News Archive

Blog

BMC drops traditional identity management, focuses on Business Service Automation

I was at the BMC User World conference in Lisbon last Tuesday, trying to figure ot where BMC is going, specifically in the field of identity management. After all, BMC's presence in that segment has been surprisingly low-key since several months. Last year, BMC was to be found at every major identity-related conference. Jeff Bohren, BMC's identity guru was very active in the standardisation efforts around provisioning services and in the identity blogger's community, and BMC was marked as one of the larger players in the identity space. Ever since, Jeff Bohren has left BMC to join Sunview...

Blog

Mike Small's Keynote at EIC 2008

If you put together 40 years of experience in computer industry, an extra portion of extra-dry British humor and excellent thought leadership, you'll get the right mix to really understand, wether Security, Privacy and Trust are a mission impossible. Thank you Mike Small (CA) for this great keynote.

Blog

Marne Gordan's Keynote at EIC 2008

Marne's brilliant keynote on the 32 Billion $ (2008) GRC Market. Talking about some famous examples in finance and health industries, she reminds us, that it is all about human behavior, when it gets down to the question, why GRC is so important.

Blog

SaaS - unmanageable, but (still) successful

SaaS is becoming more and more popular, especially in the US. In Europe the growth is much slower, but that is no surprise – Europe is usually some 12 to 36 months behind the US in adopting new technologies. But there is one thing to be considered regarding SaaS – most of the SaaS offerings are more or less unmanageable. The interfaces for identity management, event management and logging and other necessary functionalities are missing. Defined APIs for controlling and integrating the SaaS applications into the existing own IT infrastructure are missing in most cases – or they are so weak...

Blog

SAPPHIRE Berlin Day 2

Have you ever been to SAPPHIRE? No? You should! Despite my young age, I guess here is where you find how the spirit of the IT industry might have been in "those days", where multi-million dollar Mainframe deals were made. At least, that is the impression you get when you stroll around. I have been to quite some trade fairs, special meetings and vendor events - all with a rather impressive set of "supporting events" and executive receptions. But recent years have shown a decrease in the investments vendors were willing to spend on these little extras. Looks like SAP still has got some...

Blog

HP passes the buck to Novell

Hewlett-Packard, who recently announced that it would all but retreat from the identity management sector as an independent vendor, has just announced a partnership with Novell. That will settle the many speculations in the industry. As HP had made a significant investment into identity management products, someone would surely be picking up the pieces. And the winner is: Novell! From the announcement that was made to the analyst community and the subsequent press release, it is pretty clear that HP is looking for an elegant way to divest itself from its product line. Of course, HP cannot...

Congress

May 05 - 08, 2009: European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Blog

Why Information Rights Management is mandatory...

Information Rights Management (IRM) is one of these technologies which isn’t really successful until now, even while it is discussed and available for a pretty long time. IRM is about protecting the information directly, through signatures, encryption and a direct assignment of rights. These rights describe who is allowed to do what with that piece of information. There are some reasons why IRM isn’t adopted widespread today. One is the complexity of the concepts. Without understanding PKIs and Public Key encryption it is impossible to really understand IRM. Another reason are the somewhat...

Blog

Hitachi-ID: Good strategy, great new opportunities, but no shopping spree!

I've recently briefed by Hitachi-ID (ex M-Tech) about what's going on now that they are operating under a new banner. On the line were the Shohams (Gideon and Idan) as well as the new Chief Strategy Officer Masata Saito. We started going over the acquisition again - no surprise there as it's been all over the news: M-Tech has been acquired by Hitachi, and is now run as a separate business unit called Hitachi-ID, the Shohans will continue to lead the company, and the entire ex M-Tech organisation and product line will remain with Hitachi-ID - no splits-ups, re-orgs or technological fusions...

Blog

Siemens DirX - back in the IAM market...

Some time ago, as a result of some of the fundamental reorganizations Siemens had to do within the last two years ago, the department responsible for the DirX solutions has been moved into the healthcare unit of Siemens. That was a somewhat unusual place for an identity management product unit. Now, Siemens is reorganizing again. Besides three core areas (Industry, Healthcare, Energy) there will be several cross-sector activities. One of these is Siemens IT Solutions and Services. Within the Siemens IT Solutions and Services (SIS) there will be a unit “Identity Management and Biometrics”...

Blog

Federation and auto-provisioning

Ping Identity recently announced the availability of Version 5.1 of Ping Federate in their blog. What caught my attention was that Ping has now also finally added a feature I (and others) call "auto-provisioning" or "federated provisioning". In federated environments, when users from other entities visit your site and gain access to services, it is often necessary to store some local data about these users on your system. In very simple cases, this could be user profile data, such as the colour of the background, but there could be much more information that would need to be stored. So...

Product Report

Product Report - Omada Identity Manager

Over the past 2 years the Danish software company Omada has reached the position as Microsoft's most important technology partner in the field of MIIS and ILM. In cooperation with Microsoft the vendor was able to win several major clients.

Blog

Omada Identity Manager 6.1

Over the past 2 years the Danish software company Omada has reached the position as Microsoft's most important technology partner in the field of MIIS and ILM. In cooperation with Microsoft the vendor was able to win several major clients. Omada has been extending the Microsoft technology that currently and primarily is focused on the technical synchronisation of identity information by further reaching functions for role-based access control and workflows, self-service interfaces and increasingly also by extended GRC functions for compliance monitoring, attestation and other tasks.

Blog

The quest for the grail: Identity Providers in the cloud

These days I have had a briefing with John De Santis, Chairman and CEO of TriCipher, about the new myOneLogin service. This service provides strong authentication and Single Sign-On for SaaS applications, supporting many SaaS apps as well as features like SAML-based federation to the few SaaS providers which are already at that level. One of the things John mentioned was that Salesforce.com has allowed Google to be the authoritative source of identity assertion. In that relationship, Google is acting as identity provider. Besides the question whether Google is the best choice to trust on...

Blog

Identity Bus round-table video online!

As I already wrote in my last blog, one of my personal highlights at the European Identity Conference was the discussion that I had with Dale Olds, Jackson Shaw, Kim Cameron and Dave Kearns on the concept of the "Identity Bus" of the future. It's now online! So here you go, enjoy ;-) We're obviously just at the very beginning, but hopefully we've kicked off a good discussion to be continued via our blogs, papers, etc! I think it is very important that we do this and solve many issues around identity. A new type of identity plumbing, indeed. Let's keep up the momentum that's been building...

Blog

Building an Identity Bus

One of the most amazing panel discussions at EIC 2008 actually took place in the exhibition area and was filmed. Watch Kim Cameron, Felix Gaehtgens, Dave Kearns, Dale Olds and Jackson Shaw discussing the Internet Identity Bus. One of the most amazing panel discussions at EIC 2008 actually took place in the exhibition area and was filmed. Watch Kim Cameron, Felix Gaehtgens, Dave Kearns, Dale Olds and Jackson Shaw discussing the Internet Identity Bus.

Webcast

Round table discussion of the “identity bus” concept

Round Table with Felix Gaehtgens, Dale Olds, Jackson Shaw, Kim Cameron, and Dave Kearns at the 2nd European Identity Conference

Webcast

Interview with Siegfried Schallenmueller, Siemens

Felix Gaehtgens interviews Siegfried Schallenmueller, Siemens at the 2nd European Identity Conference

Webcast

Interview with Volker Smid, Novell

Felix Gaehtgens interviews Volker Smid, Novell at the 2nd European Identity Conference

Webcast

Interview with Dave Kearns

Martin Kuppinger interviews Dave Kearns at the 2nd European Identity Conference

Webcast

Interview with Amit Jasuja, Oracle

Felix Gaehtgens interviews Amit Jasuja, Oracle at the 2nd European Identity Conference

Webcast

Interview with Paul Heiden, BHOLD

Felix Gaehtgens interviews Paul Heiden, BHOLD at the 2nd European Identity Conference

Webcast

Interview with Keith Grayson, SAP

Felix Gaehtgens interviews Keith Grayson, SAP during the 2nd European Identity Conference

Webcast

Interview with Ariel Gordon, Orange/France Telecom

Felix Gaehtgens interviews Ariel Gordon, Orange/France Telecom during the 2nd European Identity Conference

Webcast

Interview with John Aisien, Oracle

Martin Kuppinger interviews John Aisien, Oracle during the 2nd European Identity Conference

Blog

Survived EIC 2008!

The European Identity Conference 2008 closed its doors last Friday, and for me it has been a fantastic event in all aspects. Obviously you should take my comments with a grain of salt as I am working for Kuppinger Cole and am therefore part of the organising team. However, I have never before attended a conference that combined such a breadth of topics, number and quality of speakers and depth. Many conferences are either at the "C*O level" or pure "geek conferences". At the former, the geeks still intermingle since they are brought to the event to do exactly that, or to showcase their...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]