News Archive

Webcast

Secure Mobile Information Sharing: Adressing Enterprise Mobility Challenges in an Open, Connected Business

KuppingerCole Webinar recording

Blog

Cloud Compliance Remains a Challenge

The cloud is reality – but still legally controversial in the details. So what do we need to consider for the future with regard to liability, especially as there are few practical alternatives for data management in the cloud and many already see the cloud as unmatched in value from an economic viewpoint? Over and over again, references are made to the cloud’s problems with multiple national and international data protection laws. Among other things "sensitive data" - for example, health data - internationalization presents huge legal problems with data management in the cloud. The...

Webcast

Understand Your Access Risks - Gain Insight Now

KuppingerCole Webinar recording

Blog

Seven Fundamentals for Future Identity and Access Management

Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source for identity information, Identity Management has to address a far more complex environment today. Over the past several years, we have already seen a number of drastic changes triggered by Cloud Computing, Mobile Computing, and Social Computing. Different deployment models and the management of access to Cloud applications, authentication and secure information access of mobile users, and the...

Blog

FIDO Alliance announces final FIDO 1.0 specifications

Yesterday, culminating over 20 months of hard work, FIDO Alliance has published final 1.0 drafts of their Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F) specifications, apparently setting a world record in the process as the world’s fastest development of a standard in the Identity Management industry. I wrote a post about FIDO Alliance in October, when the first public announcement of the specifications has been made. Since that time, I’ve had an opportunity to test several FIDO-compatible solutions myself, including the Security Key and Yubikey Neo-N...

Webcast

Access Governance for Today's Agile, Connected Businesses

KuppingerCole Webinar recording

Executive View

Executive View: Courion Access Governance/Risk Products - 71046

The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market segments in that broader IAM/IAG market.Over the past few years, the field of Access Intelligence, providing advanced analytical capabilities for identifying access risks and analyzing the current status of entitlements, has been a strong factor in this growth.  Improved capabilities in managing...

Blog

Quis custodiet ipsos custodes?

Or, if your Latin is a bit rusty, “who is guarding the guards themselves”? This was actually my first thought when I’ve read an article published by Heise Online. Apparently, popular security software from Kaspersky Lab, including at least their Internet Security and Antivirus, is still susceptible to the now-well-known POODLE exploit, which allows hackers to perform a man-in-the-middle attack on an SSL 3.0 connection by downgrading the level of encryption and effectively breaking its cryptographic security. When this vulnerability was published in September, many security researchers...

Blog

Read your cloud contract well: Your cloud service might become disruptive to your business

There is a lot of talk about disruptive technology and disruptive innovation – not only in the context of fundamental technology changes, but also in the context of innovating your business by being disruptive. Cloud Computing has a potential for fostering such innovation in business, for various reasons: It makes IT services available to organizations that never before could afford these services. This is particularly relevant to SMBs. It provides rapid adoption of new services, thus enabling rapid innovation. It allows companies to concentrate on their core business and competitive...

Webcast

Identity & Access Management als Fundament für das Digitale Business

KuppingerCole Webinar recording

Analysts' View

KuppingerCole Analysts' View on Cyber Security

270 IT Security experts took part in the recent KuppingerCole digital risk and security awareness study. The results of this study will be published in December 2014. The results of the survey are not unexpected: 85.6% of the participants have seen an increase in the number of cyber security threats over the past 12 months. Analyzing the causes of this increase shows that there are three main reasons for this changing perception. 58.7% of the respondents indicated that there is more publicly available information about cyber-attacks, resulting in a change in the perception of the...

Blog

Know Your Enemy

At a recent seminar I was asked a question on how and where do we begin preparing for a cyber attack. Another individual who interrupted my answer insisted that controls was the way to go. He said something that sounded like “I got all my 20 controls under control, implemented and monitored. I am fine." Although I partially agree with the answer that controls are important and must be implemented correctly. Oh, they also must be monitored regularly. However, I am of the opinion that the better way to begin the journey of setting up an effective cyber security posture is to begin by...

Blog

A preview of the KuppingerCole Digital Risk & Security Awareness Study

270 IT Security experts took part in the recent KuppingerCole digital risk and security awareness study. The results of this study will be published in December 2014. The results of the survey are not unexpected: 85.6% of the participants have seen an increase in the number of cyber security threats over the past 12 months. Analyzing the causes of this increase shows that there are three main reasons for this changing perception. 58.7% of the respondents indicated that there is more publicly available information about cyber-attacks, resulting in a change in the perception of the...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]