Media Coverage

Track Moderator at KuppingerCole EIC Conference

Looking forward to an action packed KuppingerCole European Identity Conference, or EIC. Participating on the Analyst Panel “ Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM ”:  It will great to revisit this topic, which turns electronic identity management, and the way relationships are managed, on its head by looking at the customer point of view. (Flashbacks to parts of 2013 and 2014 working with a company called Respect Network on creating a “personal cloud network” with an underlying trust framework,...

Read More

Kuppinger Cole: Computer-Centric Identity Management

Yesterday, I enjoyed attending a webcast entitled, “ Computer-Centric Identity Management .” Led by  Ivan Nicolai , Lead Analyst at Kuppinger Cole, the presentation was subtitled, “From Identity Management to Identity Relationship Management.  The changing relationship between IAM, CRM and Cybersecurity.” I found the presentation to be concise, informative, and thought-provoking – particularly the concept that the IAM practitioner must transition from the role of “protector” to “enabler”. I think the following diagram...

Read More

IPv6 alone will not secure IoT, warns GE CISO

It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen Internet Protocol version 6  (IPv6)  alone will not make  internet of things  (IoT) communications secure, warns  Hanns Proenen , chief information security officer (CISO) at GE Europe. Although IPv6, also known as  Internet Protocol next generation  (IPng), is essential to IoT communications by enabling every device to have its own address on the internet,...

Read More

Empresas estão mal preparadas para adoção de seviços digitais

Apenas uma em cada cinco empresas está preparada para a transição para  serviços digitais , o que pode causar  problemas de segurança  na  gestão de identidade  e acesso. Isso é o que aponta pesquisa realizada pela KuppingerCole, encomendada pela Capgemini e pela RSA, Para o levantamento foram entrevistados 831 executivos do alto escalão de empresas dos Estados Unidos, Alemanha e França, de departamentos de vendas, marketing, RH, financeiro e - especialmente - TI. Ainda de acordo com o...

Read More

Big data analytics a useful security tool

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant. “A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the Business Application Research Center (Barc)....

Read More

How Identity Management CEOs Lead in a Security-First World

With all the mainstream media attention that cybersecurity breaches receive, you’d think that identity management  would be a mainstay on CNN, Forbes.com, or Business Insider. Maybe that’s a good thing. Why? If identity management (IDM) platforms were the scapegoat behind most breaches, their CEOs would be walking around with more bullseyes on their backs. But outside of enterprise IT, IDM simply isn’t well known. Seriously, ask even your more tech-savvy friends and family members what they know about IT security. And you’ll likely get responses that...

Read More

Presentadas nuevas tecnologías de control de accesos como resultado del Proyecto ACIO Access Control in Organizations

El proyecto, desarrollado por un consorcio de empresas y universidades españolas e israelíes, persigue el objetivo de la mejora y unificación del control de acceso de personas, vehículos y mercancías  en las organizaciones, tanto a nivel físico como lógico, desde la perspectiva de la usabilidad y la seguridad. Los resultados del proyecto ACIO han sido demostrados en una instalación portuaria pero son aplicables a cualquier organización o instalación en la que, por su actividad, el control de accesos constituya un...

Read More

Big data analytics a useful security tool, says analyst

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant. “A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the  Business Application Research Center...

Read More

Security collaboration key, says BFA-Bankia CISO

CISOs across all sectors need to work together to increase the security capabilities of their organisations and grow together, according to BFA-Bankia's CISO Maria González The business IT environment is changing significantly, which means IT security needs to change accordingly, says  Isabel María Gómez González , CISO for group Spanish banking group  BFA-Bankia . “The IT environment and the way people are working is changing every day. Consequently, the role of the CISO is changing with a new mission, vision and values,” she told...

Read More

D & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and variable authentication reports Danny Bradbury* The Bible story of Jacob wearing hairy kid-goat skins on his hands and neck to fool his blind father Isaac into believing that he was his more hirsute brother Esau is possibly the earliest recorded case of biometric ID theft - some 4,000 or more years ago. And as the tokens of our identity have grown more complex – from military insignia to passports and encryption keys, so...

Read More

Organisations still fail to understand IAM, says KuppingerCole analyst

IAM is seen as being part of IT and not business, and investments tend to be aimed at mitigating one-off incidents, says KuppingerCole analyst Matthias Reinwarth Many organisations are still failing to understand the role and benefits of  identity and access management (IAM) systems , according to  Matthias Reinwarth , senior analyst at KuppingerCole. “Many organisations still do not see IAM as a necessity for implementing security and policy or as an enabler of business models requiring customer or partner interaction,” Reinwarth told Computer Weekly....

Read More

Information rights management: an analyst’s view

Your digital assets are growing exponentially, and the need to access them, any time from any place, across various devices and platforms, has become a critical success factor. Information rights management is no longer a critical IT issue, it’s a critical business issue. To stay competitive, modern businesses must be increasingly connected to their employees, business partners, suppliers, current and future customers, and even smart devices (or things). Unsurprisingly, the demand for solutions that provide strongly protected storage, fine-grained access control and secure...

Read More

Forum Systems to Present at KuppingerCole's European Identity & Cloud Conference

CTO  Jason Macy  to Lead Workshop on Identity Federation and API Security BOSTON ,  April 19, 2016  /PRNewswire/ --Forum Systems Inc. today announced that CTO  Jason Macy  will be exploring best practices in identity federation and API security through a featured workshop session at KuppingerCole's 10 th  annual European Identity &  Cloud   Conference (EIC). Taking place  May 10-13  at the Dolce Ballhaus Forum Unterschleissheim in Munich, Germany , EIC 2016 is  Europe's  leading event for identity and...

Read More

Blockchain and Risk

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering.  This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications.  But what are the risks associated with the use of this technology? Distributed ledgers offer a range of potential benefits to both private sector organizations as well as government and public services.  They can be widely distributed and yet at the same time precisely controlled. They reduce...

Read More

Von der reaktiven Abwehr zum aktiven Schutz

Privilegierte Benutzerkonten stellen für jedes Unternehmen, aber auch jede Behörde eine erhebliche Sicherheitsgefahr dar. Das hat die jüngste Vergangenheit ganz klar gezeigt: ­Nahezu immer wurden bei Fällen von Daten­sabotage oder -diebstahl privilegierte Benutzerkonten als Einfallstor genutzt. Datenpannen, Datenmissbrauch, Datenlecks, Identitätsdiebstahl: Vorfälle dieser Art nehmen auf breiter Front zu, auch wenn sie nicht immer publik werden. Hohe öffentliche Aufmerksamkeit zog vor allem der Sony-Hack auf sich. Bei der Attacke auf den...

Read More

Tools and tips for successfully preventing data leakage

More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history After the breaking news this week about  one of the biggest IT security breaches in history with 11.5 million documents stolen  containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private. Many companies and...

Read More

Apenas uma em cinco empresas está preparada para gerenciar identidades com segurança

Uma pesquisa realizada pela Capgemini, um provedor de serviços de consultoria, tecnologia e terceirização, e RSA, divisão de segurança da EMC, revelou que, à medida que as organizações buscam capitalizar as oportunidades digitais por meio do rápido desenvolvimento e da hospedagem de novos serviços online, frequentemente investem pouco em medidas de segurança cibernética. Assim, criam grandes riscos, principalmente em relação ao acesso do usuário. "Identity Crisis: How to Balance...

Read More

UK and European firms invest in data protection ahead of GDPR

European firms are set to invest in data protection in 2016, with enforcement of the EU General Data Protection Regulation just two years away, Computer Weekly’s IT priorities survey shows Data loss prevention  (DLP) is to be the top  security  initiative by UK firms in 2016, according to the latest annual TechTarget/Computer Weekly IT Spending Priorities survey. This shows a shift away from identity and access management (IAM), which was the  top area of investment  for firms in the UK and Europe in 2015, to focus more directly on data protection.

Read More