News Archive

Conference

Sep 12 - 13, 2017: Consumer Identity World USA 2017

The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time.

Conference

Dec 12 - 14, 2017: Consumer Identity World APAC 2017

With so many different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. That is why the combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business.

Executive View

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment.

Leadership Brief

Leadership Brief: Securing PSD2 APIs - 72513

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use.

Conference

Nov 27 - 29, 2017: Consumer Identity World Europe 2017

Managing customer information in a digitally transformed economy with numerous business partners demanding access is one of the most significant challenges today, and it will continue to evolve rapidly. Besides that, the challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time CIW Europe is a joint Event with our Partner CXP (Le Groupe CXP, Paris, France).

Blog

PSD2 RTS Final Draft: The good and the not-so-good

The European Banking Authority released the final draft of the Regulatory Technical Specifications for PSD2 this week.  It contains several improvements and clarifications, but there are still a few areas that fall short of industry expectations. After the release of the initial drafts, EBA received a multitude of comments and discussion from many organizations and software vendors.  One of the top concerns was on the mandate for Strong Customer Authentication (SCA), which was defined traditionally as something you have, something you know, or something you are.  Originally...

Blog

GDPR and Customer Data - Eyes on the Stars and Feet on the Ground

Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's profiles. Many specialized vendors target these organisations. And it is obvious: The identification of customers across devices and accounts, a deep insight into their behaviour and the creation of rich customer profiles comes with many promises. The adjustment, improvement and refinement of existing product and service offerings, while designing new products as customer demand changes, are surely some...

Press Release

KuppingerCole’s 1st Digital Finance World 2017

Wiesbaden, February 23, 2017  – On Wednesday, March 01, 2017 starts for the first time KuppingerCole’s  Digital Finance World (DFW)  at the House of Logistics (HOLM) in Frankfurt a. M.. The conference offers with its two event days and an exhibition area a place where the finance and insurance world talks about innovations. Participants can interact with a targeted and engaged audience, enjoy an unparalleled content depth and get guidance for critical decisions on the digital transformation of your...

Conference

Sep 12 - Dec 14, 2017: Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Webinar

Apr 06, 2017: Making the Cloud a Secure and Easy to Use Environment

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.

Webcast

Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. Attackers are trying to gain access to privileged accounts, hijacking these. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions.

Webinar

Mar 28, 2017: Creating Secure and Unified Next Generation Workspaces

A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative teams within an organization. An overall change towards diverse end-user devices, both corporate and privately owned, adds a new dimension of complexity, while compliance and security requirements challenge IT, CISOs and executive management.

Advisory Note

Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283

Many new biometric technologies and products have emerged in the last few years.  Biometrics have improved considerably, and are now increasingly integrated into smartphones.  Mobile biometric solutions offer not only multifactor and strong authentication possibilities, but also transactional authorization.  However, there are a number of challenges with biometric authentication you must be aware of.

Executive View

Executive View: Ping Identity’s PingFederate - 70284

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain.

Executive View

Executive View: CensorNet Cloud Security Platform - 72529

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve governance over their use of cloud services.

Webinar

Mar 23, 2017: Personal data breach and the GDPR – Prevention, Detection and Notification

The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud...

Webinar

Mar 16, 2017: GDPR as Opportunity to Build Trusted Relationships With Consumers

The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Whitepaper

Whitepaper: Balabit - Privilege Management - 72705

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User Behavior Analytics are cornerstones of a modern SOC.

Webinar

Apr 06, 2017: Digital Transformation in Government

Digital transformation is increasingly affecting all types of organisations including Governments. In order to encourage citizens to adopt digital services, the least expensive channel for governments, it is necessary to support modern connection methodologies and provide user-focussed services. This webinar will investigate the challenges facing government and the opportunity digital transformation affords.

Webinar

Mar 23, 2017: Blockchain - How to Separate the Hype from Reality

Blockchain has taken the world by storm since the inception of Bitcoin. While the primary interest has been in the financial and insurance industry sector Blockchain technology has wider application. This webinar will describe the technology and separate the hype from reality, looking at some innovative Blockchain applications from identity management to the Internet of Things.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]