Media Coverage

Mit Big Data die eGovernment-Angebote schützen

In der gemeinsam durchgeführten Studie „Big Data und Informationssicherheit“ gehen KuppingerCole Ltd. und das Business Application Research Center (BARC) dem Einsatz von Big Data Anlytics im Kontext von Netzsicherheit und Betrugserkennung auf den Grund. Die Ergebnisse sind auch für Verwaltungen relevant. Die Studie, für die mehr als 330 Personen aus über 50 Länden und unterschiedlichsten Branchen befragt wurden, zeigt, wie Unternehmen und Organisationen Big-Data-Technologien zur Steigerung ihrer Widerstandsfähigkeit gegen Cyber-Angriffe...

Read More

Is the information security supplier market really consolidating?

Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger Looking at the recent acquisitions, mergers, spin-offs and investments by private equity companies, one could come to the conclusion that the  information security  supplier landscape is undergoing a process of  consolidation . This includes HP Enterprise’s spin-off of non-strategic assets into a  deal with Micro Focus ; a private equity firm acquiring Ping Identity and Ping then acquiring UnboundID; the...

Read More

Europas neue Datenschutzrichtlinie EU-DSGVO – Herausforderung und Chance

CIAM-Lösung (Customer Identity and Access Management) von Gigya unterstützt Umsetzung der EU-DSGVO Die neue EU-Datenschutz-Grundverordnung (EU-DSGVO), die ab Mai 2018 in Kraft tritt, sichert EU-Bürgern deutlich mehr Kontrolle über ihre persönlichen Daten zu – egal, wo und wie diese verarbeitet werden. So muss immer ihre Zustimmung zur Datennutzung eingeholt werden und sie erhalten unter anderem das Recht, Informationen leichter wieder löschen zu lassen („Recht auf Vergessenwerden“), die Verarbeitung der Daten einzuschränken...

Read More

A single, integrated consumer ID system is best, says Martin Kuppinger

A bi-modal, integrated IAM system will help avoid the pitfalls associated with other approaches to consumer identity, according to Martin Kuppinger A single system is the best way to approach consumer identity and access management (Ciam), according to  Martin Kuppinger , principal analyst at KuppingerCole. “One Ciam that is owned by the business but operated by IT as a service with tight integration to employee IAM [ identity and access management ] is my recommendation,” he told the  Consumer Identity Summit  in Paris.

Read More

Gigya is consumer identify leader, finds KuppingerCole

Gigya, Ping Identity, Salesforce, ForgeRock are the current leaders in the consumer identity and access management market, according to a report by KuppingerCole Gigya  is the current overall leader among the top suppliers of consumer identity and access management (Ciam) systems, according to a report by analyst firm KuppingerCole. The  Ciam Leadership Compass report  is based on surveys of 12 suppliers “that have the most to offer at this time” and interviews with active customers to evaluate products on a range of criteria under user experience,...

Read More

Customer data integration a market opportunity, says CXP Group consultant

Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft Few European organisations have all the data relating to customer experience and satisfaction in a single IT system, presenting a market opportunity for suppliers, according to a digital enterprise consultant. Research by advisory firm  CXP Group  shows that at least eight different business departments within companies affect customers’ experience and satisfaction. All these departments are important...

Read More

Customer identity evolves over time, says Gigya

Customer identity evolves through a series of interactions to enable richer data for improved marketing and customer experiences, says Gigya co-founder Rooly Eliezerov Organisations should understand that getting to know the customer is building identity progressively, according to Rooly Eliezerov, co-founder of customer identity firm  Gigya . “Customer identity develops through iteration, constantly evolving from first contact through each interaction,” he told the  Consumer Identity Summit  in Paris. Once a customer visits a website and a user record...

Read More

High-assurance identity top priority for government and finance

The UK government and financial sector is working together to meet the need for high-assurance identity globally Creating persistent identities that are validated to the right trust levels is key for online banking, insurance and legal services, according to Sandy Porter, co-founder of identity assurance firm  Avoco Secure . “This is about providing the right level of assurance, to the right service at the right time,” he told the  Consumer Identity Summit  in Paris. According to Porter, it currently take around 28 days to “onboard” a...

Read More

Consumer identity key to digital transformation

Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole Consumer or customer identity and access management (Ciam) is necessary because “cookies can only get you so far”, according to John Tolbert, senior analyst at KuppingerCole. “[Organisations need to do more because] customers expect a consistent experience across all channels and all sorts of difference devices,” he told the inaugural  Consumer Identity Summit  in Paris This means organisations...

Read More

Analyst Companies publish Survey about Big Data and Information Security

KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with BARC, an enterprise software industry analyst and consulting firm specializing in areas including Data Management and Business Intelligence – have conducted a joint survey on Big Data and Information Security. The survey was focused on security-related aspects of Big Data analytics in cybersecurity and fraud detection and explains how Big Data...

Read More

Digital transformation not a finite process, says Martin Kuppinger

Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger Digital transformation is not a process that will see the world move from one state to another and then be over with, according to  Martin Kuppinger , principal analyst at  KuppingerCole . “Every industry is likely to undergo  digital transformation , but it is a continuous process of evolution to doing things differently in a digital era,” he told the  Eema   ISSE 2016  security conference in Paris....

Read More

Identity for online gambling industry a potential market opportunity

Identity for online gambling presents a potential market opportunity, because no suppliers are meeting the industry's consumer identify requirements The iGaming, or online gambling, industry is struggling to meet business and regulatory demands because there are no tailor-made software applications to manage customer identity. “The iGaming industry is having a tough time,” Martijn Postma, a freelance consultant on  identity and access management  (IAM) told Computer Weekly. On the one hand, there are the business demands to know as much about the customer as...

Read More

Die Sicherheit beginnt beim Endgerät – Schützen Sie Ihr Unternehmen vor Cyber-Angriffen

Cyber-Kriminalität ist heute so brisant wie nie zuvor, was die IT-Sicherheit in den Fokus der Geschäftsführung rückt. Die Bedrohung durch Hackerangriffe nimmt stetig zu. Cyber-Kriminalität ist zu einem „Big Business“ geworden, in dem es oft um hohe Summen geht. Dadurch wird jedes Unternehmen zum Angriffsziel – nicht nur große Firmen. Auch kleine und mittelständische Unternehmen müssen sich vor Cyberangriffen optimal schützen. 51 % aller deutschen Unternehmen waren bereits Opfer von Cyber-Attacken. Die Angriffe sind aus...

Read More

Web App Attacks: Another Reason Passwords Still Aren't Enough

Just as the personal computer eventually replaced the mainframe, web applications are becoming the norm over local software applications. With obvious benefits, like easier support and being agnostic to operating systems, web apps are only going to become more prevalent. Look at this year's "hottest jobs" from Inc. 1 , Business Insider 2  and others, and you'll consistently see "app developer" ranked high on the list. Web apps are everywhere, and technology isn't slowing down. It makes for an exciting, if not unpredictable, future. But not all is rosy. Web apps are also a...

Read More

5 Alternatives to The Gartner Magic Quadrants for IAM

Gartner is one of the loudest voices in enterprise technology— they’re world’s largest information technology research and advisory company, and generally the first source consulted when it comes to evaluating enterprise IT solutions, and enterprise Identity Management is no exception. But while the Gartner’s flagship Magic Quadrants for  IGA  and  IDaaS  are great resources for finding out who the top enterprise Identity Management contenders are, they don’t give a particularly in-depth analysis behind what each solution offers or...

Read More

Why Blockchain and Digital Transformation Go Hand in Hand

You’ve heard the term, but what on earth does it mean? Let’s start with the basics. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers. It uses cryptography to allow each participant on the network to manipulate the ledger in a secure way without the need for a central, often fee-charging authority. Bitcoin and the Mechanics of Blockchain   If you are familiar with blockchain technology, it may be because of  Bitcoin , the first app built using the...

Read More

Why Blockchain and Digital Transformation Go Hand in Hand

You’ve heard the term, but what on earth does it mean? Let’s start with the basics. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers. It uses cryptography to allow each participant on the network to manipulate the ledger in a secure way without the need for a central, often fee-charging authority. Bitcoin and the mechanics of blockchain   If you are familiar with blockchain technology, it may be because of  Bitcoin , the first app built using the platform...

Read More

How the Grinch Steals Credentials

As retailers clear out their remaining Halloween merchandise, we're reminded that the holidays are just around the corner. Some over-achievers may have already started shopping, but the rest of us will wait until our turkey dinners have digested before plunging into the Black Friday madness that kicks off the official holiday shopping season. Not to put a damper on the festivities, but those bargain-grabbing shopping days are also the prime season for cybercriminals. Remember the infamous Target mega-breach that happened in December 2013? It's estimated to have cost Target more than...

Read More

IAM ist mehr als Provisioning und Access Governance

Identity und Access Management (IAM), und vielleicht noch mehr Identity Management, sind Begriffe, die für sehr unterschiedliche Technologien verwendet werden – oft in zu enger Auslegung, manchmal aber auch in sehr großzügiger Auslegung der Begrifflichkeit. Wer ein erfolgreiches IAM-Programm umsetzen möchte, sollte sich von Beginn an damit auseinandersetzen. Nur wenn man sich von Beginn eines IAM-Projekts an klarmacht, was dazu gehört, was nicht und mit welchen weiteren Themen IAM verbunden ist, kann man die richtigen Prioritäten setzen. Es gilt eine...

Read More

DO AD-BLOCKERS SIGNIFY A NEW FORM OF CONSUMER DYNAMICS?

Customer identities are the result of the ongoing consolidation of data from various sources, including initial registration information, payment data, search requests, purchase history or help-desk interaction. Consumers use various devices to access required services and they use different accounts in different contexts. Ahead of the  Consumer Identity Summit  (Paris 22nd and 23rd November)  Laurent  Charreyron, Identity and Privacy expert at KuppingerCole, discusses the main issues that frame the debate around putting the consumer in control of their digital...

Read More

Quest Launches as an Independent Software Company Backed by Francisco Partners and Elliott Management

Francisco Partners, a leading technology-focused private equity firm, and Elliott Management Corporation today announced the completion of the Dell Software Group acquisition and the relaunch of Quest as a new standalone company. A globally recognized software brand with a nearly 30-year heritage, Quest will focus on expanding its IT and cloud management portfolio solutions to include SaaS solutions for the cloud era. Coupled with Quest’s systems and security management software expertise and market leadership, the company will continue to invest in developing the software...

Read More

Self-sovereign identity on the block – ideal or no deal?

There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so? Brexit  or not, the upcoming EU regulation  GDPR (General Data Protection Regulation)  will certainly affect every country in the world. With global online communication and transactions, there are no geographical or political borders. From  May 2018  onwards, this regulation requires every company and public authority doing business in...

Read More