News Archive


Quo vadis?

Passwords have been the security standard for thousands of years, ever since they replaced biometrics as the preferred method of authentication. Biometrics? That’s right. From pre-historic times access to secure sites (food/money storage, military camps, etc.) was biometrically controlled – the guard either recognized you or didn’t. If he recognized you and was aware that you had clearance then you’d be allowed access. Otherwise, you might get run-thru with a sword. But as the population needing access to secure sites increased, it was no longer possible for every guard to know every...

Product Report

Product Report: Kaspersky Endpoint Security 8 and Kaspersky Security Center 9 - 70401

Kaspersky Endpoint Security and Kaspersky Security Center are two key components of Kaspersky Open Space Security – the integrated security suite from highly reputable security company Kaspersky Lab. Targeted primarily towards small and medium businesses, Kaspersky Open Space Security offers a flexible solution for protecting workstations, file and mail servers, network gateways, mobile devices and smartphones. Depending on their requirements, customers can choose from several solutions, each with different components. However since endpoint protection and centralized management...


Quest acquires Bitkoo – another step for Quest to play with the big boys

During the past few years, Quest has acquired several other IAM vendors: Völcker Informatik (Provisioning and Access Governance), Symlabs (Virtual Directory Services), Vintela (Linux/UNIX Authentication and Integration), and e-DMZ (Privileged User/Account Management) are just some examples of this shopping spree. The newest addition to the Quest portfolio is Bitkoo, a vendor in the  Dynamic Authorization Management space ( This acquisition comes as no surprise given that Dynamic Authorization Management is...

Advisory Note

Advisory Note: The Open API Economy - 70352

How the Open API Economy is increasing and changing the need for Identity Management. Baking an organization’s core competence into an Open API is an economic imperative. It’s clear that three main trends are driving technology in all areas. It goes without saying that as digital identity is the gateway to all network-based products and services that identity is being affected by these trends: Social Computing Mobile Computing Cloud Computing While this observation is accurate and certainly these three trends are having a significant impact on things, there is...


Clearing up a Cloudy Standard: Simple Cloud Identity Management

KuppingerCole Webinar recording


Feb 09, 2012: Bridging the Cloud Sign-On Gap

With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frustration. In this webcast KuppingerCole and Oracle will discuss how organizations can benefit from a cloud sign-on strategy. In addition, you will learn how single sign-on can jump start your cloud access management strategy and improve security.


The Open API Economy - Opportunities and Risks

KuppingerCole Webinar recording



Is your location private? If you have installed an App on a smartphone it is almost certain that your location is being tracked. So should you care? Are you giving away details of your movements too cheaply? Is being able to track where your children are a benefit or a risk? To find the answers to these and other questions, on December 12th I attended “A Fine Balance 2011: Location and Cyber privacy in the digital age” sponsored by the UK Knowledge Transfer Network. The title to this article is taken from the lyrics of a 1983 song by “The Police” that was used as the basis of a talk by...


Managing Privacy and Data Protection – moving from “optional” to “mandatory”

My colleague Jörg Resch just gave us a summary on the current status of new EU Privacy Regulation that is “in the works” in Brussels. If only a portion of this becomes “EU Law” – meaning that it will not be a Directive which needs to be translated into local national law but supersedes any existing national law – it will change the game in an instance. Not only would the “amusingly small” fines that could currently be imposed e.g. German companies for breaking privacy laws (standard maximum fine 50.000 €) be bumped up to “significant” numbers, but the actual provider of a service could be...

Vendor Report

Vendor Report: Oracle Cloud Security - 70160

This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which to build Cloud services. These services which can be built range from IaaS (Infrastructure as a Service) using Oracle VM Server software and Sun hardware through to SaaS (Software as a Service) built upon the Oracle Database technology and Oracle Fusion Middleware. The Oracle platform is based on Oracle Exalogic Elastic Cloud hardware and Oracle Exadata Database Machine. The tools enable Cloud services...


Security - the key to smart grids and planets

This week was the 6th National IT Summit in Germany. Like always, that's where big speeches are made and little happens. The German BITKOM (Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V.), the IT and communications industry lobbyist association put the topic of smart networks (or grids) on the table. They requested initiatives (and money) to build such networks. That comes as no surprise, given that the smart world will require massive investments. So driving this forward makes sense. However, the big problem to solve for this smart world - whatever it will...


Risk. The New Compliance

KuppingerCole Webinar recording

Product Report

Product Report: Quest One Identity Manager 5 - 70133

In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the German-speaking market and has succeeded in creating a substantial customer base including many large and well-known corporations, particularly in the German-speaking market. However, Völcker has no longer been a niche player, but...

Product Report

Product Report: Axiomatics Policy Management Suite - 70293

This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse Query The Axiomatics Policy Management suite falls into the category of Dynamic Authorization Management Systems, which are sometimes also called Entitlement Management or Policy Management solutions . Products of that category use the XML-based XACML standard – eXtensible Access Control Markup Language – to define authorization policies and make access control decisions. Axiomatics is a...

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected


AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]