News Archive


How to Keep Entitlement Management Lean - in any Environment

Kuppinger Cole Webinar recording


No more Mr. Nice Guy

Adobe is a company everybody likes. Okay, with the possible exception of Steve Jobs, that is. But really: Adobe is probably the largest vendor in the IT industry that doesn’t compete head-on with any of the other giants. In fact, cooperation seems to be somehow bred into their genes, which is why the Adobe managers I met with recently in Paris seemed to be exceptionally nice. But that may change. Take Sydney Sloan, Director, Adobe’s director of product marketing & operations who is a typical charming Canadian (except that she’s an expat from the States) and whom I must thank for a...


Cloud Security = IDM+ERM, BUT: who will drive it is the real question!

My last blog on the future necessities to really, really secure applications in the cloud was heavily discussed, which I think is a good sign, obviously there is something to discuss... But let's get a bit more down to the real problems. Of course, DRM is not the same thing as ERM (let me stick to ERM for the time being), and most of the companies having integrated DRM technology into their content offering have absolutely no clue about the potential complexity of access rights one might need in a company context - just look at the average number of enterprise roles for a medium-sized...


VDIs - more than a deployment option?

Virtual Desktop Infrastructures (VDIs) are hype. But are they really a strategic element of IT? Or are they just a deployment option? I think that the answer is influenced by two major aspects: Time and the maturity of Desktop Virtualization The functional breadth of VDIs With respect to the first aspect, VDIs today are more sort of a more expensive, more complex alternative to Terminal Services. Less users per server, the same (sometimes a little bit more advanced) protocol for remote desktop access, very limited capabilities to run the VMs locally on a hypervisor - VDIs aren't really...


Jun 29, 2010: How to Keep Entitlement Management Lean - in any Environment

How to gain more flexibility and efficiency in an environment where requirements change very fast, and where users and services cannot be classified any more as easy as being "internal" or "external". This Webinar is about key decision criteria for lean entitlement management and provisioning solutions.


Choosing the right Identity Provider

It isn’t exactly a new idea, but designing your Identity and Access Management (IAM) with your users in mind always makes sense. But how about your customers and suppliers? After all, they, too, increasingly need to gain admittance to some of your internal applications and data. Unfortunately, internal directories usually aren’t up to the job, so choosing the right identity provider is growing more and more important. It isn’t exactly a new idea, but designing your Identity and Access Management (IAM) with your users in mind always makes sense. But how about your customers and...


Beyond LDAP - have a look at system.identity

LDAP (Lightweight Directory Access Protocol) is well established. It is the foundation for today's Directory Services, which support LDAP as a protocol and which usually build their data structure on the associated LDAP schema. There are many interfaces for developers to use LDAP, from the LDAP C API to high-level interfaces for many programming environments. Even while LDAP is well established, it is somewhat limited. There are several restrictions - two important ones are: The structure of LDAP is (more or less) hierarchical. There is one basic structure for containers - and linking...


Cloud Security = Interoperability for DRM

This week was very interesting for me. I have had a number of calls and meetings with people dealing with software components and architectures that will make  the cloud secure. And the most interesting observation is: actually everything is there. We as an industry could simply start doing secure clouds right away. It is of course not so much about the standard stuff that we often hear: trust into the cloud providers, their ability to deal with data privacy requirements, or multi-tenancy capabiltiies of enterprise cloud services. No. It is actually about how to secure the data between...


Jul 02, 2010: Hidden Gems - Vendors you Should Have a Look at

In this webinar, Kuppinger Cole´s founder and chief analyst will talk about his research findings for a recent report on vendors, which are, from the KuppingerCole perspective, Hidden Gems in the markets which we are analyzing. “Hidden Gems” are vendors which are (still) relatively small, less known then "the big ones", and which offer innovative solutions worth to consider. Even though there are currently a lot of other interesting innovations out there, released by established vendors, like for example Microsoft’s U-Prove. However, this webinar will cover only those vendors...


Reducing lock-in risks - has understood

One of the really interesting announcements in the Cloud space these days has been from VMware and with their vmforce offering. Their claim is "The trusted cloud for enterprise Java developers". Correct. It is a cloud environment where Java developers can build apps with a Spring Eclipse-based IDE, where they can use Tomcat, and so on. Thus there is an environment do build and deploy Java apps in the cloud. Beyond that, functionality might be used. That is definitely interesting because provides a lot of services around business analytics, reporting,...


Jun 30, 2010: Durchgängiger Schutz statt Stückwerk - Informationen richtig schützen

Wie kann man Informationen in allen Nutzungssituationen ("at rest, in move, in use") optimal und zuverlässig schützen? Information Rights Management ist hier einer der strategisch wichtigsten Ansätze und ein Kernelement in Strategien für die Informationssicherheit.


My new iPad and Identity Management

Today, I ordered my new iPad. I am really eager to use it, especially as a multi-purpose information and media home device. So far, so good. Obviously a device like this will be THE front end for the brave new Cloudy Web Services world. Whether via classical http(s) requests or via WS-*, the Apps on these kind of devices will make the Cloud happen to the average home user. But: I am not sure how this fits into the identity management demands of these services. Haven't we seen so much integration and convergence trends in the identity space in the last months? How does these actually match...

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected


AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]