News Archive

Blog

Virtualization vs. Security

Some days ago, a vendor talked at an analyst meeting about the relationship between virtualization and security. The argument was: At the hypervisor you can combine network security management, server security management and some other aspects of security management - I can't remember everything. Thus virtualization increases security, because you have one point of control. Right - as long as you can control what administrators and operators are doing. Unfortunately, that's not the case in typical virtualization environments. There is no PxM (Privileged Access, Account, Identity, User)...

Webcast

The Business Value of Log Management Best Practices

Kuppinger Cole Webinar recording

Blog

Access Governance Sets the Stage for Information Security and Compliance

Rights Management may not exactly be something new, but the rising demands from internal and external auditors are putting it back in center stage. Organizations are being forced to adopt systematic, open and replicable processes for creating, assigning, and monitoring rights within their systems, not only to ease the admins’ workloads, but also to achieve their compliance goals. Companies have been doing Rights Management for ages now as part of their overall IAM strategies (Identity & Access Management), mainly with a strong emphasis on the technical issues. Lately, however, the focus...

Product Report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren. Cyber-Ark Priviliged Identity Manager (PIM) wird vom Hersteller als Suite bezeichnet, ist aber tatsächlich eher als integriertes Produkt zu sehen, dass weit über den konventionellen Suite-Ansatz hinaus geht und...

Blog

SAP invests in security technology

SAP recently announced that the they will buy most technology assets from the Swiss-German security specialist SECUDE. The developers and other resources will as well move to SAP, ensuring that as well the software as the "brain"ware is available to SAP. SECUDE provides solutions around SAP for strong authentication, single sign-on, and event management specifically to SAP environments. There is a long-term relationship between both companies, SECUDE being a supplier for many SAP customers in the areas mentioned. One might argue that this acquisition isn't a real big deal, compared to...

Blog

Cloud Security - the market is evolving

Winter holiday season is almost over, and business claims its attention back - it was a nice time with family, good food, and so on. But the world didn't stop, so we had to spend some time to look at a number of products. I would like to mention two here, especially because they help us getting closer to the Secure Cloud. The first is Novell Cloud Security Service (shortly called NCSS). It is not clear according to todays product categories whether it is a product or a service, and this shows that we need to abstract more and more from this separation when moving into the cloud. Let me...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]