News Archive

Blog

Oracle OpenWorld ’13 Part 2 of 2 – going for more than the Americas Cup?

It is now nearly a month since Oracle OpenWorld 2013 closed and Oracle Team USA made an incredible win in the 34th Americas Cup. Both events have been amazing experiences with OpenWorld attracting more that 65000 attendees and Oracle Team USA coming back from certain defeat to a mind-blowing win. While I am a huge sailing fanatic, and probably could go on for days about the Americas Cup, in this blog post I will focus on what I believe the key messages from Oracle at OpenWorld were and also what it says about where Identity and Access Management is going. I came to Oracle OpenWorld with a...

Advisory Note

Advisory Note: Infrastructure as a Service Market Report - 71021

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with strengths in various areas.

Webinar

Dec 04, 2013: Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?

Many organizations have started their journey into the world of IAM several years ago.

Webcast

Identity Information Quality

KuppingerCole Webinar recording

Blog

Getting the security you need

Lately I’ve been writing a lot about how you should be improving your authentication and authorization. I’ve been haranguing you to get Risk-Based Access Control (RiskBAC) sooner rather than later. There has been some push back. It’s a truism in IT and security that “technology is easy, it’s the people that are hard.” Well, when moving to RiskBAC, the technology – or its implementation – isn’t easy. So if the technology isn‘t easy what does that say about the people? Darn near impossible, that’s what. There are, also, two different people problems. The first is users. While we’d like...

Press Release

New KuppingerCole Advisory Note: The Future of IT Organizations provides a standardized model to move your IT Organization and IT Infrastructure to the next level

Wiesbaden, October 18, 2013 – In the recently announced Advisory Note The Future of IT Organizations KuppingerCole identifies and describes the challenges organizations and IT are facing, based on the fundamental evolutions in IT.

Press Release

Neue Advisory Note von KuppingerCole: The Future of IT Organizations liefert ein Orientierungsmodell für die IT-Organisationsentwicklung

Wiesbaden, 18. Oktober 2013 - In der kürzlich veröffentlichten Advisory Note The Future of IT Organizations betrachtet KuppingerCole die geänderten Anforderungen an IT-Organisationen insbesondere im Kontext von agilen Unternehmensstrukturen. 

Webcast

Extended Enterprise - The New Scope of Information Security

KuppingerCole Webinar recording

Executive View

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and context-based authentication and authorisation methodology provides transparent authentication for the majority of the users, and provides an appropriate level of risk mitigation for those who are in untrusted positions. The level of assurance for a given identity depends on the risk of identity theft calculated...

Webinar

Nov 19, 2013: Moving Access Governance to the next level: Beyond check-box compliance

Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It is not sufficient to govern access in SAP environments or some few other IT systems to really tackle all of today’s Information Security challenges. The threat landscape is changing and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who...

Webcast

Strategic Information Security Investment Planning - The Legal Perspective

KuppingerCole Webinar recording

Blog

Salesforce Identity

Today Salesforce.com announced the general availability of Salesforce Identity – what does this mean for customers and the IAM market? In some ways this is not a completely new product, Salesforce.com CRM customers have been using much of this for some time.  However what is announced today extends the functionalities of this way beyond what previously existed.  Salesforce Identity provides a web single sign on capability that can be white labelled and which can be based on authentication by Salesforce.com or a number of other trusted identity providers.  The Salesforce.com authentication...

Blog

Identity Information Quality: Recertify the Identity

One of the challenges many organizations are facing in their IAM infrastructure is “Identity Information Quality”. That quality, especially in larger organizations, varies depending on the source it comes from. This challenge is not limited to the enrollment process, but also all subsequent processes. While the creation of new digital identities in IAM systems (at least for employees) is frequently driven primarily through imports from HR systems, changes of attribute values might be triggered from many different sources. Many organizations spend a lot of time and money to improve HR...

Advisory Note

Advisory Note: The Future of IT Organizations - 71200

Prepare your IT Organization for the major evolutions affecting every business. Become ready to deal with today’s and tomorrow’s approaches to Cloud Computing. Build a competitive on-premise IT if you still need on-premise IT (and most will). Stay in control of your Business Services, IT Services, and Information Security.

Executive View

Executive View: EmpowerID 2013 - 70005

EmpowerID was founded in 2005 and is based out of Dublin, Ohio. EmpowerID was previously known as a niche player, with products like the Active Directory (AD) Self-Service Suite, which provides web-based white pages and password reset for AD...

Vendor Report

Vendor Report: SafeNet - 70876

SafeNet’s Comprehensive data-centric security portfolio looks at business cases instead of solely technical solutions, and extends protection and ownership across the data lifecycle as it is stored, created, shared, accessed,and moved. The organisation looks forward to future-state virtual and Cloud deployments at the same time as making it possible integrate with current-state architectures.

Blog

Mobile Security: Virtualization on the smartphone

LG recently announced a new platform called GATE that will enable some LG business smartphones to run two mobile operating systems in parallel. LG appears, with this feature, to be reacting to the security concerns many organizations have around BYOD (Bring Your Own Device). Virtualization is one of the smartest options for enhancing the security of mobile devices, as we discussed in the KuppingerCole Advisory Note “BYOD”. By virtualizing the smartphones and providing two segregated environments, users can access both their business and their private environment, with the business apps...

Webcast

Approaches and Elements of Maturity Benchmarking in Information Security

KuppingerCole Webinar recording

Executive View

Executive View: Evidian Enterprise SSO - 70823

Despite being one of the more traditional and well-established areas of Identity and Access Management (IAM), and despite the fact there is still an obvious business benefit and quick-win potential in Enterprise Single Sign-On (E-SSO)  there are still many organizations that have not deployed an E-SSO solution. Enterprise Single Sign-On (E-SSO) is a well-established technology. Even with all the progress in the area of Identity Federation, providing standards-based Single Sign-On across applications and organizations, E-SSO still is a relevant technology. This is also true in light...

Blog

Avoiding Data Breaches and Managing Big Data

Today information is the foundation upon which businesses are built and organizations need to prosper.  However, given its value, information is not treated with sufficient respect by everyone in the organization.  It sometimes seems that the only people that understand the value of information are those who are trying to steal it! Big data makes this problem worse - in addition to the vast quantity of data from the Internet of Things and social media, so much unstructured information is now being created within organizations.  Who owns this data and who is responsible for its security? I...

Webcast

Wie Sie Ihre Daten unausspionierbar transportieren und speichern

KuppingerCole Webinar recording

Webcast

Verschlüsselung richtig einsetzen

KuppingerCole Webinar recording

Blog

Apple finally gets something right

Apple’s new iPhone (the 5S model) is equipped with the Touch ID fingerprint reader. Its release just a couple of weeks ago has generated more discussion (and bloviating) about biometrics, fingerprints in particular, than all other fingerprint systems together. Not only that, but it’s forcing me to do something I’ve rarely – if ever – done before: say something nice about Apple. In the twenty years I’ve been writing and opining about technology I’ve occasionally ranted about Apple, its products, its management and its fans, but for the first time, today, I can say bravo Apple. Bravo Apple...

Webcast

How Mature is Your Cloud?

KuppingerCole Webinar recording

Blog

The Future of the Cloud

As a UK member of ISACA as well as an industry analyst I was privileged to participate in a round table on the subject of the future of the cloud and the results of this were published in a supplement to the Guardian newspaper on September 27th. Here is a summary of my thoughts on this subject: The cloud is about efficiency and economies of scale.  The successful CSPs (Cloud Service Providers) will be those that can provide value for money to their customers.  For large enterprises the cloud will add complexity by becoming yet another platform to be accommodated.  However for SMEs the...

Whitepaper

Whitepaper: Migrating to the CA Technologies Solution for Identity Management & Access Governance - 71001

Recommendations for migrating from legacy Identity Provisioning to CA Technologies Identity Management and Access Governance solutions. Technical issues in migration, planning for migration, best practices, and potential benefits.

Executive View

Executive View: IBM SmartCloud Services - 70785

IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand.  IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a new Cloud Services division.  This executive view provides an overview of IBM SmartCloud IaaS and PaaS offerings together with an assessment their strengths and challenges in the light of these changes.

Press Release

Michael Bürger verstärkt das Businessteam von KuppingerCole

Wiesbaden, 1. Oktober 2013 - Im Rahmen der Expansion des Analystenhauses KuppingerCole nach Osteuropa verstärkt Michael Bürger das Businessteam des Unternehmens als Partner und übernimmt die Verantwortung für die Region Osteuropa.

Press Release

Michael Bürger is joining the KuppingerCole Business Team

Wiesbaden, October 1, 2013 – As a part of the analyst company KuppingerCole’s expansion towards Eastern Europe, Michael Bürger joins the company as a partner and assumes responsibility for the EECIS region.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]