News Archive

Press Release

European Identity Conference (EIC) expands further

Identity Management and Governance for Businesses – and the Cloud

Munich, May 27th 2010 – The European Identity Conference 2010, which drew to a close on May 7th, 2010, has further solidified its position as the premier event for IAM (Identity and Access Management) and GRC (Governance, Risk Management and Compliance). At the same time, the topic of Cloud Computing—with special emphasis on Cloud Security and Governance—has shifted even more into the limelight, also as a result of the Cloud 2010 conference that ran parallel to the EIC.

Conference

Oct 04 - 06, 2010: The Experts Conference Europe

The Experts Conference (TEC) 2010 kommt dieses Jahr nach Düsseldorf! TEC 2010 Europe bietet erstklassiges Training und Networking – für Experten, von Experten – und vermittelt Ihnen Wissen über effektive, innovative Möglichkeiten, die Technologien, die tagtäglich Ihre Geschäftsprozesse unterstützen, zu verwalten. Zusätzlich zu den etablierten Trainings zu Microsoft Directory & Identity Technologien wird es auf der TEC 2010 wieder zahlreiche Exchange Vorträge und zum ersten Mal ebenfalls SharePoint Sessions geben.

Conference

Oct 04 - 06, 2010: The Experts Conference Europe

The Experts Conference (TEC) Europe is coming to Düsseldorf in 2010! TEC 2010 Europe delivers world-class training and networking - for the experts, by the experts - and teaches better, more innovative ways to run and manage the technologies that drive your organization every day! In addition to its highly-acclaimed training on Microsoft Directory & Identity technologies, TEC 2010 will bring back a full agenda of Exchange training and the first ever TEC for SharePoint! As one of the Identity experts Martin Kuppinger (Kuppinger Cole) discusses in his presentation “Provisioning...

Press Release

Identity Management und Governance für Unternehmen – und die Cloud

European Identity Conference (EIC) wächst weiter

München, 25.05.2010 - Die am 07.05.2010 zu Ende gegangene European Identity Conference 2010 hat ihre Position als Leitveranstaltung für IAM (Identity und Access Management) und GRC (Governance, Risk Management, Compliance) weiter ausgebaut. Gleichzeitig ist auch das Thema Cloud Computing und hier insbesondere Cloud Security und Governance immer stärker ins Blickfeld gerückt, auch durch die parallele Cloud 2010-Konferenz.

Webcast

Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity

Best practices session at the European Identity Conference 2010 by Jonas Hogberg, Ericsson

Webcast

Orange France Telecom Identity Management Strategy

Best practices session at the European Identity Conference 2010 by Philippe Clément, Orange/France Telecom

Webcast

Identity Management & Cloud Computing in the Automotive Industry

Best practices session at the European Identity Conference 2010 by Dr. Barbara Mandl, Daimler AG

Webcast

Managed IAM Service Project at Piaggio

Best practices session at the European Identity Conference 2010 by Lorenzo Mastropietro, Piaggio

Webcast

Bringing BMW’s New Central Identity and Access Management System into Life

Best practices session at the European Identity Conference 2010 by Jürgen Skerhut, BMW and Dr. Andreas Neumann, Logica Deutschland

Webcast

Integrating Physical Access Control into Active Directory at King ICT, Croatia

Best practices session at the European Identity Conference 2010 by Adrian Castillo, HID Global and Kristian Koljatic and Nino Talian, KING ICT d.o.o.

Webcast

German National ID – Privacy by Design

Best practices session at the European Identity Conference 2010 by Andreas Reisen, Federal Ministry of the Interior, Germany

Webcast

The EC STORK Project - Approaches, Challenges, Results

Best practices session at the European Identity Conference 2010 by Marc Sel, PwC Belgium

Webcast

SPOCS - Crossborder Access to eGovernment Services

Best practices session at the European Identity Conference 2010 by Martin Spitzenberger, Austrian Federal Chancellery

Webcast

Identity and Access Management at Munich University Hospital

Best practices session at the European Identity Conference 2010 by Dr. Walter Swoboda and Simon Leutner, University Hospital of Munich

Webcast

From Creative Chaos to Modern Service Provisioning

Best practices session at the European Identity Conference 2010 by Dr. Nicola Stein, German Aerospace Center

Webcast

Migros Identity Management & SSO - Implementation and Perspectives

Best practices session at the European Identity Conference 2010 by Rudolf Gisler, Migros Dr. Peter Schill, SafeNet

Webcast

Venn and the Art of Data-Sharing

Best practices session at the European Identity Conference 2010 by Eve Maler, PayPal Inc.

Webcast

Business Oriented Entitlement Life-Cycle Management

Best practices session at the European Identity Conference 2010 by Henrik Siiskonen, If P&C Insurance Company Ltd and Pekka Hagström, RM5 Software

Webcast

From Plastic to Secured Bits - a Wallet for Virtual Cards on the Mobile Phone

Best practices session at the European Identity Conference 2010 by Jörg Heuer, Deutsche Telekom Laboratories

Webcast

Login for the Mobile Internet - What new Challenges arise from Mobile Internet Usage?

Best practices session at the European Identity Conference 2010 by Michael Gärtner, Deutsche Telekom AG

Webcast

Best Practices for Identity Management from the Annals of Private Banking

Best practices session at the European Identity Conference 2010 by Kumar Sarvesh, Deutsche Bank (Suisse) S.A

Webcast

Integration of SAP in a Comprehensive Identity Management Solution for Access and Authorization Control with Enterprise Roles

Best practices session at the European Identity Conference 2010 by Dr. Uwe Vehlies, Hannover Re and Rüdiger Berndt, Oxford Computer Group Deutschland

Webcast

Online Services and Identity Management – Driving Innovations through a Cross Sector Vision

Best practices session at the European Identity Conference 2010 by Olivier Maas, Atos Worldline and Vincent Etchebarne, Orange Labs / France Telecom

Blog

Trends from the European Identity Conference

The European Identity Conference (EIC), which has become the foremost gathering point for the identity community Europe, focused this year on a number of current topics in the areas of identity and security. A new track dedicated to cloud computing shed new light on application scenarios with special reference to security issues. Attendees and experts agreed that this will be the make or break issue for this well-hyped form of decentralized IT. One important conclusion reached by many at the conference is that, while cloud computing may be good way to handle  data processing and even...

Product Report

Product Report: Völcker ActiveEntry 4.1

Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity und Access Management-Markt etabliert. Dabei ist es dem Unternehmen auch gelungen, insbesondere im deutschsprachigen Markt, eine sehr hohe Sichtbarkeit zu erreichen und eine signifikante Zahl auch von großen Kunden zu gewinnen. Mit der Version 4.1 seines Kernprodukts ActiveEntry für das Enterprise Provisioning festigt das Unternehmen aus Sicht von KuppingerCole seine Position in der Spitze des Marktes. Die Stärken des...

Blog

Why Software Security is a part of any Business Model

During the last weeks, with all the discussions about security- and privacy-related issues in social networks like Facebook or SchülerVZ, I've had some talks with people. My position is that these issues are a result of bad software architecture. The counter argument sometimes has been that when building these networks the focus has been on functionality, not security - and that the business model of these networks is based on the functionality. What was meant by that is that you should first care about functionality and that security is somewhat irrelevant because it doesn't help you in...

Webcast

The Most Valid Wins of IAM

Keynote at the European Identity Conference 2010 by Jackson Shaw, Active Directory, Identity Management Expert, Quest Software

Webcast

IAM into the Cloud: Improving Security with Cloud and Collaboration Technology

Keynote at the European Identity Conference 2010 by Tim Dunn, Vice President - Security Business Unit, CA

Webcast

Security, Automatization and Management Essentials for the Cloud

Keynote at the European Identity Conference 2010 by Richard Sharp, Director of Software Production, XenServer Group, Citrix Systems

Blog

European Identity Conference 2010

EIC 2010 has ended. And like each year, there are some interesting observations. I'll take three of them: The "classical" IAM topics like provisioning or E-SSO are well understood now - and extended. Federation becomes reality. The cloud impacts IAM - and vice versa. Topics like provisioning and E-SSO were discussed mainly in the many "Best Practice" sessions. There are many implementations out there. Several of them use MSSPs (Managed Security Service Providers) or other Saas-/Cloud style types of deployment. And they are increasingly integrated with other IT infrastructure elements...

Webcast

An Information Society Perspective on Electronic Identity Management

Keynote at the European Identity Conference 2010 by Dr. Dirk van Rooy, Head of Sector, Trust and Security, European Commission, DG Information Society and Media

Webcast

Follow the Money: How Cloud Providers' Business Needs Drive Enterprise Identity & Security

Keynote at the European Identity Conference 2010 by Dale Olds, Distinguished Engineer, Novell

Webcast

Identity in the Cloud – Finding Calm in the Storm

Keynote at the European Identity Conference 2010 by André Durand, Founder & CEO, Ping Identity

Webcast

On Cloud 9 or Lost In (that) Space

Keynote at the European Identity Conference 2010 by Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems

Webcast

Extending the Principles of Service-Oriented Security to Cloud Computing

Keynote at the European Identity Conference 2010 by John Aisien, Vice President of Product Management, Oracle Corporation

Webcast

The Role as a Role Model

Keynote at the European Identity Conference 2010 by Niels von der Hude, Senior Manager, Beta Systems Software

Webcast

Trust in the Cloud

Keynote at the European Identity Conference 2010 by John Hermans, Associate Partner, KPMG

Webcast

Next-Generation Provisioning: A Governance-based Approach

Keynote at the European Identity Conference 2010 by Darran Rolls, Chief Technology Officer, Sailpoint

Webcast

National ID Documents Driving eApplications / eBusiness

Keynote at the European Identity Conference 2010 by Sabine Erlinghagen, Vice President & General Manager Identity Management & Biometrics, Siemens IT Solutions and Services

Webcast

The Need of Preconfigured Business Processes for Identity Management and IT Compliance

Keynote at the European Identity Conference 2010 by Peter Weierich, Völcker Informatik

Webcast

Federated Directory meets Minimal Disclosure: Mortal Enemies or Soul Mates?

Keynote at the European Identity Conference 2010 by Kim Cameron, Chief Architect of Identity in the Security Division, Microsoft

Webcast

Six Sigma For the Secure Cloud-Equip the Enterprise for Success

Keynote at the European Identity Conference 2010 by Gerry Gebel, President, Axiomatics Americas

Webcast

Convergence: Better Control, Lower Cost

Keynote at the European Identity Conference 2010 by Dave Kearns, Identity Expert & Writer, Network World

Webcast

Interview with Fernando García, Symlabs

Felix Gaehtgens interviews Fernando García at the European Identity Conference 2010

Webcast

Interview with Nishant Kaushik, Oracle

Felix Gaehtgens interviews Nishant Kaushik at the European Identity Conference 2010

Webcast

Interview with Dr. Dirk van Rooy, European Commission

Felix Gaehtgens interviews Dr. Dirk van Rooy at the European Identity Conference 2010

Webcast

Interview with Priska Altorfer, wikima4 AG

Martin Kuppinger interviews Priska Altorfer at the European Identity Conference 2010

Webcast

Interview with Kim Cameron, Microsoft

Felix Gaehtgens interviews Kim Cameron at the European Identity Conference 2010

Webcast

Interview with Sabine Erlinghagen, Siemens

Tim Cole interviews Sabine Erlinghagen at the European Identity Conference 2010

Webcast

Interview with Matthew Gardiner, CA

Felix Gaehtgens interviews Matthew Gardiner at the European Identity Conference 2010

Webcast

Interview with Gerry Gebel, Axiomatics

Felix Gaehtgens interviews Gerry Gebel at the European Identity Conference 2010

Webcast

Interview with Lorenzo Mastropietro, Piaggio

Felix Gaehtgens interviews Lorenzo Mastropietro at the European Identity Conference 2010

Webcast

Interview with Nick Nikols, Novell

Felix Gaehtgens interviews Nick Nikols at the European Identity Conference 2010

Webcast

Interview with Prof. Dr. Eberhard von Faber and Dr. Michael Pauly, T-Systems

Felix Gaehtgens interviews Prof. Dr. Eberhard von Faber and Dr. Michael Pauly at the European Identity Conference 2010

Webcast

Interview with Jackson Shaw, Quest Software

Martin Kuppinger interviews Jackson Shaw at the European Identity Conference 2010

Webcast

Interview with Peter Weierich, Völcker Informatik

Martin Kuppinger interviews Peter Weierich at the European Identity Conference 2010

Webcast

European Identity Awards 2010

European Identity Awards ceremony during the European Identity Conference 2010. May 5, 2010 in Munich, Germany.

Webcast

European Identity Conference 2010 Opening keynote

Opening keynote at the European Identity Conference 2010 by Tim Cole and Martin Kuppinger, Kuppinger Cole

Blog

Outstanding projects and initiatives in Identity Management honored

European Identity Award for outstanding projects, innovations and advancements in the field of digital identity management was presented by the analyst group Kuppinger Cole at a festive ceremony at the European Identity Conference 2010, the leading European venue for Identity and Access Management (IAM) and Governance, Risk Management and Compliance (GRC) in Munich. Awards were given in six categories. Besides the award for “best innovation” in IAM or GRC, the categories include best program or initiative in internal projects, B2B, B2C, Cloud Computing and eGovernment/eHealth. Vendors,...

Product Report

Product Report: wikima4 mesaforte

Mesaforte is a product of the Swiss firm wikima4. The product arose out of experiences from numerous projects. A series of customers has licensed it and it is being advanced within the scope of regular product development. By now, the solution, originally geared toward monitoring the security of SAP infrastructures, has a greater functional breadth. It targets the control and monitoring of access authorizations, security events, and configuration settings in SAP environments and other systems. The current version, 3.0, has a three layer architecture with a web client, in which to begin...

Advisory Note

A Review of Cloud Business Models and Demonstrations in Finance and Health Clouds

By Victor Chang, Gary Wills and David De Roure This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forum´s Cloud Cube Model (CCM), we classify cloud computing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and Services Contracts; (3) In-House Private Clouds; (4) All-In-One Enterprise Cloud; (5) One-Stop Resources and Services; (6) Government funding; (7) Venture Capitals; and (8) Entertainment and Social...

Advisory Note

Business Report: GRC Market Structure

GRC stands for Governance, Risk Management, Compliance. It is used to describe Information Tech-nology which supports these specific business requirements. This report provides a segmentation of the overall GRC market with its different elements, from the C-level dashboards down to technical elements which are required to provide information for automated controls and the automated re-mediation in case that defined thresholds of controls aren’t met. The core elements are Business GRC Operational GRC Generic IT GRC and CCM (Continuous Controls Monitoring) Specialized IT...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]