News Archive

Blog

The risk of costs

There is a constant pressure not only on IT but all areas of organizations to reduce costs. However, that frequently ends up with higher risks and potentially higher costs due to these risks. The problem is: Most organizations, especially in controlling and management, think much more about cost than risk. But cost savings (which are not necessarily negative) without a risk view are a risk - somewhat of a tautology, I know... That is why Risk Management should be a standard and central element in management, as well for business as IT. First of all: From an enterpreneurial perspective,...

Blog

Risk and Services take center stage among IT managers

Simplicity – not to be confused with oversimplification – is the key to successful management. By focusing on the critical issues of risk and services, companies can be sure they have to two most important topics covered. The concept of IT as a service has been around for quite awhile, but risk isn't really on the radar screen yet in most IT departments. This is unfortunate, since risk management can be a powerful tool for decision makers within IT as well as in top management. Life is full of risks, naturally, and in IT particularly; security risks, risk of not reaching stated project...

Blog

The unsocial side of bad software architecture

Last week, there was the news that the Federal Employment Office of Germany will claim for the return of excessive payments from potentially more than a million so called "Hartz 4" recipients. What appears to be of political and social relevance, is as well interesting for IT - because it's about the negative impact of archaic software architecture. Let's start with the background. Hartz 4 stands for as well social welfare aid as unemployment aid, named after Peter Hartz, a former Volkswagen member of the board and advisor to the German government about how to change and optimize these...

Webcast

How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need

Kuppinger Cole Webinar recortding

Webinar

Feb 10, 2010: Expanding the Reach - Identity as a Key Enabler of Customer Satisfaction through Context-aware Personalization

Once having an identity management infrastructure in place, maximising this significant investment through expanding the infrastructure´s reach would be a good idea. In this webinar, we look into the possibilities on how to integrate the customer into your identity management strategy.

Webinar

Feb 10, 2010: From E-SSO to a Holistic Authentication- and Authorization Strategy

Expert panel showcasing best practices migrating to a holistic auth(z) and auth(n) strategy.

Webinar

Feb 10, 2010: Access Management Tools - can they Integrate with what you have in a Lean Way?

Controlling access to information and to target applications, is the key element of a security policy. Access management includes multiple elements, such as access control, access delegation, access policy definition and access reporting. In this virtual panel, we will look into how access management tools can integrate into your infrastructure in a lean and flexible way.

Webinar

Feb 09, 2010: Versatile Authentication - One Layer of (Strong) Authentication

Versatile authentication flexibly integrates a variety of open and proprietary authentication methods into one security layer, and strongly simplifies the implementation of multiple authentication methods in complex environments. In this panel, Dave Kearns will discuss with several authentication vendors about current trends in versatile authentication.

Webinar

Feb 09, 2010: 5 Quick Win Approaches to Achieve the Next Level of your IAM Infrastructure

IT organisations are facing an increasing pressure to reduce costs, while at the same time compliance requirements increase and management is asking for more flexible solutions to faster react on new business requirements. In this Webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole, will describe 5 quick win approaches how to get your IAM infrastucture to the next level.

Webcast

Harnessing Sun's OpenSSO Authentication and Authorization Mechanisms

Kuppinger Cole Webinar recording

Blog

Virtual (Desktop) Identities

I recently took the chance to investigate the virtualization market a bit deeper, namely the market for Virtual Desktops as I have been used to server virtualization and the different flavors thereof for some time. While server virtualization was pretty much straight forward with regard to approach and deployment and those systems – once deployed – had little to no influence on how one runs his environment from a management perspective, Desktop Virtualization does seem to put some new obstacles in the way when it comes to identities, access to resources and management thereof. While most...

Webinar

Feb 09, 2010: Provisioning and Access Governance Trends

Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of identity information have to be used in an increasing number of new processes and applications, with some of them running in the cloud. How to move on from centralized provisioning and access management infrastructures to a new, more decentralized way of doing identity management?

Blog

RSA goes GRC

For some of you, the acquisition of Burton by Gartner might have been the deal of the year. I (for sure, acting in the same market) will not comment on this. But for me, it hasn't been the deal of the year even in these first two weeks. Much more important is the acquisition of Archer by RSA. RSA Security, a EMC subsidiary for several years now, has bought one of the leading GRC vendors. In fact it was EMC which acquired Archer but within EMC it has been RSA Security. Archer is one of the major players in the Enterprise GRC market - I recently discussed the various segments of the GRC...

Webinar

Jan 21, 2010: How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need

Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?

Webinar

Jan 14, 2010: Harnessing Sun’s OpenSSO Authentication and Authorization Mechanisms

It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. As part of a whole series of webinars focusing on practical issues and implementation details, this webinar will deeply dive into the implementation of Sun Microsystems...

Blog

New Webinar series on Claims

It's been a few years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". If you've been following Kuppinger Cole you know how positive we have been about this framework. Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. From our customers we often hear questions regarding the feasibility,...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]