News Archive

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms.

Webcast

Welcome to the European Identity & Cloud Conference

Learn all you need to know about the future of information security today!

Webcast

How to Work Together in a Privacy Preserving Way to Mitigate Risks

Panel at the Consumer Identity World 2017 APAC in Singapore

Webcast

The User Experience Panel

Panel at the Consumer Identity World 2017 APAC in Singapore

Webcast

The Role of Consumer Identity in Driving Enterprise Business Value

Panel at the Consumer Identity World 2017 APAC in Singapore

Webcast

Innovation, Agility, Usability - Getting the Most out of Your CIAM Strategy

Panel at the Consumer Identity World 2017 APAC in Singapore

Webcast

Katryna Dow - How Consumer Identity is approached by Meeco

Kantara Workshop at the Consumer Identity World 2017 APAC

Webcast

What is CIAM and why do we need it?

Kantara Workshop at the Consumer Identity World 2017 APAC

Webcast

Eric Lee - CIAM Challenges in Driving Customer-Centric Digital Transformation

Kantara Workshop at the Consumer Identity World 2017 APAC

Webcast

Colin Wallis - An Introduction to Kantara, its mission, work, structure and business model

Kantara Workshop at the Consumer Identity World 2017 APAC

Executive View

Executive View: Ilantus IDaaS Next - 70252

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting features and a well-thought-out roadmap for further evolution.  

Webcast

Rashmi Vittal - Earn Your Customers’ Trust: Building Deep Customer Relationships Gradually through Progressive Identity

Keynote at the Consumer Identity World 2017 APAC in Singapore

Webcast

Don Thibeau - Trust Frameworks: Their Critical Role in Governing Identity Systems

Session at the Consumer Identity World 2017 APAC in Singapore

Webcast

Gerauld Fiel Rivera - Marrying CIAM and Your Purpose to Jumpstart Your Identity Strategy

Keynote at the Consumer Identity World 2017 APAC in Singapore

Webcast

Allan Foster - Power to the People: Privacy, Trust and Data

Keynote at the Consumer Identity World 2017 APAC in Singapore

Webcast

Tom Wills - Customer Authentication Strategies in an Evolving Technology, Threat and Regulatory Environment

Session at the Consumer Identity World 2017 APAC in Singapore

Webcast

Graham Williamson - Privacy in the Asia Pacific: CBPR vs. GDPR

Session at the Consumer Identity World 2017 APAC in Singapore

Webcast

Dr. J.R. Reagan - Identity 4.0: Scaling for the Industrial Internet

Keynote at the Consumer Identity World 2017 APAC in Singapore

Executive View

Executive View: AlgoSec Security Management Suite - 70262

AlgoSec Security Management Suite ist eine hochautomatisierte und speziell für Unternehmen konzipierte integrierte Lösung zur Verwaltung von Netzwerksicherheitsrichtlinien und der Konnektivität von Geschäftsanwendungen für verschiedenste Geräte in heterogenen Umgebungen.

Webcast

Step-by-Step Guide to GDPR Compliance

Many people still have only a vague idea how to start planning for the GDPR, even after reading numerous publications and discussions and being bombarded from all directions with promises to solve all compliance challenges once and for all. This is completely understandable, since the regulation with its 11 chapters and 99 articles is very difficult to comprehend, to say nothing about translating the mixture of technical and legalese terms into concrete actions. The goal of this webinar is to help people decrypt the bureaucratic language of the regulation, to clarify each of its major...

Webcast

Gil Bernabeu - There Will Be No Growth in the Digital Service Market Without Privacy

Presentation at the Consumer Identity World 2017 EU in Paris, France

Webcast

Yann Lechelle - Personal Voice Assistants: How Personal, How Much Assistance?

Presentation at the Consumer Identity World 2017 EU in Paris, France

Webcast

Khanh Dang Ngo - CIAM, Privacy & the Blockchain in Financial Markets

Presentation at the Consumer Identity World 2017 EU in Paris, France

Webcast

Kannan Rasappan - Blockchain-based Pseudonymous Identity Provider

Presentation at the Consumer Identity World 2017 EU in Paris, France

Webcast

Gauthier le Masne - Reinvent the Air France KLM Customer Experience

Customer Case Study at the Consumer Identity World 2017 EU in Paris, France

Webcast

Peter Groeneveld - Implementing Consumer IDaaS for Your Smart Thermostat

Customer Case Study at the Consumer Identity World 2017 EU in Paris, France

Webcast

Make Consent Work with More Transparency and Less Control

Discussion panel at the Consumer Identity World 2017 EU in Paris, France

Webcast

Accepting Mobile Authentication: How to Integrate with E-Commerce

Discussion panel at the Consumer Identity World 2017 EU in Paris, France

Webcast

Mobile Biometric Authenticators: The Smartphone as Key

Discussion panel at the Consumer Identity World 2017 EU in Paris, France

Webcast

Mobile Ecosystem Forum Workshop: The Trust Advantage

Workshop at the Consumer Identity World 2017 EU in Paris, France

Blog

Obsession? Hype? Revolution? It Might Be a Bit of Everything: Moving Into the Age of Blockchain in Cybersecurity, Identity and Privacy

In looking at the current investor craze mainly around the primary use case of blockchain, the Bitcoin, it sometimes gets a bit difficult to think beyond the bubble and track those blockchain projects, which indeed are on their way to becoming useful in changing the way we do things like selling or buying stuff, digitally moving value, immutably store any kind of documents and data, consume information, create and manage digital IDs, or otherwise influence and change most aspects of our social, political and economic interactions. What we see happening in the crypto-world, is an explosion...

Webcast

Angelica Steinacker - How to Build a Secure and Successful Consumer Relationship

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Thom Langford - Won’t Somebody Think of the Customers Data?!

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Redefining Access Governance for Security and Fraud Prevention in Critical Applications

Enterprise platforms from SAP, Microsoft or Oracle, applications for highly regulated industries like finance or healthcare, even cloud services – all of them have their own unique and complex security models and each is usually managed by a separate team. Growing organically but even more so through mergers and acquisitions, a substantially large enterprise inevitably faces the challenge of managing risk and maintaining regulatory compliance across multiple and highly heterogeneous critical applications. Some of them are no longer even under their direct control and are managed...

Webcast

Martin Kuppinger, John Tolbert - Balancing User Experience, Privacy and Security for the Connected Consumer

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Martin Kuppinger - What Does It Take for a Complete CIAM Solution?

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Corné van Rooij - How Consent Can Build Customer Intimacy

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Christian Goy - Approaching Tomorrow Through a New Lens

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Rooly Eliezerov - How the Upcoming Wave of Identity Innovation Will Impact Society and You

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Katryna Dow - Harnessing CIAM, Regulation, Privacy and Customer Inclusion to Drive Digital Transformation

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Tim Maiorino - GDPR Is Coming

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Dennis Rijntjes, Daniel Vijge - Deepening Traveler Relationships through CIAM

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Joni Brennan - Consumer ID will Move GDP

Keynote at the Consumer Identity World 2017 EU in Paris, France

Webcast

Cécile Wendling - Insurance in the Digital Age

Keynote at the Consumer Identity World 2017 EU in Paris, France

Executive View

Executive View: Duo Security - 71330

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications they use. Duo Security goes beyond 2FA with adaptive authentication, endpoint visibility, mobile security, SSO and phishing assessment.

Webcast

Corné van Rooij - Kantara Initiative's Consent Management Solutions Workgroup

Kantara Workshop at the Consumer Identity World 2017 EU

Webcast

Thorsten Niebuhr - Kantara Initiative's Identity Relationship Management Workgroup

Kantara Workshop at the Consumer Identity World 2017 EU

Webcast

Mark Lizar - Kantara Initiative's Consent and Information Sharing Workgroup

Kantara Workshop at the Consumer Identity World 2017 EU

Webcast

Colin Wallis - Overview of Kantara's Work

Kantara Workshop at the Consumer Identity World 2017 EU

Webcast

Authentication & Authorization for the Microservices World

Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules are deployed independently and only communicate over standard protocols or APIs, they lend themselves to continuous delivery and continuous integration processes, reducing costs and risks of developing new features. However, with an increasing number of microservices, the complexity of adding security and...

Blog

McAfee Acquire Skyhigh Networks

McAfee, from its foundation in 1987, has a long history in the world of cyber-security.  Acquired by Intel in 2010, it was spun back out, becoming McAfee LLC, in April 2017. According to the announcement on April 23rd, 2017 by Christopher D. Young, CEO – the new company will be “One that promises customers cybersecurity outcomes, not fragmented products.” So, it is interesting to consider what the acquisition of Skyhigh Networks, which was announced by McAfee on November 27th, will mean. Currently, McAfee solutions cover areas that include: antimalware, endpoint...

Webcast

Identity and Access Management for Microsoft Azure and SharePoint Online

As Microsoft’s cloud solutions – including Microsoft Azure, Microsoft Office 365, and Microsoft SharePoint Online – are gaining more market share, integrating these platforms into existing enterprise IAM environments becomes essential. As more and more sensitive corporate data is moved to the cloud, ensuring strong information protection, secure access for employees, partners or customers, and, last but not least, compliance with the stringent regulations like GDPR, is impossible without a unified IAM across all on-premises and cloud systems.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]