News Archive

Blog

Azure Active Directory: What is the Graph API?

In Azure Active Directory (AAD) there is a Graph API. This is the main API to access AAD. The idea of a Graph API is not entirely new. The one provided by Facebook is already well established. But what is this really about and why does AAD provide such an API? First of all, I neither like the term “Graph API” nor “API” itself very much. Both are, from my perspective, far too technical. They are fine for people with a good background in mathematics and computer science, but not for typical business people. A graph is a mathematical concept describing nodes and their connections. The...

Leadership Compass

Leadership Compass: Access Management and Federation - 70790

With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access from externals and to external systems, including cloud services, in a consistent way. Organizations have to move forward to strategic approaches on enabling that integration, supporting the Extended Enterprise. While Web Access Management technologies...

Webcast

Authorization as a Calculated Risk

KuppingerCole Webinar recording

Blog

Oracle OpenWorld '13 Part 1 - Midway Report

Whilst the majority of the IT press is focusing on the big announcements being made here at Oracle OpenWorld, such as in-memory storage and the extended collaboration between Oracle, EMC and Microsoft, I would like to focus a bit more on the Identity & Access Management news. There are several new innovations from Oracle which have not got the same attention as the keynotes, even though many of them are, in my opinion, game-changing and could have a significant impact on the business world. In this post I will cover them briefly, and in the following weeks I will be going into more...

Webcast

The Business Side of the API Economy: Enabling the Agile, Connected Enterprise

KuppingerCole Webinar recording

Blog

A recipe for PII

PII, Personally Identifiable Information (also phrased as Personal Identity Information) is at the heart of identity security and privacy. Yet, like almost all terms in the Identity sphere, it suffers from multiple overlapping definitions leading to misunderstandings, heated discussions and a distinct lack of clarity. Major sources of these problems are codified definitions from national laws, standards bodies and government agencies (such as the US National Institute for Standards and Technology). There’s not much I can do about government definitions, no matter how wrong they are. But I...

Blog

Understanding Azure Active Directory

Some time ago Microsoft unveiled its Azure Active Directory (AAD). During recent weeks, I have had several discussions about what AAD is. First of all: It is not just an on-premise AD ported to Azure and run as a Cloud service. Despite relying in its inner areas on proven AD technology, it differs greatly from on-premise AD. It is a new concept, going well beyond a classical directory service and integrating support for Identity Federation and Cloud Access/Authorization Management. In fact you can use three flavors of AD today: The classical on-premise AD The on-premise AD running on...

Press Release

Andrew Nash is joining the KuppingerCole Analyst Team

Wiesbaden, September 17, 2013  – Identity Expert Andrew Nash just joined KuppingerCole as Fellow Analyst. Besides his very strong background in dealing with consumer identities, he has a long-term experience in PKIs, secure web services, and other identity and security related topics. “We are very pleased to welcome Andrew on board. Andrew is an experienced and well-known thought leader in Identity Management and Information Security and will add furthermore expertise to our team of leading Information Security experts”, Martin Kuppinger, Founder and Principal...

Webinar

Oct 08, 2013: Verschlüsselung richtig einsetzen

Die NSA und ihre Helfer in Europa und Deutschland haben gewaltige Möglichkeiten, sich in Ihr berufliches und privates digitales Leben unbemerkt einzuschleichen. Die jüngsten Enthüllungen zur Entschlüsselungspraxis der NSA und den Zugriff auf Smartphones steigern einerseits die Beunruhigung. Andererseits aber liefern sie genügend Details über die Praxis staatlichen Hackertums, um eine Verteidigungslinie definieren zu können. Prof. Dr. Sachar Paulus, Krypto-Experte und KuppingerCole Senior Analyst, gibt Ihnen 5 Tipps, wie Sie einen wesentlichen Teil staatlich organisierter Angriffe auf Ihre...

Webinar

Dec 19, 2013: Big Data - The Holy Grail for Information Security?

With an increasing number of fraud incidents, customer data losses and other breaches on one side, and the disappearance of the classical perimeter because of the need to finally extend the enterprise to partners and customers on the other side, introducing Big Data for Security Analytics seems to be the logical next level for your information security strategy. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will talk about the benefits and challenges using Big Data for security analytics, and he will draw your attention to the additional risk that may come along with...

Webinar

Oct 08, 2013: Wie Sie Ihre Daten unausspionierbar transportieren und speichern

Die neuesten Enthüllungen über die Angriffe westlicher Geheimdienste, allen voran der NSA, auf kryptografische Implementierungen sorgen verbreitet für Unsicherheit darüber, wie man sich mit welchen heute verfügbaren Werkzeugen noch wirksam vor dem Ausspionieren schützen kann. In diesem Webinar sprechen KuppingerCole Senior Analyst Prof. Dr. Sachar Paulus und Lutz Emrich vom SIZ über die Auswahl und den Einsatz solcher Werkzeuge. Dieses Webinar baut auf unser einführendes Webinar mit dem Titel "Verschlüsselung richtig einsetzen" auf.

Webinar

Oct 22, 2013: Identity Information Quality

Identity Information Quality has been a challenge since the early days of IAM, and it remains top of the list in many projects. Good quality of identity information is the foundation of any information security initiative. In this webinar, we will discuss strategies and solutions to improve identity data quality.

Webinar

Oct 09, 2013: Approaches and Elements of Maturity Benchmarking in Information Security

Information Security is hard to measure. If your security strategy fits well into your organization´s needs, then the risks are low and there is hardly anything happening that you could measure. Or, the other way round - the more you can measure, the more your job is at risk. True? Join us in this webinar to find out.

Webinar

Nov 05, 2013: Negotiating the Cloud Standards and Advice Jungle

The cloud is a hot topic and most SDOs (Standards Defining Organizations) have at least one initiative in this area. This plethora of initiatives has confronted the users of cloud services as well as CSPs (Cloud Service Providers) with a jungle of frameworks, standards, advice and certifications. In this webinar, KuppingerCole´s Senior Analyst Mike Small will provide a summary of these and some practical advice on their relevance and usability.

Webinar

Oct 17, 2013: Extended Enterprise - The New Scope of Information Security

Managing access to information and services deployed anwhere for employees, partners and customers in any context on any type of device owned by any party involved - there couldn´t be a much more challenging task. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce you into the new concept of managing the "explosion" of identities and devices.

Webinar

Oct 15, 2013: Strategic Information Security Investment Planning - The Legal Perspective

The ever increasing challenge of meeting regulatory compliance is putting more and more pressure on your information security budget? Then it may be time to include some legal arguments to convince your management that you need to spend more on information security. In this webinar, KuppingerCole´s Fellow Analyst, Lawyer and Data Protection expert will help you finding these arguments.

Blog

I ♥ Biometrics

If you’ve followed my writings for very long, you know I’m a strong believer in biometric authentication. (See, for example, this Network World column from over a dozen years ago) Why? Well, for one reason, unlike a password or a hardware token, you can’t misplace or lose a biometric (fingerprint, facial scan, keyboard dynamics, etc.) – it’s always with you. Now, there’s another biometric system for you to look at. Bionym, Inc. has announced Nymi, a biometric reader that goes a step further than most others. Nymi is a bracelet with two electrical contacts – one on the underside, which is...

Webinar

Oct 04, 2013: How Mature is Your Cloud?

Cloud services are outside the direct control of the customer organization and their use places control of the IT service and infrastructure in the hands of the CSP (Cloud Service Provider). A structured approach is essential to ensure organizational readiness for the cloud, to select the right service to meet business needs and other non-functional requirements like security and compliance and to enable that service to be assured. This webinar gives an introduction into cloud maturity assesment basics and is a great preparation for the KuppingerCole Information Risk & Security Summit...

Product Report

Product Report: SAP GRC Access Control 10 - 70737

The standard solution for managing Access and the related risks in SAP environments. Implement SoD controls, keep privileged users under control, and know what could happen in your SAP systems.

Webinar

Sep 17, 2013: Verschlüsselung richtig einsetzen

Die NSA und ihre Helfer in Europa und Deutschland haben gewaltige Möglichkeiten, sich in Ihr berufliches und privates digitales Leben unbemerkt einzuschleichen. Die jüngsten Enthüllungen zur Entschlüsselungspraxis der NSA und den Zugriff auf Smartphones steigern einerseits die Beunruhigung. Andererseits aber liefern sie genügend Details über die Praxis staatlichen Hackertums, um eine Verteidigungslinie definieren zu können. Prof. Dr. Sachar Paulus, Krypto-Experte und KuppingerCole Senior Analyst, gibt Ihnen 5 Tipps, wie Sie einen wesentlichen Teil staatlich organisierter Angriffe auf Ihre...

Blog

Security is not enough

Since I have worked in this industry, one trend has always been evident – most IT departments can’t, don’t or won’t pay for the very cutting edge developments in security technology. It’s not that they struggle to keep up with these developments, on the contrary, they are the very people who are demanding them, it is that they have different priorities. Technology budget is traditionally focused on performance and delivery rather than security, as that is where the obvious business benefits lie. Security rarely gives a return on investment, it is there to prevent loss; so at best security...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]