Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Expand your GRC Controls to Cover all Systems - How to Make SAP GRC Work in a Heterogeneous World
Dec 13, 2012
SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the core business environment, auditors have started looking at other environments as well – for example the Microsoft Windows and SharePoint infrastructure which holds most of the unstructured data. In addition, there are several industries and many organizations which have a series of other core business...
Webinar Recording
Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity
Dec 05, 2012
Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.
Webinar Recording
Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die Zukunft
Dec 03, 2012
Herkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing wirksam begegnen zu können. In diesem Webinar lernen Sie, wie sich Access Governance weiterentwickeln muss und welche Rolle die dynamische Zugriffssteuerung in Zukunft spielen wird.
Webinar Recording
Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning
Nov 30, 2012
Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest Software (now part of Dell) Principal Solutions Architect Paul Walker will contribute a number of best practice examples and talk about his experience from migrating existing provisioning environments to up-to-date flexible and future-proof solutions.
Webinar Recording
The Strategic Approach to Cloud Computing. From Tactics and Chaos to Efficiency
Nov 08, 2012
Selecting your Cloud Service Provider right and making sure that he steadily delivers on his promise - this needs processes in place at your organization enabling a structured way of selecting an appropriate cloud service from a myriade of offerings availabe in the market, and laying the foundations for effective and efficient cloud audits. Join this webinar to learn how to create such processes and reduce risks of high migration efforts, unnecessary costs or even unavailability of critical services.
Webinar Recording
Best Practices for Business-Driven Identity & Access Management
Nov 07, 2012
Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access Management in global organizations.
Webinar Recording
Identity Management as a Service (IdMaaS) - the Dope or are we Duped?
Oct 31, 2012
Big players like salesforce.com entering the market: Will this redefine the way we do IAM and solve our challenges in the days of Cloud Computing, Mobile Computing, and Social Computing?
Webinar Recording
Identity in an API Economy
Oct 17, 2012
In an API Economy, everyone and everything has an API. That means 26 billion APIs by the year 2015. What is your organization doing to prepare for this fundamental shift in IT infrastructure? Join KuppingerCole´s Distinguished Analyst Craig Burton and Layer 7 Technologies CTO Scott Morrison in this webinar to understand more about the API Economy and the role of Identity for your organization.
Webinar Recording
Risiken erkennen und wirksam vermeiden: Integrierte Ansätze und Lösungen für IT GRC
Oct 10, 2012
Als böten traditionelle Infrastrukturen mit ihren Schwachstellen und Angriffspunkten nicht bereits genügend Risiken, machen IT-Konsumerisierung, Social Media im Unternehmen und alle damit verbundenen Veränderungen die Ungewissheit zum Standard. Traditionelles Risk Management stößt hier an seine Grenzen. In diesem Webinar gibt Ihnen KuppingerCole Senior Analyst Prof. Dr. Sachar Paulus einen Überblick über die aktuellen Trends, Ansätze und Lösungen im Bereich IT-GRC. Danach spricht Mark Fischer von ITConcepts über seine Praxiserfahrungen bei der Einfürhung von IT-GRC-Lösungen.
Webinar Recording
Risiken vermeiden beim Management privilegierter Identitäten
Sep 28, 2012
Komplexe Organisationsstrukturen, Legionen unterschiedlicher Zielplattformen und -Systeme, kombiniert mit einer großen Zahl schlecht dokumentierter Legacy-Systeme - das Management privilegierter Benutzerkonten und die von solchen Konten ausgehenden hohen Risiken für die Informationssicherheit erfordert viel Aufmerksamkeit, ein tiefes Verständnis für die Compliance-Anforderungen, die an Ihr Unternehmen gestellt werden, und vor allem flexible Lösungen. In diesem Webinar erhalten Sie einen Überblick über die unterschiedlichen Lösungsansätze des Privileged Identity Management und deren...
Webinar Recording
BYOD, Social Networking, Cloud - sicher und kalkulierbar
Sep 20, 2012
Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue Herausforderungen. In diesem Webinar wird Martin Kuppinger, Principal Analyst bei KuppingerCole, darüber sprechen, wie die Unternehmens-IT die Erschließung des Nutzens dieser Trends ermöglicht, ohne die damit verbundenen Risiken für Ihre Informationssicherheit zu erhöhen.
Webinar Recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
Sep 19, 2012
A plethora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,” (COPE) are trying to describe methods of mitigating the risks involved. In this training, KuppingerCole Principal Analyst Martin Kuppinger will help IT professionals to find their best way through the myriad of recommendations and solutions related to this issue, and implement the right corporate...
Webinar Recording
SAML is Dead. Long Live SAML!
Sep 17, 2012
Is SAML a dead protocol or just a walking Zombie ready to consume all enterprise brains? Or is it yet alive and well both in legacy and the future? Attend this webinar to join the discussion KuppingerCole´s Distinguished Analyst Craig Burton about health and well being of the Federated sign-on protocol of choice -- SAML.
Webinar Recording
XACML and the Externalization of Authorization: How to do it Right
Aug 15, 2012
This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in which XACML currently is used, showing the breadth and potential limitations of XACML. And it will discuss where to better not use XACML itself but to “translate” things.
Webinar Recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
Aug 08, 2012
A phletora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,” (COPE) are trying to describe methods of mitigating the risks involved. In this training, KuppingerCole Principal Analyst Martin Kuppinger will help IT professionals to find their best way through the myriad of recommendations and solutions related to this issue, and implement the right corporate...
Event Recording
Welcome to European Identity & Cloud Conference
Jul 25, 2012
Webinar Recording
Enterprise Role Management Done Right: Building the Bridge Between Business and IT
Jul 23, 2012
Enterprise Role Management still is a key topic when it comes to efficiently manage large groups of users. The art of clearly defining projects for role discovery and implementation, architecture model development and lifecycle maintenance with regards to scope and resources is your most important takeaway from this training.
Webinar Recording
Life Management Plattformen & die Zukunft des Social Networking
Jul 18, 2012
Social Networking steckt noch in den Kinderschuhen, der eher suboptimal sich entwickelnde Kurs der Facebook-Aktie mag ein Indiz dafür sein. Social Networking wie wir es heute kennen, basiert in der überwiegenden Zahl der Geschäftsmodelle darauf, dass die Nutzer weitgehend auf Privatspäre und Kontrolle über ihre persönlichen Daten verzichten. Durch die sich häufenden Fälle von Datenmissbrauch und Identitätsdiebstahl wirkt dieser Verzicht mit jedem Tag unangebrachter. Life Management Plattformen bringen Social Networking und Privatsphäre zusammen und schaffen die Basis für neue...
Webinar Recording
How to Unleash the Power of Life Management Platforms
Jul 18, 2012
Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the individuals. In this webinar, KuppingerCole Founder and Principal Analyst Martin Kuppinger will describe, why Life Management will be a key trend and how it will influence your enterprise.
Webinar Recording
Intelligent Access Management - Vorsprung vor dem Auditor
Jul 04, 2012
Nie war es wichtiger als heute, genau darüber Bescheid zu wissen, wer wozu berechtigt ist und wer was getan hat. In diesem Webinar geht es um das intelligente Management von Zugriffsrechten. Um Risiken zu reduzieren, Compliance sicherzustellen und um den Anwendern selbst die Möglichkeit zu geben, ihre Zugriffsrechte zu organisieren.
Webinar Recording
Choosing the Right Cloud
Jun 28, 2012
The rise of cloud computing has changed the rules for optimising your IT strategy. However within cloud computing there are many choices. Making the right choices can save time and money making the wrong choices can increase risks. This training will look at how to choose the right cloud for your business need.
Event Recording
EIC 2012 Session: Database Firewalls - Advancing Security for Enterprise Data
May 16, 2012
Martin Kuppinger, KuppingerCole Dr. Steve Moyle, Oracle Sebastian Rohr, KuppingerCole April 19, 2012 16:30
Event Recording
EIC 2012 Session: Exchanging Metadata through Different Federations on a Global Scale
May 15, 2012
Nicole Harris, Head of Identity Management, JISC Advance April 19, 2012 15:40
Event Recording
EIC 2012 Session: Federation or Synchronization – the Future of the Cloud
May 15, 2012
Andrew Nash, Google Darran Rolls, SailPoint Travis Spencer, Ping Identity April 19, 2012 15:20
Event Recording
EIC 2012 Session: What Federation is About – in Theory and in Practice
May 15, 2012
Dave Kearns, KuppingerCole April 19, 2012 15:00
Event Recording
EIC 2012 Session: Security for Virtualized Environments, Privileged Users and PCI Compliance
May 15, 2012
Guy Balzam, CA Technologies Stephan Bohnengel, VMware Giovanni Ciminari, Telecom Italia April 19, 2012 14:30
Event Recording
EIC 2012 Session: From Virtualization to the Cloud and Beyond
May 15, 2012
Craig Burton, KuppingerCole Martin Kuppinger, KuppingerCole April 19, 2012 14:00
Event Recording
EIC 2012 Session: The Kuppingercole IT Model and the API Economy
May 14, 2012
Craig Burton, KuppingerCole Kim Cameron, Microsoft Martin Kuppinger, KuppingerCole Fulup Ar Foll, KuppingerCole Dr. Steven Willmott, 3Scale April 19, 2012 11:30
Event Recording
EIC 2012 Session: VRM and the Intention Economy - Now What?
May 14, 2012
Craig Burton, KuppingerCole Scott David, K&L Gates LLP Marcel van Galen, Qiy Drummond Reed, Connect.Me Doc Searls, Berkman Center for Internet and Society Phil Windley, Kynetx April 19, 2012 10:30
Event Recording
EIC 2012 Session: IT Strategies and Information Security in Banks - The Regulator´s View
May 11, 2012
Dr. Markus Held, Bundesanstalt für Finanzdienstleistungsaufsicht (BaFin) April 18, 2012 11:30
Event Recording
EIC 2012 Session: Access Governance Case Study - Friends Life Realizes Quick Time To Value
May 10, 2012
Julia Bernal, Group Business Security & Data Protection Manager, Friends Life April 18, 2012 17:30
Event Recording
EIC 2012 Session: Identity & Access Management as a Key Element for a Value focused Security Strategy
May 10, 2012
Ralf Knöringer, Atos IT Solutions and Services GmbH Hassan Maad, Evidian Shirief Nosseir, CA Technologies Christian Patrascu, Oracle Peter Weierich, iC Consult GmbH April 18, 2012 17:00
Event Recording
EIC 2012 Session: How to successfully get business to participate in IAM and Access Governance
May 10, 2012
Dr. Martin Kuhlmann, Omada Edwin van der Wal, Everett April 18, 2012 15:30
Event Recording
EIC 2012 Session: Delivering Actionable Recommendations to Senior Management based on a Structured Risk Identification and Evaluation Process
May 10, 2012
Dr. Waldemar Grudzien, Association of German Banks Berthold Kerl, Deutsche Bank AG Prof. Dr. Sachar Paulus, KuppingerCole April 18, 2012 15:00
Event Recording
EIC 2012 Session: Munich Re’s Identity & Access Management - Experience Report and Best Practices
May 10, 2012
Wolfgang Zwerch, MunichRe April 18, 2012 14:30
Event Recording
EIC 2012 Session: IAM Governance in the New Commerzbank
May 10, 2012
Dirk Venzke, Director, Commerzbank AG April 18, 2012 14:00
Event Recording
EIC 2012 Session: How to Address Regulatory Needs Fast and Lean
May 10, 2012
Dr. Waldemar Grudzien, Association of German Banks Dirk Venzke, Commerzbank AG Dr. Horst Walther, Kuppinger Cole Wolfgang Zwerch, MunichRe April 18, 2012 12:00
Event Recording
EIC 2012 Session: Facing the Online Threats against Retail and Banking Customers - What are the Future Perspectives?
May 10, 2012
Prof. Dr. Sachar Paulus, Senior Analyst, KuppingerCole April 18, 2012 11:00
Event Recording
EIC 2012 Session: Cyber Crime, Cloud, Social Media... - IS Threats for Banks are Constantly Increasing. What Should We Be Doing?
May 10, 2012
Berthold Kerl, Deutsche Bank AG April 18, 2012 10:30
Event Recording
EIC 2012 Keynote: Interview - What are the Privacy and Information Security Challenges 2012 and Beyond?
May 05, 2012
Roy Adar, Vice President of Product Management, Cyber-Ark Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies Martin Kuppinger, KuppingerCole Shirief Nosseir, Marketing Manager, CA Technologies Jim Taylor, VP Identity and Security Management, NetIQ April 17, 2012 15:40
Event Recording
EIC 2012 Keynote: Conflicting Visions of Cloud Identity
May 05, 2012
Kim Cameron, Creator of the Laws of Identity and Microsoft Identity Architect, Microsoft April 17, 2012 15:20
Event Recording
EIC 2012 Keynote: eID new challenges with Digital Agenda and Cloud Computing
May 05, 2012
Prof. Dr. Reinhard Posch, CIO for the Austrian Federal Government, Republic of Austria April 17, 2012 15:00
Event Recording
EIC 2012 Keynote: "Che cosa sono le nuvole?” (What are the clouds?)
May 05, 2012
Dr. Emilio Mordini, CEO, Centre for Science, Society and Citizenship CSSC April 17, 2012 14:40
Event Recording
EIC 2012 Opening Keynote
May 05, 2012
Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies Martin Kuppinger, KuppingerCole April 17, 14:00
Event Recording
EIC 2012 Closing Keynote
May 03, 2012
Dave Kearns, Senior Analyst, KuppingerCole Prof. Dr. Sachar Paulus, Senior Analyst, KuppingerCole April 19, 2012 17:30
Event Recording
EIC 2012 Keynote: Trust and Complexity in Digital Space
May 03, 2012
Dr. Jacques Bus, Secretary General, Digital Enlightenment Forum April 19, 2012 9:30
Event Recording
EIC 2012 Keynote: The Future of Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet
May 03, 2012
Prof. Dr. Kai Rannenberg, T-Mobile Chair of Mobile Business & Multilateral Security, Goethe University in Frankfurt April 19, 2012 9:00
Event Recording
EIC 2012 Keynote: How Identity Management and Access Governance as a Service make your Cloud Work and your Business more Agile
May 03, 2012
Ralf Knöringer, Manager Business Unit IAM, Atos IT Solutions and Services GmbH April 19, 2012 8:30
Event Recording
EIC 2012 Keynote: How to build a Secure and Open Cloud
May 02, 2012
Stephan Bohnengel, Sr. Specialist Systems Engineer Security, VMware April 18, 2012 18:40
Event Recording
EIC 2012 Keynote: Top Challenges and Threats Security Managers Should Watch Out For
May 02, 2012
Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems April 18, 2012 18:20
Event Recording
EIC 2012 Keynote: How Mobility Clouds the Future and SOA / Web 2.0 gives way to the Cloud API
May 02, 2012
André Durand, Founder & CEO, Ping Identity April 18, 2012 18:00
Event Recording
EIC 2012 Keynote: Information Security Governance in Banks: Delivering Actionable Recommendation to Management
May 02, 2012
Berthold Kerl, Managing Director, Head of Information & Technology Risk Governance, Deutsche Bank AG April 18, 2012 9:30
Event Recording
EIC 2012 Keynote: Securing Critical Banking Infrastructures in the Age of Cyber Warfare
May 02, 2012
Dr. Waldemar Grudzien, Director, Department Retail Banking and Banking Technology, Association of German Banks April 18, 2012 9:00
Event Recording
EIC 2012 Keynote: Leveraging Identity to Manage Enterprise Change and Complexity
May 02, 2012
Jim Taylor, VP Identity and Security Management, NetIQ April 18, 2012 8:30
Event Recording
EIC 2012 Keynote: Identity Management & Cloud Security - There’s a Workflow for That
May 01, 2012
Patrick Parker, Founder and CEO, The Dot Net Factory April 17, 2012 19:10
Event Recording
EIC 2012 Keynote: Scaling Identity, Access, and Audit Controls to Internet Proportions
May 01, 2012
Mike Neuenschwander, Sr. Director, Oracle April 17, 2012 18:50
Event Recording
EIC 2012 Keynote: Free Customers: The New Platform
May 01, 2012
Doc Searls, Berkman Fellow, Berkman Center for Internet and Society at Harvard University April 17, 2012 18:30
Event Recording
EIC 2012 Keynote: What About Bring your own Device?
May 01, 2012
Dr. Barbara Mandl, Senior Manager, Daimler AG April 17, 2012 18:10
Event Recording
EIC 2012 Keynote: How do Today’s Technology Challenges make Real IAM Possible?
May 01, 2012
Jonathan Sander, Director of IAM Business Development, Quest Software April 17, 2012 17:50
Event Recording
EIC 2012 Keynote: What Standards Have Done and Will Do for Cloud Identity
May 01, 2012
Dr. Laurent Liscia, Executive Director, OASIS April 17, 2012 17:30
Event Recording
EIC 2012 Keynote: Externalized Authorization - What is it Good for?
May 01, 2012
Peter Weierich, Senior Strategy Consultant, iC Consult GmbH April 17, 2012 17:10
Event Recording
EIC 2012 Keynote: Cloud, Consumerization & Identity: Time to Transform the Security Model
May 01, 2012
Shirief Nosseir, Marketing Manager, CA Technologies April 17, 2012 16:50
Event Recording
EIC 2012 Keynote: Ripped from the Headlines – The ‘Privileged’ Connection – Solved!
May 01, 2012
Roy Adar, Vice President of Product Management, Cyber-Ark April 17, 2012 16:30
European Identity & Cloud Conference 2012
43 videos
Keynotes and selected sessions from the European Identity & Cloud Conference 2012. Please note that most of these videos are only available for the conference participants or users having a KuppingerCole Research subscription.
Webinar Recording
Quantifying Access Risk: How to Sell the Access Governance Project to your CFO
Apr 26, 2012
How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money.
Event Recording
European Identity Award 2012 Ceremony
Apr 26, 2012
The European Identity Awards 2012 honoring outstanding projects and initiatives in Identity Management, GRC (Governance, Risk Management and Compliance) and Cloud Security were presented yesterday by the analyst group KuppingerCole at their annual event, the European Identity Conference 2012 in Munich. Winners were chosen from a shortlist of exemplary projects and initiatives compiled by the analysts at KuppingerCole, end-user companies and vendors during the last 12 months.
Webinar Recording
Identity & Access Management in the Cloud: Real or a Mirage?
Mar 30, 2012
Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.
Webinar Recording
Conducting an Orchestra - The New Role of IAM
Mar 23, 2012
With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security cornerstone.
Webinar Recording
Returning (or finally bringing?) Identity and Access Management (IAM) to the User
Mar 22, 2012
IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.
Webinar Recording
Access Risks - from SAP to the Outer Space: an Identity & Access Governance Journey
Mar 14, 2012
Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the benefits of an Enterprise wide Identity & Access Governance implementation.
Webinar Recording
Access Governance richtig gemacht: Investitionsschutz und zielgerichtete Weiterentwicklung
Feb 29, 2012
Access Governance – dieser Begriff steht für Lösungen, mit denen sich Zugriffsrechte besser steuern und kontrollieren lassen. Die regelmäßige Re-Zertifizierung und damit Überprüfung von Zugriffsberechtigungen gehört ebenso dazu wie analytische Funktionen für den Status von Zugriffsberechtigungen und Rollenmanagement-Funktionen. Die Lösungen müssen aber auch das Management von Zugriffsberechtigungen mit einfachen Bestellfunktionen für Berechtigungen durch Endanwender und damit auch eine gute Integration mit bestehenden Provisioning-Systemen unterstützen. Nur mit einem vollständigen Kreislauf...
Webinar Recording
Best Practice Driven Identity & Access Management
Feb 21, 2012
Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on the most important qualities a new generation of effective IAM solutions has to provide.
Webinar Recording
Sicherheitsanalysen und Sicherheitsmanagement - schnell, automatisiert, intelligent
Feb 16, 2012
Auch wenn häufig viel zu leichtfertig der Begriff "Cyberwar" verwendet wird (denn Tote gibt es nur im wirklichen Krieg) - die Bedrohungslage durch Online-Kriminalität ist immens geworden. Security Information and Event Management (SIEM) stellt Ihnen wirksame Mittel dagegen zur Verfügung und hilft Ihnen dabei nicht mehr nur rein reaktiv tätig werden zu können. In diesem Webinar sprechen wir mit Ihnen über neue Herangehensweisen in diesem Bereich.
Webinar Recording
Bridging the Cloud Sign-on Gap
Feb 09, 2012
With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frustration. In this webcast KuppingerCole and Oracle will discuss how organizations can benefit from a cloud sign-on strategy. In addition, you will learn how single sign-on can jump start your cloud access management strategy and improve security.
Webinar Recording
Back to the ROOTs
Feb 02, 2012
In diesem Webinar erläutert zunächst Martin Kuppinger die aktuellen Trends im Markt für PxM (Privileged Access, Account, Identity, User Management) und die Frage, wo und wie man PxM-Lösungen mit seiner übrigen Identity und Access Management-Infrastruktur verbinden sollte. Daran anschliessend stellt Jochen Koehler von Cyber-Ark praktische Ansätze zur Verwaltung von privilegierten Identitäten vor.
Webinar Recording
Privacy by Design
Jan 27, 2012
2011 was, once again, a bad year for privacy as data breaches releasing usernames, passwords, credit card details and even medical records continued to make news right through the end of the year. Time has proven that no amount of imposed regulation can protect privacy in the face of a determined hacker. What’s needed is what’s called Privacy by Design. Join us in this webinar, where Senior Analyst Dave Kearns will discuss with Ontario´s Information and Privacy Commissioner Dr. Ann Cavoukian, who originally developed the privacy by design concept, and with McAfee Chief Frivacy Officer...