News Archive

Webcast

Access Governance richtig gemacht: Investitionsschutz und zielgerichtete Weiterentwicklung

KuppingerCole Webinar recording

Blog

Google as Bogeyman

Is Google the new Microsoft? That is, is Google now the company that "people love to hate," so that - no matter what they do - there's sure to be criticism of them? Ten years or so ago Google was seen as the "white knight" that would vanquish the Microsoft dragon as a worthy successor to Apple in that role. Now, though, it appears that Apple has risen from the ashes and is the valiant warrior that the Google "dark lord" is trying to usurp. Here in the western hemisphere, the gathering of personal data in order to present ads to you which reflect your interests is considered by many to be a...

Webinar

Mar 22, 2012: Conducting an Orchestra – The New Role of IAM

With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security cornerstone.

Webcast

Best Practice Driven Identity & Access Management

KuppingerCole Webinar Recording

Blog

Apple iOS (and Android): Data Leakage by Design

Recently an old story hit the news again: Apple iOS allows apps free access to the address book, without any user consent. However that isn’t really new. The story was told back in 2010. Privacy awareness and concerns, however, have massively gained momentum since then, so it is a different situation now. Apple CEO Tim Cook has been asked by two congressmen to provide answers by Feb 29th (even while it is a German link, the lower half with the letter of the congressmen is in English). See also this link. What has happened: Apple iOS allows apps to access the address book information. Some...

Webinar

Mar 29, 2012: Identity & Access Management in the Cloud: Real or a Mirage?

Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.

Webcast

Sicherheitsanalysen und Sicherheitsmanagement - schnell, automatisiert, intelligent

KuppingerCole Webinar recording

Blog

Data Protection and the Cloud

Nowhere is the uncertainty surrounding data protection currently greater than with regard to cloud services. Microsoft is on the right track with its extensive implementation of the EU standard contract clauses, writes Martin Kuppinger. At the end of last year, Microsoft brought its Office 365 contracts into line with EU data protection and privacy regulations. But the real question when such an announcement is made is always: what’s really behind it? In this case, Microsoft can arguably be considered a pioneer. Microsoft has taken a step that many other providers should emulate. An...

Press Release

Terminblocker - European Identity and Cloud Conference 2012

Düsseldorf, 13. Februar 2012  - Vom 17. bis 20. April 2012 findet in München die englischsprachige European Identity and Cloud Conference (EIC) 2012 statt. Mit mehr als 550 Teilnehmern aus über 20 Ländern und einem Ausstellungsbereich, in dem alle wichtigen Anbieter der Bereiche Identity & Access Management, Cloud Computing und GRC vertreten sind, hat sich die European Identity and Cloud Conference  in den vergangenen 6 Jahren als eine der weltweit wichtigsten Veranstaltungen für eine  moderne und zukunftsfähige Informationssicherheit...

Blog

IAM legacies – bad for your business

It’s been almost 15 years since Business Layers and Oblix ushered in the new age of Identity and Access Management Systems (IAM systems) with what I called at the time the “killer app” for Directory Services – electronic provisioning. Even more incredible is that it’s almost 20 years since I wrote a workflow-based provisioning application (I even called it “employee provisioning”) based on Microsoft’s messaging application programming interface (MAPI). It actually was quite primitive in terms of 21st century provisioning tools in that it relied on automated email messages to inform people...

Webcast

Bridging the Cloud Sign-on Gap

KuppingerCole Webinar recording

Blog

Isn’t it better that we talk about last-generation firewalls instead of next-generation firewalls?

One of the buzzwords that became quite popular during the last few years is “next-generation firewall”. Some startup vendors position themselves in that market segment and established firewall vendors are trying to catch up. But when looking at what next generation firewalls are, I doubt that this term really applies, for two reasons: One is the question of which role firewalls will play in the future. There is no doubt that we will need some sort of firewalls as part of a multi-layered security concept. However, the firewall as the leading security device at the perimeter isn’t the...

Webinar

Mar 21, 2012: Returning (or finally bringing?) Identity and Access Management (IAM) to the User

IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.

Press Release

Fulup Ar Foll joined the KuppingerCole analyst team

Duesseldorf, February 6th, 2012  - Fulup Ar Foll just joined KuppingerCole as a Senior Analyst. Besides his very strong background in large scale and high performance identity and access management, as well as information security architecture, Fulup´s research focus is related to consumer and citizen identity, mobile security and to the evaluation and assessment of technology standards. “We are glad to have Fulup on board. Fulup is one of the most experienced and well-known professionals in the industry and adds to the brain pool of KuppingerCole”,...

Webcast

Back to the ROOTs

KuppingerCole Webinar recording

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]