News Archive

Webinar

Jan 31, 2013: Rethinking Identity and Access Governance in a World of Change and Complexity

The convergence of Cloud, Mobile and Social Computing create strong new opportunities and change the way we use Information Technology, shifting the control into the hands of the users. Governing identity and access in such a complex environment is key to success. Join us in this webinar to discuss these challenges.

Press Release

Dr. Karsten Kinast, LL.M. joins KuppingerCole as an Analyst

Wiesbaden, December 18th, 2012 - Dr. Karsten Kinast, LL.M., one of Europe’s most high-profile data protection experts, has joined analyst company KuppingerCole as a Fellow Analyst responsible for all topics with a legal focus, in particular data protection law, IT law, copyright and media law. In this capacity, he will also act as a moderator and content director for these topics at the European Identity & Cloud Conference (EIC) 2013, which takes place for the seventh time on 14–17 May 2013 in Munich. 

Blog

Mobile Device Management: It will grow – but should it?

Some weeks ago I stumbled upon an article, which said that the MDM (Mobile Device Management) market will grow massively within the next five years. I don’t doubt that the market will grow. However I’d raise the question whether it should grow that much – or, in other words, whether MDM is really the solution of choice. I don’t doubt that there is some need for MDM technologies. However, this might be more about understanding MDM as an element of other technologies or a tactical piece of a bigger puzzle. Let me explain why. The problem organizations are facing today is that there are more...

Blog

Santa’s Identity Issues

If you’ve never really thought about it, you should realize that the Christmas season is a wonderful time to reflect on identity issues. As a young child, I wondered why there seemed to be so many Santa Clauses – all the stores seemed to have one in a “grotto,” while every street corner had one ringing a bell and collecting money in a cauldron. the only other people I’d ever seen (in books) with a cauldron were witches – but I didn’t make a connection. It never occurred to me – we didn’t even know the term then – was that it might be a massive case of identity theft, or identity fraud as...

Press Release

Rechtsanwalt Dr. Karsten Kinast LL.M. wird Analyst bei KuppingerCole

Wiesbaden, 14. Dezember 2012  - Rechtsanwalt Dr. Karsten Kinast, LL.M., einer der europaweit profiliertesten Datenschutzexperten, übernimmt ab sofort als Fellow Analyst beim Analystenunternehmen KuppingerCole die Verantwortung für alle Themen mit juristischem Fokus, insbesondere Datenschutzrecht, IT-Recht, Urheberrecht und Medienrecht. In dieser Funktion wird er auch auf der European Identity & Cloud Conference (EIC) 2012, die am 14.-17.05.2013 zum 7. Mal in München stattfinden wird, die Moderation und fachliche Leitung zu diesen Themen übernehmen.

Webcast

Expand your GRC Controls to Cover all Systems - How to Make SAP GRC Work in a Heterogeneous World

KuppingerCole Webinar recording

Blog

How a botnet has stolen 36 million Euro from European bank customers

In a recently published study Versafe and Check Point Software Technologies, two software vendors, analyze the recent Eurograpper attack based on the Zeus botnet and ZitMO (Zeus in the Mobile). This attack reportedly diverted up to 36 million € by intercepting financial transactions. The most interesting aspect of this is that the attack bypassed the out-of-band authentication of financial transactions. The banks use this approach to send TAN codes (transaction numbers) to the mobile phone of the user. It is out-of-band if (and as long) as the user uses another device like his PC for...

Executive View

Snapshot: Oracle Mobile and Social Access Management - 70724

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding support for mobile devices and for logins based on social networks (social logins)...

Blog

The employee – still security risk Nr. 1

Recently, there was news here and here that a disgruntled technician of the Swiss spy agency NDB (Nachrichtendienst des Bundes) had stolen terabytes of counter-terrorism information shared between the NDB, the CIA, and MI6 (the UK spy agency). The person has been temporary arrested. It is still unclear whether he has already sold some of that information or not. This case, together with many others like the theft of data from Swiss banks, which then is sold to German tax offices, again highlights that the biggest security risk for most organizations comes from internals. There is no doubt...

Webcast

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

KuppingerCole Webinar recording

Product Report

Product Report: Oracle ESSO - 70581

With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase. KuppingerCole offers a model designed to help IT organizations manage this dichotomy by changing the perspective on IT in general. We consider that an IT organization’s job should not only be viewed from a technology perspective but—perhaps even more importantly—should also be viewed from a business perspective. Then, the primary goal of an IT organization and its sole purpose is to provide...

Vendor Report

Vendor Report: MetricStream - 70105

MetricStream is a vendor in the GRC (Governance, Risk Management, Compliance) market. Within that market, MetricStream is positioned as an Enterprise GRC vendor with good support for IT GRC, providing solutions that cover business aspects as well as provide the technical integration to IT systems. This is in contrast to pure-play Business GRC solutions which only focus on manual controls and don’t provide out-of-the-box integration with IT systems. MetricStream provides a number of solutions for different GRC requirements. These include, amongst others, solutions for regulatory...

Blog

Holy Grail for the Cloud

Back in August (“Open Source IAM – is it right for you?”) I wrote about my friend Brad Tumy’s Open Source Identity Solutions list and spent a paragraph or two on ForgeRock OpenAM, which, I told myself, I’d try to get back to with more information for you. So recently I chatted with ForgeRock’s John Barco (director of product marketing) and Jamie Nelson (Vice President of Engineering), both of whom I’d first met when they were at Sun Microsystems. John & Jamie filled me in and what’s happening with ForgeRock, and I’d like to pass that...

Webcast

Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die Zukunft

KuppingerCole Webinar recording

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]