Review European Identity Conference (EIC) and CLOUD 2011
Thanks to 500+ attendees, speakers, sponsors, exhibitors and press members, you have turned EIC and CLOUD 2011 into an unforgettable event.
We hope that you had a good trip back and will remember EIC and CLOUD 2011 as a conference having met its role as a major platform to create, continue and intensify the dialog between thought leaders and users, between business and technology. Intensive discussions inside the sessions and outside, exchange of experiences and ideas - we all hope, that you could carry away enough inspirations for your upcoming projects.
Access to Presentations
We have now uploaded all currently available presentations to the conference website.
Please note that presentations and other event materials are available only to registered participants of European Identity Conference 2011. You need to log in to be able to download them.
We have put online a photo gallery. In order to get higher resolutions of a photo, just click it. If you want to have your photos added to this gallery, please send them to Levent Kara, firstname.lastname@example.org
During EIC and CLOUD 2011, our analysts interviewed many of the speakers. We have already uploaded some of them to our Podcast section.
European Identity Award 2011
Thank you for attending and contributing. See you again next year from April 17th until 20th, 2012.
KuppingerCole Quick Poll - Compliance as a driver for IAM? Please take part in our 30 seconds quick poll.
Take the Poll
Tim Cole: RSA Hack: Don’t panic, keep calm!
Following the successful hacking attack against EMC Corp’s RSA Security Division in March of this year, and especially since news of subsequent attacks against large military contractors such as Lockheed Martin, L-3 and Northrop Grumman, which seem to have been based on data stolen from RSA, companies and organizations around the world that use the popular RSA “SecurID” token system are both confused and worried. They are demanding to know whether they can still trust the system and what they are supposed to do now that every SecurID token must be considered potentially compromised...
Martin Kuppinger: Healing the Breach at RSA
It must have hurt: RSA, one of the world’s biggest names in IT Security, recently was forced to admit that there had been a successful attack against the “seeds” that are a part of their hallmark RSA SecurID Token system. These seeds store secret information that enables the system to assemble one-time passwords. Nobody really knows how serious the breach of security has been, and RSA isn’t talking, but there nevertheless are lessons to be learned for the entire industry...
Free KuppingerCole Snapshots
For an overview of the latest snapshots, visit http://www.kuppingercole.com/snapshots
Advisory Note - Authorization in the Cloud
Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that…
Advisory Note - RSA SecurID
As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time passwords)…
Advisory Note – Strong Authentication
This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…
Advisory Note – IAM and GRC Market Evolution 2011/2012
IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market...
More current Reports
For an overview of the latest reports, visit http://www.kuppingercole.com/reports
Sailpoint and BMC – how to move forward?
Symlabs now part of Quest
Be prepared for BYOD
IT Security’s little “Pulchinella Secret”
Pretzels in the Cloud
How to Spot an Unnecessary Identity Fail
Mono Resurrects Itself as Xamarin
Classify Your Data [Not Protectively Marked]
Symantec Bets on Virtual Workspaces and Mobility
News from the Analyst Summit in London
Free KuppingerCole Podcasts
The KuppingerCole Podcasts are recordings of past webinars that respectively cover individual aspects of Governance, Risk Management and Compliance, Identity and Access Management, IT Security, Cloud Computing and other core IT issues. Each podcast lasts 50 to 60 minutes and will treat current key issues. The podcasts are available at the link specified below.
To the free Podcasts
April 17th - 20th 2012, Munich
European Identity Conference and CLOUD 2012
European Identity Conference (EIC) is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as Identity Management, Governance, Risk Management and Compliance (GRC), both in "classical" and in Cloud Computing environments. With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe and beyond...
Visit us on Facebook, LinkedIn and Twitter
KuppingerCole is now on Facebook, LinkedIn and Twitter and we want to connect with you.
Become a “fan” of our page and we’ll use this as a tool to keep you abreast of important news, event and webinar opportunities and other important updates.
KuppingerCole on Facebook
KuppingerCole on LinkedIn
KuppingerCole on Twitter