Media Coverage

Potential of blockchain technology for financial auditing

The blockchain (BC) is rising to prominence for immutable data services. One area where it is obvious that this distributed ledger technology will have deep business impact, if it succeeds, is financial auditing. The BC is in its infancy and, much like the internet was in its early stages, it is still unknown to many non-experts. In short, the BC is the technological infrastructure component behind bitcoin, the virtual currency invented in 2008. Recently there has been more interest in the BC, than the application which once made it famous. For a number of years now there has not...
More

CA Technologies Enhances Industry’s Most Comprehensive Privileged Access Management Portfolio, Reducing Risk of Data Breaches at Both Network and Server

CA Technologies (NASDAQ:CA) has released significant enhancements to its comprehensive  privileged access management portfolio , giving customers control over the privileged accounts that support a hybrid IT environment and are a frequent vector for cyberattacks. By updating and integrating  CA Privileged Access Manager  (formerly Xceedium Xsuite) and  CA Privileged Access Manager Server Control , CA helps reduce the risk of data breaches by extending the depth and breadth of control over privileged users end-to-end – from the gateway to the server and from the...
More

Get back in control of your company's privileged accounts

CA Technologies is putting its customers back behind the wheel of their privileged accounts. The company has just released significant enhancements to its comprehensive privileged access management portfolio, giving customers control over the accounts that support a hybrid IT environment. By implementing this update and integration, CA Technologies says it’s reducing the risk of data breaches by extending the depth and breadth of control end-to-end and all from a single management console. Vic Mankotia, vice president of Security & API Management at CA Technologies,...
More

Blockchain - don't get carried away by the hype

Everywhere you turn it seems there are research projects, new product proposals and services claiming a new dawn of blockchain driven technologies that fix a multitude of problems. Identity is a space where many of these claims are being made so it is useful if we explain our thinking and the approach we are advising when it comes to digital identity. The focus on shiny new technology, rather than the right technology to meet user needs, may limit the uptake of blockchain based solutions in areas such as digital identity. Views are polarised but a growing number of experts, myself...
More

Does digital identity need blockchain technology?

Everywhere you turn it seems there are research projects, new product proposals and services claiming a new dawn of blockchain driven technologies that fix a multitude of problems. Identity is a space where many of these claims are being made so it is useful if we explain our thinking and the approach we are advising when it comes to digital identity. The focus on shiny new technology, rather than the right technology to meet user needs, may limit the uptake of blockchain based solutions in areas such as digital identity. Views are polarised but a growing number of experts, myself...
More

Ping Identity Delivers Enhanced Contextual Access Management Capabilities to the Ping Identity Platform

At the Gartner Catalyst Conference,  Ping Identity® , the leader in Identity Defined Security, today announced enhancements to the Ping Identity Platform with new Contextual Access Management capabilities to help enterprises undergo digital transformation and accelerate cloud and mobile initiatives. This gives enterprises security that reacts dynamically to location, device, and network ensuring only the right people have access to the right applications and data. Enterprises looking to modernize their Web Access Management solutions to secure APIs, cloud and mobile apps,...
More

Access und Identity: Identitätsbasierter Schutz für Web-Ressourcen

Ein Großteil heutiger Applikationen werden heute mit dem Web Browser als allgemeinem Enduser-Client genutzt. Ein Höchstmaß an Komfort, Effizienz und die Umsetzung von nahtloser Sicherheit sind hierbei zentrale Herausforderungen. Web Access Management und Identity Federation sind zentrale Säulen, um dies zu erreichen. In vielen Unternehmen steigt die Notwendigkeit, dass im Rahmen der Zusammenarbeit mit externen Partnern, aber auch mit Endanwendern der Zugriff auf Ressourcen, Insbesondere Applikationen und Daten ermöglicht werden muss. Damit entsteht...
More

Wrapping up the Inaugural Sydney Identity Summit

As everyone tuning into the Olympics this week has heard, August is winter time in the southern hemisphere. Which means cool, breezy days here in Sydney – perfect weather for ForgeRock’s first-ever Identity Summit in Australia. We had a perfect venue also in the Museum of Contemporary Art (MCA), Australia’s premier museum for modern art from the region and globally. MCA has a world-class meeting space on Level 6 of its art deco headquarters, a building that formerly functioned as home base for Australia’s Maritime Services Board, and on Tuesday morning that’s...
More

DTO eyes biometric identity system

When the Digital Transformation Office takes  the wraps off its identity framework at the end of the month it will feature a previously unannounced biometric component. At an Identity Summit in Sydney this week, the DTO’s head of identity Rachel Dixon said that the verification framework that the Commonwealth identity service will use needs “well anchored” biometrics, though she didn’t specify which biometric data would be used. While the identity platform will be opt-in rather than compulsory, it could still be a hard sell to the general public –...
More

Blockchains – wichtig aber bald kaum noch im Gespräch

Blockchain hat sicher das Potenzial zum IT-Schlagwort des Jahres. Es wird sehr viel darüber geredet, geschrieben und getweetet. Manches davon ist richtig, manches nicht, wie es immer bei neuen Themen der Fall ist. Inzwischen hat sich auf breiter Basis die Erkenntnis durchgesetzt, dass es viele Arten von Blockchains gibt. Ursprünglich tauchte das Schlagwort im Zusammenhang mit Bitcoins auf, mittlerweile gibt es auch die Ethereum-Blockchain und noch viele weitere. Dabei unterscheiden sich auch die Ansätze signifikant. Es gibt anonyme Blockchains, die nach einem als...
More

Ping buys UnboundID, FIPS 201-compliant PACs

Ping acquires UnBoundID Ping Identity announced that it has acquired UnboundID, a provider of customer identity and access management software, to help enterprises improve customer engagement. Terms were not disclosed. The acquisition gives Ping a foothold in the consumer identity and access management market. With the addition of UnboundID, the Ping Identity Platform adds a scalable user directory for social login, customer preference and profile management. Ping plans to combine Unbound’s customer offering with its existing multi-factor authentication, single sign-on and...
More

Ping Identity expands mission to customers with UnboundID acquisition

Ping Identity  announced its first acquisition  since being acquired by Vista Equity Partners in June for $600 million , grabbing Austin-based  UnboundID  for an undisclosed purchase price. The purchase, which Ping CEO Andre Durand says wouldn’t have been possible before the acquisition, expands his company’s mission beyond protecting pure business identity to customer identity and all that entails. Perhaps more importantly, UboundID also gives Ping its own identity data store, a foundational piece for its identity platform. “The...
More

Review: Ping Identity PingAccess Server

Product Review:  Ping Identity PingAccess Server PingAccess server is designed to be a complete access management solution for enterprise customers, particularly large enterprises. The company behind the product, Ping Identity, is a fourteen year old small business with an  impressive list of clients . The company recently announced that it has been acquired by  Vista Equity Partners , a leading private equity firm focused on software, data and technology enabled businesses. Moreover, the company boasts a 95 percent customer retention rate since the...
More

Apple, IBM and the digital transformation of everything

IBM  and  Amica , the oldest US mutual automobile insurer, have announced a new Apple + IBM outcome in which iPads and iPhones will be used to handle insurance claims. I caught up with IBM and Amica to talk about it. iOS is getting everywhere The insurer is to use the IBM MobileFirst for iOS Claims Adjust app, one of over 100 industry-specific iOS apps  Apple and IBM have developed together  over the last two years. Big enterprise firms including Abu Dhabi Islamic Bank, Air Canada,  Alior Bank ,  Boots UK , Bosch Home Appliance Group,  Japan Post ,...
More

Consumer identity management is the core of real CRM

Identity and access management  (IAM) is the core of real customer relationship management  (CRM). Why? Because it lets us create one view of the customer across all systems holding customer data regardless of the data repository or application where the customer data originated. I will explain this opening statement and by the end of this brief essay I hope that this position will not only seem uncontroversial but a natural evolution of two historically distinct technology disciplines. Let’s first take a quick look at traditional, pre-internet...
More

Quicklinks

How can we help you

Send an inquiry

Jennifer Haas, Communications Manager:
+49 211 23707731

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

The Future of Identity & Access Management

Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]

News