News Archive

Blog

Saying that others are wrong doesn't make a mobile OS secure

Recently, Chris DiBona published a comment (or blog or whatever it is) at Google+ bashing at a lot of companies and people in the industry. He starts with "people claiming that open source is inherently insecure and that android is festooned with viruses because of that and because we do not exert apple like controls over the app market." Further down he claims that no major cell phone has a virus problem like Windows or Mac machines. There are some other harsh statements in the article, especially about vendors in the security space being charlatans and scammers. Not surprising that there...

Blog

YUNANO – CLOUD SOLUTIONS FOR MID SIZED ENTERPRISES

If you think that China only manufactures socks – read on to learn how Chinese software and European Cloud expertise plans to deliver ERP and CRM to mid-sized enterprises in EMEA. On November 8th, 2011 – the European IT services company ATOS and the Chinese software company UFIDA INTERNATIONAL HOLDINGS, LTD. announced the formation of a Joint Venture, YUNANO™ which will address the growing Cloud market in Europe and China, targeting midsize organizations. UFIDA is a Chinese software company, registered in Shanghai, which was founded in 1988 and has a focus on software for Accounting, ERP,...

Executive View

Snapshot: GTB Technologies – DLP solutions - 70357

GTB is a US-based vendor which delivers a suite of products focusing on the DLD and DLP issues, e.g. Data Loss Detection and Data Loss Prevention. The core product GTB Inspector acts as a content-aware reverse firewall which scans all outbound traffic and applies classification on these traffic in real-time. The second product is the GTP Endpoint DLP which is content-aware device control.  It sits at the endpoints and thus for instance supports mobile devices outside of the perimeter as well. Finally there is GTB eDiscovery which can scan desktops and file shares, report on vulnerable...

Blog

A totally unsurprising proposal for European cloud initiatives

Today I received a press release of SAP talking about a new study of Roland Berger (a large consulting firm) and SAP with the title "Cloud Computing brings new growth opportunities to - Europe's IT and communications industry". It ends with a program consisting of five points, the proposal of Roland Berger and SAP. The points are Define a European legal framework for data protection and data security Define a "European Cloud Gold Standard" as sort of certificate for cloud providers Spend EU money for research and development around innovations in the cloud Support Cloud Computing for...

Webcast

Access Governance: Identity Management aus dem Business für das Business

KuppingerCole Webinar recording

Blog

Is cloud computing worth the hassle?

Cloud computing provides organisations with an alternative way of obtaining information technology services and offers many benefits including increased flexibility as well as cost reduction. But man many organisations are reluctant to adopt the cloud because of concerns over information security and a loss of control over the way IT services are delivered. These fears have been exacerbated by recent events reported in the press including outages by Amazon and the three-day loss of Blackberry services from RIM. So what approach can be taken to ensure that the benefits of the cloud outweigh...

Executive View

Snapshot: Ilex Meibo and Meibo People Pack – IAM for the “big and not so big ones” - 70356

Ilex is a French company founded back in 1989. The company, which started with security consulting services, has been offering IAM products for many years, focusing mainly on France and other French speaking countries, but now expanding to other regions. Ilex offers, besides a solution for Single Sign-On, Web Access Management, and Federation, the tools Meibo and Meibo People Pack which provide IAM (Identity and Access Management) solutions for the SMB market and large mid-sized organizations. Meibo can serve larger environments or act as an addition to existing IAM infrastructures.

Vendor Report

Vendor Report: Fischer International - 70254

Fischer International differentiates itself from other vendors in the IAM market space especially through its strong focus on providing “Cloud Services” through a SaaS solution for the core functions of Identity Management. Unlike most others, Fischer International built its product completely around that particular approach. This brings specific technical advantages as far as multi-tenancy and connector architectures are concerned. It also affects configuration and management which tend to be more difficult to implement for products originally built for on-premise deployments....

Blog

SAML, SCIM - and what about authorization?

Cloud Computing is just another delivery model for IT services. However, due to the specifics of cloud services like multi-tenancy and many others, requirements sometimes are even higher than for on-premise services. One of these requirements in well-architected IT environments and for well-architected applications is the ability to externalize security. That includes relying on external directories for administering and authenticating users, e.g. on Identity Providers. It might include the capability of "cloud provisioning", e.g. receiving changes of users - even while I clearly favor...

Blog

Clearing up a cloudy standard

It was just over 10 years ago, at the annual Catalyst conference, that provisioning rivals Business Layers and Access360 sat on different sides of the conference meeting room (the ballroom of the Mariott hotel in San Diego) and hurled catcalls and invective at each other. A year later, they’d matured (as had the technology) and – under the auspices of the Organization for the Advancement of Structured Information Standards (OASIS) joined to help form the Provisioning Services Technical Committee. A year after that, in 2003, the committee demonstrated the first release of the Provisioning...

Webcast

Why Access Governance Moves the Risk and Reward Balance in your Favour

KuppingerCole Webinar recording

Webinar

Dec 15, 2011: Clearing up a Cloudy Standard: Simple Cloud Identity Management

"Simple Cloud Identity Management (SCIM) appears to be our best chance for any sort of public provisioning standard, something we desperately need and have needed for years", says Dave Kearns. Join him, Ping Identity CTO Patrick Harding and SailPoint CTO Darran Rolls for this webinar on the newest provisioning specification which both Harding and Rolls have been involved with from the beginning.

Blog

Duqu follows Stuxnet - the next attack on the industry

Last week Duqu, a new Trojan, became known to us readily coined by security experts and media as Stuxnet 2.0. Stuxnet and Duque, however, probably are only the tip of the iceberg and the precursors of new attack scenarios, which will keep us busy from now on. It was the special characteristic of Stuxnet that the attack did not occur at the level of popular operating systems. Stuxnet targeted the control systems of industrial plants. The alleged target was the control technology of Iran's nuclear power plants. They are used for instance to control the speed of motors in many industrial...

Vendor Report

Vendor Report: Courion - 70353

Courion provides identity management solutions since 1996, is well established in North America,. Although the company has traditionally not had a strong presence in Europe, several large accounts in Germany, Switzerland and the UK are using Courion’s products. This is about to change: the company has prioritized Europe for the next years and plans to aggressively expanding there through new hires and partnerships. Courion’s flagship products are its identity access management suite that also includes many GRC (governance, risk-management and compliance) features. In fact,...

Webinar

Dec 01, 2011: Risk. The New Compliance

For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that's where the organization's risk knowledge resides. Join this webcast where we reveal how to tackle risk and its...

Webcast

Solving the Million Record Challenge with XACML

KuppingerCole Webinar recording

Webinar

Dec 13, 2011: The Open API Economy - Opportunities and Risks

Three main (business) trends are driving technology in all areas: Social Computing, Mobile Computing and Cloud Computing. Looking behind the curtain, we see that these three trends with strong impact on everything around us are based on yet another trend, which is enabling companies to build their business models on top of services and features available through Open APIs (standardised application programming interfaces through which applications can connect to other applications). The impact of Open APIs on the way we do business is growing so fast, that we have to label it not just as a...

Webcast

The Clock is Ticking: Rethink PCI 2.0 Compliance

KuppingerCole Webinar recording

Executive View

Snapshot: Nervepoint Access Manager - 70354

Nervepoint Access Manager - Self-Service v0.5 is a free tool that provides self-service and password reset functionality as well as account unlock for Active Directory. The product is still deemed “beta” by Nervepoint Technologies, but the recently published v0.5 offers some additional benefit and valuable tools that can reduce help-desk calls in small to medium enterprises. The simplistic UI for the end-users is intuitive and self-explanatory, thus enabling average users to set-up their account and manage their data.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]