News Archive

Press Release

Analyst Company KuppingerCole releases new Reports

Wiesbaden, May 28, 2013 – Like in previous years KuppingerCole announced a variety of new Advisory Notes during KuppingerCole’s European Identity & Cloud Conference 2013, which took place in Munich/Germany. Besides various Reports about the winners of the European Identity & Cloud Award which have been given during a festive ceremony at EIC 2013, KuppingerCole also publishes the following Reports.

Press Release

Analystengruppe KuppingerCole veröffentlicht neue Reports

Wiesbaden, 28. Mai 2013 – Wie in den letzten Jahren hat KuppingerCole im Rahmen der jährlich stattfindenden European Identity & Cloud Conference 2013 eine Vielzahl neuer Reports vorgestellt. Hierzu gehören unter anderem beschreibende Reports zu den herausragenden Projekten, die im Rahmen einer feierlichen Zeremonie der EIC 2013 mit einem European Identity & Cloud Award ausgezeichnet wurden.

Press Release

KuppingerCole just published the advisory note "Maturity Level Matrixes for Identity and Access Management/Governance"

Wiesbaden, May 24, 2013 – KuppingerCole offers a standard approach on rating the status of current IT programs from both the Business and IT perspective and providing focused advice for further IT spending. 

Press Release

Analystengruppe KuppingerCole veröffentlicht Advisory Note "Maturity Level Matrixes for Identity and Access Management/Governance"

Wiesbaden, 24. Mai 2013 – KuppingerCole bietet fortan einen standardisierten Ansatz zur Beurteilung des Reifegrades der implementierten IT Lösungen. Dies bezieht sich sowohl auf die Business- wie auch auf die IT-Perspektive und bietet fokussierte Hilfestellung bei der Entscheidung über zukünftige IT-Ausgaben.

Blog

The Cloud Blossoms in Europe

A recent report commission by CA Technologies Inc. looks at the growth of the use of cloud services and the evolving attitudes to the security of these.  This report shows some interesting findings:  For instance:  Europe is catching up with the US, with “38% of the European respondents using cloud for two to three years.” As compared with “55% of the companies in the US have been in the cloud for three or more years”.  This finding is confirmed by the recent announcement by salesforce.com that they have signed an agreement to establish European data centre in the UK in 2014.  According...

Executive View

European Identity & Cloud Award 2013: EVRY AS - 70777

KuppingerCole has bestowed the KuppingerCole European Identity Awards since 2008 in recognition of excellent projects in the area of Identity and Access Management (IAM), GRC (Governance, Risk Management, and Compliance), and Cloud Security. This report gives a brief overview of the project performed at EVRY ASA, a leading IT system integrator and service provider based in Norway. The BIFROST Cloud Security platform provides a complete service offering in the IAM/IAG (Identity and Access Management/Governance) space. It covers four areas of security: Access Management, Identity...

Press Release

KuppingerCole introduced CIO GPS

Wiesbaden, May 22, 2013  – During the Opening Keynote at KuppingerCole’s European Identity & Cloud Conference 2013, which took place in Munich last week, Martin Kuppinger introduced KuppingerCole’s CIO GPS (GPS stands for Governance/Privacy and Data Protection/Security). The CIO GPS shows the nine areas CIOs should focus on for IT Spend Optimization, Business IT/Alignment, and Strategic Procurement, when looking at GRC (Governance, Risk Management, Compliance) and Information Security and provides orientation for CIOs and their teams on finding their way through...

Press Release

Neu eingeführtes Programm CIO GPS

Wiesbaden, 22. Mai 2013  – In der Opening Keynote der von KuppingerCole veranstalteten European Identity & Cloud Conference 2013, die letzte Woche in München stattfand, stellte Firmengründer und Principal Analyst des Analystenhauses Martin Kuppinger deren neu eingeführtes Programm CIO GPS (GPS steht für Governance/Privatsphäre und Datenschutz/Schutz) vor. Das CIO GPS definiert und zeigt die neun Bereiche, auf die das Augenmerk der CIOS gerichtet sein sollte, wenn es um die Optimierung von IT Ausgaben, Business/IT Alignment und strategische...

Executive View

Executive View: McAfee Cloud Single Sign On - 70746

In April 2013 McAfee announced the addition of Identity and Access Management solutions to its Security Connected portfolio. The products that were previously developed and sold by Intel include McAfee Cloud Single Sign On and McAfee One Time Password. In addition to the products McAfee also introduced the new McAfee Identity Center of Expertise, staffed with experts in identity and cloud security. That free service will assist users with support pertaining to identity and access management issues, such as architecture requirements and best practices...

Blog

Passwords, Authentication’s Zombies

Another European Identity (and Cloud) Conference has come and gone, and once again it was an exciting week with packed session rooms, and excellent attendance at the evening events. I’m not sure we can continue to call it the “European” Id Conference, though, as I met folks from Australia, New Zealand, Japan, South Africa and all over north and south America. And lots of Europeans, also, I should note. Nor were the attendees content to sit back and soak it all in. At least in the sessions I conducted there was a great deal of give and take between the audience and the speakers and...

Executive View

Executive View: Beta Systems Garancy Access Intelligence Manager - 70784

Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine neue, spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen Teilbereich von IAG (Identity and Access Governance). Access Governance-Lösungen bieten üblicherweise bereits integrierte Reporting-Funktionen, um die gesammelten Informationen über Zugriffsberechtigungen in Zielsystemen analysieren zu können. Gleiches gilt auch für Identity...

Press Release

European Identity & Cloud Awards 2013

Wiesbaden, May 16, 2013 – The European Identity & Cloud Awards 2013 were presented last night by the analyst group KuppingerCole at the seventh European Identity & Cloud Conference. This award is honoring outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), and Cloud Security.

Press Release

European Identity & Cloud Awards 2013

Wiesbaden, 16. Mai 2013 – Gestern abend verlieh die Analystengruppe KuppingerCole im Rahmen der siebten European Identity & Cloud Conference (EIC) in unterschiedlichen Kategorien den European Identity & Cloud Award 2013. Dieser Award zeichnet herausragende Projekte und Initiativen in den Bereichen Identity & Access Management (IAM), GRC (Governance, Risk Management and Compliance) und Cloud Security aus.

Press Release

KuppingerCole’s Identity & Cloud Conference (EIC) 2013 begann gestern in München

Wiesbaden, 15. Mai 2013 - Gestern begann in München KuppingerCole’s Identity & Cloud Conference (EIC) 2013, die sich als Leitveranstaltung in den Themengebieten Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC) und Cloud Security in Europa und darüber hinaus entwickelt hat. Bereits zum siebten Mal vereint KuppingerCole so gut wie alle namenhaften Hersteller in diesen Themenbereiche, zahlreiche Anwender, Thought Leader, Visionäre und Analysten unter einem Dach.

Press Release

KuppingerCole's European Identity & Cloud Conference 2013 has opened yesterday in Munich, Germany

Wiesbaden, May 15, 2013 – KuppingerCole’s European Identity & Cloud Conference 2013, the Europe’s leading event for such topics as Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), and Cloud Security, has opened yesterday in Munich, Germany. For the seventh time KuppingerCole has brought together most leading vendors, numerous end users, thought leaders, visionaries and analysts.

Executive View

European Identity & Cloud Award 2013: OAuth 2.0 - 70778

European Identity Award 2013 for „Best Innovation/New Standard in Information Security”: A new standard that rapidly gained momentum and plays a central role for future concepts of Identity Federation and Cloud Security.

Executive View

European Identity & Cloud Award 2013: Volkswagen Financial Services AG - 70775

Special Award 2013 for „Bridging the organizational gap between Business and IT”: A project that was far above average when it comes to Business/IT Alignment, by successfully setting up a framework of guidelines and policies plus the required organizational entities and rolling this out into a global organization.

Executive View

European Identity & Cloud Award 2013: Swiss Reinsurance Company Ltd - 70774

European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Holistic IAM/IAG approach following new architectural concepts and enabling Dynamic Authorization Management based on business rules.

Executive View

European Identity & Cloud Award 2013: Schindler Informatik AG - 70771

Special Award 2013 for „Rapid Re-Design and Re-Implementation of the Entire IAM”: Moving from a traditional, Active Directory-centric environment to full HR integration on a global scale and full support for automated provisioning, based on a clearly defined roadmap for further improvement.

Executive View

European Identity & Cloud Award 2013: Deutsche Bank AG - 70772

European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Implementing cross-divisional SoD rules on a global scale at business level, with full integration into the existing Access Governance solution.

Blog

European Identity & Cloud Awards 2013

The European Identity & Cloud Awards 2013 were presented tonight by the analyst group KuppingerCole at the seventh European Identity & Cloud Conference. This award is honoring outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), and Cloud Security. Numerous projects have been nominated by vendors and end-user companies during the last 12 months. Winners have been chosen by KuppingerCole analysts among the most outstanding examples of applications and ideas in the areas of IAM, GRC, and Cloud security. Additionally,...

Press Release

New KuppingerCole Analysts

Wiesbaden, 14th May 2013 - Peter Cummings, a high-class Identity & Access Management Specialist, and Rob Newby, renowned as top-level expert for Governance, Risk Management and Compliance, have joined analyst company KuppingerCole as Senior Analysts.

Press Release

Peter Cummings und Rob Newby werden Analysten bei KuppingerCole

Wiesbaden, 14. Mai 2013 - Das Analystenteam KuppingerCole wird ab sofort von Peter Cummings, einem hochkarätigen Identity & Access Management Spezialist und Rob Newby, bekannt als Experte für Goverance, Risk Management und Compliance unterstützt. Beide werden als Senior Analysten für KuppingerCole tätig sein.

Advisory Note

Advisory Note: From Big Data to Smart Information - 70750

Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data. The term Big Data needs to be understood as data which has greater quantity, variety or speed than can be comfortably processed using the technology that you already have. Big Data comes from a number of sources both internal and external. Many...

Executive View

Executive View: Big Data and Information Stewardship - 70744

Big Data provides many opportunities to solve emerging business challenges and Big Data technologies can create business value. However Big Data also creates security challenges that need to be considered by organizations adopting or using Big Data techniques and technologies. This paper outlines the information security risks involved in Big Data and recommends the responses to these based on the concepts of information stewardship and information centric security...

Advisory Note

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70745

Turning the Internet upside down and making privacy a fundamental layer of any networked interaction in the post Google & Facebook era. How the individuals will gain control. How social networks will have to adapt their business models. How privacy will return...

Advisory Note

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended Enterprise” in IAM/IAG, the cloud stratification in various layers, increasing threats imposed by the rise of cybercrime, and the emergence of Life Management Platforms. In the following sections, we name the five top trends for each area...

Advisory Note

Advisory Note: Typical Risks and Pitfalls for IAM and IAG projects - 70749

Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can help achieve this in a multitude of different ways for different departments and roles within them; internal staff and external partners and customers. However, this also makes it a complex issue which touches every part of the organization in different ways. Knowing the structure of an IAM programme...

Blog

Another dead body in IT? Or is XACML still alive?

Since my colleague Craig Burton has declared that SAML is dead, it seems to be in vogue among analysts to take the role of the public medical officer and to diagnose the death of standards or even IAM (Identity and Access Management) in general. Admittedly, the latter case was not about diagnosing the death but proposing to kill IAM, but that does not change much. The newest in this series of dead bodies is XACML, according to another Industry Analyst. So we are surrounded by dead corpses now, or maybe by living zombies. But is that really true? My colleague Craig Burton titled his blog –...

Advisory Note

Advisory Note: Selecting your cloud provider - 70742

The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that organizations create and communicate a policy for their acquisition and use. This should be supported by a simple, fast and reliable risk based process for cloud service procurement and complemented by providing appropriate training employees and associates. When acquiring a cloud service it is important...

Advisory Note

Advisory Note: Maturity Level Matrixes for Identity and Access - 70738

Most large organizations and a significant number of medium-sized organizations have heavily invested in IAM (Identity and Access Management) and IAG (Identity and Access Governance) during the past few years. Some projects went well; others did not deliver as expected. But even organizations that run successful IAM/IAG projects are challenged by new evolutions, such as the increasing relevance of the “Computing Troika” of Cloud Computing, Mobile Computing, and Social Computing and continually increasing regulatory pressure...

Webcast

The Common Credentials Dilemma - How to Get a Grip on Password Sprawl for Privileged Accounts

KuppingerCole Webinar recording

Blog

When three As are better than four

For years we’ve spoken about the 4 “A”s of identity & security - Administration, Authentication, Authorization, and Audit, but maybe it’s time to drop an “A”. Maybe it’s time to speak of “Access Control” which encompasses Authentication (sometimes referred to as “AuthN”) and Authorization (referred to as “authZ”). In many instances authorization is binary and tied directly to authentication – if a person is authenticated, then they get access to a resource. The authorization is tied only to the authenticated entity. Consider building security, for example – swipe your proximity card...

Press Release

KuppingerCole’s European Identity and Cloud Conference 2013

Wiesbaden, 06. Mai 2013  - Vom 14. bis 17. Mai 2013 findet in München die englischsprachige European Identity and Cloud Conference (EIC) 2013 statt. Zum 7. Mal öffnet KuppingerCole die Türen für mehr als 550 Teilnehmer aus über 20 Ländern. Im Ausstellungsbereich der Veranstaltung sind alle wichtigen Anbieter in den Themenbereichen Identity & Access Governance, Cloud Computing und GRC vertreten. Durch eine Liste hochkarätiger Sprecher und einen einzigartigen Mix aus Best Practices Präsentationen, Podiumsdiskussionen, Thought...

Webinar

May 10, 2013: The Common Credentials Dilemma – how to get a grip on password sprawl for privileged accounts

A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as administrator, dba, or root – not to speak of all the admin accounts of network equipment etc. Unfortunately, a large portion of accounts with highly elevated privileges is shared. To manage these accounts, to avoid password sprawl, and to in consequence mitigate risks, both guidelines and technologies...

Blog

The FIDO Alliance – game changer for Internet Security?

Last week, Google announced that it has joined the FIDO Alliance. FIDO stands for Fast Identity Online. The alliance was formed in July 2012. The mission is to change the nature of online authentication by providing interoperability among strong authentication devices. The alliance is working on specifications for an open, scalable, interoperable set of mechanisms that allow secure authentication of users to online services without the need for passwords for each of these services. It wishes to become a standard that allows using both existing and future strong authentication devices (those...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]