News Archive

Webcast

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Blog

Palo Alto Networks Continues to Bet on Security-as-a-Service

The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an effort to round out its offerings to meet what it expects will be growing market demand. A key element of its go-to market strategy is in response to market demand to reduce the complexity of security and to reduce the number of suppliers by adding cloud-delivered so Software-Defined Wide Area Network SD-WAN and DLP (data loss prevention) capabilities to its Prisma Access product. The move not only...

Executive View

Execuitve View: Identity Automation’s RapidIdentity Solution - 80028

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standard IAM capabilities, RapidIdentity helps healthcare organizations access a unified solution instead of relying on disparate point solutions. RapidIdentity’s cohesive suite of tools reduces integration time for organizations and delivers consistent flexible functionality.

Leadership Brief

Leadership Brief: Top 3 Initiatives to Improve CX and Customer Journeys - 80293

When it comes to digital marketing, companies of all business sectors try to constantly improve customer experience (CX) and customer journeys. In many cases, there is a single focus on technological topics, such as machine learning or conversational interfaces. But, is technology the key to success? This leadership brief gives an overview of relevant topics regarding optimization of CX and customer journeys—and highlights three initiatives to consider.

Executive View

Executive View: IBM Decentralized Identity - 80099

The IBM Decentralized Identityplatform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized identity solution has prioritized interoperable protocols rooted in Hyperledger Indy and Aries to provide secure exchange of information. IBM’s decentralized identitysolution can help enterprises establish decentralized identity networks built upon Hyperledger Indy or participate in decentralized identity ecosystems as issuers, holders, and verifiers.

Whitepaper

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die digitale Transformation haben dazu geführt, dass privilegierte Konten heute zahlreicher und weiterverbreitet sind. Werden diese nicht sicher verwaltet, sind Unternehmen den Risiken von verwaisten Konten...

Blog

Renovate Your IAM-House While You Continue to Live in It

Do you belong to the group of people who would like to completely retire all obsolete solutions and replace existing solutions with new ones in a Big Bang? Do you do the same with company infrastructures? Then you don't need to read any further here. Please tell us later, how things worked out for you. Or do you belong in the other extreme to those companies in which infrastructures can be further developed only through current challenges, audit findings, or particularly prestigious projects funded with a budget? However, you should read on, because we want to give you argumentative...

Leadership Compass

Leadership Compass: Identity as a Service (IDaaS) IGA - 80051

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for traditional IGA use cases, helping IDaaS IGA to increasingly become the preferred choice of customers for IAM purchases globally. This Leadership Compass discusses the market direction and provides a detailed evaluation of market players to offer necessary guidance for IAM and security leaders to make informed...

Executive View

Executive View: ForgeRock Access Management - 80319

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform.  It provides numerous authentication options, an intelligent adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards development, and that is reflected by the multi-protocol support in ForgeRock Access Management.  The product is built from the open source OpenAM project, and ForgeRock provides fee-based support.

KCx Talks

May 10, 2020: AI and Cybersecurity in the Age of Quantum Computing

Network and discuss with an exclusive circle of max. 30 participants in a hip location of the city, with selected food and drinks. Enjoy an evening with interesting lectures in a relaxed atmosphere together with experts from various fields. Take part in stimulating discussions and enjoy personal fireside chats on current digitalization and identity topics in various industries.

Press Release

Cybersecurity Is More Than Just Defensive

When planning the cybersecurity strategy for any given company, IT teams should be aware that they are essentially doing damage control. It is not enough to bolster defense mechanisms because in the long run there is a big chance that they will not last a strong attack. This means that cybersecurity departments should prepare to fail, and have a water-proof plan on what to do after they have been successfully attacked.

Whitepaper

Whitepaper: Modern B2B Identity Management - 80135

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM) becomes a crucial consideration. IAM shares standard features that can be used in B2E or B2C use cases as well, but IAM in the B2B context has specific requirements that need to be addressed. B2B IAM services need to support customers, suppliers, and other partner organizations by providing capabilities such as support for multiple identity types, user delegation at different levels, strong...

Architecture Blueprint

Architecture Blueprint: Identity and Access Management - 72550

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities leads to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse and sometimes even conflicting. Organization demand for a blueprint to design and implement efficient and durable IAM architectures that meet current and future requirements need to follow a sustainable yet dynamic architectural design.

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which gives them an opportunity in the enterprise market it is now targeting. In short, OVHCloud believes there is a small, but discernible shift back to the private cloud - for security and compliance imperatives. That does not mean that OVHCloud is abandoning the public cloud to the Americans. At October’s...

Executive View

Executive View: IBM MaaS360 with Watson - 79067

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With an open platform for integration with existing apps and infrastructure, IBM MaaS360 is backed by around-the-clock customer support and services, and takes a cognitive approach to UEM that enables enterprises to search thousands of data sources to discover security risks and opportunities, assess their impact on users and endpoints, and act upon them.

Webcast

Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Leadership Compass

Leadership Compass: Infrastructure as a Service – Global Providers - 80035

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Blog

There Is No “One Stop Shop” for API Management and Security Yet

From what used to be a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. Today, APIs can be found everywhere – at homes and in mobile devices, in corporate networks and in the cloud, even in industrial environments, to say nothing about the Internet of Things. When dealing with APIs, security should not be an afterthought In a world where digital information is one of the “crown jewels” of many modern businesses (and even the primary...

Blog

Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do

Nowadays, it seems that no month goes by without a large cyber-attack on a company becoming public. Usually, these attacks not only affect revenue of the attacked company but reputation as well. Nevertheless, this is still a completely underestimated topic in some companies. In the United Kingdom 43% of businesses experienced a cybersecurity breach in the past twelve months, according to the 2018 UK Cyber Security Breaches Survey. On the other hand, 74% say that cybersecurity is a high priority for them. So where is the gap, and why does it exist? The gap exists between the decision to...

Whitepaper

Whitepaper: Understanding Privileged Access Management - 80302

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more numerous and widespread. If these are not managed securely, businesses are exposed to the risks of abandoned accounts, unmanaged shared accounts and criminals and hackers are becoming more adept at...

Webcast

KuppingerCole Identifies Leaders in Consumer Authentication

Organizations are adopting Consumer Identity and Access Management (CIAM) solutions or enhancing their existing customer-facing IAM solutions with modular authentication services, in order to deter fraud, comply with new regional and industry-specific regulations, and improve the customer experience. Most organizations have IAM products in place already for business-to-employee use cases. However, many are finding that their current solutions are not able to meet consumer expectations or security requirements.   KuppingerCole's Lead Analyst John Tolbert...

Buyer's Compass

Buyer's Compass: Endpoint Detection & Response (EDR) - 80213

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for EDR tools.

Blog

Authentication and Education High on CISO Agenda

Multifactor authentication and end-user education emerged as the most common themes at a CISO forum with analysts held under Chatham House Rules in London. Chief information security officers across a wide range of industry sectors agree on the importance of multifactor authentication (MFA) to extending desktop-level security controls to an increasingly mobile workforce, with several indicating that MFA is among their key projects for 2020 to protect against credential stuffing attacks. In highly-targeted industry sectors, CISOs said two-factor authentication (2FA) was mandated at the...

Webinar

Dec 10, 2019: Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and consumers via apps and integrate with devices and things. Digital Identity is at the center of these digital transformations.

Webcast

Getting a Grip on Your AI: Know What It Does. Understand the Risks and Rewards. Be Compliant

The case for integrating AI into business processes is ever stronger. Now it’s time to assess realistically what it can do for you. Existing successes and failures of AI beta-phase testing show how to resist the survivorship bias when implementing your own AI programs. Clarify the characteristics of AI data that may be problematic, and discover where investment should be concentrated on further customizing your AI solutions. Compliance with data protection standards remains an open question as both technology and public demand evolves. Over-enthusiasm in future...

Executive View

Executive View: Atos DirX Access - 80167

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User Behavior Analytics. Atos DirX Access counts amongst the most feature-rich solutions on the market.

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]