News Archive

Webcast

Auswahlkriterien für Provisioning-Produkte

7 Minutes audio enhanced presentation

Webcast

IAM und SOA

8 Minutes audio enhanced presentation

Blog

The physical, the digital and the real world

During my recent analyst calls and briefings I came across a bunch of companies and products that all start to tackle an area I have been interested in for quite a while: getting the "holistic security" approach well beyond the borders of our mindset - beyond the digital realm! Being a CISSP and full of interest for social engineering as well, "security" has always been a wider topic to my understanding. And it looks like the industry is catching up... First of all, there are those companies that try to bridge the management gap between native systems of both worlds, such as IDpendant....

Blog

User Centric IAM - all a lie?

I talked to my Sensei-san, Dr. Kpatcha Bayarou of Fraunhofer SIT, recently and allthough only having a few minutes, we came to some extreme views on what User Centric IAM really was about. Power! The power to control who gets access to what of my content and information! You are reading this text without disclosing anything about yourself, which is due to  my totally hedonistic way of "sharing the knowledge" ;-) . Ok, one might say it is to lure some of you into registering for this site, for our newsletters and even some of the reports. That is, to get YOUR IDENTITY and YOUR MONEY ;-)...

Blog

A German's Hard Disk Is His Castle

Germans became the best-protected users of computers and the Internet today when the Federal Constitutional Court set out strict rules for government agencies anxious to spy on their hard disks. The decision was widely viewed as a slap in the face for Wolfgang Schaeuble, the hard-liner Interior Minster who has been proposing that law enforcement agencies be given broad powers to monitor the computers and e-mails of suspects on their own authority. No, the court said, you have to ask a judge first. And if during the course of an authorized surveillance the police also happen to stumble...

Blog

Still unsolved: The relationship between IAM, SOA, and BSM

In a, may be, simplistic view on IT there are three important pillars on the IT infrastructure level. Using the - sometimes improper - buzzwords, these are Identity (and Access) Management (IAM) SOA - in fact more the technologies for business processes and flexible applications, e.g. including BPM (Business Process Management) BSM (Business Service Management), or ITSM (IT Service Management), or BTO (Business Technology Optimization), or however you will name what has been systems management and now, with a new layer on top, is something "entirely new". I would say it claims to be...

Blog

IT costs - who has to know them, who wants to know them?

In the past I have several times published thoughts on the ERP for IT, and IT cost management (here and here...). Today I had a very interesting discussion with Econet, a german vendor which adresses IAM more from the process perspective and the ITSM (IT Service Management) area. During this discussion we came across the need for IT cost management and accounting - and to an interesting conclusion: There is one group which isn't really interested in the real IT costs: The customer of IT. The customer is interested in a fair, reliable, stable assignment of IT costs he can budget. But he...

Blog

Data basis – essential fundament of Identity Management

As the 2007 version, the KPC Identity Management Roadmap 2008 provides a multi-level structure for the development of Identity Management – starting from the basic aspects that rather address an administrative view, via a growing service orientation reaching up to a business perspective and business control which typically allows the information owner to define the way in which “his” identity data will be handled, instead of being occupied with technical ACLs. Apart from our vision of the future development of Identity Management and its growing focus on business integration and bundling of...

Blog

Dot Net Factory EmpowerID Suite Version 4

The Dot Net Factory, a provider of Windows Identity Management modules, is launching Version 4 of the EmpowerID Suite, a comprehensive Windows-based Identity Management suite. Users of previous versions of EmpowerID have the right to receive the new version based on the Windows Workflow Foundation. It harnesses the new Windows Workflow Foundation (WF) framework. The Dot Net Factory is one of the first companies to fully employ this framework, and has chosen it to drive the workflow for identity management. Previous users of EmpowerID can choose to continue using Dot Net Factory’s custom...

Blog

Why Liberty's Identity Governance Framework is so important

Over the last few weeks, the Liberty Alliance's IGF caught my attention several times. Fulup Ar Foll and Jason Baragry, both working for Sun Microsystems wrote a paper called "Next Generation of Digital Identity". About a month ago, HP's Marco Casassa Mont and Oracle's Phil Hunt published an article in "Sarbanes-Oxley Compliance Journal" entitled "Identity Governance Framework". I've been wanting to blog about this for several weeks, but kept putting it off. Last week I had the fortune to be briefed by Prateek Mishra, Oracle's Director of Security Standards, who explained in detail what the...

Blog

HP - will they ever understand Software Business?

HP choose to not sell it's Identity Management products any more. A surprise, for sure - at least at first look. On the other hand: HP had in 2006 revenues of 91,6 billion US$ - but only 1,3 bill US$ in software revenue. And that was a major increase, compared to 2005. With other words: HP is even today anything but a software company. Unlike Microsoft, CA, Oracle, it is first of all a box shipper, a hardware company. Even Services had only 17% of revenue in 2006 - compare it to IBM, and it is obvious that anything besides computers, printers, cameras is a pretty small part of their...

Blog

OpenID - finally set?

With the recent announcements of Yahoo to fully and Google to partially support OpenID and the now official engagement of IBM, Microsoft, Verisign, and other key players of the market in the OpenID Foundation it seems obvious that OpenID is now THE standard for user centric identity management. I agree - partially. OpenID is A standard for user centric identity management which definitely will, with some advancements, will influence the way people act in the internet. But I'm, for example, convinced that it won't replace Microsoft's Infocards (as the technical basis). These two things are...

Blog

Context-based Authentication

In the past few years, the approach of risk-based authentication has gained in importance, particularly in banking. The goal is to anticipate possible attacks on the basis of information gained from Fraud Detection solutions used for authentication, and – in these cases – to refrain from authentication. Another trend focuses on the convergence of physical and logical access control systems, as realized by Imprivata as part of its Single Sign-On solution. Here, too, the user context is the decisive factor, in this case the user location.Expanding on the topic, we should see user identity...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]