News Archive

Press Release

Digital Finance World 2018

Wiesbaden, Januar 31, 2018 – am Mittwoch, den 28. Februar startet zum zweiten Mal KuppingerColes Digital Finance World (DFW) im House of Logistics (HOLM) in Frankfurt a.M.. Die zwei-tägige englischsprachige Konferenz bietet abwechslungsreiche Vorträge und Diskussionspanels zu relevanten Themen der digitalen Finanzindustrie. Die Themenschwerpunkte sind Blockchain (Smart Contracts, Identity...), Cyber risk und Cybersecurity, Artificial Intelligence, Regulatory Management und die neuen Gesetze und Grundverordnungen PSD2 und GDPR. Die Teilnehmer können mit einem...

Press Release

Digital Finance World 2018

Wiesbaden, January 31, 2018 - On Wednesday, February 28th, 2018, starts KuppingerCole’s Digital Finance World (DFW) at the House of Logistics (HOLM) in Frankfurt am Main, Germany for the second time. The two-day conference offers various Keynotes talks und Panel discussions relevant to the Digital Finance Industry. Topics discussed will be Blockchain (Smart Contracts, Identity…), Cyber risk and Cybersecurity, Artificial Intelligence, Regulatory Management, and disruptive legislations such as PSD2 and GDPR. Participants can interact with a targeted and engaged audience...

Innovation Slam

May 14, 2018: Blockchain ID Innovation Night

Up to 10 presentations, 10 Minutes each. Your talk will be rated by a Jury (5+ industry experts, technology professionals, academia, journalists) and by the delegates. The best 2 will get a keynote slot (10 minutes as well) in the main EIC program in front of 800 EIC delegates. The overall winner will win a crypto-prizemoney AND will be nominated for a European Identity Award.

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 70841

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung.

Executive View

Executive View: RSA SecurID® Access - 70323

RSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integration to a large range of on-premises applications and cloud services. It supports context-aware authentication and uses machine learning to assess user risk and simplify the user experience.

Blog

One Identity Acquires Balabit

Yesterday, One Identity announced that they have acquired Balabit, a company specialized on Privileged Management, headquartered in Luxembourg but with their main team located in Hungary. One Identity, a Quest Software business, counts amongst the leading vendors in the Identity Management market. Aside of their flagship product One Identity Manager, they deliver a number of other products, including Safeguard as their Privilege Management offering. Balabit, on the other hand, is a pure-play Privilege Management vendor, offering several products with particular strengths around Session...

Executive View

Executive View: SAP HANA Platform Security - 70272

SAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It offers a high - performance database through in - memory processing and provides enterprise grade security features that cover  the  confi dentiality, integrity and availability of the data being held and processed. 

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen.

Conference

Sep 19 - Nov 22, 2018: Consumer Identity World Tour 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Webinar

Feb 20, 2018: The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance

Whenever people are talking about the Digital Transformation, they usually think about modern technologies like cloud computing. However, although adopting new technologies is important for staying relevant and competitive in the rapidly changing market, this transformation primarily reflects the growing volume of digital information that is powering key business processes and unlocking new business models. In many cases, digital data even becomes a company’s primary product and most valuable asset.

Executive View

Executive View: Symantec CloudSOC™ - 70615

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches KuppingerCole’s recommended functionality for CASBs. It provides a valuable tool that organizations can use to improve governance over their use of cloud services.

Executive View

Executive View: Osirium: Privileged Access Management - 70836

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications.

Leadership Brief

Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a customer’s unique business, security, and compliance requirements.

Executive View

Executive View: Thycotic Privilege Manager - 70221

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users.

Webinar

Feb 22, 2018: How to Make Your IAM Program a Success

Identity and Access Management (IAM) is one of the most important and challenging disciplines, involving multiple departments and systems across the enterprise and requiring constant communication between the business and IT. Without IAM, it is difficult to mitigate access risks, to comply with regulations and to deliver a consistent and frictionless user experience.

Blog

Spectre and Meltdown: A Great Start Into the New Year!

Looks like we the IT people have gotten more New Year presents than expected for 2018! The year has barely started, but we already have two massive security problems on our hands, vulnerabilities that dwarf anything discovered previously, even the notorious Heartbleed bug or the KRACK weakness in WiFi protocols. Discovered back in early 2017 by several independent groups of researchers, these vulnerabilities were understandably kept from the general public to give hardware and operating system vendors time to analyze the effects and develop countermeasures for them and to prevent hackers...

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]