News Archive

Vendor Report

Vendor Report: Passlogix

Passlogix is a software vendor which started in the field of E-SSO (Enterprise Single Sign-On) in 1996 and established itself as one of the leading vendors in that particular segment. The company has a significant direct and partner sales channel. In addition, Passlogix has built on the OEM channel. Oracle is still an OEM of Passlogix, but Passlogix is doing the major part of its business with end customers and through other channels, including solution providers and technology partners. Passlogix has expanded its portfolio amongst the core E-SSO solutions but with tight integration of...

Product Report

Product Report: wikima4 mesaforte

Mesaforte ist ein Produkt des Schweizer Unternehmens wikima4. Das Produkt ist als Resultat von Erfahrungen aus zahlreichen Projekten entstanden, von einer Reihe von Kunden lizenziert und wird im Rahmen einer regulären Produktentwicklung vorangetrieben. Das ursprünglich auf die Sicherheitsüberwachung von SAP-Infrastrukturen ausgerichtete Lösung hat inzwischen eine größere funktionale Breite und zielt auf die Steuerung und Überwachung von Zugriffsberechtigungen, Sicherheitsereignissen und Konfigurationseinstellungen in SAP-Umgebungen und anderen Systemen...

Product Report

Product Report: Engiweb IDEAS

Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their platform IDEAS which is built around role management, authorization management, and other features. The product is, in the Kuppinger Cole notion, best positioned as part of the market segment of Access governance platforms but with additional support for Entitlement Management. Engiweb is, from our...

Advisory Note

10 Top Trends 2010

As in the past years, Kuppinger Cole has worked out 10 Top Trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). These are complemented by 10 Top Trends in Cloud Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix of internal as well as external IT services.

Advisory Note

Die Top Ten Trends 2010

Wie jedes Jahr haben die Analysten von Kuppinger Cole wieder die zehn wichtigsten Trends im Markt für Identity und Access Management (IAM) sowie Governance, Risk Management und Compliance (GRC) herausgearbeitet. In diesem Jahr kommen erstmals die Top Ten Trends bei Cloud Computing hinzu. An der Spitze der drei Listen steht unserer Meinung nach eine noch stärkere Zusammenarbeit zwischen operativen Geschäftseinheiten und IT (so genanntes „Business-IT-Alignment“) sowie die schrittweise Einführung von Hybrid-Umgebungen auf der Grundlage gut abgestimmter interner...

Press Release

Article on the "Top Trends 2010 in IAM, GRC and Cloud Computing" from Martin Kuppinger available

Duesseldorf April, 26th, 2010 - Once a year, Martin Kuppinger, co-founder and principal analyst at Kuppinger Cole,  produces a list of Top Trends in Identity and Access Management. At this year’s European Identity Conference (EIC 2010), he will present an expanded list of trends covering the additional fields of GRC (Governance, Risk Management, Compliance) and Cloud Computing. The two most important trends, according to Mr. Kuppinger, will be an increasing level of Business-IT-Alignment and the development of hybrid environments based on a well-managed mix of internal and...

Webcast

Information Security and Governance for Microsoft SharePoint Environments

Kuppinger Cole Webinar recording

Vendor Report

Vendor Report: RM5 Software

RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second important feature is that RM5 Software from the very beginning has focused on supporting on-premise and SaaS deployments and on supporting external and internal applications, thus covering all variants of...

Product Report

Product Report: Beta Systems Software AG SAM Enterprise Identity Manager v1.1

Der Beta Systems Software AG SAM Enterprise Identity Manager ist in der Kategorie der Enterprise Provisioning-Systeme einzuordnen. Die Kernfunktionalität ist der strukturierte, automatisierte und nachvollziehbare Abgleich von Identitätsinformationen zwischen verschiedenen Systemen auf Basis von definierten Prozessen und Connectoren zu den Zielsystemen. Wie bei Provisioning-Lösungen inzwischen üblich, finden sich auch Funktionen für den User Self Service, die delegierte Administration und das Kennwortmanagement. Außerdem werden konfigurierbare Workflows...

Product Report

Product Report: Aveksa Enterprise Access Governance Platform

The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without technical integration. This is a significant step forward beyond the detective approach which was at the centre of the earlier product version. Besides this, there are significant improvements around rules, role mining, and other important product features. Aveksa has implemented these changes based on...

Webcast

One Entitlement Management For All - How to Manage All Users, Services, and Service Providers

Kuppinger Cole Webinar recording

Blog

Why enterprises shouldn’t economize on IT security

We’ve all been there before: helpdesks deluged by calls from irate users, constant complaints about buggy apps, complicated login procedures or passwords no one can remember. Much-overdue investments in security patches and updates for heirloom software have to be postponed time and again because maintenance and support eat up all the money, and still the boss is under pressure to tighten the belt another notch by slashing the IT budget yet further. And after all: Isn't IT supposed to be all about reducing costs? What about all those productivity gains and slick business processes? Yes, but...

Blog

Why we need claims in Windows

Microsoft has introduced the concept of claims-based securitywith it's "Geneva" project. Claims are sort of attributes which are provided by identity providers in the form of tokens and consumed by applications. In fact they are one way to make federation easier and more user centric. "Geneva" provides the tools at all levels to work with claims. The concept of claims is used by some other groups at Microsoft and we probably will see several Microsoft applications with support for claims within the next months. However, the biggest impact might be on the Windows operating system itself....

Press Release

Article on the “new German digital ID card – nPA” from Martin Kuppinger available

Duesseldorf April, 19th, 2010 - Martin Kuppinger, co-founder and Principal Analyst at Kuppinger Cole, has written an article about the new German digital ID card in which he discusses the security and usability issues as well as the “pseudonymity” feature that will soon be introduced with the “neuer Personal-Ausweis”, or “ePA”. His conclusion is that, far from creating transparent “glass” customers or citizens,  the nPA will instead be a big step forward, ushering in a new era of information security as well as a wealth of new and...

Webinar

Apr 26, 2010: Information Security and Governance for Microsoft SharePoint Environments

In this webinar, we will look at the SharePoint Security and the SharePoint Security Add-On market, with specific focus on what you need to fulfill the GRC requirements in SharePoint environments and how to do that integrated with other information systems.

Webinar

Apr 21, 2010: One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently

As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications.

Webcast

Access Governance: Implement Processes, Reduce Business Risks

Kuppinger Cole Webinar recording

Blog

There is more than automation

I've done several webinars around changing architectures for Identity Provisioning and Access Governance during the last few months. And new architectural approaches for Provisioning have been an important topic at the EIC for years. I've also written a report on Access Governance architectures recently. That is no surprise. Provisioning has to integrate with IT Service Management in some way. It has to support the standard systems where automation is key as well as other systems which either don't support automation interfaces (unfortunately there are several apps out there which don't...

Product Report

Product Report: SAP Business Objects GRC Access Control

The SAP BusinessObjects GRC Access Control (in short AC) solution is a powerful set of tools that help to automate risk analysis and mitigation for user and authorization management in SAP and non-SAP systems. It is a strong product for the SAP ABAP world, and is able to cover non-SAP systems using real-time adapters from Greenlight. It covers a substantial subset of the overall GRC requirements – it provides a leading-edge solution for SAP environments, which are at the centre of many IT environments and is able to perform as a realtime cross-platform solution. The core of the...

Press Release

Save the date: European Identity Conference 2010

Duesseldorf April, 12th, 2010 - The European Identity Conference 2010 (EIC) will take place from May 4-7, 2010, in Munich. Now in its fourth year, Kuppinger Cole´s flagship event is the place to meet with thought leaders, experts and decision makers to learn about, discuss and shape the market in most significant technology topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and Cloud Computing. For the first time CLOUD 2010 will be co-located with EIC 2010. With its world class list of speakers, a unique mix of best practice presentations, panel...

Press Release

Terminblocker: European Identity Conference 2010

Düsseldorf, 12.04.2010 - Vom 4. bis 7. Mai 2010 findet in München die European Identity Conference (EIC) 2010 statt. Im Rahmen der Jahresveranstaltung von Kuppinger Cole, die in diesem Jahr zum vierten Mal durchgeführt wird, treffen sich Analysten und Vordenker der Branche mit IT-Experten und -Entscheidern, um die neuesten Trends kennenzulernen und den Markt rund um Identity Management, Governance, Risk Management und Compliance (GRC) und Cloud Computing zu diskutieren und zu formen. Zum ersten Mal werden die Veranstaltungen CLOUD 2010 und Mittelstandsdialog...

Blog

Gemalto invests in Strong Auth Tokens

Just recently my Strong Authentication report has been published and now there is one vendor less in the scope: French-American card and token giant GEMALTO announced that it acquired the niche player TODOS: http://www.todos.se/index.php/media/archives/gemalto_acquires_e-banking_specialist_todos_ab/ Todos has some very interesting tokens, but I am pretty sure that Gemalto was just after the Todos'IP around online-banking security. Unknown to most of the world, it is Todos (or now Gemalto) that owns the technology that secure online banking solutions are based upon. Hopefully, Gemalto does...

Press Release

Artikel zum Thema „Neuer Personalausweis – Warum der nPA ein Erfolg wird“ von Martin Kuppinger verfügbar

Düsseldorf, 07.04.2010 - Martin Kuppinger, Gründer und Principal Analyst bei Kuppinger Cole, hat einen Artikel zum Thema „Neuer Personalausweis“ geschrieben. In diesem Artikel beschäftigt sich Martin Kuppinger ausgiebig mit der Sicherheitsdiskussion, der Nutzbarkeit und Pseudonymität des nPA, weiterhin geht Martin Kuppinger darauf ein, was dem Neuen Personalausweis noch fehlt, um optimal nutzbar zu sein. Herr Kuppinger betont, dass der nPA in Summe nicht nur eine wichtige Innovation für die Informationssicherheit bedeuten kann und wahrscheinlich auch...

Blog

Protecting the “I” in “IT”

Companies spend substantial sums on IT security, but for some reason it seems they aren’t getting much bang for their bucks. The reason, of course, it that they are putting them in point solutions instead of investing them in clear and proven strategies. By definition, point solutions are meant to solve one particular problem without regard to any related issues. They provide a quick fix for a certain problem or a fast track to implementing a new service, but they don’t solve the overall issue. Take SAP security, for instance: If you don’t protect your data base and the...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]