News Archive

Blog

Consumer Identity World (CIW) USA 2018 - Report

Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last year, indicating the significant increase in interest in the Consumer Identity and Access Management (CIAM) subject. CIAM is one of the fastest growing market segments under IAM, and with good reason. Companies that deploy CIAM solutions find that they can connect with their consumers better, delivering a more positive experience, and generating additional revenue. CIAM can also aid with regulatory...

Webinar

Dec 04, 2018: Security vs. Innovation: Why Not Choose Both?

In a world where businesses compete and succeed on the basis of application-driven innovation, enterprises are challenged to deliver software to market faster than ever before. Simultaneously, they're grappling with insider and outsider cybersecurity threats, as well as stringent data privacy regulations such as GDPR.

Webinar

Nov 06, 2018: How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation

GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the concept of “consent,” which is fairly new for most data controllers. Now, with the GDPR regulation in force, parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easily as it was given.

Webcast

Making Sense of the Top 5 Latest Cybersecurity Trends

Let’s face it: with each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night. What’s more important...

Blog

Intelligente Governance jenseits von Auditoren und regulatorischen Anforderungen

Es kann viele Gründe geben, warum ein Unternehmen eine Initiative zur Verbesserung seiner Informationssicherheit ergreift. Es gibt jedoch einen spezifischen Grund, der sich immer wieder wiederholt: "Weil die Auditoren das sagen, müssen wir....". Die Realität und die hieraus resultierende Logik war bislang oft wie folgt: Zur Durchsetzung der regulatorischen oder gesetzlichen Anforderungen gehören Sanktionen bei Nichteinhaltung. Diese galt es zu vermeiden. Dies führte zu einem Ankreuz-Listen-Ansatz für die Einhaltung der Vorschriften. Wenn dieser mit dem wie...

Blog

Intelligent Governance Beyond Auditors and Regulatory Requirements

There can be many reasons why a company takes an initiative to improve its information security. However, there is one specific reason that repeats itself time and again: "Because the auditors say that, we have to..." The reality and the resulting logic have so far often been as follows: The enforcement of regulatory or legal requirements includes sanctions for non-compliance. These had to be avoided.  This led to a check-list approach for regulatory compliance. If this was done with the absolute minimum possible cost and effort in order to avoid non-compliance and thus the fine, the...

Webcast

Access Control From an Userbase to Agency Applications in the Education Sector

The Ministry of Education in New Zealand can now control access from a wide user base to agency applications in the education sector.

Webcast

Digital Identities in the Internet of Things - Securely Manage Devices at Scale

The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption? Either on business optimization, by doing things better and more efficiently, or focusing on a...

Advisory Note

Advisory Note: GRC Reference Architecture - 72582

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals.  GRC is concerned with setting objectives, policies and controls and monitoring performance against these.  This report provides an architecture for the successful implementation of GRC within an organization.

Webinar

Dec 18, 2018: Online Forms Are Out of Date – There Are New Ways to Sign Up Customers

An extreme lack of innovation has led to online forms dominating online buying for over two decades. The latest identity platforms use fast, easy, and secure technology to streamline customer sign-ups and simplify data.

Blog

Managing the Hybrid Multi Cloud

The primary factor that most organizations consider when choosing a cloud service is how well the service meets their functional needs.  However, this must be balanced against the non-functional aspects such as compliance, security and manageability. These aspects are increasingly becoming a challenge in the hybrid multi-cloud IT environment found in most organizations. This point was emphasized by Virtustream during their briefing in London on September 6th, 2018.  Virtustream was founded in 2009 with a focus on providing cloud services for mission-critical...

Leadership Compass

Leadership Compass: Adaptive Authentication - 79011

This report provides an overview of the market for on-premise Adaptive Authentication solutions and provides you with a compass to help you to find the product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing on-premise Adaptive Authentication solutions.

Whitepaper

Whitepaper: Overcoming PSD2 Challenges with Onegini Connect - 79058

Many changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential benefits for Third Party Providers (TPPs) and consumers.  Account Information Service Providers (AISP) and Payment Initiation Service Providers (PISP) functions have historically been performed by banks; competition in the financial sector will emerge from non-traditional, non-banking types of businesses. Onegini Connect provides the foundational technical capabilities needed to meet the PSD2 challenges while...

Executive View

Executive View: United Security Providers Secure Entry Server - 79040

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and Identity Federation capabilities for complex use cases and hybrid on-premises and cloud solutions.

Conference

Sep 18 - 19, 2019: Blockchain Enterprise Days 2019

Blockchain Enterprise Days (#BeDays19) will take place September 18-19, 2019 in Frankfurt, Germany. Blockchain is still on everyone's lips and is no longer reserved for the financial sector. For this reason, the Blockchain Enterprise Days will focus on further enterprise application areas of interest: Identity Access Management (IAM), Enterprise Resource Planning (ERP) and cybersecurity.

Press Release

Independent Analyst Company presents Cybersecurity Innovation Night in Berlin

Wiesbaden, September 17th, 2018  – On November 13, 2018, the independent Analyst Company KuppingerCole runs an Innovation Night as part of the Cybersecurity leadership Summit in Berlin. The Cybersecurity Innovation Night focuses on cutting-edge approaches and advanced solutions in the various areas of cybersecurity which utilize Machine Learning (ML) and Deep Learning (DL) technologies. ML and DL have had many successful applications in image recognition and language processing, and now these techniques are the fastest growing trends in cybersecurity....

Executive View

Executive View: Evidian Identity & Access Manager - 70872

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements by integrating Identity Governance and Administration, and Analytics & Intelligence into their IAM suite.

Executive View

Executive View: ObserveIT Insider Threat Management - 79038

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and streamlined solution for detecting and mitigating various insider threats.

Press Release

KuppingerCole Organizes Second Consumer Identity World USA in Seattle

Wiesbaden, 13 September   2018  – For the second time the independent Analyst Company KuppingerCole organizes the  Consumer Identity World USA  which will take place  September 19 - 21, 2018 at the Motif Hotel in Seattle, USA.  Seattle is the first of three stops of the Consumer Identity World Tour, which will also be heald in  Amsterdam (Oct 29-31)  and  Singapore (Nov 20-22). The  Consumer Identity World USA  is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy...

Webcast

Prepare for PSD2 with Strong Customer Authentication, Fraud Risk Management and Open Banking APIs

Banks will soon have to comply with the Revised Payment Service Directive, commonly called "PSD2." The directive will introduce massive changes to the payments industry and radically alter the user experience for customers of European banks by allowing third party payment service providers (TPP) to access their account information to provide various innovative financial services. But to mitigate risk, banks and TPPs must address the core regulatory technical requirements outlined by PSD2.

Webcast

Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)

It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in advance, your customer's needs has on the one hand become a must. On the other hand, GDPR is significantly limiting the way how to create such intelligence through collecting personally identifiable data.

Webinar

Oct 18, 2018: Fine-Grained Policy-Based Access Control: Why & How?

Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization control infrastructures have developed their own segment in the security market.

Whitepaper

Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. RSA provides foundational technical capabilities in their SecurID, Adaptive Authentication, Web Threat Detection, and Archer products that can help businesses meet the technical challenges posed by PSD2.

Webcast

Privilege Management From the Cloud: Go or No-Go?

The digital transformation is changing the way we do business, and it is also changing the way we have to keep our increasingly complex IT infrastructure agile and flexible yet secure and compliant. Managing geographically dispersed cloud/hybrid environments and the privileged access to servers and other systems therein is a challenging task.

Executive View

Executive View: Delphix Dynamic Data Platform - 79010

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile Development, Data Analytics, Cloud-Migration, Notfallwiederherstellung und andere DataOps-Anwendungsfälle.

Webinar

Oct 16, 2018: Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.

Webcast

Security and Governance in the Hybrid Multi-Cloud

Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]