News Archive

Blog

Cybersecurity Leadership Summit Berlin 2018 - Review

This month we launched our Cybersecurity Leadership Summit in Berlin. A pre-conference workshop entitled “Focusing Your Cybersecurity Investments: What Do You Really Need for Mitigating Your Cyber-risks?” was held on Monday. The workshop was both business-oriented and technical in nature. Contemporary CISOs and CIOs must apply risk management strategies, and it can be difficult to determine which cybersecurity projects should be prioritized. Leaders in attendance heard the latest applied research from Martin Kuppinger, Matthias Reinwarth, and Paul Simmonds. Tuesday’s...

Whitepaper

Whitepaper: Signicat: Balancing Security and Convenience: Identity Verification & Authentication made easy - 79081

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience and creating a seamless experience for customers is essential to keeping customers happy and minimizing churn rates: Identity Assurance done correctly is an essential step towards success in digital business.

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 70614

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Advisory Note

Buyer's Guide: Marketing Automation Systems and GDPR Readiness - 80018

Marketing automation systems are key when it comes to digital or omni-channel marketing. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. It will also prepare your organization to conduct RFIs and RFPs to select the right marketing automation solution – in line with GDPR (the EU General Data Protection Regulation).

Conference

Oct 08 - 10, 2019: CyberNext Summit 2019

Cybersecurity is shifting toward more distributed and dynamic models. Decentralized security infrastructure brings its challenges and opportunities. CyberNext Summit (#CNS19) summit will focus on the capabilities needed to achieve security in such a distributed environment, especially in the context of ever-increasing security threats.

Webinar

Jan 15, 2019: Solving New Authentication Challenges While Finding Parity Between User Experience and Security

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.

Webcast

Blockchain ID for the Enterprise: A Single ID? A Good Complement? Or Irrelevant?

Blockchain and the underlying concept of “Distributed Ledger Technologies” (DLT) have well passed the peak of initial hype. As always, focus is now shifting to real-world applications that allow companies to improve their business. It is less about cryptocurrencies and concepts with a global impact, but more about process and supply chain optimizations as well as better identity (ID) concepts. Blockchain IDs are being heavily discussed as the number of concrete product offerings is increasing in the marketplace. With organizations facing an ever-growing ID problem in their Digital...

Executive View

Executive View: Saviynt Identity Governance and Administration (IGA) - 70370

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User Governance. The solution is designed to be deployed as a cloud, hybrid or on-premise solution. The Saviynt Security Manager helps customers demonstrate compliance using their access governance and risk intelligence capabilities.

Webcast

The Future of Identity Management at Border Controls: Gateless and Multiple Biometric and Beyond

Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications.  Gateless border control and multiple biometrics, coupled with self-managed crypto-identity will be the future.  This may seem travel-specific, but the same identity that will get you into a country will also open a fully authorized bank account - with KYC/AML and the relevant National FinCrime agency...

Webcast

Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?

Webcast

Cybersecurity Leadership Summit 2018 Europe Summary

Executive View

Executive View: Sphere Identity Platform - 79052

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support for B2B, but also economic incentives for both individuals and organizations through ease of use, privacy, and rewards for the individual, and reduced compliance risk, easy customer onboarding and integration for the organization.

Webcast

Privacy By Design in Practice

Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations of a single country/region. Supporting each and every regulation as they emerge is challenging and greatly increases the maintenance cost. Furthermore, these kinds of regular modifications can lead to poor customer experiences. Leveraging well-known privacy by design principles into your system design strategy is a long-term and sustainable solution for most of these privacy challenges. Once these...

Webcast

Transform Your Customer Experience: Customer Identity Today and Tomorrow

Customers are increasingly expecting more from the businesses they interact with, especially as security and privacy breaches dominate headlines. Customer Identity and Access Management can help businesses transform their customer experiences.
Join this session to learn about key use cases where organizations have leveraged CIAM to deepen their relationships with a broad spectrum of customers, businesses, and partners and to hear Okta's view of what they will demand in 2018 and beyond.

Webcast

Data Privacy — Who Actually Cares and Why?

Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for advertisers and every other data mining company. But if we do care, what are the implications for marketers? What does it mean for the generation of products and services we develop? This session will highlight how we rationalize or perceive data-privacy, why we care, and what we expect from companies when...

Webcast

Panel: How to Defend your Customer from Current and Future Threats

This panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users. Learn best practices from data protection & privacy experts on how to use the latest defenses to secure your organization against the latest threats and to offer your customer a smooth customer journey without fears.

Webcast

Consent Life Cycle Management

Consent Management is a crucial aspect of PSD2 and GDPR regulation. At initial thought, consent seems to be simple but from legal and regulatory perspective its complexity arises. Managing consent within an organization should be well planned with all units of businesses and audit trail to prove the veracity of the consent should be tied to identity and security systems of the organization.

Webcast

The End of the Password – How to Really Protect Digital Identity

In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack. Once a password is stolen, it opens the doors to fraudulent use and data theft. Furthermore, since most consumers link their online accounts at Amazon, eBay or Twitter to their Facebook or Google account, attackers only have to hack one password in order to gain access to the entire range of applications. This also enables them to easily compromise the complete digital identity of a user. All...

Webcast

Panel: CIAM Strategy Best Practice

When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organization the consumer typically does this with two contrasting expectations. On the one hand, the consumer wants to benefit from the organization as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are...

Webcast

A Digital Society Needs a Digital ID

Our world is becoming more digital and more mobile every day. The sensitivity of information being exchanged online grows rapidly and data privacy is a real concern to many people.
How are we facing new challenges to keep pace with today's digital transformation?
Getting rid of all paper flows, taking KYC-process to the next level, improve customers’ experience, introduce a safer way to login and confirm transactions, be compliant with EU regulations and PSD2.
Creating a digital ID in a country is one of the solution, but it requires more then just technology.

Webcast

Panel: Blockchain, Identity and Privacy - How to Combine It?

Blockchain, Identity and Privacy: Three words that buzz, fade and mature. 

The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead. Further, we discuss If and when blockchain-based identity projects reach critical mass in terms of user adoption, they could help get more decentralized services off the ground.

Webcast

How Policy Based CIAM can Improve the Customer Journey

In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such as mobile, internet of things, social media, and big data, the approach towards customers is getting redefined. During this presentation, TrustBuilder’s Sales Director for Benelux Kurt Berghs will give some industry-based examples of how policy-based Customer Identity and Access Management (CIAM) can help with these new challenges.  For different markets such as finance,...

Webcast

CX as the core of any CIAM

Customer Experience (CX) is the central starting point when it comes to the strategic definition of your CIAM. The management of millions of identities and the handling of several millions of interactions per day is a technical challenge that changes every day. However, ease of use, efficiency and joy of use by the customer are indispensable prerequisites. At the same time, it is imperative that every consumer can control access to his personal data. Managing customer information in a digitally changing economy with many business partners in need of access is one of today's biggest...

Webcast

5 months of GDPR – status quo on implementation of the most extensive digital law in the world

How are companies, consumers and authorities taking the new regulation?

Press Release

KuppingerCole Analysts organizes Consumer Identity World APAC in Singapore

Wiesbaden, November 12, 2018 – For the second time the Consumer Identity World APAC will take place from November 20-22, 2018 at The Westin Hotel, Singapore. Singapore is the third event of the Consumer Identity World Tour which already took place in Seattle (Sep 19-21) and Amsterdam (Oct 29-31).

Conference

Sep 18 - 19, 2019: Digital Finance World 2019

Welcome to the new world of Digital Finance: DFW - Digital Finance World, Frankfurt, September 18 – 19, 2019 - is the place for finance innovators from traditional players to meet with Fintechs and Start-ups to shape the Future. Here you can interact with a targeted and engaged financial audience, enjoy an unparalleled content depth, and get guidance for critical decisions on the digital transformation of your enterprise.

Advisory Note

Buyer’s Guide: Identity-as-a-Service (IDaaS) - 71526

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation and modify it as necessary to meet specific business requirements.

Webcast

An Overview of the Leadership Compass: Adaptive Authentication and Cloud-Based Multi-Factor Authentication

KuppingerCole has published two related Leadership Compasses on Adaptive Authentication and Cloud-based Multi-Factor Authentication solutions. We define adaptive authentication (AA) as the on-premises deployments, whereas Cloud-based MFA is SaaS-delivered. For both AA and Cloud MFA, many organizations need to gather additional attributes about users and their environments and evaluate the attributes in the context of risk-based policies. The goal of AA & Cloud MFA is to provide the appropriate risk-mitigating assurance levels for access to sensitive resources by requiring users to...

Press Release

KuppingerCole Analysts organizes first Cybersecurity Leadership Summit in Berlin

Wiesbaden, November 07, 2018 – Cybersecurity Leadership Summit 2018 will take place for the first time from November 12 to November 14 in Berlin, Germany.

The Berlin summit It is the place where the audience can learn more about the future of digital business security, Artificial Intelligence & cybersecurity, Zero Trust security and increasing Social Engineering threats. The participants will hear about the innovative ways and strategies for mastering various security challenges. 

Webcast

How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation

GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the concept of “consent,” which is fairly new for most data controllers. Now, with the GDPR regulation in force, parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easily as it was given.

Executive View

Executive View: IBM Security Access Manager (ISAM) - 79066

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access management and federation use cases, but it also provides Risk-Based Access Control and Mobile capabilities, as well as providing flexible deployment models.

Executive View

Executive View: ThreatMetrix Digital Identity Network, powered by ThreatMetrix ID - 79049

ThreatMetrix is a global fraud, identity and authentication company, helping customers deliver a unified experience across their digital customer journey.  Built on a platform providing a unified, global customer digital identity, ThreatMetrix enables businesses to prevent fraud, reduce friction, and streamline the customer experience using both risk-based and strong authentication capabilities.

Blog

IBM Acquires Red Hat: The AI potential

On October 28th IBM announced its intention to acquire Red Hat. At $34 Billion, this is the largest software acquisition ever.  So why would IBM pay such a large amount of money for an Open Source software company? I believe that this acquisition needs to be seen beyond looking just at DevOps and Hybrid Cloud, rather in the context of IBM’s view of the future where the business value from IT services will come from in future. This acquisition provides near-term tactical benefits from Red Hat’s OpenShift Platform and its participation in the Kubeflow project. It strengthens...

Blog

IBM & Red Hat – And Now?

On October 28th IBM announced its intention to acquire Red Hat. At $34 Billion, this is the largest software acquisition ever. So why would IBM pay such a large amount of money for Red Hat? Not surprising, there were quite a few negative comments from parts of the Open Source community. However, there is logic behind that intended acquisition. Aside of the potential it holds for some of the strategic fields of IBM such as AI (Artificial Intelligence) and even security (which is amongst the divisions of IBM showing the biggest growth), there is an obvious potential in the field of Hybrid...

Executive View

Executive View: AWS Identity and Access Management - 79048

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now provides easy-to-use facilities to allow customer to better leverage their identity management environment.

Blog

Impressions from the Oracle OpenWorld

Recently I was in San Francisco again, attending the Oracle OpenWorld for the second time. Just like last year, I cannot but commend the organizers for making the event even bigger, more informative and more convenient to attend – by all means not a small feat when you consider the crowd of over 60000 attendees from  175 countries. By setting up a separate press and analyst workspace in an isolated corner of the convention center, the company gave us the opportunity to work more productively and to avoid the noisy exposition floor environment, thus effectively eliminating the...

Executive View

Executive View: Securonix Cloud SIEM and UEBA - 79035

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analytics offered as a fully managed Security Operations Platform in the cloud.

Webinar

Dec 11, 2018: The Power of Identity Context: How to Get the Right Context and How AI will Help

How did the phrase “Russian trolls” manage to take over the news? If anyone knew at the time that these were not actually American citizens, they would have had no power to influence. That’s what a lack of identity context will do to you.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]