English   Deutsch   Русский   中文    

Media Coverage

Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies
May 28, 2015 Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies

KuppingerCole Deems Forum Sentry Worthy of “Evaluation by Any Organization Looking for the Highest Grade of Security and Reliability”


Read more 

Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies
May 28, 2015 Leading European Analyst Firm Recommends Forum Systems for Companies with Long-term API Strategies

KuppingerCole Deems Forum Sentry Worthy of "Evaluation by Any Organization Looking for the Highest Grade of Security and Reliability"


Read more 

GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015
May 27, 2015 GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015

GlobalSign Customer, DNA Ltd, Honored as Best B2B Identity Project at KuppingerCole EIC 2015


Read more 

KuppingerCole Report: An Executive View of ObserveIT
May 18, 2015 KuppingerCole Report: An Executive View of ObserveIT

KuppingerCole is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). Their analysts are experienced in extracting value from collecting and maintaining information security for corporations across mobile, cloud, and social platforms.

In a recent Report, KuppingerCole gives an executive view of ObserveIT’s User Activity Monitoring solution. Below is a brief summary of the report.


Read more 

Identity is key to meeting IoT security challenges, says NetIQ
May 08, 2015 Identity is key to meeting IoT security challenges, says NetIQ

The internet of things (IoT) will not necessarily introduce new cyber threats, but it will amplify those we are already facing, according to NetIQ solutions consulting director David Mount.


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 08, 2015 Future IAM will need to be broader, says Martin Kuppinger

Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 07, 2015 Future IAM will need to be broader, says Martin Kuppinger

Identity and access management systems need to look at all forms of identity, not just employees or users, says KuppingerCole analyst 07 May 2015


Read more 

Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite
May 07, 2015 Nord/LB wins Best Access Governance Award based on Beta Systems IAM Suite

Berlin, Germany. 7 May 2015 – The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). In the category Best Access Governance / Intelligence Project, the award was granted to Nord/LB for implementing an IAM project focusing on realizing a modern, workflow-structured and role-based IAM system based on the Beta Systems’ IAM suite that mitigates existing risks and improves governance capabilities. An important element within its design and deployment was a clear segregation between management of identities and access and the technical operation. The solution was implemented by Beta Systems long-time IAM solution partner BLUECARAT.


Read more 

Future IAM will need to be broader, says Martin Kuppinger
May 07, 2015 Future IAM will need to be broader, says Martin Kuppinger

Future identity and access management (IAM) systems will need to look at all forms of identity, not just employees or users, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

European Identity & Cloud Awards 2015
May 07, 2015 European Identity & Cloud Awards 2015

The European Identity & Cloud Awards 2015 were presented last night by KuppingerCole at the 9th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security.


Read more 

Businesses should prepare for black swans, says resiliency consultant
May 07, 2015 Businesses should prepare for black swans, says resiliency consultant

black swan event is defined as an incident that occurs randomly and unexpectedly and has wide-spread ramifications, but businesses can still prepare for them, according to a resiliency consultant.

 Black swans may be game-changing, but they are not all that rare and businesses can mitigate against them, said Alternative Resiliency Services managing principal Howard Mannella.

“Businesses need to move past a bad thing happening, and think about some bad thing happening,” he told the 2015 European Identity & Cloud (EIC) conference in Munich.


Read more 

Hackers likely to target IAM warns SailPoint
May 07, 2015 Hackers likely to target IAM warns SailPoint

Companies should consider their identity and access management (IAM) systems as a likely point of attack, according to IAM software supplier SailPoint.

“The easiest way to get into a server room is to break into the key cabinet,” said Darran Rolls, chief technology officer and chief information security officer at SailPoint.

“Likewise, breaking into an organisation’s IAM system will give a hacker access to every IT system within that organisation,” he told the 2015 European Identity & Cloud(EIC) conference in Munich.


Read more 

KuppingerCole presents the Prime Time for the Next Generation of IAM Solutions
May 07, 2015 KuppingerCole presents the Prime Time for the Next Generation of IAM Solutions

When it comes to security for the digital enterprise, there are good reason to get nervous, understanding current breaches like the recent attack on Sony Pictures Entertainment as signs of a dark and scary future, where cyber criminals and even terrorists lurk and create serious damage.


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger


Read more 

Security pros must look out for IoT threats, says GE CISO
May 06, 2015 Security pros must look out for IoT threats, says GE CISO

Security threats from the internet of things (IoT) have not yet reached wide public perception, according to Hanns Proenen, chief information security officer at GE Europe.

“Security professionals must look ahead for the early indicators,” he said at the 2015 European Identity & Cloud (EIC) conference in Munich.


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger


Read more 

Digital transformation affects every business, says Martin Kuppinger
May 06, 2015 Digital transformation affects every business, says Martin Kuppinger

Digital transformation is unstoppable and affects every industry and business, according to KuppingerCole principal analyst Martin Kuppinger.


Read more 

KuppingerCole presents 8 Fundamentals for Digital Risk Mitigation in the Age of Transformation
May 05, 2015 KuppingerCole presents 8 Fundamentals for Digital Risk Mitigation in the Age of Transformation

The Digital Transformation of Business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation, at the technical level. However, without changing business models, organizations will not succeed. Furthermore, connecting things with apps and services is imposing new challenges. These include product security and liability issues, but also how to appropriately deal with customer “big” data. Identity, Access, and Security become critical success factors for the Digital Transformation of Business.


Read more 

KuppingerCole’s European Identity & Cloud Conference 2015
May 05, 2015 KuppingerCole’s European Identity & Cloud Conference 2015

KuppingerCole’s European Identity & Cloud Conference 2015, Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security, opened today in Munich, Germany. For the 9th time KuppingerCole has brought together 45 exhibitors and more than 600 participants including most of Europe’s and the world’s leading vendors, end users, thought leaders, visionaries and analysts.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
May 01, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

IoT benefits and privacy not mutually exclusive, says industry expert
Apr 30, 2015 IoT benefits and privacy not mutually exclusive, says industry expert

It is possible to mitigate the privacy and security risks of the internet of things (IoT) without losing its benefits, according to an industry expert.

While IoT technologies that will enable devices to talk to each other and provide data to new services could deliver previously unimaginable benefits, many have raised concerns about security and privacy.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.

The new level of IAM that could enable stronger authentication is being ushered in through a combination of anomaly detection, user activity monitoring, user behavioural analytics and risk-based access.


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management is at hand, yet many businesses still rely on usernames and passwords


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole. The new level of IAM that could enable stronger authentication 


Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole. 

Read more 

Time to embrace a new level of IAM, says Martin Kuppinger
Apr 30, 2015 Time to embrace a new level of IAM, says Martin Kuppinger

A new level of identity and access management (IAM) is at hand, yet many businesses still rely on usernames and passwords, according to Martin Kuppinger, principal analyst at KuppingerCole.


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The EU data protection regulation will drive privacy by design in companies with European clients, says KuppingerCole analyst Karsten Kinast


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

“Privacy by design will play an increased role for any company that produces software as the new law will make them liable for any data protection breach related to using the software,” said Karten. “The drive for privacy by design will also come from 


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 29, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The coming EU data protection regulation will make privacy by design important for all companies who have European customers, according to Karsten Kinast, analyst at KuppingerCole.


Read more 

EU data protection regulation will drive privacy by design, says KuppingerCole
Apr 28, 2015 EU data protection regulation will drive privacy by design, says KuppingerCole

The coming EU data protection regulation will make privacy by design important for all companies who have European customers, according to Karsten Kinast, analyst at KuppingerCole.


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 22, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

Health insurer Anthem's breach of 80 million customers' and employees' personal data shows the need for better access control, says KuppingerCole 


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 21, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

Health insurer Anthem's breach of 80 million customers' and employees' personal data shows the need for better access control, says KuppingerCole


Read more 

Anthem breach highlights need for dynamic access control, says KuppingerCole
Apr 21, 2015 Anthem breach highlights need for dynamic access control, says KuppingerCole

The exposure of the personal data of up to 80 million customers and employees of US health insurer Anthem shows the need for better access control, said Dave Kearns, analyst at KuppingerCole.


Read more 

New Meaning of “Hacking your TV”
Apr 16, 2015 New Meaning of “Hacking your TV”

Last week the French television network TV5Monde was attacked by a group of hackers claiming to belong to Islamic State. They have disrupted broadcasts and hacked the websites and social media accounts of the French TV channel.

According to Alexei Balaganski, Senior Analyst at the independent analyst company KuppingeCole, this only confirms that the struggle between hackers and corporate security teams is fundamentally asymmetrical. “Regardless of its size and budgets, no company is safe from such attacks simply because a security team has to cover all possible attack methods, and a hacker needs just a one to succeed”.


Read more 

Forum Systems to Present at KuppingerCole European Identity & Cloud Conference
Apr 15, 2015 Forum Systems to Present at KuppingerCole European Identity & Cloud Conference

BOSTONApril 15, 2015 /PRNewswire/ -- Forum Systems Inc. announced today that CEO Mamoon Yunus and CTO Jason Macy will present at the European Identity & Cloud Conference (EIC) hosted by KuppingerCole on May 5-8 at the Dolce BallhausForum Unterschleissheim in Munich, Germany. The combined session, "The Foundations of API Security and API Gateway Technology," takes place on Tuesday, May 5, and includes a complimentary workshop, implementation showcase and technical round table discussion.


Read more 

Forum Systems to Present at KuppingerCole European Identity & Cloud Conference
Apr 15, 2015 Forum Systems to Present at KuppingerCole European Identity & Cloud Conference

BOSTONApril 15, 2015 /CNW/ -- Forum Systems Inc. announced today that CEO Mamoon Yunus and CTO Jason Macy will present at the European Identity & Cloud Conference (EIC) hosted by KuppingerCole on May 5-8 at the Dolce BallhausForum Unterschleissheim in Munich, Germany. The combined session, "The Foundations of API Security and API Gateway Technology," takes place on Tuesday, May 5, and includes a complimentary workshop, implementation showcase and technical round table discussion.


Read more 

KuppingerCole’s Top Cyber Threats - How to protect your Business
Apr 10, 2015 KuppingerCole’s Top Cyber Threats - How to protect your Business

Cyber threats are leaving even large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and massive financial losses and fines. KuppingerCole recently published an Advisory Note authored by Amar Singh, Senior Analyst at KuppingerCole, which discusses the most critical threats and tactical countermeasures that can help organizations understand and counter these threats.


Read more 

KuppingerCole introduces new research format tailored for executives – the Leadership Brief
Mar 25, 2015 KuppingerCole introduces new research format tailored for executives – the Leadership Brief

The independent Analyst Company KuppingerCole introduces a new research format that is tailored for executives. The KuppingerCole Leadership Brief provides condensed research and advice for executives and decision makers in organizations. The 2pg documents cover business challenges, and advice on how to address these, focusing on the key issues and allowing decision makers to quickly grasp both challenge and resolution.


Read more 

KuppingerCole: Mobile working is insecure – How you can change it
Mar 23, 2015 KuppingerCole: Mobile working is insecure – How you can change it

Last Friday the article “Spooks tell business: Consider stripping staff of smart phones to avoid cyber-attacks” was published at The Telegraph. It talks about staff being the ‘weakest link’ and raises the prospect of staff being blackmailed by spies. The warnings were contain in the UK government’s cyber initiatives the Ten Steps to Cyber Security (Ten Steps) and their more recent Cyber Essentials.


Read more 

Comment: The four critical success factors for “d!conomy” – manage your digital risk
Mar 16, 2015 Comment: The four critical success factors for “d!conomy” – manage your digital risk

This year’s CeBIT runs under the headline of “d!conomy”, an artificial term covering major business and IT trends such as the digital transformation of businesses and “Industry 4.0”, which stands for connected manufacturing being fully integrated with business processes and far more adaptive than ever before. There is no doubt that organizations have to rethink not only their product offerings but their business models in this age of digital transformation, with the IoT (Internet of Things) adding billions of connected devices and virtually everything else also becoming connected. Smart grids, smart homes and smart cities, connected vehicles, wearable computing, but also new payment models, competition for traditional taxi drivers and other changes demonstrate that that transformation is not just at the horizon, but already reality.


Read more 

EU Council promotes ignorance and backwardness in IT security in the e-government by rejecting the obligation to report for the public sector in cyber attacks
Mar 13, 2015 EU Council promotes ignorance and backwardness in IT security in the e-government by rejecting the obligation to report for the public sector in cyber attacks

No obligation to report for the public sector in cyber attacks. The EU Council (Council of the European Union, EU Council of Ministers) last week opposed the plan of the EU Commission that was also endorsed by the European Parliament in which the proposed directive for network and information security, including an obligation to report security-related incidents also for authorities, is anchored. This information was released yesterday by Statewatch, a civil rights organisation. However, operators, including those of Internet exchange points, online providers of payment and e-commerce, social networks, search engines or cloud services should remain subject to the obligation to report.


Read more 

The Limits of Efficiency
Mar 09, 2015 The Limits of Efficiency

For the first time in its history, SAP is offering severance packages to employees as it transforms its business to the cloud, which allows it to deliver services more efficiently and with fewer people. But opportunity continues to abound, SAP says, for those eager to take the leap.


Read more 

KuppingerCole: Real-time Security Intelligence surpassing SIEM and firewalls as Cyber Defense countermeasure #1
Feb 17, 2015 KuppingerCole: Real-time Security Intelligence surpassing SIEM and firewalls as Cyber Defense countermeasure #1

The KuppingerCole Digital Risk and Security Awareness Study has worked among others with the topic countermeasures against cyber-attacks. Looking at the countermeasures allows some interesting observations. While some technologies such as Identity and Access Management & Governance (IAM/IAG) are considered as key technologies, others are gaining momentum and expected to play a far bigger role within the next three years.


Read more 

Cyber Risks are recognized by C-level executives – only government agencies fall short
Feb 17, 2015 Cyber Risks are recognized by C-level executives – only government agencies fall short

The recently published KuppingerCole Digital Risk and Security Awareness Survey provides a number of interesting findings around the changing perception of Cyber Risks. One astonishing and alerting result is the lack of C-level attention for Cyber Risks in a significant number of government agencies.


Read more 

Understanding IT Risk Management In 4 Steps X 3
Nov 19, 2013 Understanding IT Risk Management In 4 Steps X 3

A risk management matrix combines the probability of harm and the severity of harm. In IT terms that means authentication, context, and process.

If you had to protect a million dollars in gold, would you spend $3 million to do it? In certain circumstances, you might.

If you wanted to steal a million dollars in gold, would you spend $3 million to do it? Many would answer, "of course not."

But, again, in certain circumstances they would be wrong. I’ll explain in a moment, but first some background. What I’m talking about is a discipline called IT risk management. Risk management began in the financial markets where the risk was about stocks and securities. By extension, it was applied to an organization’s digital resources. That aspect falls under the purview of the Chief Information Security Officer (CISO) for your enterprise.

By Dave Kearns 19 November 2013
InformationWeek


Read more 

Security Think Tank: Procurement and security are uneasy bedfellows
Nov 11, 2013 Security Think Tank: Procurement and security are uneasy bedfellows

Back doors in software can put customer and employee data at risk; poorly coded software can cause outages, brand damage and loss of data; viruses and Trojans in unchecked downloads can cause havoc and untold damage, including handing access to malicious third parties who then have unfettered access to systems.

By Rob Newby 11 November 2013
UK Computer Weekly


Read more 

Securing Big Data
Sep 30, 2013 Securing Big Data

Big data can create business value by solving emerging business challenges. However, big data also creates security challenges that need to be considered by organisations adopting or using big data techniques and technologies says Mike Small, FBCS CITP. There is now an enormous quantity of data in a wide variety of forms that is being generated very quickly. However, the term big data is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data.

The term big data needs to be understood as data that has greater volume, variety or velocity than can be comfortably processed using the technology that you already have. Big data comes from a number of sources both internal and external. Many organisations have accumulated large amounts of data that they are not exploiting. There is an even larger amount of data that is held in publicly available sources, like government databases, social media, as well as data that organisations would be willing to share. In addition the inbuilt instrumentation of smart systems generates a massive amount of, as yet, untapped data. To realise its potential value big data needs to be transformed into smart information , which can then be used to improve planning and increase efficiency as well as to create new kinds of products.

By Mike Small September 2013
BCS Magazine IT Now 


Read more 

The future of cloud
Sep 25, 2013 The future of cloud

We asked senior figures in the industry to come together to debate the future of cloud computing in a round table. Present were: Daniel Power, EMEA sales director, Onelogin; Matt Price, VP and general manager EMEA, Zendesk; Mike Small, fellow analyst, KuppingerCole and member of ISACA; Simon Wilcox, director, Digital Craftsmen; Jonathan Wisler, general manager EMEA, Softlayer; and Virginia Blackburn, moderator.

By Virginia Blackburn 25 September, 2013
Quelle: MEDIAPLANET


Read more 

EMC Nabs Aveksa, a Player in Identity Management
Jul 08, 2013 EMC Nabs Aveksa, a Player in Identity Management

Tech giant EMC made an interesting acquisition today that is likely to increase attention not on itself, but on another company in the same space.

EMC said today that it had acquired Aveksa, a privately held company that specializes in identity management. It’s based in Waltham, Mass., and has significant operations in India. First reports of the deal came from the Times of India, which said EMC paid $225 million. Aveksa will become part of RSA, the security division of EMC.

By Arik Hesseldahl 8 July 2013
AllThings D


Read more 

Security Think Tank: Prism – Sitting duck or elaborate honeypot?
Jul 02, 2013 Security Think Tank: Prism – Sitting duck or elaborate honeypot?

As I write, a handful of slides have been published, appearing to detail websites that are being monitored by the US National Security Agency (NSA), including Google, Facebook, Yahoo, Hotmail, Apple and Skype. What appears to be an acronym – Prism – appears throughout, along with the official seals and protective markings to suggest it is a bona fide US government presentation...

By Rob Newby 2 July 2013
UK Computer Weekly


Read more 

Cloud choices: How to select the right hosted services
May 24, 2012 Cloud choices: How to select the right hosted services

The cloud provides an alternative way of procuring IT services that offers many benefits, including increased flexibility as well as reduced cost. It extends the spectrum of IT service delivery models beyond managed and hosted services to a form that is packaged and commoditised. 

By Mike Small 24 May 2012
UK Computer Weekly


Read more 

Impressions from European Identity Conference 2012
Apr 25, 2012 Impressions from European Identity Conference 2012

This year’s European Identity & Cloud Conference took place from 17.-20. April with the last day being a workshop day to deepen some of the topics. The event is one of the most important IAM meetings in the world and continues to increase its impact. Almost 600 visitors from allover the world and 40 exhibitors constituted to a 35% growth. As every year the vendor landscape showed some dynamics with NetIQ acquiring Novell’s IAM business, ATOS taking over Siemens IT Solutions and Services (DirX), new rising stars appearing like ForgeRock, Symplified and The Dot Net Factory to name a few, Ping Identity expanding its presence and big companies like VMWare participating for the first time.

April 25, 2012
SSOCircle


Read more 

Quest Acquires Bitkoo For Cloud Identity Management
Dec 20, 2011 Quest Acquires Bitkoo For Cloud Identity Management

Quest Software Monday announced its acquisition of access-control technology vendor Bitkoo. Terms of the deal were not disclosed.

Quest is pitching the acquisition as a way to provide its customers with a more centralized and nuanced approach for handling authentication in multiple environments: inside the enterprise, including for databases--down to individual rows and columns--and SharePoint installations, as well as for cloud-based applications and Web services.

By Mathew J. Schwartz 20 December 2011
InformationWeek


Read more 

UBS Finds Risk Management Stress Test Costly
Oct 26, 2011 UBS Finds Risk Management Stress Test Costly

UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.

By Mathew J. Schwartz 26 October 2011
InformationWeek


Read more 

Impressions from European Identity Conference 2011
Jun 16, 2011 Impressions from European Identity Conference 2011

This year's European Identity Conference (EIC2011), a fixed star in the digital identity world took place in Munich, Germany, from 10.-12. May and a supplemental workshop day on the 13th. As last year the conference also hosted the Cloud 2011. In terms of venue the conference made a leap into the future from the venerable Deutsche Museum to the Dolce Ballhaus-Forum, a modern hotel and conference center north of Munich. Needless to say that the conference was well organized by KuppingeCole and newly introduced supplemental offerings like the World Cafe unconference or a crash course in international privacy and IT security law.

May 15, 2011
SSOCircle


Read more 

Confused By RSA's Clarification?
Jun 09, 2011 Confused By RSA's Clarification?

While RSA has offered to replace some tokens, many customers still don't know how or why their SecurID tokens may pose a security risk.

Could attackers break into your SecurID two-factor authentication system?

Despite the open letter issued this week by RSA chairman Art Coviello, many of the company's customers remain confused about exactly what attackers stole from RSA in March, and what risk that information might pose to their enterprise, even if they're not a defense contractor.

By Mathew J. Schwartz 09 June 2011
InformationWeek   


Read more 

WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category
May 18, 2011 WSO2 Awarded KuppingerCole European Identity Award 2011 In Cloud Provider Offerings Category

WSO2, the lean enterprise middleware company, today announced that it has been awarded the European Identity Award 2011 in the Cloud Provider Offerings category by analyst group KuppingerCole. The award recognizes WSO2 for WSO2 Identity as a Service, citing the multi-tenant open source cloud service for its OpenID and XACML support and its innovative features, including the ability to migrate from on-premise to a full cloud service. This award was presented on May 11, at the European Identity Conference 2011 in Munich.

Business Wire


Read more 

Trust, respect and personal datastores
May 17, 2011 Trust, respect and personal datastores

On the final day of last week's European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks.

By Dave Kearns 17 May 2011
Network World   


Read more 

Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)
May 13, 2011 Departing Microsoft Privacy Guru Blasts Current State Of Net Advertising (MSFT)

Kim Cameron, a Microsoft distinguished engineer and outspoken advocate of Internet privacy, left the company last week.

In a video interview yesterday, he says that Microsoft is on the right track, but he's worried that user privacy will get lost in the shuffle as big Internet companies like Microsoft, Google, and Facebook fight for market share.

By Matt Rosoff 13 May 2011
Business Insider


Read more 

Springtime in Munich
Apr 13, 2011 Springtime in Munich

One of the things I love about the European Identity Conference is the willingness of the organizers, Kuppinger Cole + Partner, to explore new formats instead of tired old presentations.
Last year, for example, one of my sessions was "a Conversation with Kim Cameron." Kim and I and two microphones. No set agenda, just exploring identity.

By Dave Kearns 13 April 2011
Network World  


Read more 

SecurID Customers Advised To Prepare For Worst Case
Mar 22, 2011 SecurID Customers Advised To Prepare For Worst Case

EMC's RSA hasn't detailed exactly what was stolen, so security experts advise the authentication system's customers to implement a more layered network defense.

How serious is the security threat posed by the theft of inside information about SecurID, the two-factor authentication system sold by EMC division RSA? "It is important enough that it required an official note to the stock markets," said Martin Kuppinger, founder and principal analyst at KuppingerCole, in a blog post...

By Mathew J. Schwartz 22 March 2011
InformationWeek
 


Read more 

What's happening - Upcoming events in the IdM/IAM arena
Mar 15, 2011 What's happening - Upcoming events in the IdM/IAM arena

May promises to be really busy, and a challenge for anyone hoping to visit all the venues. First up is the European Identity Conference (EIC) in Munich (May 10-13). EIC is my favorite European conference and one of my two favorites anywhere. This is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant technology topics such as identity management; governance, risk management and compliance (GRC); and service oriented architecture (SOA), both in "classical" environments as well as in private, public and hybrid cloud environments. I'll be there once again along with many speakers whose names are familiar from this newsletter (Kim Cameron, Tim Cole, Nishant Kaushik, Jackson Shaw, Martin Kuppinger, et al); you should be too. Sign up online so you aren't disappointed...

By Dave Kearns 15 March 2011
Network World


Read more 

Security is holding back virtualisation
Dec 13, 2010 Security is holding back virtualisation

Virtualisation security is still a thorny problem for implementers, says a survey from Kuppinger Cole.

Security is the biggest worry for virtualisation project leaders, according to a report from Kuppinger Cole, an analyst firm that focuses on information security. 

Forty per cent of respondents said they believed that a virtual environment was harder to secure than a physical one.

By Eric Doyle 10 December 2010
IT PRO


Read more 

The case for XLDAP
Jun 11, 2010 The case for XLDAP

There's still one or two issues to bring up from last month's European Identity Conference, which I want to get to this week -- one from a panel I was on and another from one I wasn't on.

Kuppinger-Cole senior analyst Sebastian Rohr inveigled me to sit on his panel "Directory Services in the Cloud" where, among other issues, we explored exchanging directory data in an XML-enabled world. I rashly suggested that Directory Services Markup Language (DSML) was sufficient for this purpose. But I didn't count on Australia's Andrew Ferguson to be lurking behind a screen where I couldn't see him.

By Dave Kearns 04 June 2010
Network World


Read more 

Impressions from European Identity Conference 2010
May 20, 2010 Impressions from European Identity Conference 2010

Three days of conference plus a Workshop day packed full with IAM and GRC topics and even more. The KuppingerCole European Identity Conference EIC2010 was a great success. In my opinion the best EIC I have seen, although there were some confusion and unexpected changes that let me miss some of the presentations I was eager to visit. But that can be easily excused looking at the choice and quality of speakers. KuppingerCole again did a very good job in gathering many of the leading heads in Identity Management and GRC. The only thing I missed were people from Google like Eric Sachs, who did a lot in the OAuth and OpenId space the last years.

SSOCircle  Blog


Read more 

Munich fuel
May 12, 2010 Munich fuel

To get through the intense European Identity Conference last week in Munich (thanks, Kuppinger Cole folks!), I had to make sure to drink lots of fluids. I’m referring, of course, to coffee, beer, and one extraordinary whisky (thanks, Ping Identity folks!)...

By Eve Maler 12 May 2010
Blog Eve Maler


Read more 

EIC 2010: An outsider’s view
May 11, 2010 EIC 2010: An outsider’s view

I stumbled into the European Identity Conference 2010 actually only by accident, more being a web developer than an enterprise IT guy (although having to do with it in terms of connecting e.g. Plone to an LDAP server in our bigger clients). But I don’t regret that I actually did!

By mrtopf 11 May 2010
Blog mrtopf.de


Read more 

Information Cards at the 2010 European Identity Conference
May 11, 2010 Information Cards at the 2010 European Identity Conference

Munich, Germany -- Information Cards and ICF members were very active in the European Identity Conference (EIC) in Munich this past week. To begin with, ICF board member Kim Cameron accepted the European Identity Award for “Best Innovation” on behalf of Microsoft for its U-Prove minimal disclosure technology. The award was shared with IBM for its similar Idemix technology. Both solutions were lauded by EIC host Kuppinger Cole as pioneering efforts in enhancing online privacy and security.

By Drummond Reed 10 May 2010
Drummond Reed's blog


Read more 

Smartsoft'a Avrupa'dan ödül
May 10, 2010 Smartsoft'a Avrupa'dan ödül

SMARTSOFT'un Oracle işbirliğiyle ortaklaşa geliştirdiği ve sinir (nöral) ağlarının kullanıldığı risk tabanlı doğrulama ve yetkilendirme operasyonlarına olanak sağlayan çözümü ile SMARTSOFT - ORACLE - ŞEKERBANK işbirliği "En İyi Kurum İçi Proje" dalında ödül kazandı.Dijital kimlik yönetimi alanındaki seçkin projelere, inovasyonlara ve gelişmelere yönelik Avrupa Kimlik Ödülleri, Kimlik ve Erişim Yönetimi (IAM) ve Yönetişim, Risk Yönetimi ve Uyumluluk (GRC) alanlarında Avrupa'nın önde gelen merkezlerinden Münih kentinde düzenlenen 2010 Avrupa Kimlik Konferansı'nda coşkulu bir törenle KUPPINGER COLE araştırma grubu tarafından sahiplerine sunuldu.

By Mehmet Göksu 10 May 2010
Computerworld


Read more 

MetricStream to Showcase Its GRC Platform at the European Identity Conference
May 07, 2010 MetricStream to Showcase Its GRC Platform at the European Identity Conference

Palo Alto, CA -- (SBWIRE) -- 05/07/2010 -- MetricStream, the market leader in Enterprise Governance, Risk, Compliance (GRC) and Quality Management solutions is showcasing its GRC Platform at Cloud 2010, a European Identity Conference(EIC) on “Cloud Computing - Thought Leadership and Best Practices” hosted by Kuppinger Cole in Munich, Germany from May 4 to 7, 2010.

By  SBWIRE
Read more 

A security event without leaving your home
Jan 27, 2010 A security event without leaving your home

Last fall I was twice put in the quandary of choosing between two conferences going on simultaneously. In September there was Digital ID World in Las Vegas and The Experts Conference in Berlin. While November saw both the Cloud Computing Expo and the Internet Identity Workshop sharing the same week. I thought I could shuttle between Cloud Computing and IIW, since they were being held only 5 miles apart, but in reality that was a no go...
 
By Dave Kearns 27 January 2010
Network World 

Read more 

Time to move the discussion past authentication
Oct 27, 2009 Time to move the discussion past authentication

A couple of notes I read last week seemed to go together so nicely that I thought I'd share hem with you in hopes of stimulating your own thought processes. One came from a discussion of the LinkedIn cloud computing group while the other was a blog post by old friend Martin Kuppinger...

By Dave Kearns 27 October 2009
Network World


Read more 

Identity in the cloud
Jul 24, 2009 Identity in the cloud

I spent a pleasant hour talking with Martin Kuppinger (of Kuppinger Cole + Partner) about "Externalizing Identity into the Cloud: Identity Services in Cloud and Outsourcing Environments" -- and we even had a surprise guest.

By Dave Kearns 24 July 2009
Network World


Read more 

EIC 2009, and a New Focus on Identity in the Cloud
Jun 03, 2009 EIC 2009, and a New Focus on Identity in the Cloud

From May 5th to May 8th I attended the 3rd European Identity Conference (EIC). As a testimonial on the front page says, it was “a wonderful and informative event, well run and useful in so many ways.” (If I quote a page quoting me, is that recursion or delegation?)

I attended the first two EICs and, while I greatly enjoyed them, each conference has been better than the last. EIC strikes a good balance between providing a forward looking vision of what identity management technology should provide for business, and what practical solutions are available now.

By Dale Olds 03 June 2009
Blog Dale Olds


Read more 

Recognizing standards
May 19, 2009 Recognizing standards

One of the highlights of the recent European Identity Conference was the conferring of the European Identity Awards, which recognize outstanding projects, innovations and additional developments in standards -- an area that should get even more recognition.

By Dave Kearns 19 May 2009
Network World


Read more 

The regional, cultural and national differences of identity management
May 13, 2009 The regional, cultural and national differences of identity management

Last week's European Identity Conference was, as always, a wonderful look at not only European advances in identity management, but what's happening worldwide. I had the opportunity to host panel discussions that included people from Germany, Holland, Sweden, Norway, France, Italy, the U.K., Belgium, Canada, the U.S., Australia and India. It's a wonderful way to discover that although identity management theory is pretty much the same the whole world over, the practice, or implementation, of that theory has many regional, cultural and national differences.

By Dave Kearns 13 May 2009
Network World


Read more 

Five Things that Stuck Out to Me at the European Identity Conference 2009
May 12, 2009 Five Things that Stuck Out to Me at the European Identity Conference 2009

As promised in my last blog entry, here are my top 5 observations from last week's European Identity Conference 2009, put on by the Germany analyst firm Kuppinger Cole.  The conference Web site is here -  http://www.id-conf.com/eic2009 where you can find conference podcasts, Twitter postings and more.

By Matthew Gardiner 12 May 2009
Blog CA Community


Read more 

Heady days at EIC in Munich
May 12, 2009 Heady days at EIC in Munich

What a week… Along with lots of other people in the identosphere, I had a great opportunity to attend the Kuppinger Cole European Identity Conference in Munich all last week. Here are some stories, impressions, and links.

By Eve Maler 12 May 2009
Blog Eve Maler


Read more 

ICF Achievements at the EIC
May 10, 2009 ICF Achievements at the EIC

This week the Information Card Foundation marked two significant developments at the European Identity Conference: the formation of the German-language chapter of the ICF, and receiving the European Identity Award for Best New Standard.

By Mike Jones 10 May 2009
Blog Mike Jones


Read more 

EIC 2009
May 10, 2009 EIC 2009

Just back from another fine European ID Conference in Munich. The combination of the venue (the Forum at the Deutsches Museum), the speakers and our great hosts from Kuppinger-Cole + Partner (Martin, Tim, Joerg, Felix, Sebastian, Levent, Gabi, Bettina and all their cohorts) makes this an event ne plus ultra.

By Dave Kearns 10 May 2009
The Virtual Quill


Read more 

Project Aristotle Wins EIC Award
May 08, 2009 Project Aristotle Wins EIC Award

I am happy to announce that Project Aristotle won an award for “Best new or improved standard” at the European Identity Conference. The win is shared with the Open Authentication (OAuth) and the Information Card Foundation (ICF).

By ArisId 08 May 2009


Read more 

European Identity Conference 2009
Apr 08, 2009 European Identity Conference 2009

This year I finally have a chance of attending the European Identity Conference in Munich. I would have been already delighted to go there just as attendee, the lineup of speakers is phenomenal and the chances of good networking appear really promising.

By Vittorio Bertocci April 8th, 2009
Vibro.NET


Read more 

Microsoft again delays identity management server
Mar 25, 2009 Microsoft again delays identity management server

Upgrade to Microsoft's ILM software has been years in development and now will not ship before January 2010

By John Fontana 25 March 2009
Network World


Read more 

Identity management in Western Europe is alive and well
Jan 26, 2009 Identity management in Western Europe is alive and well

Because I'm based in California's Silicon Valley, a long stone's throw from Oracle HQ and surrounded by dozens of identity management vendors, my view of the global marketplace can be skewed. While I try to make up for this by visiting conferences and trade shows outside the United States (I’ll be at the European ID Conference in Munich this May), I do rely on readers and friends to keep me posted about things of interest in their areas. Today, we'll hear from one identity management player in Western Europe who has reported on the state of the industry there.

By Dave Kearns 26 January 2009
Network World


Read more 

Making a case to the board
Jan 12, 2009 Making a case to the board

Proving security's worth is not always the easiest job. Once you've invested in systems, trained staff, secured the perimeter, secured the interior, put in monitoring and maintenance programmes, chosen what, if anything, to outsource, run penetration tests and more, what's the result? No-one gives out their password on the phone, catches a virus on their PC, leaves unencrypted data on the train or suffers any kind of a security breach. If all goes right, nothing happens.

By Rob Buckley 12 Jan. 2009
SC Magazine Australia/NZ


Read more 

Building an Identity Bus, Part 2
May 07, 2008 Building an Identity Bus, Part 2

Thoughts on how to move the Identity Bus forward

Last time out I told you about an informal discussion I had with Microsoft's Kim Cameron, Novell's Dale Olds, Quest's Jackson Shaw hosted by Kuppinger-Cole's Felix Gaehtgens all about the so-called "Identity Bus." I said that we reached a conclusion about the best way to move forward, but perhaps it's better to say we identified a couple of paths that might be worth taking.

By Dave Kearns 05 May 2008
Network World


Read more 

Building an Identity Bus, Part 1
May 05, 2008 Building an Identity Bus, Part 1

Identity Bus discussion at the European Identity Conference

One of the most interesting "panel discussions" I had at the European Identity Conference didn't have anyone in the audience. Kuppinger & Cole senior analyst Felix Gaehtgens gathered Microsoft's Kim Cameron, Quest's Jackson Shaw (former colleagues at Zoomit) and Novell's Dale Olds for a video interview (which may or may not show up at the KCP Web site) about the "Identity Bus" .

By Dave Kearns 05 May 2008
Network World


Read more 

Putting Context in Identity
Apr 30, 2008 Putting Context in Identity

An overview of some panel discussions from the 2nd annual European Identity Conference

I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity."

By Dave Kearns 30 April 2008
Network World


Read more 

European Identity Awards
Apr 29, 2008 European Identity Awards

The recent European Identity Conference 2008 featured the presentation of Kuppinger Cole’s European Identity Awards. Vendors, integrators, consultants and user companies were asked for nominations. For each category, three outstanding projects and innovations were nominated as finalists. Here is how Kuppinger Cole framed the results:

By Kim Cameron 29 April 2008
Kim Cameron´s Identity Weblog


Read more 

Virtual Corporate Business Cards
Apr 27, 2008 Virtual Corporate Business Cards

Martin Kuppinger is one of the key analysts behind the amazing European Identity Conference just held in Munich.  This was "User Centric Meets Enterprise Identity Management" with a twist: our European colleagues have many things to contribute to the discussion about how they fit together...

By Kim Cameron 27 April 2008
Kim Cameron´s Identity Weblog


Read more 

Context in identity
Apr 24, 2008 Context in identity

Sessions worth attending at the 2nd annual European Identity Conference

Today I want to talk about a company I mentioned a year ago, with all intentions of telling you more about them. But even as I try to get them into today's newsletter, there's a timely issue to tell you about first, especially if you're in Munich this week for the 2nd annual European Identity Conference.

By Dave Kearns 24 April 2008
Network World


Read more 

ID management enters the application stack
Mar 12, 2008 ID management enters the application stack

Businesses are looking to simplify the process of managing identities, according to analysts

The complexity of managing governance, risk and compliance (GRC) activities is driving firms to integrate identity and role management into the application stack.

According to analyst group Kuppinger Cole & Partners, identity management and role management have become so fundamental to enterprises' ability to manage GRC that business leaders are looking at new ways to simplify the process.

Gareth Morgan, IT Week 12 March 2008
Personal Computer World


Read more 

Identity 2.0 products gaining ground
Mar 12, 2008 Identity 2.0 products gaining ground

Identity 2.0 technologies are leading the way in identity management, according to research from industry analysts.
Analyst group Kuppinger Cole and Partner analysed the 10 predominant topics and trends in identity management in 2008.

Clement James, vnunet.com, 12 Mar 2008
Personal Computer World


Read more 

Analyst: Open-ID ist eine Business-Technologie
Feb 14, 2008 Analyst: Open-ID ist eine Business-Technologie

Web-Single-Sign-on ist auch für Firmen interessant

Analysten begrüßen den nahenden Durchbruch bei der Webregistrierungs-Technik Open-ID. Sie wird zwar derzeit vor allem im Blog-Umfeld eingesetzt, birgt aber auch Business-Potenziale. Dazu muss die Technologie für das User-centric Identity Management aber noch reifen.

Autor: Armin Barnitzke 14.02.2008
Computer Zeitung


Read more 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Analytics
There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data into information with value. These analytics are now being widely adopted by organizations to improve their performance. However what are the security and governance aspects of the use of these tools?
KuppingerCole Services
KuppingerCole offers clients a wide range of reports, consulting options and events enabling aimed at providing companies and organizations with a clear understanding of both technology and markets.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole