Media Coverage

A one-size-fits-all blockchain just won’t do

With manifold use cases and specific requirements for blockchains, businesses will have to choose the right variety rather than deploy a single ‘interoperable’ blockchain There will certainly be some major developments for  blockchain technology in the coming years. The basic idea of tamper-proof, distributed data structures with time-stamped and replicable transactions stored in chained and  encrypted  blocks will undoubtedly stand the test of time. However, one blockchain alone will not solve every problem. The technology is also much more driven...

Read More

The Great Analyst Debate Over Consumer IAM

Analysts typically are pretty close in their opinions. They’re analyzing the same markets and pool of vendor solutions, so it stands to reason that they wouldn’t depart much from each other. So it can be entertaining when they disagree, except that as a practitioner, eventually you will have to make a decision on which one is right. It’s like trying to decide for Donald Trump or  Hillary Clinton  if you’re a US citizen. Remain in or leave the UK. Pasta or chicken on the international flight. The choices are tough, because the implications are so...

Read More

IT-Sicherheit ist wichtiges Ziel bei Digitalisierung

Die Digitalisierung ist in einem Großteil der europäischen Unternehmen angekommen – und damit auch neue Herausforderungen an die IT-Sicherheit. So hält laut einer Studie des Analystenhauses Pierre Audoin Consultants (PAC) in Zusammenarbeit mit KuppingerCole knapp die Hälfte der europaweit rund 200 befragten Chief Information Security Officers (CISOs) die Abwehr von Bedrohungen und Angriffen für eine besonders wichtige Grundvoraussetzung für die digitale Transformation. Die Benutzer- und Berechtigungsverwaltung wird in diesem Zusammenhang als...

Read More

BENUTZER- UND BERECHTIGUNGSVERWALTUNG IM DIGITALEN ZEITALTER

Die digitale Transformation erfasst derzeit ganz Europa – und das über die unterschiedlichsten Branchen hinweg. Die erhofften Mehrwerte: die Wettbewerbsfähigkeit verbessern, die Effizienz steigern oder eine größere Nähe zu Kunden und der Lieferkette herstellen. Damit eng verbunden ist aber auch das Bewusstsein der Unternehmen dafür, dass die IT-Sicherheit eine zentrale Rolle bei der digitalen Transformation spielen muss. Vor allem die  Frage, wie die exponentiell anwachsenden digitalen Identitäten künftig zuverlässig gesichert und...

Read More

SAST GRC-Suite wächst in den Niederlanden

Die akquinet AG weitet ihre Vertriebsaktivitäten in den Niederlanden aus und geht eine Vertriebs-Partnerschaft mit dem SAP-Beratungshaus Newitera ein.  Die 2011 gegründete Newitera B.V. bietet Implementierung und Hosting von SAP-Lösungen an sowie Infrastruktur-Leistungen, Prozessoptimierung und Change Management. Seit Kurzem vertreibt der SAP-Spezialist auch die SAST GRC Suite von akquinet. Hierdurch strebt Newitera an, sein Beratungsangebot für SAP Security auszubauen und in den Niederlanden bester Reselling-Partner für SAST-Software zu werden. Henny...

Read More

STIX, CybOX & TAXII

A friend of mine runs a small legal firm and he was the victim of a ransom-ware attack. He decided not to pay and it took him two days to get his server up and running again, and the best part of a week to recreate documents that had not been backed up. It caused him a lot of worry and embarrassment with his clients, and it cost him money to pay for staff over time. He doesn’t know definitively how it happened, he suspects a phishing attack on a user account with system level access. No it shouldn’t be that easy for hackers but unfortunately it is – in millions of...

Read More

De l’IAM à Blockchain pour faire face aux défis des objets connectés

La gestion des identités et des accès s’étend au-delà de son périmètre historique. Blockchain peut aussi apporter sa contribution. L’arrivée des objets connectés fait émerger de nombreux défis en matière de gestion des identités et des accès (IAM), mais également de confidentialité et d’intégrité des données. Pour Ivan Niccolai, directeur des opérations de KuppingerCole en Asie-Pacifique et analyste en chef, de nombreuses entreprises se...

Read More

Privilege Management: Nachhaltig & sicher administrieren

Die konsequente und weitreichende Umsetzung von Maßnahmen zum Privilege Management erfordert eine strategische Herangehensweise von technischer und organisatorischer Seite. In vielen Organisationen ist über die Jahre die Erkenntnis gewachsen, dass der Zugriff auf hoch privilegierte Konten innerhalb einer IT-Landschaft mit  hohen Risiken  verbunden ist. Gerade in Organisationen, die regulatorischen oder gesetzlichen Anforderungen unterworfen sind, zum Beispiel Unternehmen im Bereich der  Finanzdienstleistungen , helfen bei dieser Erkenntnis auch gerne mal...

Read More

Web Access Management e Identity Federation: sfida tra soluzioni e vendor

In questo studio realizzato da KuppingerCole sono riportati tutti i dati relativi ai prodotti dei principali vendor attivi negli ambiti Web Access Management e Identity Federation: ne esce un quadro molto puntuale di pregi e difetti delle diverse soluzioni presenti sul mercato KuppingerCole, società di ricerche di mercato indipendente, ha pubblicato nel mese di Marzo un’indagine sulle tecnologie di Web Access Management e Identity Federation dei principali vendor attivi in tali ambiti. In questo report è illustrato il panorama dei protagonisti dell’offerta,...

Read More

Atos manages security for dm-drogerie markt through Evidian solutions

Atos supports drugstore company dm-drogerie markt with comprehensive security solutions. dm-drogerie market uses the Evidian solution Enterprise Single Sign-On (E-SSO) for personalized authentication processes, which is user-friendly and enables secure login processes. Evidian's solutions are part of the Bull portfolio, the Atos brand for technology products and software. The contract will improve operational efficiency for up to 50,000 dm-employees at over 3,000 locations across Europe. It not only offers a strong authentication via RFID badge in combination with a password, but once...

Read More

Analyst KuppingerCole Executive View on Dell One Identity Manager v7

Traditional perimeter-based security, while still needed, is getting less important. Previously adequate strategies for implementing tools and processes for achieving governance and for providing evidence for compliance need to be adapted and extended to meet the above given new challenges. Many organizations and many vendors have understood that with the changing landscape as described above, the role of identity and its associated access is getting increasingly important. The simplistic, but nevertheless true statement that “identity is the new perimeter” illustrates the...

Read More

Atos manages security for dm-drogerie markt through Evidian solutions

Solutions for authentication and single sign-on facilitate registration in the back office of branches and increase security level  KuppingerCole awards dm for identity and access management (IAM) with the European Identity & Cloud Award 2016 Atos, an international leader in digital services, supports drugstore company dm-drogerie markt with comprehensive security solutions. dm-drogerie market uses the Evidian solution Enterprise Single Sign-On (E-SSO) for personalized authentication processes, which is user-friendly and enables secure login processes....

Read More

Enterprise IDaaS: Reflecting on the Gartner Magic Quadrant and KuppingerCole Leadership Compass

Silicon Valley has been buzzing over the past decade with the development of software for audiences outside of data centers. Applications are no longer solely purchased and administered by IT. Thousands of companies have popped up to develop software as a service (SaaS) and mobile apps that are used by everyone and often dedicated to a specific function within the organization. As a result, enterprises are undergoing a digital transformation. They want to move their apps and data to the cloud and give their employees the freedom to take advantage of this change: to safely go...

Read More

Human error causes more data loss than malicious attacks

Human error is the main cause of data breaches, according to statistics obtained from the UK’s Information Commissioner’s Office Figures obtained by Egress Software Technologies via a Freedom of Information (FOI) request found that human error accounted for almost two-thirds (62%) of the incidents reported to the ICO – far outstripping other causes, such as insecure webpages and hacking, standing at 9% combined. The most common type of beach occurred as a result of someone sending data to the wrong person. Data posted or faxed to the wrong recipient accounted...

Read More

Neue Identitäten für den Channel

Im Fokus der „European Identity & Cloud Conference (EIC) 2016“ standen Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC) und Cloud-Sicherheit. Wir haben uns umgesehen, welche Chancen sich dem Channel bieten. Themen wie Identity and Access Management (IAM) scheinen nur etwas für Experten zu sein, die Services sind auf Consulting und Implementierung ausgerichtet, das Geschäft machen wenige Spezialisten, die die notwendige Erfahrung und das erforderliche Personal haben. Doch der Markt ist groß und aussichtsreich, wie die...

Read More

KuppingerCole Rates Omada’s Identity Management and Access Governance Solution Favorably in Executive View

Omada , a market leader in identity management and access governance, is pleased to announce a favorable review from KuppingerCole, the analyst company focusing on information security and identity and access management in the recently published “ Executive View: Omada Identity Suite v11.1 .” According to the Executive View, KuppingerCole ”strongly recommends including Omada Identity Suite into evaluations for IAG offerings and for combined Identity Provisioning/Access Governance projects.” 1 “To successfully deliver solutions in the identity and...

Read More