News Archive

Product Report

Product Report: Siemens DirX Access

Siemens managed to enter the web access management and identity federation market successfully by buying in and then significantly developing technology. Siemens DirX Access’ version 8.1 is a technically accomplished solution with a flexible and modular architecture concept. Siemens DirX Access 8.1 covers all standard requirements for solutions in this segment and in addition offers even more features for web services security and application integration options - especially for federation-support. The product is thus one of the leading solutions in the marketplace. A decisive...

Vendor Report

Vendor Report: Siemens

Siemens is one of the largest companies in the world. Siemens IT Solutions and Services (SIS), responsible for IT-products and services, is one of the different segments [Siemens refers to these as “sectors”] of the company group. The established IAM and GRC products from Siemens are also allocated to this segment. Biometric solutions, smartcards, card management and public key infrastructures are part of the product range for IT security, in addition to IAM core solutions. SIS focuses more and more on the integration of horizontal solutions portfolios such ERP, CRM and...

Webinar

Jun 09, 2009: Messbare Vorteile für Sicherheit und Kosten durch Single Sign-On mit starker Authentifizierung

In diesem Webinar wird auf den quantitativen und qualitativen Nutzen von Enterprise Single Sign-On-Projekten in Verbindung mit starker Authentifizierung eingegangen.

Webcast

EIC Impressions

A few short interviews from the European Identity Conference 2009

Webcast

Interview with Marina Walser, Novell

Tim Cole interviews Marina Walser at the European Identity Conference 2009

Webcast

Interview with Kim Cameron, Microsoft

Tim Cole interviews Kim Cameron at the European Identity Conference 2009

Webcast

Interview with Fulup Ar Foll, Sun Microsystems

Tim Cole interviews Fulup Ar Foll at the European Identity Conference 2009

Blog

Trends and Threats in Desktop Virtualization

Desktop virtualization is clearly a hot topic in IT, but a closer look reveals that some elements are still missing and that in many use cases problems would be better addressed using “classic” technologies such as Client Lifecycle Management and terminal services. That certainly doesn’t mean that there is no need for desktop virtualization. There are several interesting use cases for desktop virtualization and the technology will become more important over time. A successful deployment of desktop virtualization, however, requires a well-thought concept and careful planning, and...

Blog

What defines the cloud?

There are plenty of definitions of the "cloud". Most of them include aspects like services which are provided via the internet and which are highly scalable. But the discussion about terms like a "private cloud" proves that this is a somewhat insufficient definition. Depending on the definition of a "private cloud", these services might be delivered via a private network. The insufficiency becomes obvious as well with respect to some of the aspects of the cloud. There are so many different types of cloud services that there are for sure some which, for example, are so specific that they...

Webcast

The Care and Feeding of Online Relationships

Keynote at the European Identity Conference 2009

by Eve Maler, Sun Microsystems

Webcast

Identity Management Systems as a Risk?

Keynote at the European Identity Conference 2009

by Niels von der Hude, Beta Systems Software

Webcast

Identity Management in the Focus of eGovernment and Vertical Solutions

Keynote at the European Identity Conference 2009

by Sabine Erlinghagen, Siemens IT Solutions and Services

Webcast

The Road to Claims: From Vision to Reality

Keynote at the European Identity Conference 2009

by Kim Cameron, Microsoft

Webcast

Is there a difference between the European way of doing IAM/GRC and „the rest of the world“?

Keynote at the European Identity Conference 2009

by Paul Heiden, BHOLD COMPANY BV, Prof. Dr. Audun Josang, Queensland University of Technology, and Oslo University, Darran Rolls, Sailpoint, Chris Harvison, Scotiabank

 

Webcast

Identity Management & GRC 2009 - 2019

Opening keynote at the European Identity Conference 2009

by Martin Kuppinger, Kuppinger Cole + Partner

Webcast

Interview with Berthold Kerl, Deutsche Bank

Tim Cole interviews Berthold Kerl at the European Identity Conference 2009

Webcast

Interview with Prof. Dr. Rob Fijneman, KPMG

Tim Cole interviews Dr. Rob Fijneman at the European Identity Conference 2009

Webcast

Interview with Dr. Prateek Mishra, Oracle

Felix Gaehtgens interviews Dr. Prateek Mishra at the European Identity Conference 2009

Webcast

Interview with Dale Olds, Novell

Felix Gaehtgens interviews Dale Olds at the European Identity Conference 2009

Webcast

Interview with Anthony Nadalin, IBM

Felix Gaehtgens interviews Anthony Nadalin at the European Identity Conference 2009

Webcast

Interview with Fulup Ar Foll, Sun Microsystems

Felix Gaehtgens interviews Fulup Ar Foll at the European Identity Conference 2009

Webcast

Interview with Dr. Babak Sadighi, Axiomatics AB

Felix Gaehtgens interviews Dr. Babak Sadighi at the European Identity Conference 2009

Webcast

Interview with Pat Patterson, Sun microsystems

Felix Gaehtgens interviews Pat Patterson at the European Identity Conference 2009

Webcast

Interview with Eve Maler, Sun Microsystems

Felix Gaehtgens interviews Eve Maler at the European Identity Conference 2009

Blog

My Twitter Top Ten

I know it's funny, but in fact it's me, by far the oldest guy at KCP, who is actually the greatest fan of Twitter. Perhaps if you don't have as much time left to waste as some of my younger colleagues you learn to appreciate abbreviation. Anyway, the European Identity Conference which ended yesterday here in Munich produced a bumper crop of Tweets which I have been browsing through this morning at my leisure (first time in a week I'v had any), and I thought I would share a few with those of you who do not yet fully appreciate just how powerful this new medium actually is. Summing up of a...

Press Release

Analystengruppe Kuppinger Cole vergibt den European Identity Award 2009

Die Analystengruppe Kuppinger Cole hat im Rahmen der European Identity Conference 2009 (EIC), der europäischen Leitveranstaltung für Identity und Access Management (IAM) und GRC (Governance, Risk Management, Compliance) den European Identity Award vergeben. Mit dem Award werden herausragende Projekte sowie Innovationen und Weiterentwicklungen von Standards honoriert.

Press Release

Awards for outstanding Identity management projects

Analyst company Kuppinger Cole confers European Identity Award 2009

On the occasion of the European Identity Conference 2009 (EIC), the leading European event for Identity and Access Management (IAM) and GRC (Governance, Risk Management, and Compliance), the analyst firm Kuppinger Cole conferred the European Identity Award. The award recognizes outstanding projects as well as innovations and additional developments of standards.

Blog

Awards for outstanding Identity management projects

On the occasion of the European Identity Conference 2009 (EIC), the leading European event for Identity and Access Management (IAM) and GRC (Governance, Risk Management, and Compliance), the analyst firm Kuppinger Cole conferred the European Identity Award. The award recognizes outstanding projects as well as innovations and additional developments of standards. There are six categories for the award. In addition to best innovation in the areas of IAM and GRC, and the best new or improved standards, the best projects of the past 12 months for the categories internal projects, B2B, B2C, and...

Vendor Report

Vendor Report: Aveksa

Aveksa's claim is "Enterprise Access Governance". The company is one of several startups which provide a GRC platform to support requirements of what Kuppinger Cole calls IAM-GRC, e.g. the Identity and Access Management related aspects of GRC (Governance, Risk Management, and Compliance). Aveksa was founded in 2006, by an experienced team including several former executives from Netegrity, a market leader in identity and access management software that was acquired by CA in 2004. Aveksa has successfully managed to set up an impressive number of partnerships. From an overall...

Vendor Report

Vendor Report: Beta Systems

Die Beta Systems Software AG ist ein in Berlin ansässiger Anbieter von Standardsoftwareprodukten. Das Unternehmen unterstützt die Bereiche Security (mit Fokus auf Identity und Access Management) und Compliance sowie Dokumentenverarbeitung, die Verarbeitung von großen Datenmengen in Rechenzentren und das Management und die Automatisierung in Rechenzentren. Die Produkte und Lösungen zielen auf die Prozessoptimierung in der IT ab und sind auf eine verbesserte Sicherheit und mehr Agilität in der IT ausgerichtet. Im Mittelpunkt steht heute die Erfüllung von...

Product Report

Product Brief: Microsoft Forefront Identity Manager

On Monday the 23rd of March, Microsoft announced that it would - again - delay the launch of ILM 2, the "Identity Lifecycle Manager". The release was now pushed back one whole year, to give Microsoft more time to "validate ILM in long-running live deployments before release". As can be expected, this announcement has caused a considerable amount of reactions, ranging from delight to frustration. The blogosphere and newswires soaked up the news and were buzzing with comments, and even outright speculation.   Kuppinger Cole has been asked by journalists to provide an opinion as...

Vendor Report

Vendor Report: vps ID Systeme

Die vps ID Systeme GmbH (vps) ist eine 100%ige Tochtergesellschaft der börsennotierten Digital Identi-fication Solutions AG. Letztere ist wiederum aus dem Bereich Identifikations- und Sicherheitssysteme des KODAK-Konzerns entstanden und 2003 als unabhängiges Unternehmen gegründet worden. Die Digital Identification Solutions AG ist seit 2006 börsennotiert. Die vps wiederum wurde 1992 gegründet und hat sich von Beginn an auf Software-Produkte für die Personalisierung und Verwaltung von Sicherheitsausweisen ausgerichtet. Seit 2004 werden web-basierende...

Advisory Note

Market Report: The SAP Identity Management Strategy

About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it was two years ago. The product called SAP NetWeaver Identity Management has gained a lot of attention in the market. By now, SAP can provide numerous customer references. Furthermore, it is especially customers with a large SAP infrastructure as well as mid-sized companies that show an active interest...

Blog

EIC09: ICF-German Chapter Gründung

Dear readers, the following post is provided bi-lingual but does not represent a one-to-one translation. Most information is for German speaking readers, so the English version is comparably short! Still, there is some general info in the English part, so please make sure you read both parts… The ICF German Chapter Inauguration Meeting www.informationcard.de Participants: Corisecio, Fraunhofer FOKUS, Deutsche Telekom, Oracle, Novell, Arcot, Microsoft, Siemens, fun Communications, Hasso-Plattner-Institut, Azigo, KuppingerCole and MANY more! Initiated by Jens Fromm of Fraunhofer FOKUS in...

Press Release

European Identity Conference continues to grow

Around 500 attendees. More than 50 exhibitors.

The 3rd European Identity Conference 2009 (EIC), which has opened its doors today, has already been a resounding success. This year´s conference continues to generate a lot of interest despite the difficult economic climate. With more than 50 exhibitors, the venue has established itself as Europe´s leading event on the topic. All big names in identity management will be represented there, which means that the EIC 2009 will provide the most comprehensive access to European identity management providers in one single venue.

Press Release

European Identity Conference wächst weiter

Rund 500 Teilnehmer. Über 50 Aussteller.

Die morgen in München beginnende 3rd European Identity Conference 2009 (EIC) ist schon jetzt ein voller Erfolg. Die diesjährige Konferenz ist auch im schwierigen Marktumfeld weiter im Aufwind begriffen. Mit nun über 50 Ausstellern hat sie sich als wichtigste Veranstaltung in diesem Bereich in Europa fest etabliert. Dabei sind alle namhaften Anbieter im Identity Management vertreten, so dass die EIC 2009 den umfassendsten Zugang zu Identity Management-Anbietern in Europa innerhalb einer Veranstaltung bietet.

Press Release

Neue Reports zu Zukunftsthemen des Identity Managements

Analystengruppe Kuppinger Cole stellt Reports zu Claims-based Identities und zur starken Authentifizierung beim user-centric Identity Management vor

Das Analystenunternehmen Kuppinger Cole stellt auf der morgen beginnenden European Identity Conference 2009 (EIC) zwei neue Reports vor, die sich mit Zukunftsthemen des Identity und Access Managements befassen.

Press Release

Prof. Dr. Sachar Paulus wird Partner bei Kuppinger Cole

Experte für Sicherheitsmanagement und SAP-Themen verstärkt das Team der Kuppinger Cole-Analysten

Prof. Dr. Sachar Paulus, der frühere Chief Security Officer von SAP, wird neuer Senior Partner der Analystengruppe Kuppinger Cole. Prof. Dr. Paulus hat sich über Jahre hinweg als führender Experte im Bereich der Informationssicherheit etabliert und verfügt durch seine frühere Tätigkeit auch über exzellente Kenntnisse im SAP-Umfeld.

Blog

Where in the Cloud am I?

Recently, at a press briefing by German IBM boss Stefan Jetter who waxed enthusiastic about Cloud Computing, an elderly journalist rose and asked him a show-stopper: “Where are my data when they’re out there in the Cloud?” Jetter did a double take, but my colleague pressed on: “I mean, physically, where are they?” Of course, the answer is: On some nameless server somewhere, anywhere in a grid farm in Ohio or Dublin or… In fact, the usual answer is : Who cares? Well, for one the German privacy protection agencies. Passing data across national boundaries can be a federal offense not only...

Advisory Note

Trend Report: SSO 2009

Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten. Innerhalb der Vielzahl von unterschiedlichen technischen Ansätzen für das Single Sign-On sehen wir Identity Federation und, in Ergänzung für spezielle Einsatzfelder, die Technologien des user-centric Identity Managements als die strategischen Lösungsansätze, weil...

Advisory Note

Trend Report: The impact of claims-based approaches

The term of “claims-based identity” and the idea overall of using the term “claim” in Identity and Access Management (IAM) has been introduced by Microsoft some two years ago but the concepts can be used in any environments and technologies can (and sometimes are) provided by other vendors as well. A claim is a piece of information about a user provided by an identity provider which can be challenged by the relying party which receives that claim. Claims can represent pretty much anything about a user. The name, the age, the role within in a corporation, the...

Advisory Note

Technology Report: Strong authentication for user-centric Identity Management

Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite the fact, that there are several open questions regarding business models for identity providers and the, until now, slow adoption of user-centric technologies beyond the experts and geeks, we expect a bright future for strong authentication as well as for user-centric identity management. User-centric...

Advisory Note

Market Report: Die Identity Management-Strategie von SAP

Seit der Übernahme des norwegischen Herstellers MaXware durch SAP sind inzwischen rund zwei Jahre vergangen. Seit diesem Zeitpunkt hat sich SAP IM im Identity Management-Markt positioniert. Die von MaXware übernommenen Produkte wurden in dieser Zeit signifikant wei-terentwickelt. Auch in der Strategie gibt es inzwischen deutlich mehr Klarheit als noch vor zwei Jahren. Das als SAP NetWeaver Identity Management bezeichnete Produkt hat erhebliche Aufmerk-samkeit im Markt geweckt. SAP kann inzwischen etliche Referenzkunden vorweisen. Zudem gibt es gerade bei Kunden mit einer...

Advisory Note

Market Report: Oracle buys Sun – the Impact on IAM and GRC strategies and tactics

The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that point of time, both vendors will have to act separately and are not allowed to publish a combined roadmap. Kuppinger Cole has, as part of its research programme, extensively researched both companies’ offerings and strategies. Until the proposed merger is cleared, and both companies provide a road...

Advisory Note

Market Report: GRC 2009

GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. Kuppinger Cole observes an trend towards tools which integrate analysis, attestation, authorization management, risk management, Segregation of Duties controls, and role management functionalities to provide an overall GRC solution with focus on access controls and authorization which can be applied to all applications and all compliance regulations which are relevant to any organization in a first step. Beyond that we expect to see more complete GRC solutions which cover other...

Product Report

Product Report: Omada Identity Manager

Der dänische Hersteller Omada hat sich in den vergangenen Jahren als wichtigster Technologiepartner von Microsoft im Umfeld von MIIS und Forefront Identity Manager positionieren können. Gemeinsam mit Microsoft wurden eine Reihe von großen Projekten gewonnen und zusammen mit unterschiedlichen Integrationspartnern umgesetzt. Omada erweitert dabei die derzeit primär auf die technische Synchronisation von Identitätsinformationen ausgelegte Microsoft-Technologie um weitergehende Funktionen für das Rollenmanagement und Workflows, um Self-Service-Schnittstellen,...

Product Report

Product Report: Quest ActiveRoles Server

Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für die rollenbasierte Verwaltung von Active Directory-Umgebungen, das inzwischen auch eine zunehmende Zahl von anderen Systemumgebungen unterstützt. Entsprechend liegen die spezifischen Stärken des Produkts auch beim Management von Active Directory-Umgebungen, wo es in der Funktionalität signifikant über typische Provisioning-Produkte hinausgeht. Auf der anderen Seite hat Quest die...

Vendor Report

Vendor Report: Siemens

Siemens ist eines der größten Unternehmen weltweit. Innerhalb des in verschiedene Segmente [Siemens spricht hier von Sektoren] gegliederten Konzerns gibt es auch den Bereich Siemens IT Solutions and Services (SIS), der für IT-Produkte und –Dienstleistungen zuständig ist. Diesem Bereich sind auch die etablierten IAM- und GRC-Produkte von Siemens zugeordnet. Zu den Produktangeboten für IT-Sicherheit gehören neben IAM-Kernlösungen auch biometrische Lösungen,Smartcards, Kartenmanagement und Public Key Infrastructures. Über die reinen Produkte...

Vendor Report

Vendor Report: TESIS SYSware

Die TESIS SYSware ist ein in München beheimatetes Unternehmen in Privatbesitz, das Teil der TESISGruppe ist. Diese Unternehmensgruppe besteht aus drei Teilunternehmen, die sich mit unterschiedlichen IT-Themenfeldern beschäftigen. Die TESIS SYSware (im Folgenden kurz als TESIS bezeichnet) hat ihren Schwerpunkt in den Bereichen IT-Security und Identity Management und ist ein Anbieter von standardisierten Softwareprodukten in diesem Bereich. Das Unternehmen ist dabei primär auf Lösungen für das Kennwortmanagement, das Privileged Account Management und das...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]