News Archive

Webinar

Dec 13, 2010: Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.

Webinar

Nov 19, 2010: Integrating Enterprise GRC and IT-GRC Programs on a Single Framework

This webinar will highlight how organizations can manage risk better across their IT and business processes, thus enabling them to determine potential impact considering both IT and business controls.

Blog

Cloud Computing is mainly Service Management

When looking at all the discussions around the "cloud" I still miss some focus on the real essentials of a strategic (!) approach for using clouds. Clouds are, when looking at the right now common understanding of private, hybrid, and public clouds, in fact nothing else than IT environments which produce IT services. These services are provided at many different layers, like in the common (and pretty coarse grain) segmentation into SaaS, PaaS, and IaaS. But: It is about the (efficient, scalable,...) production of standardized, reusable services. Cloud Computing is about using these...

Webcast

Policy Based Access Control with XACML 3.0

Kuppinger Cole Webinar recording

Blog

IT-SA conference takeaways

A long time ago my last post... Anyway, lots of first-year students and research grant applications kept me busy. The IT-SA is now THE event for IT-security in Germany. It has not the flavour of the RSA conference, altough it may actually be of a similar size, at least in the exhibition area. It is much more about small conferences around the exhibition floor, organized / owned by different people and groups, such as e.g. the AppSec conference in Germany or the KuppingerCole Enterprise Cloud Security summit. Consequently, and this is especially true for folks from abroad, don't expect a...

Blog

Convergence re-iterated

The press release of HID acquring ActiveIdentity almost slipped my sensor network, despite the fact that I had the honour of having some close contact to top-level HID guys this week. I am totally positive about this acquisition, as HID now is able to get their hands on some really good Versatile Authentication Server (VAS) with AI's 4Tress product. This is what they need to really set a mark in the authentication industry, because their NaviGO tool was a good starting point but it really lacks the quality and integration some of the other tools feature. HID is brand new to "software", but...

Webinar

Nov 11, 2010: XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard...

Webinar

Nov 18, 2010: Authentifizierung in der Cloud - richtig gemacht

Wenn sich interne und externe Benutzer an Diensten anmelden müssen, die mal in der privaten und mal in der öffentlichen (public) Cloud laufen, wird es auf den ersten Blick viel komplexer, eine verlässliche Authentifizierung durchzuführen. Doch ist das wirklich so? Oder bieten nicht die heute etablierten Technologien wie Identity Federation oder Enterprise Single Sign-On in Verbindung mit neuen Ansätzen wie der kontextbasierenden, flexiblen Authentifizierung nicht Optionen, eine stringente Authentifizierungsstrategie umzusetzen? Martin Kuppinger und Sebastian Rohr von KuppingerCole werden...

Webinar

Nov 18, 2010: Identitäts- und Datenschutz im Cloud Computing

Unternehmensweit gelten dieselben Sicherheitsrichtlinien, egal von wo aus die Anwender arbeiten und wo die von ihnen genutzten Dienste zur Verfügung gestellt werden. Nahtlose Integration von Cloud Services in das Sicherheitskonzept Ihres Unternehmens und eine Identität für alles, deren Sicherheit dem jeweiligen Kontext angepasst ist. So oder so ähnlich lässt sich eine funktionierende Basis für ein sicheres Cloud Computing mit wenigen Worten beschreiben. In diesem Webinar beschreibt Sebastian Rohr, Senior Analyst bei Kuppinger Cole, wie Sie Ihre bestehende Infrastruktur Schritt für Schritt...

Webinar

Nov 18, 2010: Governance, Risk Management & Compliance in der Cloud

Zwischenzeitlich haben sich sehr viele Unternehmen dafür entschieden, Dienste aus der Cloud zu nutzen. Teilweise auch schon seit Jahren, bevor der Begriff des Cloud Computing überhaupt entstanden war. Wenn es aber um die Verteilung unternehmenskritischer Informationen geht, dann ist die Zurückhaltung sehr viel größer und der Zielkonflikt zwischen einer "Hochverfügbarkeit" von Informationen und deren Sicherheit wird mit dem fortschreitenden Siegeszug des Cloud Computing immer stärker. Für interne Systeme ist ein funktionierender GRC-Ansatz die Regel. Wie aber sieht es in der Cloud aus? In...

Webinar

Nov 18, 2010: Cloud Computing in der praktischen Umsetzung - Ein Leitfaden

So stark die Resonanz zum Thema Cloud Computing auch sein mag - so klafft doch häufig noch eine starke Lücke zwischen dem Anspruch, die interne IT durch Zugabe von Cloud Services flexibler und kostengünstiger zu gestalten, und der praktischen Umsetzung. Dafür gibt es mehrere Gründe. Einerseits fehlt der Konsens über vertrauensbildende Richtlinien, die das Geschäft zwischen Cloud-Anbietern und den "Konsumenten" von Cloud Services regeln. Andererseits herrscht verbreitet Unsicherheit darüber, wie sich das Cloud Computing auf bestehende Risiken auswirkt und welche neuen Risiken man sich mit...

Webcast

Identity Federation: Essential Building Block for a Winning Cloud Strategy in your SAP Environment

Kuppinger Cole Webinar recording

Webcast

Zurück zur Kernkompetenz: Cloud Computing als Strategie

Kuppinger Cole Webinar recording

Webinar

Nov 16, 2010: One Authentication Strategy for All – from Internals to the Customer

Martin Kuppinger of KuppingerCole will discuss the trends around authentication strategies, the breadth of options available today, and the future evolution towards a centralized layer for context-based authentication and authorization - for all types of users and for all types of services and use cases. Dirk Losse of ActivIdentity will then describe some Best Practices and talk about his experiences with authentication projects.

Blog

Soft biometrics for stronger authentication

I'm somewhat reluctant regarding biometrics. There are some good reasons that biometrics still are a niche approach: The need for specialized hardware, the aversion of users against some biometric approaches like fingerprints, the discussion about potential security weaknesses for example around fingerprints, the intrusiveness to the user experience, and more... However, there is one approach I find interesting: Keystroke Biometrics. The German vendor Psylock provides several solutions based on what they call keystroke biometrics. The user has to train the system a little. I had to enter...

Webinar

Oct 28, 2010: Zugriffe im Griff: Von der Übersicht zur Risikominimierung

Martin Kuppinger von KuppingerCole geht in diesem Webinar auf die Trends im Bereich der Access Governance und die Rolle, die Access Governance in GRC-Strategien spielen kann und muss ein. Er definiert Anforderungen an Access Governance-Lösungen und liefert eine Checkliste für die Auswahl solcher Lösungen. Klaus Hild von Novell spricht anschließend über Best Practices für die schrittweise Entwicklung und Umsetzung von Access Governance-Lösungen.

Webinar

Oct 25, 2010: How to Deploy Identity Management When You're Not a Top Fortune 500 Company

Medium-to-large enterprises face specific challenges in implementing identity management. Quite often, solutions are tailored for very large companies, making deployments an uneasy fit. In this Webinar, Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can accumulate quick wins and reach identity workflow and compliance safely. Followed by Martin, Stéphane Vinsot from Evidian will lead you through some Best Practices and will talk about Evidian´s experiences with identity management deployments in medium-to-large enterprises.

Webcast

Privileged User Management: Wer kontrolliert die Admins?

Kuppinger Cole Webinar recording

Product Report

Product Report: Novell Identity Manager 4

Novell Identity Manager 4 is a family of products in the category of enterprise provisioning, allowing synchronizing and managing identities and entitlements, including strong policy and reporting features. Beyond the basic capabilities, Novell has added advanced role management and policy management features as well as new reporting capabilities and support for cloud applications. That reflects the overall trend in the market from technical provisioning tools towards more complete platforms with support for a multitude of target systems as well as integrated Access Governance...

Blog

Oracle acquires Passlogix

Oracle has announced that they are acquiring Passlogix. That is no real surprise to me. Oracle has been the last large OEM partner of Passlogix for their E-SSO (Enterprise Single Sign-On) solution. Others like IBM had decided for own solutions in the past. Passlogix had some success in direct sales, but being a niche vendor they probably had to decide between an exit strategy or significant investments to expand their own portfolio. From an Oracle perspective, the acquisition definitely makes sense. Oracle mentions "tighter integration" as the opportunity behind that deal. And that exactly...

Blog

Red Hat and the Cloud

These days I've talked with Red Hat about their Cloud strategy. It was an interesting and, in some areas, somewhat surprising conversation. It is not that surprising that Red Hat doesn't focus on becoming an IaaS (Infrastructure as a Service) provider themselves, e.g. directly competing with Amazon EC2, Microsoft Azure and other environments isn't on their agenda at that point of time. Red Hat focuses on providing the technology some of these provides (not Microsoft, for sure) require - but not mainly the very big ones, but all the others like Telcos, large MSPs (Managed Service Providers),...

Press Release

KuppingerCole to open US office

Expansion part of global strategy – expanded service offering in identity and security Duesseldorf, October 05th 2010 – In order to better serve its clients in North America, KuppingerCole, the globally recognized European analyst group in Identity Management and Information Security for traditional, cloud and hybrid infrastructures, has announced the opening of a U.S. branch. Tim Cole, co-founder and Distinguished Fellow at KuppingerCole, will coordinate all activities from the group’s new office in Boston.

Webcast

Best Practices for Enterprise Log Management

Kuppinger Cole Webinar recording

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]