News Archive

Survey

Virtualization Security Survey: Security – an essential prerequisite for successful virtualization

During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Organizations transitioning to a virtualized or cloud IT model need to invest in a security strategy, in organization and skills, and in technology. Vendors need to provide better integration between security and service management plus security tools to better support heterogeneous virtualized and physical environment.   Highlights of the results are:...

Vendor Report

Vendor Report: CA Technologies Virtualization Security

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security has to be well planned and requires a set of well-integrated products to provide the right balance between security and risk mitigation on one hand, and costs and complexity on the other. CA...

Webcast

Virtualization Security Trends & Insights: Results from KuppingerCole's Recent Survey

Kuppinger Cole Webinar recording

Webcast

Kontextbasierte Authentifizierung im Active Directory Umfeld

Kuppinger Cole Webinar recording

Blog

What I would expect from capacity MANAGEMENT

These days I talked with one vendor about his news around capacity management. Capacity management is used as a term to describe products which are used for optimizing workloads in data centers and to make the best use of the resources within these data centers. Honestly, I didn't do a deep dive into that specific area before, and maybe I'm a green on advanced IT topics - but when vendors are promising capacity management, I'd expect that to be somewhat active. However, I've learned that it's about reporting and analytics - even in association with terms like dynamic, continuous, proactive...

Webcast

How to Let Your Access Management Scale - and Save Costs

Kuppinger Cole Webinar recording

Blog

Finally: Novell is sold

I'm following Novell for more than 20 years right now. And for roughly the same period of time there have been rumours of other companies acquiring Novell. But it never happened. Not really, at least. You could argue that the acquisition of Cambridge Technology Partners was sort of a takeover of Novell by Cambridge, with Jack Messman becoming CEO and so on. But at the end, Novell was at its own again. But yesterday the news spread that Attachmate is buying Novell - finally they are sold. Attachmate will keep Novell as separate business unit and maintain the brands of Novell and Suse. With...

Webcast

Integrating Enterprise GRC and IT-GRC Programs on a Single Framework

Kuppinger Cole Webinar recording

Webcast

Authentifizierung in der Cloud - richtig gemacht

Kuppinger Cole Webinar recording

Webcast

Identitäts- und Datenschutz im Cloud Computing

Kuppinger Cole Webinar recording

Webcast

Governance, Risk Management & Compliance in der Cloud

Kuppinger Cole Webinar recording

Webcast

Cloud Computing in der praktischen Umsetzung

Kuppinger Cole Webinar recording

Webcast

One Authentication Strategy for All - from Internals to the Customer

Kuppinger Cole Webinar recording

Blog

Secure Pipes or the new Role of Telcos

This week, I had a very interesting discussion with Werner Thalmeier, CTO of M86 Security, about the protection of systems and information. He used the analogy of the "secure pipe" to explain the approach they are following - today, our drinking water is clean, we can use it directly out of the pipe. In former days, it wasn't. It had to be cooked, filtered, and so on. The approach of M86 Security is basically the same - keep the pipe clean so that you don't have to care about what comes out. We ended up in a discussion of new challenges in that area, especially the "apps" for the so called...

Webinar

Dec 16, 2010: Using Standards to manage access to SOA and Cloud Services

In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the...

Blog

You can’t have one without the other(s)

Remember the old New Yorker cartoon about the canine computer user telling his sidekick: „On the Internet nobody know’s you’re a dog“? That was back in 1993, but it still holds true. And while many, myself included, relish the anonymity the Net gives us, the inability to prove conclusively who is on the other end of the line can be irking, and even downright dangerous, when large sums of money or the running of critical or possibly even existential systems is concerned. Of course, the username/password currently used by almost everybody doesn’t prove who you or I are at all. It simply...

Webcast

SharePoint Governance: Vom Site-Chaos zur vertrauenswürdigen Plattform

Kuppinger Cole Webinar recording

Webcast

XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Kuppinger Cole Webinar recording

Blog

eMail that noone really needs

These days, the Deutsche Post started its eBrief service. And the so called De-Mail is as well on its way. The common idea: Trustworthy, legally signed eMail. So far, so good. But we all know that its not the first approach for secure eMail. Some people are even using it actively, and some even beyond the reach of their corporate eMail systems. But when I look at my inbox, well below 1% of the incoming mails are signed and exactly 0% are encrypted. Why should that change with new services which are expensive (to send the eBrief costs money like a real letter), have a complex registration...

Blog

Old dog, new tricks

At my time in life, you sort of become settled into old, comfortable habits, and that’s okay. However, moving from Munich to Boston to set up our new US office has shaken a few things up in my life. And as if that wasn’t enough, I flew out to the Bay Area a couple of days later to attend IIW ’11, which the organizers, Kaliya Hamlin (a.k.a. “identitywoman”), Phil Windley and Doc Searls put on at the Museum of Computer History right around from NASA’s Ames Research Lab at Moffet Field  in Mountain View – and boy did that give me a dose of culture shock. I mean, we at KuppingerCole have some...

Webinar

Nov 30, 2010: Privileged Cloud Identity Management

In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anforderungen an einen Public Cloud oder Outsourcing Dienstleister zu stellen sind, damit Ihr internes (PUM) durch die Hinzunahme von Cloud Services nicht kompromittiert wird. Jochen Koehler vom Privileged Identity Management Spezialisten Cyber-Ark wird daran anschliessend einen überaus interessanten...

Webcast

Zugriffe im Griff: Von der Übersicht zur Risikominimierung

Kuppinger Cole Webinar recording

Webcast

How to Deploy Identity Management When You're Not a Top Fortune 500 Company

Kuppinger Cole Webinar recording

Webinar

Nov 23, 2010: How to let your Access Management Scale – and Save Costs

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.

Webinar

Nov 26, 2010: Virtualization Security Trends & Insights: Results from KuppingerCole´s Recent Survey

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.

Webinar

Nov 26, 2010: Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in...

Webinar

Dec 09, 2010: Building Operational Governance for SharePoint 2010

During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.

Webinar

Nov 12, 2010: SharePoint Governance: Vom Site Chaos zur vertrauenswürdigen Plattform

SharePoint-Umgebungen tendieren dazu, sich den GRC-Anforderungen Ihres Unternehmens widersetzen zu wollen. In diesem Webinar beschreibt Martin Kuppinger einen holistischen Ansatz zur Einbung Ihrer SharePoint-Umgebung in ein unternehmensweites GRC und Identity Management. Dr. martin Kuhlmann von Omada wird daraufhin detailliert darstellen, wie sich dieser Ansatz effektiv umsetzen lässt.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]