure there is Identity Provisioning. And, as expected, Role Management is a very important area. Besides these both areas there is Single Sign-On as the third topic on which a lot of money will be spent within the next 12 months. More than 30% of the survey participants will implement SSO, will enhance their implementations significantly or will replace...

Blog

VeriSign Identity Protection - an interesting approach

I still remember some tough discussions I had with eBay in 2004 when we had just started KCP around there missing investments in secure, strong authentication. Interestingly eBay and PayPal are amongst the first now to use VeriSign Identity Protection, abbreviated as VIP. And they start in the German market to roll out this technology. Basically VIP is sort of a combination of strong authentication with a user-centric identity which can be used with different vendors and other companies in the market. The user requires a token which provides an OTP (one time password) which is used for...

Vendor Report

Vendor Report: BHOLD

BHOLD ist ein spezialisierter Anbieter, der sich auf das Enterprise Authorization Management, also die Verwaltung von Autorisierungen für den Zugriff auf IT-Systeme aus Business-Sicht, spezialisiert hat. Mit dieser konsequent umgesetzten Positionierung nimmt BHOLD nach unserer Einschätzung eine Allein-stellung im Markt ein. Damit ist BHOLD kein typischer Anbieter des Enterprise Role Managements, auch wenn diese Funktionalität im Rahmen der BHOLD - Produkte mit abgedeckt wird. Das Unternehmen verfügt über leistungsfähige Produkte und eine validierte Methodik...

Advisory Note

Trend Report: Application Security Infrastructure

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der einen Seite und den Anwendungen auf der anderen Seite.

Blog

Enterprise Information Management

In some of my last entries in this blog (here and here) I’ve mentioned the concept of Enterprise Information Management, something I will cover in depth in a report within the next few weeks. Enterprise Information Management will be sort of the long term evolution of today’s Identity Management and some of the tightly related topics, as well as the integration of IAM with some other technologies. I started thinking about this concept when I developed a simple chart which describes the future of IAM. It starts with today’s IAM, which is sort of “Identity Management for Administrators”,...

Blog

From risk-based to context-based authorization

Dave Kearns, who will contribute as a track moderator and speaker to our European Identity Conference 2008, has introduced the term context-based authorization (and influenced my thoughts on this topic - thanks to Dave) as an approach for basing authorization on the context in which a user acts, which goes beyond the risk-based authorization in two ways: It's not binary, e.g. either in or out. And it's based potentially on more information about the context. I'd like to add some thoughts from my side to this and explain as well the difference between today's risk-based authorization and...

Blog

Not invented here...

SAP tends to talk about its concept of business-driven Identity Management in these days and claims this to be a new approach. But honestly – neither the term nor the concept are really new (but valid). Business-driven Identity Management in SAP’s vision is role-based. Based on business roles, to clarify this, not on the technical system roles SAP supports today in its different business systems. There is no doubt that business roles are becoming more and more important for IAM. SAP supports them today in its GRC Access Control product. SAP NetWeaver Identity Management in the current and...

Blog

SAP NetWeaver Identity Management and the CUA

Sometimes the real important news are hidden pretty well. I’ve experienced this once again at SAP TechEd in Munich. Despite several analyst briefings before and during the event I decided to attend a presentation on the status and future of SAP NetWeaver Identity Management. At the very end of the presentation there came a slide about the relationship of CUA and SAP NetWeaver Identity Management which said that CUA will be replaced by SAP NetWeaver Identity Management on the long term. That is really important news. CUA is the Central User Administration in the SAP environments, allowing...

Blog

Service-based IT cost management

A side effect of application security infrastructures When writing my upcoming report on the architecture of application security infrastructures I thought also about potential business values of this type of service layer which sits between applications and the security infrastructure (in fact the term "application security infrastructure" is somewhat misleading because its more about a service layer which sits on top of the infrastructure - and the service layer is core, not the infrastructure). When thinking about the business values it became clear to me that there is a clear link to...

Blog

Oracle and BEA: It's about marketshare

Oracle today announced that they'd like to acquire BEA and have placed a bid for BEA. The BEA management on the other hand seems to not be willing to become a part of Oracle. To me, it's somewhat surprising that Oracle looks on BEA. Oracle has its own middleware product and, from a technical perspective, I don't see the urgent requirement to buy BEA. BEA, for sure, is one of the leading vendors in the market space but I don't expect them to add that much value at least from a technical perspective to Oracle that it would be worth to pay the pretty high price. So there is mainly one reason...

Blog

Bye Bye CRM

On this year's Digital ID World in San Francisco, Doc Searls held a keynote on Vendor Relationship Management (VRM), a concept he has been contributing to as a Harvard (Berkman Center) fellow. According to Doc, VRM is the inverse of Customer Relationship Management (CRM) and provides methods and tools for individuals to deal with customers. VRM being still quite early in it's evolution, definately is extremely interesting, as it is one of the first initiatives to look into what can be done on top of User Centric Identity, besides decentralized authentication and some kind of Web-SSO. VRM...

Blog

Oracle acquires LogicalApps

Oracle remains true to its strategic approach of growth trough acquisitions. The next company to become part of Oracle is LogicalApps. LogicalApps, pretty unknown at least here in Europe, is a vendor in the GRC space - more concrete of "automated GRC controls management solutions". GRC is an acronym for Governance, Risk Management and Compliance. The solution supports SoD enforcement, monitoring of business transactions, and evidence (e.g. audit). The vendor is focused on Oracle Applications with - as they claim - hundreds of successful deployments in these environments. With this...

Blog

The business value of Compliance

Today I read a press release from Novell where they claim that most enterprise don't realize the value of Compliance. For sure, if you think about Compliance, then most of us first think about the pain of being compliant. More reports, more rules, new applications,... And, honestly, Compliance is first of all something reactive, avoiding penalties. But there are as well some clear advantages, like we've mentioned several times. This is especially true if you look on it from a general "Governance, Risk Management, Compliance"-perspective. There are, especially in the risk management area,...

Product Report

Product Report: Oracle Identity Manager

Der Oracle Identity Manager ist die Lösung für das Enterprise Provisioning innerhalb des Oracle-Produktportfolios. Das Produkt zeichnet sich durch eine sehr große Leistungsfähigkeit und Flexibilität in den meisten Bereichen aus und zählt damit aus Sicht von KCP zu den führenden Lösungen in diesem Segment.

Product Report

Product Report: Passlogix v-GO SSO 6

Passlogix zählt zu den etablierten Anbietern im Enterprise Single Sign-On-Markt. Mit dem Kernprodukt v-GO SSO und ergänzenden Komponenten werden alle wichtigen Anforderungen im Bereich Single Sign-On abgedeckt. Die Lösung ist einfach zu implementieren und zu admi-nistrieren. Viele gängige Anwendungen sind vorkonfiguriert, weitere Anwendungen lassen sich über eine grafische Schnittstelle erfreulich einfach hinzufügen.

Blog

A new competitive situation in IAM

The acquisition of MaxWare by SAP finally has led to a new competitive situation in IAM. I define four segments or clusters of vendors in the market: The ones with focus on the business process The ones with focus on business service management The pure (or mainly) IAM vendors (and the ones which have a broader IAM portfolio but not integrated that into a higher level vision) The specialists  To start with the first segment - these are the vendors who compete for becoming the leading supplier of the infrastructure for business processes. To do this, they need IAM to provide identity...

Blog

The ERP for IT

During an analyst briefing I had some days ago with a leading vendor in the BSM space around the role Identity Management plays for BSM (which is quite important, given the fact that all leading BSM vendors are IAM vendors and that IAM plays a significant role within ITILv3) we came to the conclusion that there is no ERP for IT. There are specific ERP solutions for Finance, Customer Relationship Management, Product Lifecycle Management, and so on. But there is nothing for IT. That automatically led to the question whether BSM might fill this gap. The discussion also was sort of a reminder...

Blog

A Prescription For A Healthcare Headache

Anyone know where the biggest identity project in the world is going on today? Would you believe Germany? It's true, though. The "Electronic Healthcard" or "elektronische Gesundheitskarte" (known as the "eGK") will soon be issued to some 80 million citizens, providing them for the first time with a digital identity aimed at reducing healthcare costs and improving the quality of service for patients. It may actually save some lives, too, by giving doctors a way to track patient histories and avoid possible side effects or drug allergies. Of course, simply handing out 80 million chip cards...

Blog

Identity services - easier software audits

In the last week I had several conversations with different IT vendors and end users which led to a discussion about the value of identity services within a service-oriented architecture. The IT companies came from different market segments. One example is E2E, a swiss company which develops a tool for model-driven architecture and the resulting applications. They have started defining such identity (and other security) services within their models. Other persons I spoke with came for example from the BSM (Business Service Management) space. The well-known business values for identity...

Blog

Orange / France Telecom release OpenID Service

Ariel Gordon and Aude Pichelin from France Telecom (FT) yesterday announced at the 6th Digital ID World in San Francisco release of an OpenID service to their 40 million subscribers. Congratulations to the OpenID community for this big success. It is not surprising that it is FT with it's Orange brand being the first company running an internet scale OpenID service. On the one hand, it's a smart company. They strongly contributed to the emergence of the SAML standard and pushed IBM into the Liberty Alliance some 3 years ago. On the other hand, if there is any industry which can make a...

Seminar

Nov 14, 2007: Governance, Risk, Compliance (GRC) & Identity Management

Das unternehmensweite Risikomanagement, das nachhaltige Steuern des Unternehmens durch Kodizes und Richtlinien (?Governance?) und das systematische Streben nach dem Einhalten externer und interner Regelwerke (?Compliance?) verändern grundlegend die Anforderungen der Unternehmensführung an IT-Infrastruktur und Anwendungen. Welchen Hintergrund diese veränderten Anforderungen haben, wie sie sich auf die IT auswirken und welche zentrale Rolle das Identity Management dabei spielt, zeigt Ihnen dieses Seminar auf.

Seminar

Nov 21, 2007: Identity Management im SAP-Umfeld

Mit dem Zukauf von Maxware hat SAP für Aufsehen gesorgt. Dennoch stellt sich die Frage, welcher Ansatz für das Identity Management der richtige ist, wenn (neben anderen IT-Systemen) SAP-Systeme eingesetzt werden.

Product Report

Product Report: Novell Identity Manager 3.5

Novell hat mit der Version 3.5 seines Identity Managers wieder eine Reihe neuer Funktionen
implementiert und die kontinuierliche Entwicklung des Produkts fortgesetzt. Der Identity Manager
3.5 bleibt damit auch weiterhin eines der führenden Produkte im Enterprise Provisioning-
Markt.

Vendor Report

Vendor Report HP 2007

HP hat bereits vor einigen Jahren mit der Akquisition mehrerer Hersteller und Produkte im Bereich Identity und Access Management auf sich aufmerksam gemacht. Allerdings ist es dem Unternehmen im Anschluss zunächst nicht gelungen, größere Sichtbarkeit zu erlangen. Das hat sich inzwischen mit der auf die von HP als Business Technology Optimization (Business/IT Service Management) bezeichnete, auf die business-gesteuerte Umsetzung von IT-Services ausgerichtete, Strategie geändert.Zudem hat HP sein Produktportfolio in den vergangenen Jahren konsequent weiterentwickelt. Das...

Vendor Report

Vendor Report Secude 2007

SECUDE ist ein Spezialist im Bereich der IT-Sicherheitslösungen, dessen Zielsetzung es ist, alle Lösungen
aus einer Hand anzubieten, um Informationen zu schützen. Mit Produkten in den Bereichen
SAP-Sicherheit, Datenverschlüsselung, sichere Authentifizierung und Smartcard-/Token-Infrastrukturen
bietet SECUDE dafür inzwischen ein breites Portfolio.

Advisory Note

Trend Report: Identity as a service

Identity Management muss und wird sich von monolithischen, funktional orientierten Produkten in den kommenden Jahren in Richtung zu service-orientierten Ansätzen entwickeln. Dabei gibt es viele Facetten. Diese werden in diesem Report vorgestellt und bewertet. Insbesondere wird dabei auch darauf eingegangen, welche der Ansätze sich bis 2010 etablieren werden.

Product Report

Product Report Imprivata OneSign 3.5

Imprivata OneSign ist eine auf einer Hardware-Appliance basierende Lösung für Enterprise Single Sign-On, die Mechanismen für die starke Authentifizierung und die Konvergenz zu physischen Zugangskontrollsystemen unterstützt. Durch den gewählten Appliance-Ansatz nimmt das Produkt eine Sonderstellung in diesem Marktsegment ein.

Product Report

Product Report Siemens DirX Identity 8 english

Product Report Siemens DirX Identity 8

The report describes and analyzes the Siemens DirX Identity 8 product, an offering in the provisioning market segment.

Vendor Report

Vendor Report Siemens

Vendor Report Siemens

Der Report beschreibt das Produktportfolio von Siemens im Bereich Identity Management und bewertet die Positionierung des Unternehmens in diesem Markt.

Vendor Report

Vendor Report Oracle

Vendor Report: Oracle

Der Report beschreibt und bewertet das Identity Management-Angebot von Oracle und die Positionierung des Anbieters.

Congress

Apr 22 - 25, 2008: European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.

Webcast

Enterprise Identity Management Strategies & Trends

7 Minutes audio enhanced presentation on Enterprise Identity Management Strategies & Trends

Webcast

Enterprise Single Sign-on Strategies & Trends

7 Minutes audio enhanced presentation on E-SSO Strategies & Trends

Webinar

Jul 13, 2007: Identity Management Roadmap 07/08

KCP hat aus den Erfahrungen einer Reihe von IAM-Strategieprojekten, aus den Gesprächen mit vielen weiteren Anwendern und aus den Diskussionen mit Herstellern eine IAM-Roadmap entwickelt, die Entwicklungsrichtlinien und Reifegrade von IAM-Infrastrukturen aufzeigt.

Webinar

Jun 26, 2007: Provisioning 2.0

Externe Workflows, SPML 2.0 oder die verstärkte Integration von Rollenmanagement-Funktionen in Provisioning-Werkzeugen und Federation-Ansätze sind nur einige der Trends, die den Provisioning-Markt prägen.

Webinar

Jul 06, 2007: Update: Die Identity Management Strategie von SAP

SAP hat angekündigt, den norwegischen Identity Management-Spezialisten Maxware zu übernehmen. Welche Konsequenzen hat diese Übernahme für die Identity Management Strategie von SAP?

Product Report

Product Report Völcker Informatik Active Entry 3.1

Die Völcker Informatik AG ist mit ihrem Produkt ActiveEntry 3.1 einer der interessantesten Anbieter im Provisioning-Markt. Darüber hinaus unterstützt das Produkt Rollenmanagement-Funktionen und liefert Auditing-Dienste. Das Konzept von ActiveEntry 3.1 unterscheidet sich stark von den meisten Mitbewerbern, bietet aber in vielen Bereichen Vorteile. Das Produkt zählt aus Sicht von KCP zu den führenden Lösungen im Provisioning-Markt.

Product Report

Product Report Siemens DirX Identity 8

Siemens ist mit der seit 2005 verfügbaren Version DirX Identity 7 einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning geworden, auch wenn die Sichtbarkeit des Produkts am Markt größer hätte sein können. Technologisch war die Version 7 aber definitiv wettbewerbsfähig. Mit der Version 8 rückt das Produkt nun in die enge Spitze des Marktes auf.

Congress

May 07 - 10, 2007: European Identity Conference 2007

Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]