English   Deutsch   Русский   中文    

Media Coverage

Businesses must address digital transformation security risks, says analyst
May 04, 2016 Businesses must address digital transformation security risks, says analyst

The security elements of business IT, the internet of things and operational technology are now all deeply interconnected, claims Martin Kuppinger

Businesses need to recognise that the process of digital transformation will affect all of their major areas, creating new security problems as once separate systems are connected in new ways, said Martin Kuppinger, principal analyst at KuppingerCole.

“Just about everything companies do in terms of digital transformation means that all these new information security risks are effectively business risks,” he told Computer Weekly. “Sensors in the production line, for example, are now being connected to business processes for the first time.”

Kuppinger said companies need to recognise that business transformation and information security are connected, and this means “we have to do information security differently”.

 “When organisations look at digital transformation, they need to restructure so that information security is responsible for the security of everything, including the internet of things (IoT), the organisation’s operational technology (OT) and the business,” said Kuppinger.

“The execution of information security needs to move to where organisations use IT, meaning IT departments will have to become more decentralised and services-based, while information security is independently responsible for security governance across everything,” he said.


Read more 

Beta Systems Software : presents at the European Identity & Cloud Conference in Munich 2016
May 03, 2016 Beta Systems Software : presents at the European Identity & Cloud Conference in Munich 2016

Berlin, 3 May, 2016 - Beta Systems will showcase their risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016.

The GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to access rights. The browser-based solution for the efficient recertification of access rights enables companies to review the internal and external users' access rights and to specify which managers are able to recertify or revoke user permissions. A Password Management module facilitates access to applications and simplifies the enforcement of IT security policies associated to passwords.


Read more 

Tools and tips for successfully preventing data leakage
May 03, 2016 Tools and tips for successfully preventing data leakage

More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history

After the breaking news this week about one of the biggest IT security breaches in history with 11.5 million documents stolen containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private.

Many companies and individuals are not yet conscious enough about the fact that information breaches are today one of the reasons why companies lose a lot of money, customers, their good reputation and public image. This risk is specially high when the confidential information needs to be shared with third parties as they may not be diligent enough at protecting our key information.

The right question to be done is not IF we should use an IRM (Information Rights Management) solution to keep privacy and control on the confidential information at our organization but WHICH of the solutions available on the market should be selected and deployed.


Read more 

Big data analytics a useful security tool
Apr 28, 2016 Big data analytics a useful security tool

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center

Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant.

“A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the Business Application Research Center (Barc).

“The survey also found that 41% reported a ‘moderate’ benefit and only 6% said benefit was ‘low’, so there is fairly strong evidence of the business benefits of big data security analytics, ” he told Computer Weekly.

While adoption across the board is still relatively low, more than two-thirds of the more advanced companies surveyed are adopting advanced big data security analytics technologies, such as user behaviour analytics, the Barc survey revealed.

The more advanced companies, which classified themselves as having “much better” skills and competency in security analytics than their companies, represented 13% of the total sample, with 68% saying they have deployed user behaviour analytics.

“Of the 87% who did not consider themselves to be in the more advanced group, only 27% have deployed user behaviour analytics,” said Bange.

User behaviour analytics can help improve an organisation’s cyber security resilience, he said, by tracking user behaviour across all IT systems, for example, to identify whenever there are significant deviations from normal behaviour to warn of potential malicious activity.

“There is nothing new in being able to identify patterns of behaviour – most of the analysis techniques are 30 to 40 years old – but now we are able to apply them to extremely large data sets across multiple information technology systems,” said Bange.

“Organisations need to know there is now the technology to support this kind of analysis that can be very beneficial in the field on information security. It can enable organisations to become more resilient through data-driven security decision-making, planning and incident responses,” he said.


Read more 

Empresas estão mal preparadas para adoção de seviços digitais
Apr 28, 2016 Empresas estão mal preparadas para adoção de seviços digitais

Apenas uma em cada cinco empresas está preparada para a transição para serviços digitais, o que pode causar problemas de segurança na gestão de identidade e acesso. Isso é o que aponta pesquisa realizada pela KuppingerCole, encomendada pela Capgemini e pela RSA, Para o levantamento foram entrevistados 831 executivos do alto escalão de empresas dos Estados Unidos, Alemanha e França, de departamentos de vendas, marketing, RH, financeiro e - especialmente - TI.
Ainda de acordo com o levantamento, à medida que organizações buscam capitalizar oportunidades digitais por meio do rápido desenvolvimento e hospedagem de novos serviços on-line, frequentemente investem pouco em medidas de segurança cibernética. Assim, criam grandes riscos, principalmente em relação ao acesso do usuário.
 
A maioria dos entrevistados (62%) acredita ser muito importante ou essencial que suas organizações possibilitem ou estendam o acesso dos clientes aos serviços digitais de forma segura, mas apenas 26% possuem a tecnologia para isso.

Read more 

IPv6 alone will not secure IoT, warns GE CISO
Apr 28, 2016 IPv6 alone will not secure IoT, warns GE CISO

It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen

Internet Protocol version 6 (IPv6)  alone will not make internet of things (IoT) communications secure, warns Hanns Proenen, chief information security officer (CISO) at GE Europe.

Although IPv6, also known as Internet Protocol next generation (IPng), is essential to IoT communications by enabling every device to have its own address on the internet, it is a myth that IPv6 is more secure than IPv4, he told Computer Weekly.

“In fact, IPv6 introduces new risks that need to be recognised and understood, especially those relating to availability andconfidentiality,” said Proenen. 


Read more 

Kuppinger Cole: Computer-Centric Identity Management
Apr 28, 2016 Kuppinger Cole: Computer-Centric Identity Management

Yesterday, I enjoyed attending a webcast entitled, “Computer-Centric Identity Management.” Led by Ivan Nicolai, Lead Analyst at Kuppinger Cole, the presentation was subtitled, “From Identity Management to Identity Relationship Management.  The changing relationship between IAM, CRM and Cybersecurity.”

I found the presentation to be concise, informative, and thought-provoking – particularly the concept that the IAM practitioner must transition from the role of “protector” to “enabler”.

I think the following diagram does a good job of illustrating the relationships people have with organizations, mobile communication devices and other devices in the growing world of IoT. Identity Relationships are critical in enabling the potential of Digital Transformation.


Read more 

Track Moderator at KuppingerCole EIC Conference
Apr 28, 2016 Track Moderator at KuppingerCole EIC Conference

Looking forward to an action packed KuppingerCole European Identity Conference, or EIC.

Participating on the Analyst Panel “Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM”: It will great to revisit this topic, which turns electronic identity management, and the way relationships are managed, on its head by looking at the customer point of view. (Flashbacks to parts of 2013 and 2014 working with a company called Respect Network on creating a “personal cloud network” with an underlying trust framework, reputation system and semantic graph…) It will great to talk with Eve Maler, Ian Glazer and my other co-panelists on how this space has evolved.

Moderating the Identity-Aware Cybersecurity Track: The notion of identity and access management (IAM) as a first class citizen of cybersecurity isn’t exactly new; recall pundits were saying 15 years ago it’s at least as important to let the good guys in as keep the bad guys out. Yet as IT endlessly evolves, IAM seems to require constant tweaking (and occasional reinvention). Nirvana always seems a bit further out on the maturity curve, standing out on the next level of sophistication once a new area of innovation unfolds. And so within this track we’ll explore:


Read more 

Big data analytics a useful security tool, says analyst
Apr 25, 2016 Big data analytics a useful security tool, says analyst

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center

Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant.

“A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the Business Application Research Center (Barc).

“The survey also found that 41% reported a ‘moderate’ benefit and only 6% said benefit was ‘low’, so there is fairly strong evidence of the business benefits of big data security analytics, ” he told Computer Weekly.


Read more 

Presentadas nuevas tecnologías de control de accesos como resultado del Proyecto ACIO Access Control in Organizations
Apr 25, 2016 Presentadas nuevas tecnologías de control de accesos como resultado del Proyecto ACIO Access Control in Organizations

El proyecto, desarrollado por un consorcio de empresas y universidades españolas e israelíes, persigue el objetivo de lamejora y unificación del control de acceso de personas, vehículos y mercancías en las organizaciones, tanto a nivel físico como lógico, desde la perspectiva de la usabilidad y la seguridad. Los resultados del proyecto ACIO han sido demostrados en una instalación portuaria pero son aplicables a cualquier organización o instalación en la que, por su actividad, el control de accesos constituya un aspecto crítico.


Read more 

How Identity Management CEOs Lead in a Security-First World
Apr 25, 2016 How Identity Management CEOs Lead in a Security-First World

With all the mainstream media attention that cybersecurity breaches receive, you’d think thatidentity management would be a mainstay on CNN, Forbes.com, or Business Insider. Maybe that’s a good thing. Why?

If identity management (IDM) platforms were the scapegoat behind most breaches, their CEOs would be walking around with more bullseyes on their backs.

But outside of enterprise IT, IDM simply isn’t well known.

Seriously, ask even your more tech-savvy friends and family members what they know about IT security. And you’ll likely get responses that include antivirus software, firewalls, passwords, SSL, VPNs, or WiFi encryption.

So given the huge need for more effective IT security, but the relatively low levels of IDM awareness, how do CEOs of identity management software developers lead their companies, their clients’ companies, and their industry in a security-first world?


Read more 

Security collaboration key, says BFA-Bankia CISO
Apr 22, 2016 Security collaboration key, says BFA-Bankia CISO

CISOs across all sectors need to work together to increase the security capabilities of their organisations and grow together, according to BFA-Bankia's CISO Maria González

The business IT environment is changing significantly, which means IT security needs to change accordingly, says Isabel María Gómez González, CISO for group Spanish banking group BFA-Bankia.

“The IT environment and the way people are working is changing every day. Consequently, the role of the CISO is changing with a new mission, vision and values,” she told Computer Weekly.

“Our role is about being enablers. As a CISO, I am talking about things changing legislation, collaboration, and about enabling younger generations to interact with the bank in new ways such as through social media,” said González.

“To be effective in my role as group CISO, I had to change the way I interact with various parts of the 20 enterprises in the BFA-Bankia group, using a different language for the business, the legal departments, the compliance departments and the information security teams,” she said.


Read more 

D & access: Halt, who goes there?
Apr 21, 2016 D & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and variable authentication reports Danny Bradbury*

The Bible story of Jacob wearing hairy kid-goat skins on his hands and neck to fool his blind father Isaac into believing that he was his more hirsute brother Esau is possibly the earliest recorded case of biometric ID theft - some 4,000 or more years ago.

And as the tokens of our identity have grown more complex – from military insignia to passports and encryption keys, so the means to cheat them has become more sophisticated too.  

So how does a company master identity and access management (IAM), and specifically how do we prevent malicious actors who try to steal legitimate credentials and misrepresent themselves to gain access?


Read more 

Information rights management: an analyst’s view
Apr 20, 2016 Information rights management: an analyst’s view

Your digital assets are growing exponentially, and the need to access them, any time from any place, across various devices and platforms, has become a critical success factor. Information rights management is no longer a critical IT issue, it’s a critical business issue.

To stay competitive, modern businesses must be increasingly connected to their employees, business partners, suppliers, current and future customers, and even smart devices (or things).

Unsurprisingly, the demand for solutions that provide strongly protected storage, fine-grained access control and secure sharing of sensitive digital information, is extremely high nowadays, with vendors rushing to bring their various solutions to the market. Of course, no single information sharing solution can possibly address all different and often conflicting requirements of different organisations and industries, and the sheer number and diversity of such solutions is a strong indicator for this. Vendors may decide to support just certain types of storage or document formats, concentrate on solving a specific pain points of many companies like enabling mobile access, or design their solutions for specific verticals only.


Read more 

Organisations still fail to understand IAM, says KuppingerCole analyst
Apr 20, 2016 Organisations still fail to understand IAM, says KuppingerCole analyst

IAM is seen as being part of IT and not business, and investments tend to be aimed at mitigating one-off incidents, says KuppingerCole analyst Matthias Reinwarth

Many organisations are still failing to understand the role and benefits of identity and access management (IAM) systems, according to Matthias Reinwarth, senior analyst at KuppingerCole.

“Many organisations still do not see IAM as a necessity for implementing security and policy or as an enabler of business models requiring customer or partner interaction,” Reinwarth told Computer Weekly.

KuppingerCole believes IAM should be embedded in business processes and the underlying policies, and should constitute a stable and continuous process.

“Typically, however, IAM is seen as being part of IT and not business, and investments tend to be aimed at mitigating one-off incidents such as a segregation of dutiesviolation,” said Reinwarth.


Read more 

Forum Systems to Present at KuppingerCole's European Identity & Cloud Conference
Apr 19, 2016 Forum Systems to Present at KuppingerCole's European Identity & Cloud Conference

CTO Jason Macy to Lead Workshop on Identity Federation and API Security

BOSTONApril 19, 2016 /PRNewswire/ --Forum Systems Inc. today announced that CTO Jason Macy will be exploring best practices in identity federation and API security through a featured workshop session at KuppingerCole's 10th annual European Identity & Cloud Conference (EIC).

Taking place May 10-13 at the Dolce Ballhaus Forum Unterschleissheim inMunich, Germany, EIC 2016 is Europe's leading event foridentity and access management (IAM) and cloud security. At the conference, Forum Systems will also be showcasing its award-winning Forum Sentry API Security Gateway in Booth S3.

"Mobile, hybrid cloud, SDN and IoT are not simple corporate buzzwords. They are paradigm-shifting business and technology drivers that have combined to revolutionize network architectures," said Macy. "In order to successfully adapt to and thrive in the modern computing landscape, today's global enterprises are eschewing the legacy agent and adapter based identity access control approaches of a bygone era. Instead, they are embracing API Security Management technology as the foundation for their identity federation and API security initiatives. We are excited to participate at EIC 2016 to share key insights and techniques to help other organizations ensure deployment success as they adapt these initiatives in our evolving digital economy."

On Tuesday, May 10 from 9:00 a.m. - 1:00 p.m. CEST, Macy will lead a workshop titled, "Achieving Secure Enterprise Identity Federation." The session will feature a panel of industry experts, including KuppingerCole Senior Analyst Matthias Reinwarth.


Read more 

Blockchain and Risk
Apr 15, 2016 Blockchain and Risk

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering.  This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications.  But what are the risks associated with the use of this technology?

Distributed ledgers offer a range of potential benefits to both private sector organizations as well as government and public services.  They can be widely distributed and yet at the same time precisely controlled. They reduce costs by automating the processes involved in verifying and rapidly publishing authorized changes.  They are structured in a way that makes it extremely difficult to change or tamper with existing authorized content.  They can be the basis for new kinds of applications like smart contracts.


Read more 

Von der reaktiven Abwehr zum aktiven Schutz
Apr 11, 2016 Von der reaktiven Abwehr zum aktiven Schutz

Privilegierte Benutzerkonten stellen für jedes Unternehmen, aber auch jede Behörde eine erhebliche Sicherheitsgefahr dar. Das hat die jüngste Vergangenheit ganz klar gezeigt: ­Nahezu immer wurden bei Fällen von Daten­sabotage oder -diebstahl privilegierte Benutzerkonten als Einfallstor genutzt.

Datenpannen, Datenmissbrauch, Datenlecks, Identitätsdiebstahl: Vorfälle dieser Art nehmen auf breiter Front zu, auch wenn sie nicht immer publik werden. Hohe öffentliche Aufmerksamkeit zog vor allem der Sony-Hack auf sich. Bei der Attacke auf den US-amerikanischen Filmkonzern Sony ­Pictures Entertainment gelang es den Angreifern, vertrauliche Unterlagen, persönliche Daten und eMails in großem Stil zu entwenden. Der Imageverlust für das Unternehmen war immens.

Nach übereinstimmenden Informationen hatten die Angreifer nach Überwindung der Firewall einen Root-Zugriff auf die Daten- und Kommunikationsserver des Konzerns. Dadurch konnten sie im ­Unternehmensnetzwerk wie Administratoren agieren und auf ­jede Datei zugreifen.


Read more 

Tools and tips for successfully preventing data leakage
Apr 08, 2016 Tools and tips for successfully preventing data leakage

More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history

After the breaking news this week about one of the biggest IT security breaches in history with 11.5 million documents stolen containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private.

Many companies and individuals are not yet conscious enough about the fact that information breaches are today one of the reasons why companies lose a lot of money, customers, their good reputation and public image. This risk is specially high when the confidential information needs to be shared with third parties as they may not be diligent enough at protecting our key information.

The right question to be done is not IF we should use an IRM (Information Rights Management) solution to keep privacy and control on the confidential information at our organization but WHICH of the solutions available on the market should be selected and deployed.

Business Analysts such as KuppingerCole indicate that in the next three years, the deployment of this type of solutions will grow exponentially and have selected Prot-On as a product leader in this market.


Read more 

Apenas uma em cinco empresas está preparada para gerenciar identidades com segurança
Apr 05, 2016 Apenas uma em cinco empresas está preparada para gerenciar identidades com segurança

Uma pesquisa realizada pela Capgemini, um provedor de serviços de consultoria, tecnologia e terceirização, e RSA, divisão de segurança da EMC, revelou que, à medida que as organizações buscam capitalizar as oportunidades digitais por meio do rápido desenvolvimento e da hospedagem de novos serviços online, frequentemente investem pouco em medidas de segurança cibernética. Assim, criam grandes riscos, principalmente em relação ao acesso do usuário.

"Identity Crisis: How to Balance Digital Transformation and User Security?", uma pesquisa realizada com mais de 800 executivos do alto escalão de empresas dos Estados Unidos, Alemanha e França, mostra que 62% deles acredita ser muito importante ou essencial que suas organizações possibilitem ou estendam o acesso dos clientes aos serviços digitais de forma segura, mas que apenas 26% possuem a tecnologia para isso. No entanto, os resultados deixaram claro que as empresas sabem que precisam fazer mais para melhorar a experiência do usuário, sendo que 85% delas reconhecem a necessidade de métodos de identificação e autenticação mais flexíveis e adaptáveis, inclusive do login em redes sociais.


Read more 

UK and European firms invest in data protection ahead of GDPR
Apr 05, 2016 UK and European firms invest in data protection ahead of GDPR

European firms are set to invest in data protection in 2016, with enforcement of the EU General Data Protection Regulation just two years away, Computer Weekly’s IT priorities survey shows

Data loss prevention (DLP) is to be the top security initiative by UK firms in 2016, according to the latest annual TechTarget/Computer Weekly IT Spending Priorities survey.

This shows a shift away from identity and access management (IAM), which was the top area of investment for firms in the UK and Europe in 2015, to focus more directly on data protection.


Read more 

Reminiscing about identity and access management (IAM)
Mar 30, 2016 Reminiscing about identity and access management (IAM)

Ten years ago identity and access management (IAM) was nicely compartmentalised and relatively easy to understand. There were a dozen vendors in the market and after deciding a company’s size and propensity for an enterprise directory, it was relatively easy to define a solution. I enjoyed visiting clients, listening to how vendors had bamboozled them and then recommending to them a succinct way forward to reaching their IAM goals. Then the “Cloud” came.

All of a sudden it was necessary to throw out the old paradigm of a central directory and firewalls at the perimeter, and figure out how to avoid opening up the enterprise directory to the world. At the same time, it was necessary to determine how to service SaaS applications without synchronising identity data to the Cloud. With the HR and IM systems on the internal network and the SaaS applications on the Internet some “magic” was needed. But solutions were available and Cloud providers developed support for identity in the Cloud and the Security Assertion Markup Language (SAML) protocol, to varying degrees. Then came BYOD.


Read more 

WHY MARKETING, HR AND FINANCE SHOULD HAVE A BIGGER SAY IN YOUR IDAAS STRATEGY THAN YOU MAY THINK
Mar 16, 2016 WHY MARKETING, HR AND FINANCE SHOULD HAVE A BIGGER SAY IN YOUR IDAAS STRATEGY THAN YOU MAY THINK

My colleague Darren Platt recently weighed in on the undeniable upward trend of organizations moving toward Identity as a Service, or IDaaS. While only 15% of organizations report having a cloud-based pure play for their identity solutions, more than 55% are saying they have a mix of cloud and traditional. Cloud-hosted identity solutions appear to be here to stay. And that’s why when planning your identity future you had better assemble a team of your best IAM strategists, IT personnel, cloud architects and….marketing.

Wait, what? Yes, that’s right. According to a new IDaaS survey from Capgemini and RSA, and designed by analyst firm KuppingerCole, strategic decisions around moving certain identity functions to the cloud are being shaped increasingly by key business line owners. Fully one quarter of the 831 respondents to the IDaaS survey came from sales, marketing, HR and finance executive roles. These people obviously want a voice. They are seeking ways to reach new audiences faster and with more agility than traditional IAM solutions can provide. And they want to partner with IT to do that.


Read more 

L’IDaaS, l’autre eldorado de la sécurité ?
Mar 16, 2016 L’IDaaS, l’autre eldorado de la sécurité ?

Le marché de l’identité as a service apparaît plus attractif que jamais, jusqu’à conduire des partenaires de longue date à se tourner le dos. Mais ce pourrait n’être qu’un début avant une convergence IDaaS, CASB et EMM, portée par la transformation numérique des entreprises.

Capgemini et RSA ont récemment sollicité KuppingerCole et Pierre Audoin Consultants (PAC) pour produire une étude sur la gestion des identités en entreprise (IAM). Et d’interpréter les chiffres obtenus comme un plaidoyer en faveur de l’IDaaS (Identity as a Service).


Read more 

How to prepare for EU Standard General Data Protection Regulation?
Mar 15, 2016 How to prepare for EU Standard General Data Protection Regulation?

Take-away summary

 The GDPR shows that states in the EU are aware of the risk in the cyber world. Protection of private data and personal information are highly important European values and policy-wise organisations have to get ready for new standards. The EU-directive affects all organisations, even if they are not to be seen as part of the critical infrastructure. Also, the BSI in Germany speaks about further national policies. This shows that preparation is necessary.

 It is difficult to estimate the content of laws and new rules. General norms like ISO 27001 provide a first point of orientation, but it should not be forgotten that compliance always starts with the security architecture. Therefore, tools – such as Privilege User and Access Management software - should be picked that deliver added value for security, but are flexible enough to fulfil existing and upcoming norms and regulations. It needs security vendors that combine the technological skill and the experience with regional demands to master the challenge of compliance and IT security.


Read more 

Bad Option – the lemming approach
Mar 15, 2016 Bad Option – the lemming approach

I’ve never actually seen lemmings jumping off a cliff but I have observed companies blindly following others into bad decisions regarding their security. It seems CEOs and CIOs are unwilling to spend the time analysing their requirements and undertaking a robust selection process to ensure those requirements are met. They prefer to “follow the crowd”.

One area in which I’ve seen bad decisions being made is in the selection of mobile device management solutions. Many companies prefer to select the same solution as their competitors. I assume the thinking is “we need a solution so that we don’t get left behind” and “if our competitor has chosen a solution it must be good”. Unfortunately, there are then two companies with sub-optimal solutions.


Read more 

Only one in five organizations set up to securely manage user identities
Mar 12, 2016 Only one in five organizations set up to securely manage user identities

Capgemini and RSA survey finds that most businesses are ill-prepared for the digital services transition, causing a shortfall in identity and access management security

Paris and San Francisco – A survey conducted by Capgemini, one of the world's foremost providers of consulting, technology and outsourcing services, and RSA, The Security Division of EMC (NYSE:EMC), revealed that as organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity measures creating significant risks, in particular governing user access.

"Identity Crisis: How to Balance Digital Transformation and User Security?", a survey of more than 800 C-level executives in the US, UK, Germany, France, Benelux and the Nordics1 revealed that 62 percent believe it is very important or critical for their organizations to enable or extend access for users to digital services securely, yet only 26 percent have the technology in place to do so. However, it is clear from the findings that organizations recognize the need to do more to improve the user experience, with 84 percent acknowledging the need to offer more flexible, adaptive authentication methods and IDs.


Read more 

Stage IAM Analytics & Intelligence
Feb 29, 2016 Stage IAM Analytics & Intelligence

Atos SE (Société Européenne), est une entreprise leader de services numériques avec un chiffre d'affaires annuel de 11 milliards d'euros et 93 000 collaborateurs dans 72 pays.

Atos fournit à ses clients du monde entier des services de conseil et d'intégration de systèmes, d'infogérance et de BPO, de Big Data et de Cyber-sécurité, d'opérations Cloud et des services transactionnels par l'intermédiaire de Worldline, le leader européen et un acteur mondial dans les services de paiement.

Grâce à son expertise technologique et sa connaissance sectorielle pointue, Atos sert des clients dans différents secteurs : Défense, Services financiers, Santé, Industrie, Médias, Services aux collectivités, secteur Public, Distribution, Télécoms et Transports.

Atos déploie les technologies qui accélèrent le développement de ses clients et les aident à réaliser leur vision de l'entreprise du futur.

Atos est le partenaire informatique mondial des Jeux Olympiques et Paralympiques.

Le Groupe est coté sur le marché Euronext Paris et exerce ses activités sous les marques Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, Worldline.


Read more 

Why relying on standards is best for secure Cloud Computing
Feb 24, 2016 Why relying on standards is best for secure Cloud Computing

Why relying on standards is best for secure Cloud Computing 

Who will have access to what? In a complex world where soon everyone and everything – people, things and services – will be connected everywhere and anytime through a global cloud, IAM is one of the best means to protect enterprise security, especially when firewalls are not sufficient any more. However, to guard cloud computing, the IAM technology must be further developed. For this, standards play a central role. 

The mere defining of roles for individual access permissions is no longer sufficient. IAM has to become more agile and fine grained. It has to allow for decisions about the access of consumers, employees, partners and billions of things dynamically and in real time. Furthermore, plenty of users use multiple identities (or personas) and flexibly switch between them several times per day, often by deploying different authentication mechanisms.

IAM has to make sure that these internal and external personas are still identified as being the same persons. Failing in IAM for the transforming world is failing in business transformation. However, to comply with requirements such as minimal disclosure in the cloud is not easy, since many cloud services offer only rudimentary support for IAM.


Read more 

Please Stop Using Snowden as Evidence of the Necessity of Data Loss Prevention Technology!
Feb 22, 2016 Please Stop Using Snowden as Evidence of the Necessity of Data Loss Prevention Technology!

Rarely a day goes by as an IT Security professional that one will not hear a security vendor or consulting firm using the Edward Snowden affair as proof that their security product is necessary for data loss prevention (DLP) protection. Insider threats must be mitigated, and whistleblowers such as Snowden are lumped together with rogue or disgruntled employees as an example of common insider threat actors. The reality is that whistleblowers are a unique type of actor at the cause of confidential data loss, and the response of information security to this type of insider threats is a perfect example of the contemporary dilemmas of IT security professionals today. What are the ethics of the profession? How can it provide the most value to the people and organisations it serves?


Read more 

KUPPINGERCOLE RECOGNIZES GURUCUL FOR USER BEHAVIOR ANALYTICS APPROACH TO THREAT DETECTION
Feb 22, 2016 KUPPINGERCOLE RECOGNIZES GURUCUL FOR USER BEHAVIOR ANALYTICS APPROACH TO THREAT DETECTION

LOS ANGELES -- (BUSINESS WIRE) -- Gurucul, the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here:http://gurucul.com/kuppingercole-report-gurucul-predictive-risk-analytics


Read more 

Security Think Tank: Top five issues in taking a structured approach to security in the cloud
Feb 22, 2016 Security Think Tank: Top five issues in taking a structured approach to security in the cloud

Last week, experts discussed the need to focus on the basics of security in the cloud. Here, the security think tank expert panel covers a structured approach to cloud computing security.

The term "cloud" has been turned into a marketing platform by many suppliers and this has obscured what it really is - a way to procure and deliver IT services. The cloud covers a wide spectrum of services and delivery models. The common security concerns are ensuring the confidentiality, integrity and availability of the services and data delivered through a cloud environment.


Read more 

KuppingerCole Recognizes Gurucul for User Behavior Analytics Approach to Threat Detection
Feb 16, 2016 KuppingerCole Recognizes Gurucul for User Behavior Analytics Approach to Threat Detection

LOS ANGELES--()--Gurucul, the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here: http://gurucul.com/kuppingercole-report-gurucul-predictive-risk-analytics


Read more 

Blockchain or Bulls**t
Feb 12, 2016 Blockchain or Bulls**t

When the UK government published its report “Distributed Ledger Technology: beyond block chain” this attracted some sceptical comments on various internet forums.  Is Blockchain the answer to many problems or is it just another over-hyped technology looking for problems?

Well there are plenty of problems around trust in information that need to be solved and the report provides plenty of examples.  Some of these examples refer to existing solutions and these provide some confidence that there is value in the technology.  Others are more futuristic with a focus on ongoing research and development.


Read more 

CA Technologies is an Overall Leader for privilege management, says KuppingerCole
Feb 01, 2016 CA Technologies is an Overall Leader for privilege management, says KuppingerCole

CA Technologies has been named an Overall Leader in privilege management in the recent Leadership Compassreport issued by KuppingerCole, an analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator.

“The scope of privilege management though quite broad can be summed up as ‘automating the management of who can access your most critical data and systems when, from where, at what time and for how long,’” Martin Kuppinger and Amar Singh, Principal and Senior Analysts at KuppingerCole respectively, wrote in the report. “CA Privileged Access Manager is a comprehensive, mature and overall complete solution that would function well on its own but also integrates fully with other products in the CA Technologies stack such as CA Identity Governance and CA Identity Manager.” 


Read more 

Ringing in the new year with great news
Jan 29, 2016 Ringing in the new year with great news

The sound of bells might have you all wince given the wild opens/closes in the stock market but I’ve got news that should both cheer you up and makes your lives better! Today I am beyond excited to share with you some insightful analyst reviews on the information protection space, an early look on how we plan to integrate the Secure Islands product into our overall information protection offering, and upcoming updates to the Azure Rights Management service. 


Read more 

PATECCO is Taking Part at European Identity & Cloud Conference (EIC) 2016
Jan 28, 2016 PATECCO is Taking Part at European Identity & Cloud Conference (EIC) 2016

Herne, Germany, January 28, 2016 --(PR.com)-- As a company in the field of Identity and Access Management, PATECCO will be a sponsor and exhibitor at the European Identity & Cloud Conference 2016. It takes place May 10 – 13, 2016 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany.

EIC 2016 is known as the event where identity management, cloud and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation driven IT.

Read more: http://www.virtual-strategy.com/2016/01/28/patecco-taking-part-european-identity-cloud-conference-eic-2016#ixzz3ycakFpKh 
Follow us: @virtualstrategy on Twitter | VirtualStrategyMagazine on Facebook

Read more at http://www.virtual-strategy.com/2016/01/28/patecco-taking-part-european-identity-cloud-conference-eic-2016#axzz3ycJDokKK#1aZJ7DeGfHMueg6R.99


Read more 

ForgeRock Identity Platform Addresses Evolving Customer Data Privacy Regulations With First-of-Its-Kind Consent Solution
Jan 27, 2016 ForgeRock Identity Platform Addresses Evolving Customer Data Privacy Regulations With First-of-Its-Kind Consent Solution

SAN FRANCISCO, CA -- (Marketwired) -- 01/27/16 -- ForgeRock®, the leading open platform provider of identity management solutions, today introduced its newest identity management platform, including an implementation of the User-Managed Access (UMA) standard. Built on consent-by-default and consent-by-design principles, the ForgeRock Identity Platform™ is the first identity management platform to support an UMA implementation designed for consumer consent and data sharing purposes.

"Highly scalable platform architecture is becoming increasingly sought-after amongst hyper-connected organizations that must support millions of customers across even more devices and things," said Martin Kuppinger, founder and principal analyst of KuppingerCole. "As the influence of the IoT spreads to all aspects of our lives, the ability to adapt access management capabilities quickly will become pivotal to future business success. Furthermore, with consumer expectations surrounding data security and privacy higher than ever before, standards such as UMA will soon become the industry benchmark to which all organizations must conform."


Read more 

Noticeable Stock: CA, Inc.
Jan 25, 2016 Noticeable Stock: CA, Inc.

On January 20, 2016, CA, Inc. (CA)announced it has been named an “Overall Leader” in Privilege Management in the recent Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator.


Read more 

CA Technologies Named an Overall Leader in Privilege Management
Jan 21, 2016 CA Technologies Named an Overall Leader in Privilege Management

AUSTRALIA, Jan. 21, 2016 – CA Technologies (NASDAQ: CA) today announced it has been named an “Overall Leader” in Privilege Management in the recent Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator.


Read more 

Why relying on standards is best for secure Cloud Computing
Jan 15, 2016 Why relying on standards is best for secure Cloud Computing

Who will have access to what? In a complex world where soon everyone and everything – people, things and services – will be connected everywhere and anytime through a global cloud, IAM is one of the best means to protect enterprise security, especially when firewalls are not sufficient any more. However, to guard cloud computing, the IAM technology must be further developed. For this, standards play a central role. 


Read more 

Information Rights Management explained
Jan 15, 2016 Information Rights Management explained

(Initiative Mittelstand)

With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay competitive, modern businesses must be increasingly connected to their business partners, suppliers, current and future customers and even smart devices (or things). New digital businesses therefore have to be agile and connected.


Read more 

Report: CyberArk named privilege management leader by KuppingerCole
Jan 07, 2016 Report: CyberArk named privilege management leader by KuppingerCole

CyberArk (NASDAQ: CYBR), the company that protects organisations from cyber attacks that have made their way inside the network perimeter, has been named the Overall Leader by independent analyst firm KuppingerCole in its Leadership Compass: Privilege Management 2015 report.

CyberArk surpassed the other vendors by being positioned as the leader across all the report's evaluation categories: Overall, Product, Market and Innovation. To help companies make intelligent vendor choices to protect against privileged account compromise, the firm analysed 12 vendors and named CyberArk the "Gold Standard" and the "one to beat in Privilege Management". The CyberArk Privileged Account Security Solution was the only one to receive the highest possible product rating across security, functionality, integration, interoperability and usability categories.


Read more 

Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report
Jan 06, 2016 Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report

WASHINGTONJan. 6, 2016 /PRNewswire/ -- Thycotic, a leading provider of enterprise privileged account management solutions for more than 3,500 global organizations, today announced that KuppingerCole, a global analyst firm focused on Information Security and Identity and Access Management (IAM), recently published a report on Privileged Account Management (PAM) and how to protect the "keys to the kingdom" against cyber-attacks and insider threats.


Read more 

Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report
Jan 06, 2016 Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report

Global Analyst Firm Praises Thycotic for Lean and Rapid-To-Deploy Privileged Account Security Solutions that Combat Cyber-Attacks

WASHINGTONJan. 6, 2016 /PRNewswire/ --Thycotic, a leading provider of enterprise privileged account management solutions for more than 3,500 global organizations, today announced that KuppingerCole, a global analyst firm focused on Information Security and Identity and Access Management (IAM), recently published a report on Privileged Account Management (PAM) and how to protect the "keys to the kingdom" against cyber-attacks and insider threats.


Read more 

Named Leader in KuppingerCole Leadership Compass for Privilege Management
Jan 05, 2016 Named Leader in KuppingerCole Leadership Compass for Privilege Management

Leading global analyst firm KuppingerCole has released its 2015 Leadership Compass for Privilege Management, and BeyondTrust is pleased to be represented as a leader in every category in the report – as an Overall LeaderProduct LeaderMarket Leader and Innovation Leader. BeyondTrust continues to move up in the report, reflecting our continued product innovation and customer focus.


Read more 

Report: CyberArk Named the Privilege Management Leader by KuppingerCole
Jan 02, 2016 Report: CyberArk Named the Privilege Management Leader by KuppingerCole

NEWTON, Mass.--()--CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacksthat have made their way inside the network perimeter, has been named the Overall Leader by independent analyst firm KuppingerCole in its Leadership Compass: Privilege Management 2015 report.


Read more 

Report: CyberArk Named the Privilege Management Leader by KuppingerCole
Dec 22, 2015 Report: CyberArk Named the Privilege Management Leader by KuppingerCole

Newton, Mass. – December 22, 2015 – CyberArk (NASDAQ: CYBR), the company that protects organizations fromcyber attacks that have made their way inside the network perimeter, has been named the Overall Leader by independent analyst firm KuppingerCole in its Leadership Compass: Privilege Management 2015 report.

CyberArk surpassed the other vendors by being positioned as the Leader across all the report’s evaluation categories: Overall, Product, Market and Innovation. To help companies make intelligent vendor choices to protect against privileged account compromise, the firm analyzed 12 vendors and named CyberArk the “Gold Standard” and the “one to beat in Privilege Management.” The CyberArk Privileged Account Security Solution was the only one to receive the highest possible product rating across security, functionality, integration, interoperability and usability categories.


Read more 

Infosec 2040 – Neural Implants Hacked
Nov 25, 2015 Infosec 2040 – Neural Implants Hacked

What does the future hold for IT security? That was the question I was asked to address in my talk to the 50th anniversary meeting of the BCS IRMA (Information Risk Management and Assurance) group.  Here are some thoughts on the evolution of information security over the next 25 years made with help from the Information Security Group at Royal Holloway.

Making predictions is always difficult and experts are notoriously poor at this.  When we make predictions we often look through a mirror at the past rather than through a telescope into the future.  Nevertheless history is important because it shows us the mistakes we need to avoid.


Read more 

How to secure banking transactions with mobile devices, if at all possible
Nov 17, 2015 How to secure banking transactions with mobile devices, if at all possible

Clearly, banking with your smartphone is quick and handy. But again and again, we hear about huge breaches of mobile banking transactions. Greedy hackers are becoming more and more aggressive and their attacks more elaborated. Is there still a way to make mobile transactions relatively secure? 

Often mobileTAN is being praised as a safe and flexible alternative to online banking with transaction authentication numbers on paper. However, no mobile system today is completely secure, not even iOS. Breaking it might cost a little bit more effort and money than with other operating systems, but it’s still possible.


Read more 

Finding the right Provider: Don’t let the Cloud disrupt your Business
Oct 22, 2015 Finding the right Provider: Don’t let the Cloud disrupt your Business

Cloud Computing can help organizations to bring innovations quickly and with relatively low costs to the market. It can also enable new and agile business models. However, if not properly provided it might as well disrupt your business to a severe extent. This latter case can be avoided by carefully reading the contract with the provider.


Read more 

The Trouble with Encryption
Oct 20, 2015 The Trouble with Encryption

Invariably it seems that whenever a new data breach is revealed – and that appears to be almost a daily, or at least more than once-weekly event – that a number of so-called gurus and pundits will bemoan the fact that the data was unencrypted. There’s always been one good reason why this was irrelevant, but recent news has uncovered a second reason.

The first reason, one I’ve gone on about for quite some time, is that the data breaches are no longer “smash and grab” operations. The miscreants use social engineering to obtain legitimate credentials from users, then provide these credentials to log in and accumulate the data which is then sent out to a site friendly to the hacker. Usually without triggering any alarms, and with no need to circumvent any encryption should it be in place. That’s because authorized users see unencrypted data and logging in as that authorized user – with stolen or forged credentials – gives the bad guys unencrypted access.


Read more 

Short term savings can mean long term risk: Data Protection Officer Andrea Vosshoff warns against sending fitness app data to health insurance companies
Oct 07, 2015 Short term savings can mean long term risk: Data Protection Officer Andrea Vosshoff warns against sending fitness app data to health insurance companies

 Short term savings can mean long term risk: Data Protection Officer Andrea Vosshoff warns against sending fitness app data to health insurance companies

“Runtastic”, “Calory Counter” by FatSecret, “Zombies Run!”  these are only three of about 400.000 apps today that deal with medical, health or lifestyle topics. A growing number of private health insurance companies in Germany offer apps to their members for use as proof of healthy habits. They simply transfer data about their preventive check-ups or sporting activities to the insurance companies. These apps are either being downloaded on smartphones and tablets or they are already integrated into wearable devices. They also gather sensitive health data like heartrate frequency, overall physical condition, eating habits or a person’s entire medical history. German Data Protection Officer Andrea Vosshoff, however, warns users who voluntarily download those fitness apps not to be negligent about their sensitive medical information. None should start to use them merely because of short term financial benefits, without thinking about about the long term risks.


Read more 

Die Analystenhäuser CXP Group und KuppingerCole bündeln ihre Expertise für Cyber Security
Oct 06, 2015 Die Analystenhäuser CXP Group und KuppingerCole bündeln ihre Expertise für Cyber Security

Die CXP Group, das führende unabhängige, europäische Marktanalyse- und Beratungsunternehmen für den Software- und IT-Dienstleistungsmarkt sowie Digitale Transformation, und KuppingerCole, ein Analystenunternehmen mit Hauptsitz in Europa mit Schwerpunkt auf Information Security und Identity & Access Management (IAM ), wollen künftig europaweit auf dem Gebiet der Cyber-Sicherheit für Unternehmen eng zusammenarbeiten. 


Read more 

CXP Group and KuppingerCole team up to deliver unmatched cybersecurity expertise to enterprises engaging in digital transformation
Oct 06, 2015 CXP Group and KuppingerCole team up to deliver unmatched cybersecurity expertise to enterprises engaging in digital transformation

Paris/Wiesbaden, October 6th, 2015. CXP Group, the independent European research and advisory firm for software and IT services in the context of enterprises’ digital transformation, and KuppingerCole, a global analyst firm focusing on information security and identity & access management (IAM), announce a major European partnership.

 


Read more 

Bull renforce sa suite de produits Evidian
Sep 30, 2015 Bull renforce sa suite de produits Evidian

Bull, la marque de produits et de logiciels technologiques d’Atos, annonce qu’elle a consolidé tous ses produits pour la gestion des identités et des accès (IAM) sous Evidian pour inclure désormais DirX. À la fois, Evidian et Atos figurent dans le Magic Quadrant de Gartner pour la gouvernance et l’administration des identités de 2014. Atos a été évaluée pour ses produits de Dirx. La suite Evidian, renforcée par l’offre DirX, est parmi les suites les plus réussies dans les Leadership Compasses de KuppingerCole.


Read more 

KuppingerCole positioned SAP as leader in all four categories in the KuppingerCole Leadership Compass for Access Control and Access Governance Solutions for SAP environments
Sep 29, 2015 KuppingerCole positioned SAP as leader in all four categories in the KuppingerCole Leadership Compass for Access Control and Access Governance Solutions for SAP environments

WALLDORF, 29-9-2015 — /EuropaWire/ — SAP SE (NYSE: SAP) today announced that independent analyst firm KuppingerCole has positioned SAP as the leader in all four categories in the KuppingerCole Leadership Compass for Access Control and Access Governance Solutions for SAP environments. KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that market segment.


Read more 

SAP Positioned as Overall Leader for Access Control and Governance by KuppingerCole
Sep 28, 2015 SAP Positioned as Overall Leader for Access Control and Governance by KuppingerCole

SAP SE (NYSE: SAP) today announced that independent analyst firm KuppingerCole has positioned SAP as the leader in all four categories in the KuppingerCole Leadership Compass for Access Control and Access Governance Solutions for SAP environments.


Read more 

Business transformation in 2016: what contractors need to know
Sep 18, 2015 Business transformation in 2016: what contractors need to know

The four fundamentals for business transformation contractors, by KuppingerCole founder Martin Kuppinger.

When the ‘greatest geek who’s ever lived’ connected with his idea about a wireless world back in 1926, he saw a future earth converting into one big brain – with the help of instruments not dissimilar to the modern day smartphone and the Internet of Things. 

But even Nikola Tesla, genius that he was, couldn’t possibly have imagined the sheer number of connectable items we’d have in 2015 and will have in 2016 – both in the consumer and corporate worlds - and the risks they’d give rise to. 

Here, exclusively for Hydrogen’s inaugural newsletter, I’ll explore the fundamentals with which business transformation contractors can mitigate these risks, personally and professionally, writes Martin Kuppinger, Principal Analyst and founder of the leading analyst house KuppingerCole. 


Read more 

KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation
Sep 15, 2015 KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation

The independent Analyst Company KuppingerCole Ltd. recently published a new Advisory Note regarding the Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation. The author, Martin Kuppinger, Principal Analyst and founder of KuppingerCole, writes about Digital Risk Mitigation as a key success factor in the Digital Transformation of businesses.


Read more 

KuppingerCole präsentiert die acht Grundsätze der Digitalen Transformation
Sep 15, 2015 KuppingerCole präsentiert die acht Grundsätze der Digitalen Transformation

Das unabhängige Analystenunternehmen KuppingerCole Ltd. hat eine Advisory Note zu den acht Grundsätzen der Digitalen Transformation veröffentlicht. Der Autor, Martin Kuppinger, Principal Analyst und Gründer von KuppingerCole, schreibt über den richtigen Umgang mit digitalen Risiken als wesentlichem Erfolgsfaktor der Digitalen Transformation von Unternehmen.


Read more 

KuppingerCole says Using independent, external Certification for Cloud Provider Selection is a must
Sep 15, 2015 KuppingerCole says Using independent, external Certification for Cloud Provider Selection is a must

Independent Analysts Company KuppingerCole Ltd. recently published a new Executive View about using certification for Cloud Provider Selection. The document provides an overview of how certifications and attestations relating to cloud services and CSPs can be used by a cloud customer.


Read more 

KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation
Sep 15, 2015 KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation

The independent Analyst Company KuppingerCole Ltd. recently published a new Advisory Note regarding the Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation. The author, Martin Kuppinger, Principal Analyst and founder of KuppingerCole, writes about Digital Risk Mitigation as a key success factor in the Digital Transformation of businesses.

 


Read more 

KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation
Sep 15, 2015 KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation

The independent Analyst Company KuppingerCole Ltd. recently published a new Advisory Note regarding the Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation. The author, Martin Kuppinger, Principal Analyst and founder of KuppingerCole, writes about Digital Risk Mitigation as a key success factor in the Digital Transformation of businesses.


Read more 

KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation
Sep 15, 2015 KuppingerCole presents Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation

The independent Analyst Company KuppingerCole Ltd. recently published a new Advisory Note regarding the Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation. The author, Martin Kuppinger, Principal Analyst and founder of KuppingerCole, writes about Digital Risk Mitigation as a key success factor in the Digital Transformation of businesses.


Read more 

KuppingerCole says Using independent, external Certification for Cloud Provider Selection is a must
Sep 15, 2015 KuppingerCole says Using independent, external Certification for Cloud Provider Selection is a must

Independent Analysts Company KuppingerCole Ltd. recently published a new Executive View about using certification for Cloud Provider Selection. The document provides an overview of how certifications and attestations relating to cloud services and CSPs can be used by a cloud customer. 


Read more 

Time to educate the digital na(t)ives.
Sep 10, 2015 Time to educate the digital na(t)ives.

Each and every day we learn from the news about more or less sophisticated technical hacks that enable minor or major data breaches. In the best cases responsible disclosure models are applied to avoid these hacks to be in the wild at all. Most of the known issues are fixed within a more (e.g. Firefox) or less (e.g. Apple) reasonable timeframe and patched throughout many of the relevant installations. Several are not (and I am looking at you, Android).


Read more 

The Only European Company Named Product and Innovation Leader in KuppingerCole’s “Leadership Compass Report for ...
Sep 09, 2015 The Only European Company Named Product and Innovation Leader in KuppingerCole’s “Leadership Compass Report for ...

Prot-On, a dynamic and growing young European company has been named Product and Innovation Leader by KuppingerCole in its recently released Leadership Compass Report on Secure Information Sharing. Prot-On has also been qualified in the report as “Strong Potential” and “Hidden Gem” in the Market/Product and Market/Innovation analysis categories. All companies and institutions have an increasing need to share confidential information with partners, clients, patients, aud ...


Read more 

KuppingerCole Leadership Compass - API Security Management
Sep 03, 2015 KuppingerCole Leadership Compass - API Security Management

Forum Systems takes the top spot in Product Leader and Innovation Leader categories. 

This report provides analysis of API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This Leadership Compass helps you find the best solution that addresses your requirements, while maintaining the highest level of security and threat protection.


Read more 

CA API Management
Sep 02, 2015 CA API Management

“CA is now the only API Management vendor to be named a leader in all major API Management analyst reports (Forrester, Gartner and KuppingerCole).”


Read more 

Informe Kuppingercole sobre entornos de desarrollo de Aplicaciones.
Sep 01, 2015 Informe Kuppingercole sobre entornos de desarrollo de Aplicaciones.

Aportamos un estudio realizado sobre el desarrollo de aplicaciones. Este Informe Kuppingercole ofrece un análisis del mercado de soluciones de gestión de API con un fuerte enfoque en las funciones de seguridad.


Read more 

Where to from here?
Sep 01, 2015 Where to from here?

A recent post by John Dunn about what’s hot, and how long is it going to be hot, got me thinking – how does a security guru decide where to place his/her interest and how do you decide in which area to develop expertise? I’ve met many highly experienced security consultants who are stuck at level 3 in the OSI stack and don’t seem to realise that the wave has passed them by, there is no network perimeter anymore and the demand for expertise in configuring firewalls has, at best, plateaued. But rather than bemoaning our lot in life let’s look at the future, it’s remarkably bright.


Read more 

KuppingerCole Names Forum Systems a Leader in API Security Management
Aug 27, 2015 KuppingerCole Names Forum Systems a Leader in API Security Management

BOSTONAug. 26, 2015 /PRNewswire/ -- Forum Systems Inc. announced today that leading European analyst firm KuppingerCole has named the company an Overall Leader in its July market analysis of API Security Management solutions.

Recognized as the only vendor in the API Management market "with a primary focus on security," Forum Systems secured the top spot in both the Product Leadership and Innovation Leadership categories. This latest KuppingerCole report closely follows its Executive View titled, "Forum Sentry API Gateway," which recommends Forum Systems for "evaluation by any organization looking for the highest grade of security and reliability for their API Management infrastructure."


Read more 

KuppingerCole Names Forum Systems a Leader in API Security Management
Aug 27, 2015 KuppingerCole Names Forum Systems a Leader in API Security Management

BOSTONAug. 26, 2015 /PRNewswire/ -- Forum Systems Inc. announced today that leading European analyst firm KuppingerCole has named the company an Overall Leader in its July market analysis of API Security Management solutions.

Recognized as the only vendor in the API Management market "with a primary focus on security," Forum Systems secured the top spot in both the Product Leadership and Innovation Leadership categories. This latest KuppingerCole report closely follows its Executive View titled, "Forum Sentry API Gateway," which recommends Forum Systems for "evaluation by any organization looking for the highest grade of security and reliability for their API Management infrastructure."


Read more 

Intralinks Named a Leader in KuppingerCole’s Leadership Compass for Secure Information Sharing
Aug 25, 2015 Intralinks Named a Leader in KuppingerCole’s Leadership Compass for Secure Information Sharing

New York, NY, August 25, 2015 – Intralinks® Holdings Inc., a leading, global SaaS provider of secure enterprise content collaboration solutions, today announced that it has been named a leader in product, innovation, and overall strength in KuppingerCole’s Leadership Compass for Secure Information Sharing.


Read more 

Intralinks y Netskope se alían
Aug 21, 2015 Intralinks y Netskope se alían

Intralinks Holdings anunció la integración de Netskope al ecosistema de socios que conforman la Estructura Empresarial de la compañía. Netskope ofrece al departamento de TI de una empresa la capacidad de descubrir, entender y asegurar aplicaciones en nube autorizadas y no autorizadas, para mitigar riesgos en torno al intercambio de contenidos.


Read more 

CA Technologies titled “Overall Leader” in API Management by KuppingerCole
Aug 20, 2015 CA Technologies titled “Overall Leader” in API Management by KuppingerCole

CA Technologies has announced it has been named the “Overall Leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focussed information security. CA’s API Management solutions were evaluated for the report, which evaluated existing integrated API management solutions, with a strong focus on API security.


Read more 

Axway reconnu Leader pour la gestion de la sécurité des API
Aug 19, 2015 Axway reconnu Leader pour la gestion de la sécurité des API

Axway, leader du marché de la gouvernance des flux de données, a été nommé « Leader » dans le rapport « Leadership Compass for API Security Management » de KuppingerCole pour sa solution degestion d’API, composante d’Axway 5 Suite.Ce rapport  a examiné les acteurs principaux du marché de la gestion de la sécurité des API en analysant particulièrement leurs capacités à maîtriser les enjeux d’exposition des API, la sécurité et la suppression des menaces, le contrôle des accès et des identités, ainsi que la disponibilité et laperformance. Axway s’est ainsi imposé parmi les Leader dans les quatre catégories de leadership portant sur la gestion de la sécurité des API.


Read more 

Relatório Leadership Compass da KuppingerCole
Aug 19, 2015 Relatório Leadership Compass da KuppingerCole

Axway (Euronext:AXW.PA), líder de mercado na governança de fluxos de dados, anunciou hoje que sua solução API Management, parte do Axway 5 Suiterecebeu a distinção de “líder” no relatório analíticoLeadership Compass for API Security Management” da KuppingerCole.[1] O relatório examina os recursos dos fornecedores dentro do mercado de gerenciamento de segurança de APIs, avaliando especificamente serviços e virtualização, segurança e redução de ameaças, controle de identidade e acesso, disponibilidade e desempenho. A Axway está posicionada como líder em todas as quatro categorias de liderança de gerenciamento de segurança de API.


Read more 

KuppingerCole appoints two new Senior Analysts based in Asia Pacific region
Aug 18, 2015 KuppingerCole appoints two new Senior Analysts based in Asia Pacific region

The independent Analyst Company KuppingerCole Ltd. has announced the appointment of new Senior Analysts, both based in the Asia Pacific region and working in Advisory Services with Senior Analyst & Director of KuppingerCole (Asia Pacific) Graham Williamson. Both also will provide additional KuppingerCole research.


Read more 

KuppingerCole appoints two new Senior Analysts based in Asia Pacific region
Aug 17, 2015 KuppingerCole appoints two new Senior Analysts based in Asia Pacific region

The independent Analyst Company KuppingerCole Ltd. has announced the appointment of new Senior Analysts, both based in the Asia Pacific region and working in Advisory Services with Senior Analyst & Director of KuppingerCole (Asia Pacific) Graham Williamson. Both also will provide additional KuppingerCole research.


Read more 

Protecting your data
Aug 17, 2015 Protecting your data

Today’s network perimeter security – the firewalls, Intruder Detection Systems, “hardened” appliances, such as routers, etc. – is stronger and more effective than ever. Yet newspaper headlines almost weekly scream of yet another data breach, bigger than all that have gone before. How is it possible for both of these statements to be true?


Read more 

CA Technologies Named the Overall Leader in API Management Market by Analyst Firm KuppingerCole
Aug 13, 2015 CA Technologies Named the Overall Leader in API Management Market by Analyst Firm KuppingerCole

Innovation, Solution Completeness, Market Presence and Security- and Identity-Related Product Capabilities Used to Determine the Overall Leader Rating

NEW YORK, August 13, 2015 – CA Technologies (NASDAQ: CA) today announced it has been named the “Overall Leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA’s API Management solutions were evaluated for the report, which evaluated existing integrated API management solutions, with a strong focus on API security.


Read more 

SAP Security Awareness: vulnerabilities are changing the SAP Security market
Aug 12, 2015 SAP Security Awareness: vulnerabilities are changing the SAP Security market

SAP Security Awareness is constantly growing. First of all, at the BlackHat’s Pwnie Awards, on August 6, vulnerability in SAP Compression algorithm won the first prize for Best Server-Side vulnerability. This is the second time SAP vulnerability highlighted in the Pwnie awards. In 2013, the vulnerability in SAP Router identified by ERPScan’s Researcher was nominated forbest server-side vulnerability.


Read more 

ERPScan in KuppingerCole's Leadership Compass for SAP Access Control
Aug 07, 2015 ERPScan in KuppingerCole's Leadership Compass for SAP Access Control

ERPScan, a most distinguished player in the SAP and Oracle Security area, was included as a Challenger in recent KuppingerCole's Leadership Compass about Access Control/Access Governance for SAP environments for its SoD module of ERPScan Security Monitoring Suite.


Read more 

KUPPINGERCOLE RELEASES EXECUTIVE VIEW OF UNIFY IDENTITY BROKER
Aug 07, 2015 KUPPINGERCOLE RELEASES EXECUTIVE VIEW OF UNIFY IDENTITY BROKER

KuppingerCole, Europe’s Leading Analysts on Identity Management, have recently released an Executive View of UNIFY Identity Broker v5.0.


Read more 

WorksPad отмечен ведущим европейским аналитическим агентством в области безопасности
Aug 07, 2015 WorksPad отмечен ведущим европейским аналитическим агентством в области безопасности

Ведущее европейское аналитическое агентство KuppingerCole включило компанию MobilityLab, разработчика интегрированного мобильного рабочего места WorksPad, в отчет Leadership Compass: Secure Information Sharing.


Read more 

ERPScan in KuppingerCole's Leadership Compass for SAP Access Control
Aug 07, 2015 ERPScan in KuppingerCole's Leadership Compass for SAP Access Control

Founded in 2004, KuppingerCole is a global Analyst Company headquartered in Europe focusing onInformation Security and Identity and Access … 


Read more 

Cyber Security & Usability — What Should A Bank Choose?
Aug 03, 2015 Cyber Security & Usability — What Should A Bank Choose?

I was about to file a recent article on mobile security into my “just another article on mobiles and security” when I noticed what I believe to be a couple of half-witted quotes.

So, in context. An online magazine published an article titled “Banks defend integrity of passcode-less TouchID login”. The story was about a couple of banks releasing a new banking mobile app that made using the app (and hence carrying out banking transactions) extremely user friendly.


Read more 

Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing
Jul 30, 2015 Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing

Medford, NJ, July 28, 2015 - Watchful Software, a leading provider of data-centric information security solutions, today announced that it has been rated as a "Technology Leader" with a "Strong Positive" rating for usability by KuppingerCole, a leading global analyst company headquartered in Germany, in its recently released Leadership Compass Report on Secure Information Sharing (SIS). The "Technology Leader" designation went to vendors that displayed "technologies which are strong regarding their existing functionality and which show a good degree of innovation" according to the report.


Read more 

Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing
Jul 30, 2015 Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing

Watchful Garners "Strong Positive" and "Strong Potential" Ratings in Esteemed Analyst Report MEDFORD, NJ--(Marketwired - Jul 28, 2015) - Watchful Software, a leading provider of data-centric information security solutions, today announced that it has been rated as a "Technology Leader" with a "Strong Positive" rating for usability by … 


Read more 

Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing
Jul 30, 2015 Watchful Software Ranked as a “Technology Leader” in KuppingerCole Leadership Compass Report on Secure Information Sharing

Watchful Garners "Strong Positive" and "Strong Potential" Ratings in Esteemed Analyst Report MEDFORD, NJ--(Marketwired - Jul 28, 2015) - Watchful Software, a leading provider of data-centric information security solutions, today announced that it has been rated as a "Technology Leader" with a "Strong Positive" rating for usability by … 


Read more 

KuppingerCole publishes Leadership Compass about Secure Information Sharing
Jul 28, 2015 KuppingerCole publishes Leadership Compass about Secure Information Sharing

KuppingerCole Ltd. has released a new Leadership Compass which provides an overview and analysis of the market for Secure Information Sharing. There are multiple options for organisations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel. The Leadership Compass on Secure Information Sharing will help in the selection of an optimal solution.


Read more 

BeyondTrust Introduces First Commercial Least Privilege Solution for Apple Desktops in the Enterprise
Jul 28, 2015 BeyondTrust Introduces First Commercial Least Privilege Solution for Apple Desktops in the Enterprise

PHOENIX, July 27, 2015 - BeyondTrust, the global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, today announced the release of PowerBroker for Mac to address security and compliance concerns among the increasing share of Apple desktops in the enterprise. PowerBroker for Mac is the first solution made commercially available to establish and enforce least privilege on the OS X platform. With the addition of PowerBroker for Mac, BeyondTrust is the first security solutions provider to offer privileged account management solutions for Unix, Linux, Windows and OS X platforms in the enterprise.


Read more 

IoT and Smart Manufacturing: Security must not be an afterthought
Jul 27, 2015 IoT and Smart Manufacturing: Security must not be an afterthought

Security is all too often neglected in the Internet of Things and Smart Manufacturing

Following the virtually daily news on new attacks and incidents around the IoT (Internet of Things) and Smart Manufacturing (or “Industry 4.0”) proves the insight that security still commonly is an afterthought.


Read more 

Can there be a winner in the Crypto Wars?
Jul 21, 2015 Can there be a winner in the Crypto Wars?

Alexei Balaganski, analyst, Kuppinger Cole

If there is one thing that can be said about most politicians, it’s that they do not understand technology. This is especially true when the technology in question is related to cybersecurity and strong encryption in particular. Governments have always considered the ability to intercept and decrypt communications of foreign nations a matter of national security, but no other country has been as persistent in their fight against encryption as the United States.


Read more 

KuppingerCole publishes Leadership Compass about Access Control
Jul 15, 2015 KuppingerCole publishes Leadership Compass about Access Control

The independent Analyst Company KuppingerCole Ltd. presented a new Leadership Compass about Access Control/Access Governance for SAP environments. The report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate compliance with applicable laws and regulations. The Leadership Compass about AccessControl/Access Governance for SAP environments provides decision makers with a compass to help them to find the Governance solution for SAP that best meets the needs of their company.


Read more 

KuppingerCole publishes Leadership Compass about Access Control/Access Governance for SAP environments
Jul 15, 2015 KuppingerCole publishes Leadership Compass about Access Control/Access Governance for SAP environments

The independent Analyst Company KuppingerCole Ltd. presented a new Leadership Compass about Access Control/Access Governance for SAP environments. The report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate compliance with applicable laws and regulations. The Leadership Compass about AccessControl/Access Governance for SAP environments provides decision makers with a compass to help them to find the Governance solution for SAP that best meets the needs of their company.


Read more 

KuppingerCole publishes Leadership Compass about API Security Management
Jul 10, 2015 KuppingerCole publishes Leadership Compass about API Security Management

The independent Analyst Company KuppingerCole Ltd. presents a new Leadership Compass about API Security Management. The report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. The Leadership Compass about API Security Management helps decision makers to find the best solution that addresses the requirements of their company, while maintaining the highest level of security and threat protection.


Read more 

The Future of IAM
Jul 09, 2015 The Future of IAM

Where is Identity and Access Management headed? What do consumers need for the future, and what defines a ‘consumer’ as compared to a ‘user’?

With technology being a big part of any business, the future of IAM carries great meaning, especially as concepts like cloud solutions, IDaaS (Identity as a Service), BYOD (Bring Your Own Device), IDoT (Identity of Things) and many others get bandied about and become more mainstream. Regarding the future of IAM, both Gartner and KuppingerCole have created outlines for the direction IAM will take. Looking at Gartner‘s IAM research team, they have tried to quantify their vision and identified 5 key trends:


Read more 

KuppingerCole report on IDM365
Jul 06, 2015 KuppingerCole report on IDM365

The product works in a task-centric way with a modern UI, backed by ITMC's long experience in implementing IAM & IAG in an efficient way.


Read more 

IAM 3.0
Jul 03, 2015 IAM 3.0

Spellpoint osallistui toukokuussa KuppingerColen European Identity & Cloud Conference 2015:aan Münchenissä.

Tässä konferenssin kolme kovaa I:tä.


Read more 

Biometrics: The time has come?
Jul 01, 2015 Biometrics: The time has come?

Most IT professionals over the last ten to fifteen years when asked about the future of authentication would either confidently assert or otherwise quietly mutter that it would be some form of biometrics but ask not to be pressed as to when or how. And with good reason: we’ve been waiting for a long time and had all sorts of trials, experiments and promises hurled at us that it was at times embarrassing. But is the tide turning and can we, for the first time, actually say that biometrics in one form or another are about to go mainstream?  The answer, you’ll be pleased to know, is both yes and no.


Read more 

Minun yritykseni -palvelu on parasta maailmassa
Jun 30, 2015 Minun yritykseni -palvelu on parasta maailmassa

DNA:n Minun yritykseni -palvelu on innovatiivinen ja helppokäyttöinen sähköinen palveluportaali, josta DNA:n yritysasiakkaat löytävät kaikki tarvitsemansa tietoliikenne- ja tietotekniikkapalvelut yhdestä paikasta. Palveluun kirjautumisessa ja asiakkaan identiteetin todentamisessa on käytetty sähköiseen tunnistautumiseen erikoistuneen teknologiayritys GlobalSignin ratkaisuja, joiden juuret juontavat suomalaisen UbiSecuren innovaatioihin.


Read more 

Imprivata « leader du secteur médical » sur les Single Sign-On (SSO) selon le rapport KuppingerCole
Jun 23, 2015 Imprivata « leader du secteur médical » sur les Single Sign-On (SSO) selon le rapport KuppingerCole

Paris, le 23 juin 2015 - Tels sont les termes des experts du très reconnu « Leadership Compass sur les Single Sign-On », publié chaque année par la société européenne d'analystes KuppingerCole. Le rapport met notamment en avant le très haut niveau de sécurité, la souplesse du cadre d'authentification, la fluidité des connexions et les nombreuses fonctionnalités dédiées au secteur de la santé d'Imprivata, solution d'authentification unique SSO. Cette distinction conforte les choix technologiques et de développement du leader mondial des solutions de gestion d'authentification et de sécurisation des accès applicatifs. Acteur récent en France, Imprivata apporte son expertise de la protection de l'information et de l'optimisation des processus de soin, à 1400 établissements de soin, répartis dans 20 pays.


Read more 

Follow up on User Empowerment / Life Management by KuppingerCole
Jun 17, 2015 Follow up on User Empowerment / Life Management by KuppingerCole

(in 3 parts) KuppingerCole analysts created the "Life Management Platform" term in early 2012 while giving the EIC Award to the QIY Fundation that year. They shared today their updated view of 3 years in the field of Personal Clouds and User Empowerment.


Read more 

OneLogin Recognized As a Leader in Cloud User and Access Management by KuppingerCole
Jun 05, 2015 OneLogin Recognized As a Leader in Cloud User and Access Management by KuppingerCole

OneLogin, the innovator in identity management, today announced it has been rated first for innovation among Cloud First identity and access management (IAM) vendors in KuppingerCole’s July 2014 Leadership Compass Report on Cloud User and Access Management. OneLogin was also ranked among the product, market and overall leaders included in the report.


Read more 

Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies
May 28, 2015 Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies

KuppingerCole Deems Forum Sentry Worthy of "Evaluation by Any Organization Looking for the Highest Grade of Security and Reliability"


Read more 

Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies
May 28, 2015 Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies

KuppingerCole Deems Forum Sentry Worthy of “Evaluation by Any Organization Looking for the Highest Grade of Security and Reliability”


Read more 

GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015
May 27, 2015 GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015

GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015


Read more 

KuppingerCole Report: An Executive View of ObserveIT
May 18, 2015 KuppingerCole Report: An Executive View of ObserveIT

KuppingerCole is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). Their analysts are experienced in extracting value from collecting and maintaining information security for corporations across mobile, cloud, and social platforms.

In a recent Report, KuppingerCole gives an executive view of ObserveIT’s User Activity Monitoring solution. Below is a brief summary of the report.


Read more 

Identity is key to meeting IoT security challenges, says NetIQ
May 08, 2015 Identity is key to meeting IoT security challenges, says NetIQ

The internet of things (IoT) will not necessarily introduce new cyber threats, but it will amplify those we are already facing, according to NetIQ solutions consulting director David Mount.


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 08, 2015 Future IAM will need to be broader, says Martin Kuppinger

Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst


Read more 

KuppingerCole presents the Prime Time for the Next Generation of IAM Solutions
May 07, 2015 KuppingerCole presents the Prime Time for the Next Generation of IAM Solutions

When it comes to security for the digital enterprise, there are good reason to get nervous, understanding current breaches like the recent attack on Sony Pictures Entertainment as signs of a dark and scary future, where cyber criminals and even terrorists lurk and create serious damage.


Read more 

European Identity & Cloud Awards 2015
May 07, 2015 European Identity & Cloud Awards 2015

The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security.


Read more 

Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite
May 07, 2015 Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite

Berlin, Germany. 7 May 2015 – The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project focusing on realizing a modern, workflow-structured and role-based IAM system based on the Beta Systems’ IAM suite that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 07, 2015 Future IAM will need to be broader, says Martin Kuppinger

Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst 07 May 2015


Read more 

Businesses should prepare for black swans, says resiliency consultant
May 07, 2015 Businesses should prepare for black swans, says resiliency consultant

black swan event is defined as an incident that occurs randomly and unexpectedly and has wide-spread ramifications, but businesses can still prepare for them, according to a resiliency consultant.

 Black swans may be game-changing, but they are not all that rare and businesses can mitigate against them, said Alternative Resiliency Services managing principal Howard Mannella.

“Businesses need to move past a bad thing happening, and think about some bad thing happening,” he told the 2015 European Identity & Cloud (EIC) conference in Munich.


Read more 

Hackers likely to target IAM warns SailPoint
May 07, 2015 Hackers likely to target IAM warns SailPoint

Companies should consider their identity and access management (IAM) systems as a likely point of attack, according to IAM software supplier SailPoint.

“The easiest way to get into a server room is to break into the key cabinet,” said Darran Rolls, chief technology officer and chief information security officer at SailPoint.

“Likewise, breaking into an organisation’s IAM system will give a hacker access to every IT system within that organisation,” he told the 2015 European Identity & Cloud(EIC) conference in Munich.


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 07, 2015 Future IAM will need to be broader, says Martin Kuppinger

Future identity and access management (IAM) systems will need to look at all forms of identity, not just employees or users, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

Security pros must look out for IoT threats, says GE CISO
May 06, 2015 Security pros must look out for IoT threats, says GE CISO

Security threats from the internet of things (IoT) have not yet reached wide public perception, according to Hanns Proenen, chief information security officer at GE Europe.

“Security professionals must look ahead for the early indicators,” he said at the 2015 European Identity & Cloud (EIC) conference in Munich.


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger.


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger


Read more 

KuppingerCole presents 8 Fundamentals for Digital Risk Mitigation in the Age of Transformation
May 05, 2015 KuppingerCole presents 8 Fundamentals for Digital Risk Mitigation in the Age of Transformation

The Digital Transformation of Business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation, at the technical level. However, without changing business models, organizations will not succeed. Furthermore, connecting things with apps and services is imposing new challenges. These include product security and liability issues, but also how to appropriately deal with customer “big” data. Identity, Access, and Security become critical success factors for the Digital Transformation of Business.


Read more 

KuppingerCole’s European Identity & Cloud Conference 2015
May 05, 2015 KuppingerCole’s European Identity & Cloud Conference 2015

KuppingerCole’s European Identity & Cloud Conference 2015, Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security, opened today in Munich, Germany. For the 9th time KuppingerCole has brought together 45 exhibitors and more than 600 participants including most of Europe’s and the world’s leading vendors, end users, thought leaders, visionaries and analysts.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
May 01, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

IoT benefits and privacy not mutually exclusive, says industry expert
Apr 30, 2015 IoT benefits and privacy not mutually exclusive, says industry expert

It is possible to mitigate the privacy and security risks of the internet of things (IoT) without losing its benefits, according to an industry expert.

While IoT technologies that will enable devices to talk to each other and provide data to new services could deliver previously unimaginable benefits, many have raised concerns about security and privacy.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.

The new level of IAM that could enable stronger authentication is being ushered in through a combination of anomaly detection, user activity monitoring, user behavioural analytics and risk-based access.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole. The new level of IAM that could enable stronger authentication 


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole. 

Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

“Privacy by design will play an increased role for any company that produces software as the new law will make them liable for any data protection breach related to using the software,” said Karten. “The drive for privacy by design will also come from 


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The coming EU data protection regulation will make privacy by design important for all companies who have European customers, according to Karsten Kinast, analyst at KuppingerCole.


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 28, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The coming EU data protection regulation will make privacy by design important for all companies who have European customers, according to Karsten Kinast, analyst at KuppingerCole.


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 22, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

Health insurer Anthem's breach of 80 million customers' and employees' personal data shows the need for better access control, says KuppingerCole 


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 21, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

The exposure of the personal data of up to 80 million customers and employees of US health insurer Anthem shows the need for better access control, said Dave Kearns, analyst at KuppingerCole.


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 21, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

Health insurer Anthem's breach of 80 million customers' and employees' personal data shows the need for better access control, says KuppingerCole


Read more 

New Meaning of “Hacking your TV”
Apr 16, 2015 New Meaning of “Hacking your TV”

Last week the French television network TV5Monde was attacked by a group of hackers claiming to belong to Islamic State. They have disrupted broadcasts and hacked the websites and social media accounts of the French TV channel.

According to Alexei Balaganski, Senior Analyst at the independent analyst company KuppingeCole, this only confirms that the struggle between hackers and corporate security teams is fundamentally asymmetrical. “Regardless of its size and budgets, no company is safe from such attacks simply because a security team has to cover all possible attack methods, and a hacker needs just a one to succeed”.


Read more 

Forum Systems to Present at KuppingerCole European Identity & Cloud Conference
Apr 15, 2015 Forum Systems to Present at KuppingerCole European Identity & Cloud Conference

BOSTONApril 15, 2015 /PRNewswire/ -- Forum Systems Inc. announced today that CEO Mamoon Yunus and CTO Jason Macy will present at the European Identity & Cloud Conference (EIC) hosted by KuppingerCole on May 5-8 at the Dolce BallhausForum Unterschleissheim in Munich, Germany. The combined session, "The Foundations of API Security and API Gateway Technology," takes place on Tuesday, May 5, and includes a complimentary workshop, implementation showcase and technical round table discussion.


Read more 

Forum Systems to Present at KuppingerCole European Identity & Cloud Conference
Apr 15, 2015 Forum Systems to Present at KuppingerCole European Identity & Cloud Conference

BOSTONApril 15, 2015 /CNW/ -- Forum Systems Inc. announced today that CEO Mamoon Yunus and CTO Jason Macy will present at the European Identity & Cloud Conference (EIC) hosted by KuppingerCole on May 5-8 at the Dolce BallhausForum Unterschleissheim in Munich, Germany. The combined session, "The Foundations of API Security and API Gateway Technology," takes place on Tuesday, May 5, and includes a complimentary workshop, implementation showcase and technical round table discussion.


Read more 

KuppingerCole’s Top Cyber Threats - How to protect your Business
Apr 10, 2015 KuppingerCole’s Top Cyber Threats - How to protect your Business

Cyber threats are leaving even large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and massive financial losses and fines. KuppingerCole recently published an Advisory Note authored by Amar Singh, Senior Analyst at KuppingerCole, which discusses the most critical threats and tactical countermeasures that can help organizations understand and counter these threats.


Read more 

KuppingerCole introduces new research format tailored for executives – the Leadership Brief
Mar 25, 2015 KuppingerCole introduces new research format tailored for executives – the Leadership Brief

The independent Analyst Company KuppingerCole introduces a new research format that is tailored for executives. The KuppingerCole Leadership Brief provides condensed research and advice for executives and decision makers in organizations. The 2pg documents cover business challenges, and advice on how to address these, focusing on the key issues and allowing decision makers to quickly grasp both challenge and resolution.


Read more 

KuppingerCole: Mobile working is insecure – How you can change it
Mar 23, 2015 KuppingerCole: Mobile working is insecure – How you can change it

Last Friday the article “Spooks tell business: Consider stripping staff of smart phones to avoid cyber-attacks” was published at The Telegraph. It talks about staff being the ‘weakest link’ and raises the prospect of staff being blackmailed by spies. The warnings were contain in the UK government’s cyber initiatives the Ten Steps to Cyber Security (Ten Steps) and their more recent Cyber Essentials.


Read more 

Comment: The four critical success factors for “d!conomy” – manage your digital risk
Mar 16, 2015 Comment: The four critical success factors for “d!conomy” – manage your digital risk

This year’s CeBIT runs under the headline of “d!conomy”, an artificial term covering major business and IT trends such as the digital transformation of businesses and “Industry 4.0”, which stands for connected manufacturing being fully integrated with business processes and far more adaptive than ever before. There is no doubt that organizations have to rethink not only their product offerings but their business models in this age of digital transformation, with the IoT (Internet of Things) adding billions of connected devices and virtually everything else also becoming connected. Smart grids, smart homes and smart cities, connected vehicles, wearable computing, but also new payment models, competition for traditional taxi drivers and other changes demonstrate that that transformation is not just at the horizon, but already reality.


Read more 

EU Council promotes ignorance and backwardness in IT security in the e-government by rejecting the obligation to report for the public sector in cyber attacks
Mar 13, 2015 EU Council promotes ignorance and backwardness in IT security in the e-government by rejecting the obligation to report for the public sector in cyber attacks

No obligation to report for the public sector in cyber attacks. The EU Council (Council of the European Union, EU Council of Ministers) last week opposed the plan of the EU Commission that was also endorsed by the European Parliament in which the proposed directive for network and information security, including an obligation to report security-related incidents also for authorities, is anchored. This information was released yesterday by Statewatch, a civil rights organisation. However, operators, including those of Internet exchange points, online providers of payment and e-commerce, social networks, search engines or cloud services should remain subject to the obligation to report.


Read more 

The Limits of Efficiency
Mar 09, 2015 The Limits of Efficiency

For the first time in its history, SAP is offering severance packages to employees as it transforms its business to the cloud, which allows it to deliver services more efficiently and with fewer people. But opportunity continues to abound, SAP says, for those eager to take the leap.


Read more 

Cyber Risks are recognized by C-level executives – only government agencies fall short
Feb 17, 2015 Cyber Risks are recognized by C-level executives – only government agencies fall short

The recently published KuppingerCole Digital Risk and Security Awareness Survey provides a number of interesting findings around the changing perception of Cyber Risks. One astonishing and alerting result is the lack of C-level attention for Cyber Risks in a significant number of government agencies.


Read more 

KuppingerCole: Real-time Security Intelligence surpassing SIEM and firewalls as Cyber Defense countermeasure #1
Feb 17, 2015 KuppingerCole: Real-time Security Intelligence surpassing SIEM and firewalls as Cyber Defense countermeasure #1

The KuppingerCole Digital Risk and Security Awareness Study has worked among others with the topic countermeasures against cyber-attacks. Looking at the countermeasures allows some interesting observations. While some technologies such as Identity and Access Management & Governance (IAM/IAG) are considered as key technologies, others are gaining momentum and expected to play a far bigger role within the next three years.


Read more 

Understanding IT Risk Management In 4 Steps X 3
Nov 19, 2013 Understanding IT Risk Management In 4 Steps X 3

A risk management matrix combines the probability of harm and the severity of harm. In IT terms that means authentication, context, and process.

If you had to protect a million dollars in gold, would you spend $3 million to do it? In certain circumstances, you might.

If you wanted to steal a million dollars in gold, would you spend $3 million to do it? Many would answer, "of course not."

But, again, in certain circumstances they would be wrong. I’ll explain in a moment, but first some background. What I’m talking about is a discipline called IT risk management. Risk management began in the financial markets where the risk was about stocks and securities. By extension, it was applied to an organization’s digital resources. That aspect falls under the purview of the Chief Information Security Officer (CISO) for your enterprise.

By Dave Kearns 19 November 2013
InformationWeek


Read more 

Security Think Tank: Procurement and security are uneasy bedfellows
Nov 11, 2013 Security Think Tank: Procurement and security are uneasy bedfellows

Back doors in software can put customer and employee data at risk; poorly coded software can cause outages, brand damage and loss of data; viruses and Trojans in unchecked downloads can cause havoc and untold damage, including handing access to malicious third parties who then have unfettered access to systems.

By Rob Newby 11 November 2013
UK Computer Weekly


Read more 

Securing Big Data
Sep 30, 2013 Securing Big Data

Big data can create business value by solving emerging business challenges. However, big data also creates security challenges that need to be considered by organisations adopting or using big data techniques and technologies says Mike Small, FBCS CITP. There is now an enormous quantity of data in a wide variety of forms that is being generated very quickly. However, the term big data is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data.

The term big data needs to be understood as data that has greater volume, variety or velocity than can be comfortably processed using the technology that you already have. Big data comes from a number of sources both internal and external. Many organisations have accumulated large amounts of data that they are not exploiting. There is an even larger amount of data that is held in publicly available sources, like government databases, social media, as well as data that organisations would be willing to share. In addition the inbuilt instrumentation of smart systems generates a massive amount of, as yet, untapped data. To realise its potential value big data needs to be transformed into smart information , which can then be used to improve planning and increase efficiency as well as to create new kinds of products.

By Mike Small September 2013
BCS Magazine IT Now 


Read more 

The future of cloud
Sep 25, 2013 The future of cloud

We asked senior figures in the industry to come together to debate the future of cloud computing in a round table. Present were: Daniel Power, EMEA sales director, Onelogin; Matt Price, VP and general manager EMEA, Zendesk; Mike Small, fellow analyst, KuppingerCole and member of ISACA; Simon Wilcox, director, Digital Craftsmen; Jonathan Wisler, general manager EMEA, Softlayer; and Virginia Blackburn, moderator.

By Virginia Blackburn 25 September, 2013
Quelle: MEDIAPLANET


Read more 

EMC Nabs Aveksa, a Player in Identity Management
Jul 08, 2013 EMC Nabs Aveksa, a Player in Identity Management

Tech giant EMC made an interesting acquisition today that is likely to increase attention not on itself, but on another company in the same space.

EMC said today that it had acquired Aveksa, a privately held company that specializes in identity management. It’s based in Waltham, Mass., and has significant operations in India. First reports of the deal came from the Times of India, which said EMC paid $225 million. Aveksa will become part of RSA, the security division of EMC.

By Arik Hesseldahl 8 July 2013
AllThings D


Read more 

Security Think Tank: Prism – Sitting duck or elaborate honeypot?
Jul 02, 2013 Security Think Tank: Prism – Sitting duck or elaborate honeypot?

As I write, a handful of slides have been published, appearing to detail websites that are being monitored by the US National Security Agency (NSA), including Google, Facebook, Yahoo, Hotmail, Apple and Skype. What appears to be an acronym – Prism – appears throughout, along with the official seals and protective markings to suggest it is a bona fide US government presentation...

By Rob Newby 2 July 2013
UK Computer Weekly


Read more 

Cloud choices: How to select the right hosted services
May 24, 2012 Cloud choices: How to select the right hosted services

The cloud provides an alternative way of procuring IT services that offers many benefits, including increased flexibility as well as reduced cost. It extends the spectrum of IT service delivery models beyond managed and hosted services to a form that is packaged and commoditised. 

By Mike Small 24 May 2012
UK Computer Weekly


Read more 

Impressions from European Identity Conference 2012
Apr 25, 2012 Impressions from European Identity Conference 2012

This year’s European Identity & Cloud Conference took place from 17.-20. April with the last day being a workshop day to deepen some of the topics. The event is one of the most important IAM meetings in the world and continues to increase its impact. Almost 600 visitors from allover the world and 40 exhibitors constituted to a 35% growth. As every year the vendor landscape showed some dynamics with NetIQ acquiring Novell’s IAM business, ATOS taking over Siemens IT Solutions and Services (DirX), new rising stars appearing like ForgeRock, Symplified and The Dot Net Factory to name a few, Ping Identity expanding its presence and big companies like VMWare participating for the first time.

April 25, 2012
SSOCircle


Read more 

Quest Acquires Bitkoo For Cloud Identity Management
Dec 20, 2011 Quest Acquires Bitkoo For Cloud Identity Management

Quest Software Monday announced its acquisition of access-control technology vendor Bitkoo. Terms of the deal were not disclosed.

Quest is pitching the acquisition as a way to provide its customers with a more centralized and nuanced approach for handling authentication in multiple environments: inside the enterprise, including for databases--down to individual rows and columns--and SharePoint installations, as well as for cloud-based applications and Web services.

By Mathew J. Schwartz 20 December 2011
InformationWeek


Read more 

UBS Finds Risk Management Stress Test Costly
Oct 26, 2011 UBS Finds Risk Management Stress Test Costly

UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.

By Mathew J. Schwartz 26 October 2011
InformationWeek


Read more 

Impressions from European Identity Conference 2011
Jun 16, 2011 Impressions from European Identity Conference 2011

This year's European Identity Conference (EIC2011), a fixed star in the digital identity world took place in Munich, Germany, from 10.-12. May and a supplemental workshop day on the 13th. As last year the conference also hosted the Cloud 2011. In terms of venue the conference made a leap into the future from the venerable Deutsche Museum to the Dolce Ballhaus-Forum, a modern hotel and conference center north of Munich. Needless to say that the conference was well organized by KuppingeCole and newly introduced supplemental offerings like the World Cafe unconference or a crash course in international privacy and IT security law.

May 15, 2011
SSOCircle


Read more 

Confused By RSA's Clarification?
Jun 09, 2011 Confused By RSA's Clarification?

While RSA has offered to replace some tokens, many customers still don't know how or why their SecurID tokens may pose a security risk.

Could attackers break into your SecurID two-factor authentication system?

Despite the open letter issued this week by RSA chairman Art Coviello, many of the company's customers remain confused about exactly what attackers stole from RSA in March, and what risk that information might pose to their enterprise, even if they're not a defense contractor.

By Mathew J. Schwartz 09 June 2011
InformationWeek   


Read more 

WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category
May 18, 2011 WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category

WSO2, the lean enterprise middleware company, today announced that it has been awarded the European Identity Award 2011 in the Cloud Provider Offerings category by analyst group KuppingerCole. The award recognizes WSO2 for WSO2 Identity as a Service, citing the multi-tenant open source cloud service for its OpenID and XACML support and its innovative features, including the ability to migrate from on-premise to a full cloud service. This award was presented on May 11, at the European Identity Conference 2011 in Munich.

Business Wire


Read more 

Trust, respect and personal datastores
May 17, 2011 Trust, respect and personal datastores

On the final day of last week's European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks.

By Dave Kearns 17 May 2011
Network World   


Read more 

Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)
May 13, 2011 Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)

Kim Cameron, a Microsoft distinguished engineer and outspoken advocate of Internet privacy, left the company last week.

In a video interview yesterday, he says that Microsoft is on the right track, but he's worried that user privacy will get lost in the shuffle as big Internet companies like Microsoft, Google, and Facebook fight for market share.

By Matt Rosoff 13 May 2011
Business Insider


Read more 

Springtime in Munich
Apr 13, 2011 Springtime in Munich

One of the things I love about the European Identity Conference is the willingness of the organizers, Kuppinger Cole + Partner, to explore new formats instead of tired old presentations.
Last year, for example, one of my sessions was "a Conversation with Kim Cameron." Kim and I and two microphones. No set agenda, just exploring identity.

By Dave Kearns 13 April 2011
Network World  


Read more 

SecurID Customers Advised To Prepare For Worst Case
Mar 22, 2011 SecurID Customers Advised To Prepare For Worst Case

EMC's RSA hasn't detailed exactly what was stolen, so security experts advise the authentication system's customers to implement a more layered network defense.

How serious is the security threat posed by the theft of inside information about SecurID, the two-factor authentication system sold by EMC division RSA? "It is important enough that it required an official note to the stock markets," said Martin Kuppinger, founder and principal analyst at KuppingerCole, in a blog post...

By Mathew J. Schwartz 22 March 2011
InformationWeek
 


Read more 

What's happening - Upcoming events in the IdM/IAM arena
Mar 15, 2011 What's happening - Upcoming events in the IdM/IAM arena

May promises to be really busy, and a challenge for anyone hoping to visit all the venues. First up is the European Identity Conference (EIC) in Munich (May 10-13). EIC is my favorite European conference and one of my two favorites anywhere. This is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as identity management; governance, risk management and compliance (GRC); and service oriented architecture (SOA), both in "classical" environments as well as in private, public and hybrid cloud environments. I'll be there once again along with many speakers whose names are familiar from this newsletter (Kim Cameron, Tim Cole, Nishant Kaushik, Jackson Shaw, Martin Kuppinger, et al); you should be too. Sign up online so you aren't disappointed...

By Dave Kearns 15 March 2011
Network World


Read more 

Security is holding back virtualisation
Dec 13, 2010 Security is holding back virtualisation

Virtualisation security is still a thorny problem for implementers, says a survey from Kuppinger Cole.

Security is the biggest worry for virtualisation project leaders, according to a report from Kuppinger Cole, an analyst firm that focuses on information security. 

Forty per cent of respondents said they believed that a virtual environment was harder to secure than a physical one.

By Eric Doyle 10 December 2010
IT PRO


Read more 

The case for XLDAP
Jun 11, 2010 The case for XLDAP

There's still one or two issues to bring up from last month's European Identity Conference, which I want to get to this week -- one from a panel I was on and another from one I wasn't on.

Kuppinger-Cole senior analyst Sebastian Rohr inveigled me to sit on his panel "Directory Services in the Cloud" where, among other issues, we explored exchanging directory data in an XML-enabled world. I rashly suggested that Directory Services Markup Language (DSML) was sufficient for this purpose. But I didn't count on Australia's Andrew Ferguson to be lurking behind a screen where I couldn't see him.

By Dave Kearns 04 June 2010
Network World


Read more 

Impressions from European Identity Conference 2010
May 20, 2010 Impressions from European Identity Conference 2010

Three days of conference plus a Workshop day packed full with IAM and GRC topics and even more. The KuppingerCole European Identity Conference EIC2010 was a great success. In my opinion the best EIC I have seen, although there were some confusion and unexpected changes that let me miss some of the presentations I was eager to visit. But that can be easily excused looking at the choice and quality of speakers. KuppingerCole again did a very good job in gathering many of the leading heads in Identity Management and GRC. The only thing I missed were people from Google like Eric Sachs, who did a lot in the OAuth and OpenId space the last years.

SSOCircle  Blog


Read more 

Munich fuel
May 12, 2010 Munich fuel

To get through the intense European Identity Conference last week in Munich (thanks, Kuppinger Cole folks!), I had to make sure to drink lots of fluids. I’m referring, of course, to coffee, beer, and one extraordinary whisky (thanks, Ping Identity folks!)...

By Eve Maler 12 May 2010
Blog Eve Maler


Read more 

Information Cards at the 2010 European Identity Conference
May 11, 2010 Information Cards at the 2010 European Identity Conference

Munich, Germany -- Information Cards and ICF members were very active in the European Identity Conference (EIC) in Munich this past week. To begin with, ICF board member Kim Cameron accepted the European Identity Award for “Best Innovation” on behalf of Microsoft for its U-Prove minimal disclosure technology. The award was shared with IBM for its similar Idemix technology. Both solutions were lauded by EIC host Kuppinger Cole as pioneering efforts in enhancing online privacy and security.

By Drummond Reed 10 May 2010
Drummond Reed's blog


Read more 

EIC 2010: An outsider’s view
May 11, 2010 EIC 2010: An outsider’s view

I stumbled into the European Identity Conference 2010 actually only by accident, more being a web developer than an enterprise IT guy (although having to do with it in terms of connecting e.g. Plone to an LDAP server in our bigger clients). But I don’t regret that I actually did!

By mrtopf 11 May 2010
Blog mrtopf.de


Read more 

Smartsoft'a Avrupa'dan ödül
May 10, 2010 Smartsoft'a Avrupa'dan ödül

SMARTSOFT'un Oracle işbirliğiyle ortaklaşa geliştirdiği ve sinir (nöral) ağlarının kullanıldığı risk tabanlı doğrulama ve yetkilendirme operasyonlarına olanak sağlayan çözümü ile SMARTSOFT - ORACLE - ŞEKERBANK işbirliği "En İyi Kurum İçi Proje" dalında ödül kazandı.Dijital kimlik yönetimi alanındaki seçkin projelere, inovasyonlara ve gelişmelere yönelik Avrupa Kimlik Ödülleri, Kimlik ve Erişim Yönetimi (IAM) ve Yönetişim, Risk Yönetimi ve Uyumluluk (GRC) alanlarında Avrupa'nın önde gelen merkezlerinden Münih kentinde düzenlenen 2010 Avrupa Kimlik Konferansı'nda coşkulu bir törenle KUPPINGER COLE araştırma grubu tarafından sahiplerine sunuldu.

By Mehmet Göksu 10 May 2010
Computerworld


Read more 

MetricStream to Showcase Its GRC Platform at the European Identity Conference
May 07, 2010 MetricStream to Showcase Its GRC Platform at the European Identity Conference

Palo Alto, CA -- (SBWIRE) -- 05/07/2010 -- MetricStream, the market leader in Enterprise Governance, Risk, Compliance (GRC) and Quality Management solutions is showcasing its GRC Platform at Cloud 2010, a European Identity Conference(EIC) on “Cloud Computing - Thought Leadership and Best Practices” hosted by Kuppinger Cole in Munich, Germany from May 4 to 7, 2010.

By  SBWIRE
Read more 

A security event without leaving your home
Jan 27, 2010 A security event without leaving your home

Last fall I was twice put in the quandary of choosing between two conferences going on simultaneously. In September there was Digital ID World in Las Vegas and The Experts Conference in Berlin. While November saw both the Cloud Computing Expo and the Internet Identity Workshop sharing the same week. I thought I could shuttle between Cloud Computing and IIW, since they were being held only 5 miles apart, but in reality that was a no go...
 
By Dave Kearns 27 January 2010
Network World 

Read more 

Time to move the discussion past authentication
Oct 27, 2009 Time to move the discussion past authentication

A couple of notes I read last week seemed to go together so nicely that I thought I'd share hem with you in hopes of stimulating your own thought processes. One came from a discussion of the LinkedIn cloud computing group while the other was a blog post by old friend Martin Kuppinger...

By Dave Kearns 27 October 2009
Network World


Read more 

Identity in the cloud
Jul 24, 2009 Identity in the cloud

I spent a pleasant hour talking with Martin Kuppinger (of Kuppinger Cole + Partner) about "Externalizing Identity into the Cloud: Identity Services in Cloud and Outsourcing Environments" -- and we even had a surprise guest.

By Dave Kearns 24 July 2009
Network World


Read more 

EIC 2009, and a New Focus on Identity in the Cloud
Jun 03, 2009 EIC 2009, and a New Focus on Identity in the Cloud

From May 5th to May 8th I attended the 3rd European Identity Conference (EIC). As a testimonial on the front page says, it was “a wonderful and informative event, well run and useful in so many ways.” (If I quote a page quoting me, is that recursion or delegation?)

I attended the first two EICs and, while I greatly enjoyed them, each conference has been better than the last. EIC strikes a good balance between providing a forward looking vision of what identity management technology should provide for business, and what practical solutions are available now.

By Dale Olds 03 June 2009
Blog Dale Olds


Read more 

Recognizing standards
May 19, 2009 Recognizing standards

One of the highlights of the recent European Identity Conference was the conferring of the European Identity Awards, which recognize outstanding projects, innovations and additional developments in standards -- an area that should get even more recognition.

By Dave Kearns 19 May 2009
Network World


Read more 

The regional, cultural and national differences of identity management
May 13, 2009 The regional, cultural and national differences of identity management

Last week's European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what's happening worldwide. I had the opportunity to host panel discussions that included people from Germany, Holland, Sweden, Norway, France, Italy, the U.K., Belgium, Canada, the U.S., Australia and India. It's a wonderful way to discover that although identity management theory is pretty much the same the whole world over, the practice, or implementation, of that theory has many regional, cultural and national differences.

By Dave Kearns 13 May 2009
Network World


Read more 

Heady days at EIC in Munich
May 12, 2009 Heady days at EIC in Munich

What a week… Along with lots of other people in the identosphere, I had a great opportunity to attend the Kuppinger Cole European Identity Conference in Munich all last week. Here are some stories, impressions, and links.

By Eve Maler 12 May 2009
Blog Eve Maler


Read more 

Five Things that Stuck Out to Me at the European Identity Conference 2009
May 12, 2009 Five Things that Stuck Out to Me at the European Identity Conference 2009

As promised in my last blog entry, here are my top 5 observations from last week's European Identity Conference 2009, put on by the Germany analyst firm Kuppinger Cole.  The conference Web site is here -  http://www.id-conf.com/eic2009 where you can find conference podcasts, Twitter postings and more.

By Matthew Gardiner 12 May 2009
Blog CA Community


Read more 

EIC 2009
May 10, 2009 EIC 2009

Just back from another fine European ID Conference in Munich. The combination of the venue (the Forum at the Deutsches Museum), the speakers and our great hosts from Kuppinger-Cole + Partner (Martin, Tim, Joerg, Felix, Sebastian, Levent, Gabi, Bettina and all their cohorts) makes this an event ne plus ultra.

By Dave Kearns 10 May 2009
The Virtual Quill


Read more 

ICF Achievements at the EIC
May 10, 2009 ICF Achievements at the EIC

This week the Information Card Foundation marked two significant developments at the European Identity Conference: the formation of the German-language chapter of the ICF, and receiving the European Identity Award for Best New Standard.

By Mike Jones 10 May 2009
Blog Mike Jones


Read more 

Project Aristotle Wins EIC Award
May 08, 2009 Project Aristotle Wins EIC Award

I am happy to announce that Project Aristotle won an award for “Best new or improved standard” at the European Identity Conference. The win is shared with the Open Authentication (OAuth) and the Information Card Foundation (ICF).

By ArisId 08 May 2009


Read more 

European Identity Conference 2009
Apr 08, 2009 European Identity Conference 2009

This year I finally have a chance of attending the European Identity Conference in Munich. I would have been already delighted to go there just as attendee, the lineup of speakers is phenomenal and the chances of good networking appear really promising.

By Vittorio Bertocci April 8th, 2009
Vibro.NET


Read more 

Microsoft again delays identity management server
Mar 25, 2009 Microsoft again delays identity management server

Upgrade to Microsoft's ILM software has been years in development and now will not ship before January 2010

By John Fontana 25 March 2009
Network World


Read more 

Identity management in Western Europe is alive and well
Jan 26, 2009 Identity management in Western Europe is alive and well

Because I'm based in California's Silicon Valley, a long stone's throw from Oracle HQ and surrounded by dozens of identity management vendors, my view of the global marketplace can be skewed. While I try to make up for this by visiting conferences and trade shows outside the United States (I’ll be at the European ID Conference in Munich this May), I do rely on readers and friends to keep me posted about things of interest in their areas. Today, we'll hear from one identity management player in Western Europe who has reported on the state of the industry there.

By Dave Kearns 26 January 2009
Network World


Read more 

Making a case to the board
Jan 12, 2009 Making a case to the board

Proving security's worth is not always the easiest job. Once you've invested in systems, trained staff, secured the perimeter, secured the interior, put in monitoring and maintenance programmes, chosen what, if anything, to outsource, run penetration tests and more, what's the result? No-one gives out their password on the phone, catches a virus on their PC, leaves unencrypted data on the train or suffers any kind of a security breach. If all goes right, nothing happens.

By Rob Buckley 12 Jan. 2009
SC Magazine Australia/NZ


Read more 

Building an Identity Bus, Part 2
May 07, 2008 Building an Identity Bus, Part 2

Thoughts on how to move the Identity Bus forward

Last time out I told you about an informal discussion I had with Microsoft's Kim Cameron, Novell's Dale Olds, Quest's Jackson Shaw hosted by Kuppinger-Cole's Felix Gaehtgens all about the so-called "Identity Bus." I said that we reached a conclusion about the best way to move forward, but perhaps it's better to say we identified a couple of paths that might be worth taking.

By Dave Kearns 05 May 2008
Network World


Read more 

Building an Identity Bus, Part 1
May 05, 2008 Building an Identity Bus, Part 1

Identity Bus discussion at the European Identity Conference

One of the most interesting "panel discussions" I had at the European Identity Conference didn't have anyone in the audience. Kuppinger & Cole senior analyst Felix Gaehtgens gathered Microsoft's Kim Cameron, Quest's Jackson Shaw (former colleagues at Zoomit) and Novell's Dale Olds for a video interview (which may or may not show up at the KCP Web site) about the "Identity Bus" .

By Dave Kearns 05 May 2008
Network World


Read more 

Putting Context in Identity
Apr 30, 2008 Putting Context in Identity

An overview of some panel discussions from the 2nd annual European Identity Conference

I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity."

By Dave Kearns 30 April 2008
Network World


Read more 

European Identity Awards
Apr 29, 2008 European Identity Awards

The recent European Identity Conference 2008 featured the presentation of Kuppinger Cole’s European Identity Awards. Vendors, integrators, consultants and user companies were asked for nominations. For each category, three outstanding projects and innovations were nominated as finalists. Here is how Kuppinger Cole framed the results:

By Kim Cameron 29 April 2008
Kim Cameron´s Identity Weblog


Read more 

Virtual Corporate Business Cards
Apr 27, 2008 Virtual Corporate Business Cards

Martin Kuppinger is one of the key analysts behind the amazing European Identity Conference just held in Munich.  This was "User Centric Meets Enterprise Identity Management" with a twist: our European colleagues have many things to contribute to the discussion about how they fit together...

By Kim Cameron 27 April 2008
Kim Cameron´s Identity Weblog


Read more 

Context in identity
Apr 24, 2008 Context in identity

Sessions worth attending at the 2nd annual European Identity Conference

Today I want to talk about a company I mentioned a year ago, with all intentions of telling you more about them. But even as I try to get them into today's newsletter, there's a timely issue to tell you about first, especially if you're in Munich this week for the 2nd annual European Identity Conference.

By Dave Kearns 24 April 2008
Network World


Read more 

Identity 2.0 products gaining ground
Mar 12, 2008 Identity 2.0 products gaining ground

Identity 2.0 technologies are leading the way in identity management, according to research from industry analysts.
Analyst group Kuppinger Cole and Partner analysed the 10 predominant topics and trends in identity management in 2008.

Clement James, vnunet.com, 12 Mar 2008
Personal Computer World


Read more 

ID management enters the application stack
Mar 12, 2008 ID management enters the application stack

Businesses are looking to simplify the process of managing identities, according to analysts

The complexity of managing governance, risk and compliance (GRC) activities is driving firms to integrate identity and role management into the application stack.

According to analyst group Kuppinger Cole & Partners, identity management and role management have become so fundamental to enterprises' ability to manage GRC that business leaders are looking at new ways to simplify the process.

Gareth Morgan, IT Week 12 March 2008
Personal Computer World


Read more 

Analyst: Open-ID ist eine Business-Technologie
Feb 14, 2008 Analyst: Open-ID ist eine Business-Technologie

Web-Single-Sign-on ist auch für Firmen interessant

Analysten begrüßen den nahenden Durchbruch bei der Webregistrierungs-Technik Open-ID. Sie wird zwar derzeit vor allem im Blog-Umfeld eingesetzt, birgt aber auch Business-Potenziale. Dazu muss die Technologie für das User-centric Identity Management aber noch reifen.

Autor: Armin Barnitzke 14.02.2008
Computer Zeitung


Read more 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole