News Archive

Webcast

Reducing Risk with User Behavior Analytics (UBA)

Artificial Intelligence (AI) and Machine Learning have matured to the point where making use of analytics in Security broadly is possible. With this more specifically in Identity & Access Management is now possible. One of the most interesting applications of such analytics has been in managing privileged identities and accounts. Given that such identities and accounts have access to sensitive and business critical data, it is very important to ensure that they are not only protected, but also monitored in real time for anomalies in behavior. The use of User Behavior Analytics (UBA) to...

Vendor Report

Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513

As a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over their intellectual property. Of late the company has developed a more diversified client base, especially in the health sector, which must deal with much sensitive data.

Advisory Note

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility.
In building a modern, resilient and defendable network the firewall may have a part to play, by using it in a role where it is actually able to be effective.

Webcast

Creating Secure and Unified Next Generation Workspaces

Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.

Executive View

Executive View: Ping Identity PingOne - 70288

PingOne provides c loud - based Single Sign - On (SSO)  and Identity - as - a - Service  (IDaaS)  for employees, business partners, and  consumers . PingOne is a  key  component of PingIdentity’s Consumer Identity and Access Management SaaS  offering, supporting social logins, self - registration, and SSO to all popular SaaS  apps.

Blog

GDPR as an Opportunity to Build Trusted Relationships with Consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the webinar. Q: How does two factor authentication play into GDPR regulations? Karsten Kinast: Two factor authentication does not play into GDPR at all. Martin Kuppinger: While two factor authentication is not a topic of GDPR, it e.g. plays a major role in another upcoming EU regulation, the PSD2...

Webcast

Personal data breach and the GDPR – Prevention, Detection and Notification

The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. All systems dealing with data subject to data protection legislation (i.e. PII = personally identifiable information) will need to be compliant to the requirements of this regulation. And, quite logically, IT systems will in turn be key enablers for many organisations to achieve compliance to this new set of requirements.

Webcast

Blockchain - How to Separate the Hype from Reality

Blockchain has taken the world by storm since the inception of Bitcoin. While the primary interest has been in the financial and insurance industry sector Blockchain technology has wider application. This webinar will describe the technology and separate the hype from reality, looking at some innovative Blockchain applications from identity management to the Internet of Things.

Executive View

Executive View: HexaTier Database Security and Compliance - 71255

HexaTier provides an all-in-one database security and compliance solution across  multiple platforms with a strong focus on  cloud environments and Database-as-a-Service products.

Executive View

Executive View: Cisco Advanced Malware Protection - 72518

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and continuous endpoint and network monitoring, AMP provides constant visibility and control across all environments before, during, and after a cyber-attack.

Whitepaper

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty.  

Webcast

GDPR as opportunity to build trusted relationships with consumers

The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.

Blog

Building a Future-proof Intelligent Security Operations Center, Part 2

Security Intelligence Platforms (SIP) are universal and extensible security analytics solutions that offer a holistic approach towards maintaining complete visibility and management of the security posture across the whole organization. Only by correlating both real-time and historical security events from logs, network traffic, endpoint devices and even cloud services and enriching them with the latest threat intelligence data it becomes possible to identify previously unknown advanced security threats quickly and reliably, to be able to respond to them in time and thus minimize the...

Blog

Building a Future-proof Intelligent Security Operations Center

I have to admit that I find the very concept of a Security Operations Center extremely… cinematic. As soon as you mention it to somebody, they would probably imagine a large room reminiscent of the NASA Mission Control Center – with walls lined with large screens and dozens of security experts manning their battle stations. From time to time, a loud buzzer informs them that a new security incident has been discovered, and a heroic team starts running towards the viewer in slow motion… Of course, in reality most SOCs are much more boring-looking, but still this...

Blog

Why Wikileaks' Vault 7 Publication isn't Worth Reading

Vault 7, Wikileaks´ recently published plethora of documents and files from internal CIA resources, has created quite some excitement and noise, and it has even been compared with Edward Snowden´s NSA revelations. My opinion: this is complete nonsense. In looking at what Edward Snowden has done - disclosing information on methods and extent of NSA´s mass surveillance activities which nobody outside the walls of NSA would have thought it would be possible - these latest collections of CIA authored configuration files and documents describing exploits and...

Webinar

Mar 30, 2017: Reducing Risk with User Behavior Analytics (UBA)

Business landscape is changing rapidly where most organizations, irrespective of the vertical, are transforming themselves into technology organizations. With the adoption of Internet of Things (IoT), the number of connected entities has increased significantly. Managing identities of people, things and other objects in an automated and predictive manner is becoming the new norm. Simultaneously, the burgeoning number of identities exposes a broader attack surface posing a big challenge to these organizations and their growth plans.

Leadership Compass

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.

Webinar

Apr 27, 2017: Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben

Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche Herausforderung und bedarf angemessener Prozesse und Technologien.

Survey

The Future of Banking: Management Summary - 74002

The Finance Industry is facing a profound change with the introduction of PSD2, an update to the 2007 EU Directive on Payment Services. The directive, which comes into force on January 13, 2018, continues Europe´s goal to modernize, unify and open its financial landscape. In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2, such as banks and FinTechs. The primary focus of the survey was on Strong Customer Authentication, API Strategy and KYC & Customer Identity Management, in the context of the changed requirements imposed by PSD2. The results...

Webcast

Dr. Khanh Dang Ngo - Regulation of Blockchain-based Platforms

Webcast

Martin Kuppinger - Findings from a Recent KuppingerCole Study on PSD2 Readiness

Webcast

Robert MacDonald - The Alternate Truths of Identity Management

It is an exciting – and challenging – time in the identity management space for the Financial Services industry. Digital disruptors like IoT, Digital Transformation, the Cloud, Hybrid, Blockchain, Shadow IT, DevOps and more suggest a significant change in identity management. But what does this challenge mean for Financial Institutions? Join our session as we work through the alternate truths to find a way forward.

Webcast

Christian Goy - The Future of Digital Finance

The financial world is pressured with ever-increasing change in customers’ demographics undermining banks loyalty-base, well-funded fintech startups looking to disrupt incumbents and a new generation of customers.In his session, Christian Goy will explore what value means to customers today, how redefining a brand’s customers by how they think, instead of who they are or what they do becomes more paramount, and how banks today can use behavioral economics to help predict the customer demands of tomorrow.

Webinar

Apr 04, 2017: Managing the User's Consent Life Cycle: Challenges, GDPR Compliance and (Business) Rewards

Companies that manage consumer identities and personal profiles have a bit more than one year left to comply with the new European General Data Protection Regulation (EU-GDPR).

Press Release

Results from KuppingerCole Study: The Future of Banking - Innovation & Disruption in light of the revised European Payment Services Directive (PSD2)

Wiesbaden, March 02, 2017 – Today KuppingerCole Ltd., an international and independent analyst company with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation published the outcomes of their latest study about the Future of Banking. During the Digital Finance World event at the HOLM in Frankfurt a. M. , Founder and Principal Analyst Martin Kuppinger and Lead Analyst John Tolbert from KuppingerCole presented the results at the first event session of the day. The study was realized by...

Advisory Note

Advisory Note: Mobile Biometrics for PSD2 - 71512

Many new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial services industry under the Revised Payment Services Directive (PSD2). However, there are several challenges with biometric authentication that implementers must consider.

Survey

Survey: The Future of Banking - 74002

The Future of Banking: Innovation & Disruption in light of the revised European Payment Services Directive (PSD2) In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2. The primary focus of the survey was on Strong Customer Authentication, API Strategy and KYC & Customer Identity Management, in the context of the changing requirements imposed by PSD2. The results shed light on the lack of preparation and maturity of banks and other institutions, for the anticipated changes imposed by PSD2. KuppingerCole has requested PwC to join forces during the...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]