News Archive

Press Release

EIC 2019 Attracts Almost 1,000 Visitors

Wiesbaden, May 17, 2019 – With the 13th European Identity & Cloud Conference 2019 coming to an end today, KuppingerCole Analysts AG can once again look back at a record-breaking event. While the number of registered delegates has grown since eight consecutive years, for the first time in its history, the EIC has attracted well over 900 delegates this year.

Webcast

Impressions of the European Identity & Cloud Conference 2019

Webcast

European Identity & Cloud Conference 2019 Wrap-Up

Webcast

Impressions of the AI Innovation Night at EIC 2019

Webcast

Martin Kuppinger - Closing Keynote & Announcement of EIC 2019s Gamification Winners

Webcast

European Identity & Cloud Awards Ceremony

The KuppingerCole Jury will once again honor outstanding Identity Management and Security Projects and Initiatives.

Press Release

KuppingerCole Analysts AG Proudly Presents Winners of European Identity & Cloud Awards

Wiesbaden, May 16, 2019 – Last night, KuppingerCole Analysts AG presented the winners of the European Identity & Cloud Awards at the peak of the 13th European Identity & Cloud Conference. For the 12th consecutive year, the company honored outstanding identity management and security projects and initiatives as part of the flagship event.

Whitepaper

Whitepaper: The Dark Side of the API Economy - 80019

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Unfortunately, many organizations still lack competence in the field of API security and tend to downplay API-related risks. Many are also overconfident in the capabilities of their existing tools. This paper aims to dispel several common API myths and provide recommendations on designing a...

Webcast

Todd Peterson - Rightsizing IGA – One Size Does Not Fit All

The Holy Grail of identity and access management is identity governance and administration (IGA). Unfortunately, getting IGA right is much easier said than done. From access request through provisioning and into identity lifecycle management; and from user access governance, through data governance, and into privileged access governance, the sheer volume of users, systems, and scenarios that must be addressed can be overwhelming. In this session, One Identity will discuss what IGA truly means, how to determine where to start, and where to go next once you are on the path. Don’t be...

Webcast

Henk Marsman - Blockchain & IAM: A Perfect Fit or a Squared Peg and a Round Hole?

Blockchain to some is the future solution for everything, or at least for managing identity information. Rabobank is piloting extensively with blockchain. In his presentation Henk will use a few cases on blockchain to see what works well and what doesn't, and where blockchain could be applied to managing identities, whether these are customer identities or employee identities. Or both.

Webcast

Andrea Rus - SAP Customer Experience: Delivering Trusted Relationships for Your B2B Customers and Partners

Driving growth through customer and partner engagement is critical for B2B business success. Yet, too often, companies struggle to meet this vital need. Why? For partner organizations, managing the end-to-end partner lifecycle is difficult using legacy technologies and manual practices. Each partner has varying needs for security roles, authorizations, and application permissions, and these elements must be handled efficiently so partners get to market quickly and so users can easily go about their day-to-day work. Meanwhile, the business’ most sensitive data must be protected...

Webcast

Mike Kiser, David Lee - Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Who was the real Tara Simmons? On November 16, 2017, she sat before the Washington State Supreme Court. The child of addicts and an ex-addict and ex-felon herself, she had subsequently graduated near the top of her law school class. She was asking the court to trust her to become an attorney, and the outcome of her case rested whether or not her past could be used to predict her future. Algorithms that use the past to predict the future are commonplace: they predict what we’ll watch next, or how financially stable we will be, or, as in Tara’s case, how likely we are to commit...

Webcast

Maximilian Möhring - The Future of Digital Identity is Decentral, But Not Blockchain

This interdisciplinary talk will lead you through on why not just identities, but any identity-related information should not be stored on a blockchain. The main technical reason being that none of the blockchain USPs is applicable when it comes to identity (-related) data, especially assertions.The legal and business reason being that blockchain is not (yet) compatible with and accepted in our legal and regulatory framework. So what is the way to go? There's not many other areas where security and decentralisationis as important as when we're dealing with identity data. Max will...

Webcast

Dr. Sridhar Muppidi - Identity + Blockchain: Next Generation IAM is Closer Than You Think

Over the past 12-18 months, there has been a mounting interest in how Blockchain technology might support the next generation of IAM systems. The promises of decentralized and self-sovereign identity, which promote a frictionless user experience and improved privacy controls, are very appealing to any organization looking to reduce both costs and risks. But how do you get started? Many organizations are just starting their journey to cloud, so the idea of Identity + Blockchain may seem too futuristic. In this session, experts from IBM will share how clients are progressively moving towards...

Webcast

Mark Stephen Meadows - That Robot Overlord Is in Your Kitchen. Her Name's Alexa

If we look under Alexa’s hood and read between the technologies we find a disturbing reflection of our own identities and personal data. In your home Alexa is always listening and influencing your options. In your company’s product deployment Alexa is influencing your brand, your customers, and your user data.  We will discuss why this represents a geo-political shift more significant than the rise of social media. As a previous developer of Alexa skills and other AI systems I will share with you my lessons learned.

And we will examine alternatives.

Webcast

Dr. Karsten Kinast - The Global Race for AI – Is it Time to Regulate Now?

Not only is there no form of AI that understands what it says, can draw conclusions from it, and can base decisions on it, but it is not even known how such a synthetic intelligence could be created. In our time, let's say in the next two and a half decades, it is not primarily a question of developing an ethical code within which AI's can unfold as independent subjects, but rather of a far more profane view of responsibilities. If a self-propelled car decides to drive against a traffic light pole without any action on my part, who is responsible for the damage? Are there already...

Webcast

Christian Goy - Is Data Really The New Oil?

Data, a massive amount of data, seems to be the holy grail in building more sophisticated AI’s, creating human-like chatbots and selling more products. But is more data actually better? With GDPR significantly limiting the way we generate intelligence through collecting personally identifiable data, what is next? How can we create a specific understanding of our customers to deliver superiority over our competition? During this keynote, we will share how our own expectations and the principle of behavioral economics can alter the way we approach product ideas, personalized...

Webcast

Ivana Bartoletti - AI and Identity Management: Considerations for Deployment

With Identity Management increasingly moving to Access management, this talk will explore how permitting access on the basis machine learning is the logical next step on from biometric ID, and to provide for improved security to implement access control.  The session will explore the necessary steps to undertake to deploy AI systems in a secure, privacy compliant and ethical manner.  Key takeaways: The potential of AI in digital identity and access management Assessing algorithms, an example of Algorithmic impact assessment Main privacy and ethical issue Getting...

Webcast

Katryna Dow - Customer Personalisation: Bridging CIAM and SSID

With the rapid fusion of physical, biological and digital, identity is now more personal than ever. At the same time, data breaches, hacking and centralised honey pots mean that customers are more vulnerable than ever before. How we collect and process data in order to personalise services may be the difference between gaining trust or getting fined. Distributed ledger, Self-Sovereign Identity and Zero Knowledge Proofs offer new opportunities to build a trusted data and identity stack. Taking the best of CIAM together with increasing the rights and protections for customers will drive...

Webcast

Gerald Beuchelt - Data Driven Identity Programs – Past, Present, and Future: End-User Experience is Key

A comprehensive and fully functioning identity program is an ever evolving mission. From creating security awareness that sticks with employees, getting executive buy-in, and assembling the right team, there’s a lot to do – and then deciding the correct mix of services and solutions that are required for the identity program can be quite the task. One thing is certain – security should not compromise user experience. If there is too much friction in the mix, users will avoid best practice. In this keynote, Gerald will look at some of the challenges as they exist today,...

Webcast

Panel: Tower Defense, Identity Edition: Zero Trust, Machine Learning, MFA & Passwordless - How to Prevent your Customers & Employees from Falling Victim to Hackers

The attackers are coming in ever increasing waves - come and learn how to set up your defenses so you have the lowest likelihood of account compromise, and accounts which do fall present minimal risk. 100's of thousands of accounts fall victim to hackers every day across consumer and enterprise Identity systems. Attacks are increasing in volume, and Identity takeover remains the "brass ring" for attackers. The good news? More than 99.9% of these compromises are easily preventable by using the principles of Zero Trust and modern Cybersecurity tools. Benefit from the analysis of more than...

Webcast

Simon Moffat - Bot, Human, Friend or Foe?

Modern authentication and authorization services need to generate more than the traditional allow or deny result. Developing user discovery flows that capture and store contextual information, can allow authorization services to  deliver dynamic and fine grained data redaction and resource protection. It enables organizations to digitally transform their business and to develop future proof identity models and ecosystems focusing on zero trust and continually secure infrastructures.

Webcast

Kim Cameron - Turning the Web Right Side Up – Giving People What Is Theirs

A steady stream of trends has built up over the years fueling a growing momentum around Decentralized Identity.  Kim Cameron will report on why early adopters – enterprises both large and small – are already beginning to make Decentralized Identity part of their strategy for digital transformation.  He will argue that the underlying trends will only intensify – and that enterprises which figure out how to benefit early will benefit the most.

Webcast

Jim Taylor - Learning to Fly – Taking Infrastructure Software to the Next Level

Do you build your own car?  Do you buy all the components and put them together yourself?  Of course you don't.  You find vendors who have already assembled all of the pieces into a finished car, and then select the options for the car that fits it perfectly to your wish list.  Don't you think it’s time that you bought your software the same way?  Why spend your time and money running around trying to find all of the best pieces, and even more money trying to put them together.  Broadcom believes that there is a better way, and we intend...

Webcast

Patrick Parker - Applying Microservice Design Principles to Cloud Security Management

The old paradigm of a centralized directory for security has been shattered into a thousand pieces and scattered across the Cloud. Identities, sensitive data and resources, and the management of who may access them are now distributed across hundreds of on-premise and Cloud systems each with its own idiosyncratic security model and none designed to be managed in unison. The shift to Microservices has accelerated the pace of this change. Given this monumental new challenge what is the solution for identity professionals? The answer lies in embracing this change and applying...

Webcast

Joy Chik - Identity-Driven Security: The Key to Digital Privacy

In today’s world, organizations and people manage a complex web of digital relationships. To keep everyone safe, each digital interaction must be validated. Strong tools and technologies are now available to help organizations protect their resources, employees, business partners, and customers. But there are no similar tools—beyond legislation—for individuals trying to protect their private information. As an industry, we have a responsibility to provide technology tools that ensure privacy for individuals even while they strengthen security. This means supporting...

Webcast

Ian Glazer - The Most Forgotten Thing in Identity Management

Passwords? No, it’s not passwords. I’ll give you a hint: we all use them. Everyday. Many many times a day. Still don’t know? It’s the humble username. The “middle child” of identity management, the username doesn’t get the same attention that its big brother “Password” and its little sister “Password-less” get. Instead, just does his job without thanks or recognition. But, failing to pay attention to username can have major negative impact in both B2B and B2C scenarios. In this talk, Mr. Glazer explores the critical aspects...

Press Release

13th European Identity & Cloud Conference

Wiesbaden, May 14th, 2019 – KuppingerCole Analysts AG opens the doors to its 13th European Identity & Cloud Conference today, kicking off four days of insightful exchange among experts from the Information Security and Digital Identity industry. With more than 50 exhibitors and over 800 participants from all over the world, KuppingerCole once more brings together the world’s leading vendors, end users, thought leaders, visionaries and analysts at Europe’s leading event for Identity and Access Management (IAM), Privacy & GDPR, Blockchain ID, Cloud Security and...

Press Release

At KuppingerCole’s European Identity & Cloud Conference 2019: iC Consult Announces China and Russia Expansion

Wiesbaden, May 14th, 2019 – With the European Identity & Cloud Conference, the vendor-independent IAM system integrator iC Consult has chosen the KuppingerCole Analysts AG flagship event to announce the expansion with Service Layers to China and Russia in the fourth quarter of 2019.

Webcast

Martin Kuppinger - Opening Keynote

Webcast

Jochen Werne - HUMAN. DIGITAL. CULTURE - Disruption or just Progress? Impacts of Artificial Intelligence on Business and Society

Webcast

Dr. Emilio Mordini - "Das Sterben der Pythia" - On Humans, Artificial Intelligence and Oracles

Very often we hear the argument, that the way the internet has been influencing our lives can be compared to Gutenberg´s invention of the printing press. Emilio Mordini - Psychiatrist and one of the world´s most distinguished thought leaders on how future technology will change the way we think and live, says that the transition from analog to digital is much closer to the transition from the spoken to literacy than the printing press ever was, because it is changing the medium in which human thoughts are materialized. In his keynote, Dr. Mordini will refer to...

Webcast

Kelley Mak - Emerging Venture Capital Trends in Enterprise Cloud and Cybersecurity

For the past five years at Work-Bench, we’ve been investing in a total reimagining of the enterprise technology stack. The enterprise infrastructure stack that powers Fortune 1000 organizations is in the midst of a tectonic shift. This talk will highlight key trends in cloud and cybersecurity affecting the enterprise and where disruption lies for VC investment and corporate innovation. While there remains a lot of buzz around emerging technology, such as ML/AI and new infrastructure patterns like serverless, this keynote will cut through the noise and marketing hype and help bring to...

Webcast

Thom Langford - Facing the Post-GDPR Reality

Press Release

KuppingerCole Analysts AG Hosts AI Innovation Night

Wiesbaden, May 13th, 2019 – KuppingerCole Analysts AG hosts the Artificial Intelligence Innovation Night in Munich, Germany today. From 7:00 pm on, nine speakers will present various approaches to utilize AI techniques for IAM, Cybersecurity, Consumer Experience and Marketing Automation in slam-style talks.

Executive View

Executive View: Ideiio IGA - 80077

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfolio. ideiio, a spun out from IAM systems integrator ProofID, is a new vendor in the IGA space offering IGA functions targeted at mid-market customers to meet their basic IGA requirements with minimal effort and investment.

Blog

CIAM as a Key Factor in the Digital Transformation

Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors, at conferences, and in the general media. But Digital Transformation, or DT as we like to abbreviate it, is much more than that. DT is commonly regarded as a step or process that businesses go through to make better use of technology to deliver products and services to customers, consumers, and citizens. This is true for established businesses, but DT is enabling and creating entirely new businesses...

Blog

Sustainable Data Management

Getting competitive advantage from data is not a new idea however, the volume of data now available and the way in which it is being collected and analysed has led to increasing concerns. As a result, there are a growing number of regulations over its collection, processing and use. Organization need to take care to ensure compliance with these regulations as well as to secure the data they use. This is increasing the costs and organizations need a more sustainable approach. In the past organizations could be confident that their data was held internally and was under their own control....

Blog

Robotic Process Automation – an IAM Challenge

Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform tasks that humans executed before, companies unlock a significant potential for cost savings. AI (Artificial Intelligence) helps in realizing RPA solutions. However, if done wrong, the use of RPA can cause severe security challenges. It starts with the definition of the accounts used by the robots. There appears being a tendency of creating sort of “super-robot” accounts –...

Webcast

Next-Gen Identity Analytics and Access Governance Approach

Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity analytics and access governance for creation of Next-Gen IGA solutions. Machine Learning inspired IGA offers significant improvements to enhance identity analytics and access governance processes to enable IAM leaders support the business better by helping them make more informed decisions.

Leadership Brief

Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105

As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in combination with other types of technologies. Blockchain ID and the related concept of Self Sovereign Identity (SSI) are gaining momentum, in areas such as KYC (Know Your Customer), Consumer Authentication, and Consumer ID management. While most solutions are still in their early stages, they show the potential of Blockchain ID.

Advisory Note

Buyer’s Guide: Endpoint Protection - 80110

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for endpoint protection.

Executive View

Executive View: Wallix Bastion - 79053

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale multi-tenant deployments.

Webcast

Identity Governance - the Value of Leveraging IGA Functions from the Cloud

Even though companies need to implement Identity Governance & Administration (IGA) solutions in order to stay compliant and support their security, the deployment of IGA solutions still poses a challenge to many of them. Delivering a frictionless experience for users and employees while efficiently managing identities and access entitlements are key to a successful deployment.

Press Release

KuppingerCole Analysts AG Honors Identity Management and Security Projects at the 12th European Identity & Cloud Award Ceremony

Wiesbaden, May 07, 2019 – With the European Identity & Cloud Awards, KuppingerCole Analysts AG honors outstanding identity management and security projects and initiatives at the 13th European Identity & Cloud Conference 2019 on Wednesday, May 15, 2019, 7:20 pm. The winner projects will be announced live on stage during the festive Award Ceremony at the peak of EIC.

Executive View

Executive View: FIDO2 - 80059

The FIDO® Alliance has released new authentication specifications that enhance security and privacy, standardize the authentication experience and underlying APIs, improve the usability, and extend the FIDO paradigm to more types of devices, platforms, and environments. With the publication of FIDO2 (comprised of FIDO’s CTAP and W3C’s WebAuthn specification), FIDO has more effectively bridged the gaps between mobile devices, traditional computing devices, and web applications.

Executive View

Executive View: Darktrace Enterprise Immune System - 80003

Darktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the whole corporate IT infrastructure, including physical and virtualized environments, industrial control networks, cloud infrastructures, and SaaS applications.

Advisory Note

Buyer’s Guide: Consumer Identity and Access Management Solution - 80111

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.

Executive View

Executive View: BeyondTrust Password Safe - 80067

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für das Passwortmanagement gemeinsam genutzter Accounts und für die Sitzungsverwaltung über ein breites Spektrum von Zielsystemen bereit.

Whitepaper

Whitepaper: Identity Governance. The Value of Leveraging IGA Functions from the Cloud - 80043

With IT functions gradually shifting to the cloud, it is time to rethink the way  supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are implemented. While solutions running on premises, but also supporting cloud services were the norm until now, running IGA as a service, with support for the hybrid reality of IT infrastructures becomes the adequate solution.

Executive View

Executive View: Exostar Supplier Risk Management - 79074

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply chain. By building on the capabilities of the Exostar Platform as an industry collaboration network, it enables re-use of supplier representations and certifications with multiple buyers, thus efficiently reducing the workload involved and improving information consistency and accuracy in support of Supplier Relationship Management.

Webinar

May 29, 2019: The Compelling Need for Privileged IT Process Automation

IT processes can often be repetitive and many of these tasks can take companies a lot of time and costs, putting pressure on highly skilled IT staff. By automating IT processes, companies can not only become more productive and efficient but also relieve the load on their IT department.

Conference

Feb 06, 2020: Cybernetix.world 2020 - Nigeria

Cybernetix.world is a first sustainable decentralized event for global communities. These series of events offer you talks, panel discussions and workshops relevant for an enterprise executive but also for a private citizen. The events across the 2 continents will cover all aspects of digitalization and the interaction of humans and technology.

Leadership Brief

Leadership Brief: Artificial Intelligence in Cybersecurity - 70278

Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop millions of complex rules sounds amazing: instead, machine learning models are simply trained by feeding them with large amounts of carefully selected data. However, should we really expect AI to replace human analysts in the field of cybersecurity anytime soon?

Conference

Feb 04 - 05, 2020: Cybernetix.world 2020 - Sweden

Cybernetix.world is a first sustainable decentralized event for global communities. These series of events offer you talks, panel discussions and workshops relevant for an enterprise executive but also for a private citizen. The events across the 2 continents will cover all aspects of digitalization and the interaction of humans and technology.

Conference

Feb 04 - 06, 2020: Cybernetix.world 2020 - Germany

Cybernetix.world is a first sustainable decentralized event for global communities. These series of events offer you talks, panel discussions and workshops relevant for an enterprise executive but also for a private citizen. The events across the 2 continents will cover all aspects of digitalization and the interaction of humans and technology.

Conference

Feb 04 - 06, 2020: Cybernetix.world 2020

Webcast

Artificial Intelligence: Disruption Ahead?

When AI comes to mind, many people, maybe in Europe a bit more than in other parts of the world, fear some kind of terrestrial robot overlords taking over control, forcing us humans to surrender and devote our freedom to their understanding of a well-organized society without all those things that make our lives worth living. But the reality is different. We are many years away from what Terminator, ex Machina and all the other Hollywood puppets and figures would suggest: Artificial organisms which understand what they see, hear, say or do. So, what is it that creates such a hype around a...

Executive View

Executive View: One Identity Manager SAP Integration - 80073

One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The integration capabilities count amongst the leading-edge solutions in IGA (Identity Governance and Administration) products.

Webcast

Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems. That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of today’s IGA products: In-depth management of Active Directory, Azure AD, Office 365 and other core infrastructure elements, from creating mailboxes to in-depth access control in AD and on file servers Lightweight implementations for SMBs that don’t need the full breadth in capabilities...

Webinar

Jun 27, 2019: Under Pressure From the Auditor: Rapid Response by Rapid Access Reviews

Most organizations are aching under the pressure the feel from auditors in delivering information. A large portion of that is based on access reviews, i.e. demonstrating that the least privilege principle and related regulatory requirements are met.

Congress

May 12 - 15, 2020: European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Executive View

Executive View: Kleverware IAG - 80106

Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermöglicht die schnelle Implementierung von Berechtigungsprüfungen und -berichten und kann auf einfache Weise Berechtigungsdaten in heterogenen, komplexen IT-Landschaften, einschließlich SaaS-Diensten und Geschäftsanwendungen sammeln und homogenisieren. Kleverware IAG bietet eine schlanke Alternative zu umfassenden IGA (Identity Governance & Administration) Implementierungen.

Blog

Could Less Data Be More Data?

Data, a massive amount of data, seems to be the holy grail in building more sophisticated AI’s, creating human-like chatbots and selling more products. But is more data actually better? With GDPR significantly limiting the way we generate intelligence through collecting personally identifiable data, what is next? How can we create a specific understanding of our customers to exceed their expectations and needs with less data? Many of us collect anything we can get our hands on from personal information, behavioral data, to “soft” data that one might run through a natural...

KCx Talks

Jun 04 - Dec 31, 2019: KCx Talks Series 2019

KCx Talks stand for expertise, exchange, and exclusivity. Enjoy an evening in a relaxed atmosphere together with experts from a wide range of disciplines. Exciting short lectures, rousing panel discussions and personal fireside chats on current digitization and identity topics in various industries await you. Network and discuss with an exclusive group of participants at a hip location in the city, with selected food and drinks. Be part of the community and secure your seat at one of the KCx Talks near you now!

Executive View

Executive View: BeyondTrust Password Safe - 80067

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security threats caused by  abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management capabilities across a wide range of target systems.

Webcast

Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud

The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.

KCx Talks

Jun 12, 2019: Rise & Application of Artificial Intelligence

Artificial Intelligence (AI) has been around for decades. But now, with the increasing computational power available, and with significant investments from large technology companies like Google, IBM and Amazon, and from governments like China, we are experiencing AI on its way to developing a game changing impact on how we live, work and do business. In this KCx Talk we will look at the promise of current AI deployments, their challenges, implications, and risks, and we will discuss the way how AI will influence our future.

Blog

The Perfect Shot!

Shooting from the hip is easy, because it is fast and sound like you’re making an impact. But do you hit the mark? When you study the ‘art of shooting’ a bit there is a whole lot of practice to it, it takes time and every shot is highly contextual. No soldier goes into battle without a thorough preparation and training. The target, the terrain, the road in and the road out, weather, it all plays a role in hitting the mark. Becoming really good is hard, takes a long time, and ultimately also depends on context. Yet it always beats shooting from the hip. Every so often I...

Executive View

Executive View: Ubisecure Identity Platform - 79072

Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, innovative standards support, and the ability to leverage some bank and national IDs. RapidLEI provides a way to manage organizational identity.  

KCx Talks

Jun 04, 2019: Treiber der Digitalen Transformation in der Finanzindustrie

Genießen Sie gemeinsam mit Experten aus verschiedenen Fachbereichen einen Abend mit interessanten Vorträgen in entspannter Atmosphäre. Nehmen Sie an anregenden Diskussionen teil und genießen Sie persönliche Kamingespräche zu den aktuellen Digitalisierungs- und Identitätsthemen in unterschiedlichen Branchen. Netzwerken und diskutieren Sie mit einem exklusiven Teilnehmerkreis in einer angesagten Location der Stadt, mit ausgewählten Speisen und Getränken.

Webinar

May 02, 2019: Artificial Intelligence: Disruption Ahead?

When AI comes to mind, many people, maybe in Europe a bit more than in other parts of the world, fear some kind of terrestrial robot overlords taking over control, forcing us humans to surrender and devote our freedom to their understanding of a well-organized society without all those things that make our lives worth living.

Webinar

Jun 25, 2019: Mit Access-Governance-Projekten neue Vorschriften erfüllen, ohne das Rad neu zu erfinden

IGA-Projekte (Identity Governance & Administration) bergen aufgrund ihrer Komplexität diverse Risiken. Diese ergeben sich meistens in der Vernetzung einer komplexen, heterogenen IT-Infrastruktur sowie durch den bereichsübergreifenden Charakter von IGA-Projekten. Wenn man nicht bei jedem Projekt immer wieder von Null anfangen möchte, und auf Erfahrungswerte zurückgreift, können viele Risiken sehr leicht vermieden werden.

Webinar

Jul 02, 2019: Challenges for Managed Service Providers Offering Privileged Account Management as a Service

Insufficiently protected privileged accounts pose high risks to any given company today. Therefore, Privileged Account Management (PAM) is of paramount importance to a functional insider threat program, which is at the core of any modern cybersecurity strategy. While utilizing a variety of IaaS, PaaS and SaaS offerings, organizations often face difficulties in controlling the management of their privileged accounts due to a lack of time, budget and other resources.

Blog

Artificial Intelligence in Cybersecurity: Are We There Yet?

Artificial Intelligence (along with Machine Learning) seems to be the hottest buzzword in just about every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop millions of complex rules sounds amazing: instead, machine learning models are simply trained by feeding them with large amounts of carefully selected data. There is however a subtle but crucial distinction between “thinking like a human” (which in academic circles is usually referred as...

Blog

Smart Manufacturing: Locking the Doors You've Left Open When Connecting Your Factory Floor

Smart Manufacturing or, as the Germans tend to say, Industry 4.0, has already become a reality for virtually any business in manufacturing. However, as just recently demonstrated by the attack on Norsk Hydro, this evolution comes at a price: There are doors created and opened for attackers that are not easy to close again. These new challenges are not a surprise when looking at what the quintessence of Smart Manufacturing is from a security perspective. Smart Manufacturing is about connecting business processes to manufacturing processes or, in other words, the (business) value chain to...

Blog

Data Security and Governance (DSG) for Big Data and BI

Today, organizations are capturing trillions of bytes of data every day on their employees, consumers, services and operations through multiple sources and data streams. As organizations explore new ways to collect more data, the increased use of a variety of consumer devices and embedded sensors continue to fuel this exponential data growth. Large pools of data, often referred to as data lakes, are created as a result of this massive data aggregation, collection and storage – which remains the easiest of all processes in a Big Data and BI value chain. What’s concerning is the...

Leadership Brief

Leadership Brief: Data Security and Governance (DSG) for Big Data and BI Environments - 80109

Increased relevance of BigData and BI environments in supporting business decisions requires a broad set of data points to be collected throughout the lifetime of an application and users’ interaction with it. Security and risk management leaders must ensure that the risks emerging from the abundance and extensive use of this data are identified and that the right security and governance controls are employed to address these risks.

Leadership Brief

Leadership Brief: The Limits of AI in Marketing Automation - 79007

Artificial intelligence and machine learning are megatrends in marketing analytics and automation—it's often seen as the holy grail of digital marketing, as its possibilities seem to be endless. But are they? This leadership brief discusses typical limits and risks of ML-based marketing automation—and shows how to overcome or manage them.

Webcast

The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance

Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across the entire IT landscape, starting with an initial clean-up. This can result in complex projects with multi-year initiatives on defining business roles and cumbersome access review (recertification) processes, which annoy the business users. Factually, such approaches even might fail in fulfilling the regulatory requirements, just because they never get done and used.

Press Release

KuppingerCole Analysts Young Talents Community Offers Students Free Accreditation for European Identity & Cloud Conference

Wiesbaden, April 09, 2019 – KuppingerCole Analysts offers all students the opportunity to join the company’s Young Talents Community. Apart from other benefits, members of the community can attend KuppingerCole events such as the European Identity & Cloud Conference from May 14-17, 2019 in Munich free of charge.

Leadership Brief

Leadership Brief: Machine Learning, Marketing, and Privacy - 80032

Artificial intelligence and machine learning techniques are becoming more and more important for marketing. ML offers new possibilities to analyze customer data, enabling individual marketing measures to be delivered. Nevertheless, privacy is often a concern when it comes to ML. Furthermore, legislation based on GDPR has to be considered. This leadership brief gives an overview of the opportunities, privacy risks, and solutions regarding machine learning and marketing.

Webinar

Jun 13, 2019: Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers are stubbornly ignoring the latest cyberthreats and do not see security as a priority in general.

Leadership Brief

Leadership Brief: AI and Machine Learning – The Basics in a Nutshell - 80033

Artificial intelligence is becoming more and more important for various applications in almost all industrial sectors. This leadership brief gives a basic overview of the main principles of artificial intelligence (AI), with a strong focus on machine learning (ML). Typical use cases are illustrated based on some examples—with a marketing and identity management-oriented focus.

Executive View

Executive View: ManageEngine AD360 - 79070

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that go beyond pure entitlement, by adding authentication features, UBA (User Behavior Analytics), and even Single Sign-On to several cloud services. However, the core of the product is supporting an efficient, automated management of Microsoft Active Directory and mitigating risks in these environments by automation and optimization of entitlements.

Executive View

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.2 - 79079

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra provides the necessary components of a CIAM solution with a focus on the Japanese market.

Executive View

Executive View: BigID - 80046

With today's mounting regulations to protect sensitive customer data, organizations are faced with new requirements, challenges and compliance risks. BigID assist organizations with their data compliance requirements by helping them find, categorize and map their data at scale.

Webinar

Jun 18, 2019: Getting Rid of the Password – How to Increase Safety Affordably

Despite compromised passwords being the leading cause of data breaches, most online businesses still rely on solely using passwords for logins. While getting rid of password authentication is desirable from a security standpoint, organizations fear that it is a costly endeavor that can also affect user experience.

Leadership Brief

Leadership Brief: Marketing, IoT, and Privacy - 80034

The Internet of Things (IoT) is an IT megatrend. Apart from offering new possibilities and experiences to its users, IoT is highly interesting for marketers as it offers new ways to communicate with consumers and customers, leading to new possibilities in terms of analytics and consumer engagement as well. But what about privacy when IoT comes into play? This Leadership Brief gives an overview of marketing opportunities and privacy challenges in terms of IoT, with a focus on European legislation based on GDPR.

Executive View

Executive View: Simeio IAM for SMB - 79071

Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrators as well as security. The solution provides comprehensive user management via workflows, which are accessible via mobile devices.

Executive View

Executive View: WSO2 Identity Server - 80060

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of application and service APIs. WSO2 Identity Server provides a comprehensive and flexible solution for the modern enterprise.

Blog

There Is a Price to Pay for Using the Shiny, Bright Cloud Service

One of the slides I use most frequently these days is about Identity Brokers or Identity Fabrics, that manage the access of everyone to every service. This slide is based on recent experience from several customer advisories, with these customers needing to connect an ever-increasing number of users to an ever-increasing number (and complexity) of services, applications, and systems. This reflects the complex reality of most businesses. Aside of the few “cloud born” businesses that don’t have factory floors, large businesses commonly have a history in their IT. Calling...

Webcast

The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It

The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared.  What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases.  In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these environments, organizations cannot adequately account for how personal data...

Webinar

Jun 05, 2019: Leverage Enterprise Architecture to Achieve GDPR Compliance

Several measures have been undertaken by Organizations at various levels to comply with GDPR, most of which remain reactive, fragmented and largely ad-hoc. These controls are also not continuous in nature and therefore fail to satisfy ongoing compliance requirements. Organizational leaders (CISOs, CIOs, CDPOs or CROs) felt the need for better data controls that should be baked into organizational processes to ensure compliance by design.

Executive View

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80036

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft® SharePoint™, Office 365™) gespeichert sind durch Virtualisierung, Verschlüsselung und Datenfragmentierung. Sichere und benutzerfreundliche Zusammenarbeit an geschützten Dokumenten und transparente, datenzentrische Sicherheit für Cloud, On-Premises und Hybridspeicherumgebungen.

Executive View

Executive View: AWS Certificate and Key Management - 70365

A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory compliance across the whole cloud footprints.

Webcast

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.

Executive View

Executive View: CyberArk Privileged Session Manager for Cloud - 79034

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and services. Privileged Session Manager for Cloud enables secured administrative access to a hybrid cloud environment combined with multi-factor authentication.

Webinar

May 09, 2019: Next-Gen Identity Analytics and Access Governance Approach

Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity analytics and access governance for creation of Next-Gen IGA solutions. Machine Learning inspired IGA offers significant improvements to enhance identity analytics and access governance processes to enable IAM leaders support the business better by helping them make more informed decisions.

Leadership Compass

Leadership Compass: Privileged Access Management - 79014

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a detailed analysis of the PAM market and its key players to help security and IAM leaders find the right product(s) that best fit their cybersecurity needs.

Webinar

May 21, 2019: The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is Located

With a huge amount of data around, cloud migration is the ideal solution today. A necessary stage in migrating data to the cloud is putting it in order. This is particularly important when it comes to unstructured, so-called dark data: files and documents that are undermanaged (excel files of budget estimates, PDFs containing important patents, Word documents containing personal employee or customer information), in general the data that is not managed in an orderly fashion such as structured database which is easily governed. Usually, this kind of data that tends to be misplaced, misused,...

Executive View

Executive View: Digital Shadows SearchLight™ - 79041

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure.

Webcast

Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

Executive View

Executive View: Amazon GuardDuty - 80005

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick and uncomplicated identification of suspicious activities and malicious behavior across AWS cloud accounts and workloads.

Webinar

May 28, 2019: All the Roads Lead to the C, Paved with B2B

More and more organizations use CIAM for B2B use cases as such combination can help companies position themselves on the market. While no one argues that user experience journey for the B2B Customer is just as important as any other customer, they most certainly need a relatively different set of features.

Executive View

Executive View: Krontech SingleConnect - 80031

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges.

Blog

Oslo, We Have a Problem!

As you have certainly already heard, Norsk Hydro, one of the world’s largest aluminum manufacturers and the second biggest hydropower producer in Norway, has suffered a massive cyber attack earlier today. According to a very short statement issued by the company, the attack has impacted operations in several of its business areas. To maintain the safety and continuity of their industrial processes, many of the operations had to be switched to manual mode. The details of the incident are still pretty sparse, but according to the statement at their press conference, it may have been...

Webinar

May 23, 2019: Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.

Executive View

Executive View: Thycotic Privilege Manager - 80004

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a combination of least privilege and application control.

Webcast

API Security: Separating Truth from Fiction

APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have developed into one of the foundations of today’s digital business. Nowadays, APIs are everywhere – they enable business communications with partners and customers, make applications from different vendors work together seamlessly, power large IoT networks and the whole cloud. For many companies, APIs have even become the very foundation of their business models and the primary source of...

Blog

Ignorance is Risk

#RSAC2019 is in the history books, and thanks to the expansion of the Moscone Center, there was ample space in the expo halls to house vendor booths more comfortably. In fact, there seemed to be a record number of exhibitors this year. As always, new IAM and cybersecurity products and services make their debut at RSAC. Despite the extra room, it can be difficult for the security practitioner and executive to navigate the show floor. Some plan ahead and make maps of which booths to visit, others walk from aisle 100 to the end. It can take a good deal of time to peruse and discover...

Webinar

Apr 30, 2019: Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems.

Blog

Building Trust by Design

Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the latter is usually applied to Blockchain, of course). To me, this has always sounded… weird. After all, trust is the foundation of the very society we live in, the key notion underlying the “social contract” that allows individuals to coexist in a mutually beneficial way. For businesses, trust has always been a resulting combination of two crucial driving forces – reputation...

Blog

The Wrong Click: It Can Happen to Anyone of Us

The Wrong Click: It Can Happen to Anyone of Us

Blog

AI Myths, Reality and Challenges

The dream of being able to create systems that can simulate human thought and behaviour is not new. Now that this dream appears to be coming closer to reality there is both excitement and alarm. Famously, in 2014 Prof. Stephen Hawking told the BBC: "The development of full artificial intelligence could spell the end of the human race”. Should we be alarmed by these developments and what in practice does this mean today? The origins of today’s AI (Artificial Intelligence) can be traced back to the seminal work on computers by Dr Alan Turing. He proposed an experiment that became...

Webcast

Matthias Reinwarth - The wrong click: it can happen to anyone of us

The wrong click: it can happen to anyone of us

Executive View

Executive View: Kleverware IAG - 80042

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rapidly implementing access reviews and entitlement reporting, and can easily collect and homogenize entitlement data across heterogeneous, complex IT landscapes, including SaaS services, business applications, and other tools. Kleverware IAG delivers a lightweight alternative to full IGA (Identity Governance & Administration) deployments.

Whitepaper

Whitepaper: PATECCO Privileged Access Management Services - 80037

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation.

Executive View

Executive View: Thales Vormetric Application Crypto Suite - 79069

Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities, beyond just network and file-level encryption. Vormetric Application Crypto Suite from Thales eSecurity provides an integrated, easy-to-use set of services covering the needs for such environments.

Boot Camp

May 17, 2019: Hybrid and Secure Cloud Boot Camp

Executive View

Executive View: Ilantus Compact Identity - 80052

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the business. Ilantus Compact Identity is an entry level enterprise IDaaS offering targeted at SMB customers to jump start their IAM with minimal effort and investment.

Blog

Ledger for the Masses: The Blockchain Has Come to Stay

Hype topics are important. They are important for vendors, startups, journalists, consultants, analysts, IT architects and many more. The problem with hypes is that they have an expiration date. Who remembers 4GL or CASE tools as an exciting discussion topic in IT departments? Well, exactly, that's the point... From that expiration date on, they either have to be used for some very good purposes within a reasonable period of time, or they turn out to be hot air. There have been quite a few hype topics lately. Think for example of DevOps, Machine Learning, Artificial Intelligence, IoT,...

Webcast

Consumer Identity World 2019

Executive View

Executive View: Veracode Application Security Platform - 79060

Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.

Webinar

Apr 09, 2019: The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance

Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across the entire IT landscape, starting with an initial clean-up. This can result in complex projects with multi-year initiatives on defining business roles and cumbersome access review (recertification) processes, which annoy the business users. Factually, such approaches even might fail in fulfilling the regulatory requirements, just because they never get done and used.

Webinar

Apr 25, 2019: Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud

The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.

Executive View

Executive View: Bromium Secure Platform 4.1 - 71309

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user behavior monitoring and enhanced enterprise management capabilities.

Blog

Web Access & Federation

An organization’s need to support communication and collaboration with external parties such as business partners and customers is just as an essential technical foundation today as it has been in the past. Web Access Management and Identity Federation are two vital and inseparable technologies that organizations can use to manage access to and from external systems, including cloud services, consistently. While the core Web Access Management and Identity Federation technologies have been well established for years, organizations will still need a strategic approach to address the...

Blog

Data Privacy & CX

Beyond the new data privacy regulations: how to improve customer understanding and the customer experience? When it comes to state-of-the-art sales and marketing, customer experience (CX) is a highly important topic. Creating and analyzing outstanding customer journeys while considering attractive and suitable marketing touchpoints are seen as key to success when it comes to omnichannel marketing. The customer experience depends on many factors, all of which have to be considered in terms of strategic and operational marketing. A key topic is the individualization of various marketing...

Blog

Blockchain Just a Hype?

Blockchain - Just a Hype?

Webcast

Martin Kuppinger - Blockchain Just a Hype?

Blockchain Just a Hype?

Advisory Note

Advisory Note: Maturity Level Matrix for Cyber Security - 72555

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

Advisory Note

Architecture Blueprint: Hybrid Cloud Security - 72552

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and integrate security for the Hybrid Cloud.

Executive View

Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80036

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while enabling the safe and convenient cooperation with protected documents. Transparent, data-centric security for cloud, onpremises and hybrid storage environments.

Webcast

CCPA vs. GDPR: An Overview on Similarities and Differences

Over the last few years, the world has witnessed an increasing number of data breaches involving the credentials and PII of employees, citizens, and consumers. We've all experienced breach fatigue and/or been impacted by these losses.

Leadership Compass

Leadership Compass: Access Management and Federation - 71147

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms. Your compass for finding the right path in the market.

Executive View

Executive View: Hitachi ID Privileged Access Manager - 80030

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists.

Webinar

May 07, 2019: Identity Governance - the Value of Leveraging IGA Functions from the Cloud

Even though companies need to implement Identity Governance & Administration (IGA) solutions in order to stay compliant and support their security, the deployment of IGA solutions still poses a challenge to many of them. Delivering a frictionless experience for users and employees while efficiently managing identities and access entitlements are key to a successful deployment.

Whitepaper

Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. ForgeRock Identity Platform provides strong customer authentication capabilities that can help businesses meet the technical challenges posed by PSD2.

Executive View

Executive View: Checkmarx Software Exposure Platform - 71512

Checkmarx Software Exposure Platform combines application security testing tools, managed services, and training in a single solution that enables developers to detect, prioritize and mitigate software-related risks at every stage of the development life cycle.  
 

Boot Camp

May 17, 2019: Microservice & Identity Boot Camp

Whitepaper

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and productivity for users on the go. There is a need for the next-generation enterprise security solutions delivered from the cloud.

Executive View

Executive View: comforte AG SecurDPS Enterprise - 80007

comforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure security and compliance of sensitive data in mission-critical business applications.

Executive View

Executive View: SAP Customer Data Cloud - 79001

SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management.   Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identity, consent, profile management and marketing service functionality for enterprise customers.

Webinar

Mar 26, 2019: Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 

Webcast

IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly

Making your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and innovative pressure.

Blog

Are You Prepared for a Cyber-Incident?

According to the Ponemon Institute - cyber incidents that take over 30 days to contain cost $1m more than those contained within 30 days. However, less than 25% of organizations surveyed globally say that their organization has a coordinated incident response plan in place. In the UK, only 13% of businesses have an incident management process in place according to a government report. This appears to show a shocking lack of preparedness since it is when not if your organization will be the target of a cyber-attack. Last week on January 24th I attended a demonstration of IBM’s new...

Webinar

Mar 21, 2019: Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

Webinar

Apr 02, 2019: The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It

The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared. What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases. In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these environments, organizations cannot adequately account for how personal data is processed...

Blog

Who's the Best Security Vendor of Them All?

This week I had an opportunity to visit the city of Tel Aviv, Israel to attend one of the Microsoft Ignite | The Tour events the company is organizing to bring the latest information about their new products and technologies closer to IT professionals around the world. Granted, the Tour includes other cities closer to home as well, but the one in Tel Aviv was supposed to have an especially strong focus on security and the weather in January is so warm, so here I was! I do have to confess however that the first day was somewhat boring– although I could imagine that around 2000...

Executive View

Executive View: SSH.COM PrivX - 70302

SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments.

Blog

Can Autonomous Improve Security Posture?

Last week I attended the Oracle Open World Europe 2019 in London. At this event Andrew Sutherland VP of technology told us that security was one of the main reasons why customers were choosing the Oracle autonomous database. This is interesting for two reasons firstly it shows that security is now top of mind amongst the buyers of IT systems and secondly that buyers have more faith in technology than their own efforts. The first of these reasons is not surprising. The number of large data breaches disclosed by organizations continues to grow and enterprise databases contain the most...

Conference

Nov 12 - 14, 2019: Cyber Access Summit 2019

Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Conference

Nov 12 - 14, 2019: Cybersecurity Leadership Summit 2019

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management,...

Blog

Thoughts on the Acquisition of Janrain by Akamai

2019 started off with a very noteworthy acquisition in the identity and security space: the purchase of Janrain by Akamai. Janrain is a top vendor in the Consumer Identity market, as recognized in our recent Leadership Compass: https://www.kuppingercole.com/report/lc79059. Portland, OR-based Janrain provides strong CIAM functionality delivered as SaaS for a large number of Global 2000 clients. Boston-based Akamai has a long history of providing web acceleration and content delivery services. Last year, they entered into a partnership whereby Akamai provided network layer protection for...

Blog

CCPA: GDPR as a Catalyst for Improving Data Protection Outside the EU

It wasn't too long ago that discussions and meetings on the subject of digitization and consumer identity access management (CIAM) in an international environment became more and more controversial when it came to privacy and the personal rights of customers, employees and users. Back then the regulations and legal requirements in Europe were difficult to communicate, and especially the former German data protection law has always been belittled as exaggerated or unrealistic. However, in the past three years, during which I have given many talks, workshops and advisory sessions on the...

Webcast

Solving New Authentication Challenges While Finding Parity Between User Experience and Security

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.

Webinar

Feb 12, 2019: CCPA vs. GDPR: An Overview on Similarities and Differences

Over the last few years, the world has witnessed an increasing number of data breaches involving the credentials and PII of employees, citizens, and consumers. We've all experienced breach fatigue and/or been impacted by these losses.

Conference

Nov 27 - 28, 2019: AImpact Summit 2019

AImpact Summit held on November 27 – 28, 2019 in Munich, offers the unique opportunity to get a deep insight on the hottest topics of Artificial Intelligence, network with like-minded people, connect with peers who recognize that now is the time for AI, meet the people changing the perspectives and transforming the way we do business today. As AI increasingly permeates every aspect of our life, knowing how to apply the cutting-edge technology to one’s competitive advantage or how to avoid risks and threats become vastly important.

Blog

Trends in Consumer Identity for 2019

2018 was a year of sweeping changes in Consumer Identity Management products and services. CIAM continues to be a fast-growing market. Research indicates that about half of all CIAM deals are still originating outside the tent of the CISO and IAM support organizations. More vendors entered the market and there were some noteworthy acquisitions. Lastly, many innovative improvements occurred across most all solutions, due in part to GDPR. What is driving CIAM growth? Businesses are realizing that efficient and effective digital identity solutions lead to more consumer engagement and a better...

Blog

BAIT and VAIT as Levers to Improving Security and Compliance (And Your IAM)

Usually, when we talk about special compliance and legal requirements in highly regulated industries, usually one immediately thinks of companies in the financial services sector, i.e. banks and insurance companies. This is obvious and certainly correct because these companies form the commercial basis of all economic activities. Although regulations and their obligations are often formulated on a relatively abstract level, they must be adapted over time to the changing business and technical circumstances. Sometimes they need to be made more concise, more actionable and more specific, to...

Blog

AI in a Nutshell

What AI is and what not

Executive View

Executive View: Safe-T Software Defined Access - 79075

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is done by authenticating users prior to providing access. The solution supports a variety of use cases, including hybrid cloud deployments and access to cloud services such as Microsoft Office 365. It thus can become a central component, specifically in environments with high security requirements.

Webcast

Martin Kuppinger - AI in a Nutshell

What AI is and what not

Webinar

Mar 14, 2019: API Security: Separating Truth from Fiction

APIs (application programming interfaces) have undergone a truly amazing transformation in recent years. From an obscure technical term only software developers were familiar with, they have developed into one of the foundations of today’s digital business. Nowadays, APIs are everywhere – they enable business communications with partners and customers, make applications from different vendors work together seamlessly, power large IoT networks and the whole cloud. For many companies, APIs have even become the very foundation of their business models and the primary source of income.

Whitepaper

Whitepaper: OneSpan Intelligent Adaptive Authentication - 80026

Fraud reduction is a paramount concern in many industries today.  Finance, as well as healthcare and retail companies, are increasingly targeted by cybercriminals. New regulations in the financial industry are coming into force in many areas around the world. These regulations aim to improve security and reduce fraud. OneSpan Intelligent Adaptive Authentication provides strong and multi-factor authentication and transactional risk analysis capabilities that can help businesses strengthen their security posture, meet the technical challenges posed by these new regulations, and improve...

Blog

Top 5 CISO Topics for 2019

Where to put your focus on in 2019

Webcast

Martin Kuppinger's Top 5 CISO Topics for 2019

Where to put your focus on in 2019

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]