Media Coverage

KuppingerCole recommande un système d’IAM unique pour gérer tous ses clients

Pour l'analyste Martin Kuppinger, l’utilisation d’un système de gestion des identités et des accès bimodal, intégré, est la meilleure solution pour gérer l’identité de ses clients. Le recours à un unique système constitue la meilleure façon d’appréhender la gestion des identités et des accès de ses clients (CIAM,  Consumer IAM ), selon Martin Kuppinger, analyste principal chez KuppingerCole : « je recommande l’utilisation d’un...

Read More

Four EU-Based IAM Vendors We’re Watching in 2017

If you’ve been following our site or InfoSec news in general, then you’re probably aware of the recent groundswell of interest in Identity and Access Management (IAM). It’s common knowledge that companies and governments around the world are seeing increased value in Identity and Access Management (IAM) Solutions, and Europe is no exception. In fact, 93% of European IT security leaders plan to maintain or increase spending on IAM in the next three years, according to a recent study from KuppingerCole. 42% of those polled claimed that they would increase their...

Read More

Blockchain: Risk and Reward

A blockchain is a data structure, originally used by Bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks and rewards associated with the use of this technology. Distributed ledgers offer a range of potential benefits to both private sector organisations as well as government and public services. They can be widely distributed and yet at the same time precisely controlled. They reduce...

Read More

Securing the vote

“ It is enough that the people know there was an election. The people who cast the votes decide nothing. The people who count the votes decide everything. ” – Joseph Stalin We recently had an election in the US – you may have heard about it. In the run-up to the election, and in its aftermath, candidates from all parties have raised the specter of the vote being hacked. Even long established technology magazine  Scientific American  asked: “Is the vulnerability of computerized voting systems to hacking a critical threat to our national...

Read More

New product nevisReports simplifies governance of security infrastructures

AdNovum further extends the NEVIS Security Suite. The new product nevisReports offers a comprehensive overview of security-relevant aspects by means of intuitive governance dashboards with role-specific reporting. It thereby enables fast recognition of anomalies and simple governance of the security infrastructure. At the security trade fair it-sa in Nuremberg, nevisReports will be presented for the first time. Additionally, AdNovum and the German resellers and technology partners introduce the ecosystem around the NEVIS Security Suite in Germany. The NEVIS Security Suite helps those...

Read More

Gigya Recognized by KuppingerCole as the Overall Leader in Consumer Identity and Access Management

Gigya announced that KuppingerCole, a global research firm specializing in security and data protection, has recognized Gigya as the Overall Leader in Consumer Identity and Access Management (CIAM) in a new Leadership Compass report on CIAM Platforms. The report examines 12 CIAM vendors and ranks them in four categories: Overall Leadership, Product Leadership, Market Leadership, and Innovation Leadership. Gigya is the only company named an Overall Leader, and is the only company to be named a Leader in all four categories. “Consumer Identity and Access Management...

Read More

Analyst Companies publish Survey about Big Data and Information Security

KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with BARC, a leading enterprise software industry analyst and consulting firm specializing in areas including Data Management and Business Intelligence – have conducted a joint survey on Big Data and Information Security.  The survey was focused on security-related aspects of Big Data analytics in cybersecurity and fraud detection and explains how Big Data...

Read More

Fünf Risiken bei Cloud-Anwendungen

Der Einsatz von Mobilgeräten und Cloud-Applikationen am Arbeitsplatz ist in den vergangenen Jahren zu einer alltäglichen Angelegenheit geworden. Die Zeit, als derartige Anwendungen eher etwas für Verbraucher waren, sind lange vorbei. Mit dem Einsatz sind jedoch auch Risiken verbunden. Unternehmen verdanken den Lösungen aus der Cloud eine zuvor unbekannte Flexibilität, neue Formen der Zusammenarbeit und damit verbunden erhebliche Produktivitätssteigerungen. Eine Arbeitswelt ohne die  Cloud  ist daher schlicht nicht mehr vorstellbar. Auch wenn...

Read More

Expertendiskussion IT-Security: Mit intelligenterer Abwehr zu mehr Sicherheit

Die rasanten Veränderungen in der Entwicklung der IT machen es für Anwender immer schwieriger, ein hinreichendes Security-Niveau zu halten. Wie sie den zunehmenden Anforderungen genügen können, das war Thema des Presse-Roundtables IT meets Press, das übrigens vor dem Angriff auf die Telekom-Router stattfand. Eines verdeutlichte die lebhafte Podiumsdiskussion: Sich gegen Attacken – auch und gerade im IoT – zu wehren, wird zunehmend anspruchsvoller, aber auch die Sicherheitslösungen werden intelligenter. Vor zahlreichen IT- und...

Read More

Gegen Hackerangriffe: Nur mehr Intelligenz bringt auch mehr Sicherheit

Die rasanten Veränderungen in der Entwicklung der IT machen es für Anwender immer schwieriger, ein hinreichendes Security-Niveau zu halten. Wie sie den zunehmenden Anforderungen genügen können, das war Thema des Presse-Roundtables „IT meets Press“, das noch vor dem Angriff auf die Telekom-Router stattfand. Eines verdeutlichte die lebhafte Podiumsdiskussion: Sich gegen Attacken – auch und gerade im IoT – zu wehren, wird zunehmend anspruchsvoller, aber auch die Sicherheitslösungen werden intelligenter. Vor zahlreichen IT- und...

Read More

IoT verlangt völlig neue Sicherheitssysteme

Angesichts immer raffinierterer und zunehmender Cyber-Angriffe müssen Unternehmen ihre Strategien in Bezug auf IT-Sicherheit überdenken. Neue Lösungen für Security Intelligence in Echtzeit sind gefragt. Das Internet of Things (IoT) und die Cloud verlangen eine Neudefinition von IT-Sicherheit, so der Tenor der Veranstaltung "IT meets Press", die Ende November in München zum Thema IT- Security  stattfand. Die Cloud als neue Standardinfrastruktur verschiebe Datenverarbeitung und Daten auf Infrastrukturen außerhalb der Unternehmensgrenzen sagte Matthias...

Read More

Training für mehr Sicherheit

Die rasanten Veränderungen in der Entwicklung der IT machen es für Anwender immer schwieriger, ein hinreichendes Security-Niveau zu halten – darin war sich eine Expertenrunde vor wenigen Tagen in München einig. Sich gegen Attacken – auch und gerade im IoT – zu wehren, werde zunehmend anspruchsvoller. Die gute Nachricht: Auch die Sicherheitslösungen werden intelligenter. Und es gibt neue Trainingsmöglichkeiten für Sicherheitsexperten. Vor zahlreichen IT- und Wirtschaftsjournalisten diskutierten Milad Aslaner von Microsoft; Tolga Erdogan...

Read More

Is the information security supplier market really consolidating?

Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger Looking at the recent acquisitions, mergers, spin-offs and investments by private equity companies, one could come to the conclusion that the  information security  supplier landscape is undergoing a process of  consolidation . This includes HP Enterprise’s spin-off of non-strategic assets into a  deal with Micro Focus ; a private equity firm acquiring Ping Identity and Ping then acquiring...

Read More

Gigya Recognized by KuppingerCole as the Overall Leader in Consumer Identity and Access Management

 Gigya, the leader in Customer Identity Management, announced today that KuppingerCole, a global research firm specializing in security and data protection, has recognized Gigya as the Overall Leader in Consumer Identity and Access Management (CIAM) in a new Leadership Compass report on CIAM Platforms. A free copy of the report is available for download -- no registration required -- at www.gigya.com/compass. The report examines 12 CIAM vendors and ranks them in four categories: Overall Leadership, Product Leadership, Market Leadership, and Innovation Leadership. Gigya is the...

Read More

Getting to Know Your Customer One Step at a Time: Progressive Identity

The means for creating a positive customer experience have changed substantially in the last five years, and they are likely to change more rapidly in the future. Let’s throw out those hackneyed ideas of product branding. Get rid of that “Mad Men” advertising concept from the last century. Those pitches were aimed at print readers and broadcast audiences. Companies seeking data might as well have been marketing by carrier pigeon. Analytics – and any revisions growing out of that data – had to wait months for sales results before assessing and refining an...

Read More

HERAUSFORDERUNGEN IM ZEITALTER VON CLOUD UND IOT

Die Entwicklung der IT ändert sich rasant, für Anwender wird es schwieriger, ein hinreichendes Security-Niveau zu halten. Den zunehmenden Anforderungen gerecht zu werden, war Thema des Presse-Roundtables IT meets Press, das übrigens vor dem Angriff auf die Telekom-Router stattfand. Eines verdeutlichte die lebhafte Podiumsdiskussion: Sich gegen Attacken – auch und gerade im IoT – zu wehren, wird zunehmend anspruchsvoller, aber auch die Sicherheitslösungen werden intelligenter. Noch nie waren Angriffe leichter “Einen erfolgreichen Angriff zu...

Read More

Ping Identity Tops Product Leadership Category in KuppingerCole Leadership Compass for Customer Identity and Access Management

Ping Identity®, the leader in Identity Defined Security, is driving the market for Customer Identity and Access Management (CIAM) with new products, customer success, and accolades from industry analysts. The company was highlighted as a product leader in the Leadership Compass for CIAM Platforms by KuppingerCole, a leading global analyst company headquartered in Europe that focuses on Information Security and Identity and Access Management (IAM). The comprehensive report is  available for download  on the Ping Identity website. KuppingerCole’s Leadership...

Read More

Mit Big Data heutigen Sicherheitsbedrohungen begegnen

Neue Generationen von Security Analytics-Lösungen sind heute in der Lage, große Mengen an Sicherheitsdaten im Unternehmen in Echtzeit zu erfassen, zu speichern und zu analysieren. Sie werden mit ähnlichem Mechanismen verarbeitet, wie sie auch in anderen Bereichen der Big Data Analyse verwendet werden. Das Konzept eines Unternehmens-Sicherheits-Perimeters ist aufgrund der zunehmenden Nutzung von Cloud- und mobilen Diensten weitgehend verschwunden. Auch die Informationssicherheit durchläuft deshalb einen tiefgreifenden Paradigmenwechsel. Traditioneller...

Read More

IT-Security: Nur mehr Intelligenz bringt auch mehr Sicherheit

Die rasanten Veränderungen in der Entwicklung der IT machen es für Anwender immer schwieriger, ein hinreichendes Security-Niveau zu halten. Wie sie den zunehmenden Anforderungen genügen können, das war Thema des Presse-Roundtables IT meets Press, das übrigens vor dem Angriff auf die Telekom-Router stattfand. Eines verdeutlichte die lebhafte Podiumsdiskussion: Sich gegen Attacken – auch und gerade im IoT – zu wehren, wird zunehmend anspruchsvoller, aber auch die Sicherheitslösungen werden intelligenter. Vor zahlreichen IT- und...

Read More

Mit Big Data die eGovernment-Angebote schützen

In der gemeinsam durchgeführten Studie „Big Data und Informationssicherheit“ gehen KuppingerCole Ltd. und das Business Application Research Center (BARC) dem Einsatz von Big Data Anlytics im Kontext von Netzsicherheit und Betrugserkennung auf den Grund. Die Ergebnisse sind auch für Verwaltungen relevant. Die Studie, für die mehr als 330 Personen aus über 50 Länden und unterschiedlichsten Branchen befragt wurden, zeigt, wie Unternehmen und Organisationen Big-Data-Technologien zur Steigerung ihrer Widerstandsfähigkeit gegen Cyber-Angriffe...

Read More

Is the information security supplier market really consolidating?

Mergers and acquisitions continue at pace in the information security market, but these are not necessarily signs of consolidation, writes Martin Kuppinger Looking at the recent acquisitions, mergers, spin-offs and investments by private equity companies, one could come to the conclusion that the  information security  supplier landscape is undergoing a process of  consolidation . This includes HP Enterprise’s spin-off of non-strategic assets into a  deal with Micro Focus ; a private equity firm acquiring Ping Identity and Ping then acquiring UnboundID; the...

Read More

Customer data integration a market opportunity, says CXP Group consultant

Technology and service providers should focus on customer data integration to help businesses improve customer satisfaction, says CXP Group consultant Nicole Dufft Few European organisations have all the data relating to customer experience and satisfaction in a single IT system, presenting a market opportunity for suppliers, according to a digital enterprise consultant. Research by advisory firm  CXP Group  shows that at least eight different business departments within companies affect customers’ experience and satisfaction. All these departments are important...

Read More

Gigya is consumer identify leader, finds KuppingerCole

Gigya, Ping Identity, Salesforce, ForgeRock are the current leaders in the consumer identity and access management market, according to a report by KuppingerCole Gigya  is the current overall leader among the top suppliers of consumer identity and access management (Ciam) systems, according to a report by analyst firm KuppingerCole. The  Ciam Leadership Compass report  is based on surveys of 12 suppliers “that have the most to offer at this time” and interviews with active customers to evaluate products on a range of criteria under user experience,...

Read More

A single, integrated consumer ID system is best, says Martin Kuppinger

A bi-modal, integrated IAM system will help avoid the pitfalls associated with other approaches to consumer identity, according to Martin Kuppinger A single system is the best way to approach consumer identity and access management (Ciam), according to  Martin Kuppinger , principal analyst at KuppingerCole. “One Ciam that is owned by the business but operated by IT as a service with tight integration to employee IAM [ identity and access management ] is my recommendation,” he told the  Consumer Identity Summit  in Paris.

Read More

Europas neue Datenschutzrichtlinie EU-DSGVO – Herausforderung und Chance

CIAM-Lösung (Customer Identity and Access Management) von Gigya unterstützt Umsetzung der EU-DSGVO Die neue EU-Datenschutz-Grundverordnung (EU-DSGVO), die ab Mai 2018 in Kraft tritt, sichert EU-Bürgern deutlich mehr Kontrolle über ihre persönlichen Daten zu – egal, wo und wie diese verarbeitet werden. So muss immer ihre Zustimmung zur Datennutzung eingeholt werden und sie erhalten unter anderem das Recht, Informationen leichter wieder löschen zu lassen („Recht auf Vergessenwerden“), die Verarbeitung der Daten einzuschränken...

Read More

High-assurance identity top priority for government and finance

The UK government and financial sector is working together to meet the need for high-assurance identity globally Creating persistent identities that are validated to the right trust levels is key for online banking, insurance and legal services, according to Sandy Porter, co-founder of identity assurance firm  Avoco Secure . “This is about providing the right level of assurance, to the right service at the right time,” he told the  Consumer Identity Summit  in Paris. According to Porter, it currently take around 28 days to “onboard” a...

Read More

Customer identity evolves over time, says Gigya

Customer identity evolves through a series of interactions to enable richer data for improved marketing and customer experiences, says Gigya co-founder Rooly Eliezerov Organisations should understand that getting to know the customer is building identity progressively, according to Rooly Eliezerov, co-founder of customer identity firm  Gigya . “Customer identity develops through iteration, constantly evolving from first contact through each interaction,” he told the  Consumer Identity Summit  in Paris. Once a customer visits a website and a user record...

Read More

Consumer identity key to digital transformation

Customer identity and access management has benefits for consumers and service providers alike, but is key to digital transformation, says KuppingerCole Consumer or customer identity and access management (Ciam) is necessary because “cookies can only get you so far”, according to John Tolbert, senior analyst at KuppingerCole. “[Organisations need to do more because] customers expect a consistent experience across all channels and all sorts of difference devices,” he told the inaugural  Consumer Identity Summit  in Paris This means organisations...

Read More

Analyst Companies publish Survey about Big Data and Information Security

KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with BARC, an enterprise software industry analyst and consulting firm specializing in areas including Data Management and Business Intelligence – have conducted a joint survey on Big Data and Information Security. The survey was focused on security-related aspects of Big Data analytics in cybersecurity and fraud detection and explains how Big Data...

Read More

Digital transformation not a finite process, says Martin Kuppinger

Security, privacy and identity are key to digital transformation, which is an evolutionary process, according to Martin Kuppinger Digital transformation is not a process that will see the world move from one state to another and then be over with, according to  Martin Kuppinger , principal analyst at  KuppingerCole . “Every industry is likely to undergo  digital transformation , but it is a continuous process of evolution to doing things differently in a digital era,” he told the  Eema   ISSE 2016  security conference in Paris....

Read More

Die Sicherheit beginnt beim Endgerät – Schützen Sie Ihr Unternehmen vor Cyber-Angriffen

Cyber-Kriminalität ist heute so brisant wie nie zuvor, was die IT-Sicherheit in den Fokus der Geschäftsführung rückt. Die Bedrohung durch Hackerangriffe nimmt stetig zu. Cyber-Kriminalität ist zu einem „Big Business“ geworden, in dem es oft um hohe Summen geht. Dadurch wird jedes Unternehmen zum Angriffsziel – nicht nur große Firmen. Auch kleine und mittelständische Unternehmen müssen sich vor Cyberangriffen optimal schützen. 51 % aller deutschen Unternehmen waren bereits Opfer von Cyber-Attacken. Die Angriffe sind aus...

Read More

Identity for online gambling industry a potential market opportunity

Identity for online gambling presents a potential market opportunity, because no suppliers are meeting the industry's consumer identify requirements The iGaming, or online gambling, industry is struggling to meet business and regulatory demands because there are no tailor-made software applications to manage customer identity. “The iGaming industry is having a tough time,” Martijn Postma, a freelance consultant on  identity and access management  (IAM) told Computer Weekly. On the one hand, there are the business demands to know as much about the customer as...

Read More

Web App Attacks: Another Reason Passwords Still Aren't Enough

Just as the personal computer eventually replaced the mainframe, web applications are becoming the norm over local software applications. With obvious benefits, like easier support and being agnostic to operating systems, web apps are only going to become more prevalent. Look at this year's "hottest jobs" from Inc. 1 , Business Insider 2  and others, and you'll consistently see "app developer" ranked high on the list. Web apps are everywhere, and technology isn't slowing down. It makes for an exciting, if not unpredictable, future. But not all is rosy. Web apps are also a...

Read More

5 Alternatives to The Gartner Magic Quadrants for IAM

Gartner is one of the loudest voices in enterprise technology— they’re world’s largest information technology research and advisory company, and generally the first source consulted when it comes to evaluating enterprise IT solutions, and enterprise Identity Management is no exception. But while the Gartner’s flagship Magic Quadrants for  IGA  and  IDaaS  are great resources for finding out who the top enterprise Identity Management contenders are, they don’t give a particularly in-depth analysis behind what each solution offers or...

Read More

Why Blockchain and Digital Transformation Go Hand in Hand

You’ve heard the term, but what on earth does it mean? Let’s start with the basics. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers. It uses cryptography to allow each participant on the network to manipulate the ledger in a secure way without the need for a central, often fee-charging authority. Bitcoin and the mechanics of blockchain   If you are familiar with blockchain technology, it may be because of  Bitcoin , the first app built using the platform...

Read More

Why Blockchain and Digital Transformation Go Hand in Hand

You’ve heard the term, but what on earth does it mean? Let’s start with the basics. A blockchain is a data structure that makes it possible to create a digital ledger of transactions and share it among a distributed network of computers. It uses cryptography to allow each participant on the network to manipulate the ledger in a secure way without the need for a central, often fee-charging authority. Bitcoin and the Mechanics of Blockchain   If you are familiar with blockchain technology, it may be because of  Bitcoin , the first app built using the...

Read More

How the Grinch Steals Credentials

As retailers clear out their remaining Halloween merchandise, we're reminded that the holidays are just around the corner. Some over-achievers may have already started shopping, but the rest of us will wait until our turkey dinners have digested before plunging into the Black Friday madness that kicks off the official holiday shopping season. Not to put a damper on the festivities, but those bargain-grabbing shopping days are also the prime season for cybercriminals. Remember the infamous Target mega-breach that happened in December 2013? It's estimated to have cost Target more than...

Read More

IAM ist mehr als Provisioning und Access Governance

Identity und Access Management (IAM), und vielleicht noch mehr Identity Management, sind Begriffe, die für sehr unterschiedliche Technologien verwendet werden – oft in zu enger Auslegung, manchmal aber auch in sehr großzügiger Auslegung der Begrifflichkeit. Wer ein erfolgreiches IAM-Programm umsetzen möchte, sollte sich von Beginn an damit auseinandersetzen. Nur wenn man sich von Beginn eines IAM-Projekts an klarmacht, was dazu gehört, was nicht und mit welchen weiteren Themen IAM verbunden ist, kann man die richtigen Prioritäten setzen. Es gilt eine...

Read More

Quest Launches as an Independent Software Company Backed by Francisco Partners and Elliott Management

Francisco Partners, a leading technology-focused private equity firm, and Elliott Management Corporation today announced the completion of the Dell Software Group acquisition and the relaunch of Quest as a new standalone company. A globally recognized software brand with a nearly 30-year heritage, Quest will focus on expanding its IT and cloud management portfolio solutions to include SaaS solutions for the cloud era. Coupled with Quest’s systems and security management software expertise and market leadership, the company will continue to invest in developing the software...

Read More

DO AD-BLOCKERS SIGNIFY A NEW FORM OF CONSUMER DYNAMICS?

Customer identities are the result of the ongoing consolidation of data from various sources, including initial registration information, payment data, search requests, purchase history or help-desk interaction. Consumers use various devices to access required services and they use different accounts in different contexts. Ahead of the  Consumer Identity Summit  (Paris 22nd and 23rd November)  Laurent  Charreyron, Identity and Privacy expert at KuppingerCole, discusses the main issues that frame the debate around putting the consumer in control of their digital...

Read More

Self-sovereign identity on the block – ideal or no deal?

There’s a rumour out there in the IT and business world that blockchains could be the magic elixir when it comes to users’ full control and power over their own digital identities. But is that really so? Brexit  or not, the upcoming EU regulation  GDPR (General Data Protection Regulation)  will certainly affect every country in the world. With global online communication and transactions, there are no geographical or political borders. From  May 2018  onwards, this regulation requires every company and public authority doing business in...

Read More

Internet of Things: Diese Management-Methode müssen Unternehmen beherrschen

Oft sind Firmen gar nicht in der Lage, sämtliche Zugriffe auf ihre IT-Ressourcen zu kontrollieren und zu dokumentieren. Identity & Access Management (IAM) stellt sich dieser Herausforderung. Wie lange dauert es, bis ein neuer Mitarbeiter an seinem Arbeitsplatz alle benötigten Geräte und Anwendungen nutzen kann? Wie viele Geschäftschancen bleiben ungenutzt, weil die dafür benötigten IT-Ressourcen nicht oder verspätet bereitgestellt werden? Und was passiert, wenn in den Stunden nach einem E-Mail-Versand mit Sonderangeboten plötzlich...

Read More

Dell Survey: You’re (Probably) Not Prepared for the GDPR

 Dell dropped a bombshell on the digital business community (read:  the business community ). The news came in the form of a  press release  and  report  detailing the results of a new survey commissioned by Dell to assess organizations’ preparedness for the European General Data Protection Regulation (GDPR), set to take effect in May 2018. 821 qualified professionals responded to the survey — the majority IT executives and managers — and their answers were, to say the least, cause for alarm. The GDPR is broad-based, comprehensive and has...

Read More

In the digital era, customer identity is key

Identity is vital for presenting a consistent customer relationship across digital channels, but not everyone in all organisations understands this shift, according to identity veteran Ian Glazer Identity is key to providing the context for business processes when enterprises engage with customers and partners through digital channels, according to an identity industry veteran. “Identity is also important for recognising customers, acknowledging the relationship with them, and making that consistent across all channels,” said  Ian Glazer , editor of the  Kantara...

Read More

Blog, Pressearbeit und Selbst-PR: Wie Sie das Jahr 2017 für sich nutzen können

Selbst-PR lebt von interessanten und relevanten Gesprächsthemen: Wer seinen PR-, Content- und Marketingplan auf nützliche Informationen und gezielte Angebote zu saisonalen Themen, Messen und Veranstaltungen abstimmt, findet mehr Aufmerksamkeit. Eine Übersicht über die Daten, die Sie in Ihren Kalender eintragen sollten sowie Quellen für Termine aller Art für 2017 finden Sie hier. Relevanz und Nützlichkeit machen Ihre Informationen sexy – egal, ob Sie Ihre Kunden im eMail-Newsletter informieren, die Medien mit Presseinformationen oder Ihre Fans...

Read More

Quick Reference Guide: It’s Time to Stop Talking about Passwords

Secure your enterprise and satisfy your users with modern authentication Whether you get your information from Deloitte, Gartner, KuppingerCole or dozens of other reputable sources, they’re all saying the same thing: passwords just don’t cut it any more. And they’re putting your enterprise at risk. Yet, so many enterprises still rely on this outdated approach, claiming its user friendly. That may have been true when all you had to remember was the PIN to your ATM card and combination of your gym locker, but those days are long gone. Passwords alone are...

Read More

Many firms failing on crucial customer experience in digital era

Only through collaboration between all customer-facing parts of a business can it deliver the customer experience that is crucial to survival in the digital era, according to CXP Group consultant Nicole Dufft Many companies are failing to deliver a good customer experience, which is crucial now that it is possible to change brands easily and complain on social media, according to a strategy consultant. “Although 90% of businesses polled see customer experience as important, the majority do not have someone to oversee and integrate all the customer interactions or...

Read More

Balabit und Lieberman Software kündigen integrierte Sicherheitslösung aus einer Hand an

Balabit und Lieberman Software Corporation haben eine weltweite strategische Allianz in den Bereichen Vertrieb und Marketing geschlossen. Im Rahmen der Zusammenarbeit bieten Balabit und seine Partner eine integrierte Plattform für das Privileged Access Management an. Ein Bestandteil ist die Shell Control Box, Balabits  Lösung  für das Privileged Activity Monitoring (PAM). Hinzu kommt der Enterprise Random Password Manager (ERPM) von Lieberman Software, eine Lösung für das Privileged Identity Management (PIM). Balabit stellt für die Plattform...

Read More

Les données personnelles, au cœur de la stratégie client

Les historiens et les sociologues des temps futurs se pencheront sans doute avec curiosité sur ce phénomène : la généralisation des adblockers sera peut-être vue comme le premier mouvement social d’envergure dans le monde virtuel. Ce boycott du retargeting, du profiling et de la publicité en ligne est-il annonciateur d’une nouvelle forme de revendication sociale dans le monde virtuel, débouchant sur une relation plus équilibrée entre les plateformes, les marques et les utilisateurs ? En attendant, les...

Read More

GDPR: The Y2K of Digital Marketing?

Remember the great Y2K scare of the late 1990s? Civilization was going to grind to a halt at 12:01 a.m. on January 1, 2000, as computers programmed to only recognize a two-digit year reset themselves to 1900 and crashed. Otherwise rational people were hoarding freeze-dried food and making plans to hide in the woods on New Year’s Eve 1999. The European Union’s General Data Protection Regulation (GDPR), due to take full effect in May 2018, could be the digital marketing equivalent of Y2K – in a good way. The GDPR applies to all companies that do business in Europe,...

Read More

22 & 23 November: Consumer Identity Summit in Paris

For the first time the Consumer Identity Summit 2016 will take place from 22nd to 23rd November 2016 at the Palais Brongniart in Paris, France. The event is one of the first collaborative events between CXP Group and KuppingerCole Ltd. Bringing together Marketing, Business and Security colleagues to realise the digital transformation was the main motivation of the two companies to realize the event. The linking of secure Identity & Access Management with Customer Relationship Management continues to be a core element for any digital business, not least because the CRM system...

Read More

Der steinige Weg zu sicheren und Nutzer-souveränen Online-Identitäten

Die Verfügbarkeit vertrauenswürdiger und Nutzer-kontrollierter Identitätsinformationen wird immer wichtiger. Neue Anforderungen für den Datenschutz und für die Absicherung von Online-Transaktionen werden hierzu in naher Zukunft erheblich beitragen. Beginnen wir mit einer einfachen Frage: Welche Organisation hat heute die notwendigen Informationen, um zu entscheiden, dass die Online-Identität, die sich gerade für die Nutzung eines Dienstes anmeldet, tatsächlich Sie sind? Oder genauer: Wem vertrauen Sie heute im Internet so weit, dass Sie...

Read More

Cognitive Security

US (and some European) newspapers recently carried headlines such as this one from the New York Daily News – “Facebook, Twitter and Instagram allowed over 500 law enforcement agencies to monitor users at protests nationwide”. Like many a mainstream newspaper headlines this one is rather misleading. The social networking sites didn’t “allow” any law enforcement agencies to do anything. Rather, either through normal reading of tweetstreams and the like, or through the use of APIs available to any developers, a company called Geofeedia, monitored social...

Read More

Businesses must address digital transformation security risks, says analyst

The security elements of business IT, the internet of things and operational technology are now all deeply interconnected, claims Martin Kuppinger Businesses need to recognise that the process of  digital transformation  will affect all of their major areas, creating new security problems as once separate systems are connected in new ways, said  Martin Kuppinger , principal analyst at  KuppingerCole . “Just about everything companies do in terms of digital transformation means that all these new information security risks are effectively business...

Read More

Stark, stärker, Blockchain?

Im digitalen Kundenkontakt müssen Unternehmen und Behörden für Datenschutz und eine vertrauensvolle Interaktion sorgen. Eignen sich Blockchain-basierte Verfahren, um Nutzern die volle Hoheit und Kontrolle über die von ihnen eingegebenen Daten und Informationen zu geben? Kurz vor Inkrafttreten der neuen  EU-Richtlinie GDPR  (General Data Protection Regulation) im Mai 2018 machen sich Anbieter von Online-Produkten und Services vermehrt Gedanken darüber, wie sie mit sensitiven Daten umgehen. Die Richtlinie liefert den rechtlichen Rahmen für die...

Read More

Cloud Sicherheit: CensorNet ist laut KuppingerCole Leadership Compass ein CASB Produktführer

  CensorNet , führender Anbieter umfassender Lösungen für die Cloud-Sicherheit, ist laut dem 2016 Leadership Compass: Cloud Access Security Brokers (CASB) von KuppingerCole ein Produktführer in diesem Markt (https://www.kuppingercole.com/report/lc71138). Bei dem Bericht handelt es sich um die erste globale Wettbewerbsanalyse von CASB-Lösungen überhaupt. Er will Unternehmen bei der Auswahl von Anbietern und Produkten unterstützen, wenn sie sich auf dem CASB-Markt nach einer für sie geeigneten Lösung umschauen. Bedingt durch die hohe...

Read More

New Research Reveals Significant Anxiety about Cloud Security, Yet Persistent Data Protection Gaps Remain

CipherCloud , a leader in cloud security and governance, and Osterman Research today released a  new report  that shows businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners outsource responsibility for data protection, even though they still bear full legal liability if there is a breach. The survey also revealed that encryption is not well understood, with misconceptions about where encryption takes place, who manages the keys, and which parties can decrypt...

Read More

Balabit and Lieberman Software Announce Joint Sales & Marketing Initiative to Deliver Best-of-Breed Privileged Access Management

Balabit and Lieberman Software Corporation have announced a strategic global sales and marketing alliance, where Balabit and its respective partner network will proactively sell a comprehensive Privileged Access Management Platform comprising an out-of-the-box integration between Balabit's Shell Control Box Privileged Activity Monitoring (PAM) solution and Lieberman Software's Privileged Identity Management (PIM) solution, Enterprise Random Password Manager (ERPM). Balabit also offers global support services for the joint solution. The joint Balabit/Lieberman solution addresses the...

Read More

The benefits of digital business process management with blockchain technology

Distributed and decentralised ledger technologies, smart contracts and the internet of things have the potential to disrupt and revolutionise business process management and optimisation Business process management  (BPM) and business process optimisation (BPO) are the two longest-standing and most efficient ways of managing processes with a focus on continual effective monitoring and improvement. The emergence of distributed and decentralised ledger technologies  with smart contracts  and the  internet of things  (IoT) can be instrumental in disrupting...

Read More

6 Ways To Prepare For The EU’s GDPR

In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Here's how to prepare for them. In less than 20 months, all companies handling personal data belonging to residents of the European Union will be expected to comply with a new set of privacy requirements under the EU General Data Protection Regulation (GDPR). The GDPR introduces tough new privacy requirements for companies handling EU data and vests consumers with significantly greater control and rights over the manner in which their data is collected, shared, retained,...

Read More

Comparing Access Management & Federation Solutions With KuppingerCole’s Leadership Compass

International Analyst firm KuppingerCole has released the latest iteration of its  Leadership Compass report  for Access Management and Federation. In the 2016 Leadership Compass for Access Management and Federation, KuppingerCole Founder and Principal analyst Martin Kuppinger evaluates the strengths and weaknesses of 17 vendors that he considers most significant in the Access Management market and provides readers with graphs separating the vendors into followers, challengers, and leaders. Kuppinger compares vendors across four graphed categories: Overall Leaders, Product...

Read More

CipherCloud Announces Next-Generation Cloud Data Protection Platform

Active Encryption Extended Across HR, CRM, IT Service Management, Marketing and Analytics Clouds SAN JOSE, Calif. ,  Sept. 28, 2016  /PRNewswire/ --   CipherCloud , a leader in cloud security and governance, today announced the availability of its next-generation data protection solution, extending its industry-leading Cloud Access Security Broker (CASB) platform. With extensible connectors to virtually any cloud application, the CipherCloud platform provides a common security layer for advanced encryption, key management and policy enforcement across multiple clouds,...

Read More

CipherCloud Announces Next-Generation Cloud Data Protection Platform

Active Encryption Extended Across HR, CRM, IT Service Management, Marketing and Analytics Clouds SAN JOSE, Calif. ,  Sept. 28, 2016  /PRNewswire/ --   CipherCloud , a leader in cloud security and governance, today announced the availability of its next-generation data protection solution, extending its industry-leading Cloud Access Security Broker (CASB) platform. With extensible connectors to virtually any cloud application, the CipherCloud platform provides a common security layer for advanced encryption, key management and policy enforcement across multiple clouds,...

Read More

FinTech innovation should make security a lifestyle decision

FinTech and Financial Service institutions talk a lot about consumer orientation. But if you look at their actual behavior they mainly approach this with an internal perspective and with a focus on innovation in the enterprise, industry or branch. They look what they did before and what they could do better within their existing organization.  The most common innovation is to build mobile applications for their sales channel. Without any doubt, this is important for continuous improvement of financial services! But is this disruptive (“blue ocean”) and really customer...

Read More

Tame the Dangerous Combination of Mobile and Cloud With EMM and a CASB

The combination of mobile and cloud may be the most dangerous threat to your enterprise security. While many security analysts focus on either mobile or cloud security, few think about them in tandem. Fewer still consider how to leverage enterprise mobility management (EMM) solutions and a cloud access security broker (CASB) at the same time. I’ve spent a great deal of time writing and talking about mobile security and the importance of developing a strategy that goes beyond the device. I developed an e-guide, “ Mobilephobia: Curing the CISO’s Most Common Mobile...

Read More

Forum Systems revolutioniert sichere Federated Identity

Boston (ots/PRNewswire)  -  Die neueste Version von Forum Sentry verfügt über Identitätsverarbeitung   der nächsten Generation und bietet Multikontext-Authentifizierung Die umfassende "Federation-in-a Box" Lösung ist ein skalierbarer,   codefreier, agentenloser Ansatz bei SSO Forum Systems Inc. ( http://www.forumsys.com/ ) gab heute die Verfügbarkeit des Forum Sentry API Gateway mit der ersten Multikontext-Authentifizierungsfunktion der Branche bekannt, die Unternehmen und Regierungsorganisationen einfache, sichere Identity...

Read More

Data Security in Financial Services: It’s Likely Not What You Think

With so much confidential information in their keeping, you’d think that banks and other financial institutions would have stellar  financial data security  in place. But new research has shown quite the opposite to be true. In the Financial Services breach  report  from Bitglass, data leaks nearly doubled between 2014 and 2015, and the same trend is being seen in 2016. Last year 87 breaches were reported in the  financial services sector  up from 45 in 2014. In the first half of 2016, 37 banks reported breaches. In other research, only one of...

Read More

CA Technologies accelerates development of secure APIs

CA Technologies has added new capabilities to its API management portfolio to speed development and change the way applications are envisioned and brought to reality. “CA Technologies is helping customers transform how the applications which drive today’s economy are built,” said Vic Mankotia, vice president, security and API management, CA Technologies. “The new releases in CA’s API Management portfolio help accelerate time-to-market for new apps and services by giving API and mobile developers important tools that make their jobs...

Read More

CA mejora sus soluciones de gestión de accesos privilegiados para reducir el riesgo de brechas en servidores y redes

CA Technologies ha dado a conocer mejoras significativas en su cartera de soluciones de gestión de accesos privilegiados, que permiten controlar las cuentas privilegiadas en entornos TI híbridos, objetivos frecuentes de los ciberataques, y proteger así la información y los sistemas más sensibles de una organización . Al actualizar e integrar  CA Privileged Access Manager, antes denominado Xceedium Xsuite, y  CA Privileged Access Manager Server Control,  CA Technologies ayuda a reducir el riesgo de las brechas de datos, ampliando...

Read More

Enterprise Business’ Need API Security Management

Traditionally enterprise class API management has focused on the analytics, monitoring, and lifecycle of their API’s. Creating a well-planned strategy and reliable infrastructure in exposing enterprise services such as APIs is impossible without also addressing the security challenges related to exposing these services. The best monitoring and design solution will be of little benefit if the enforcement component is insecure and can be compromised. Recognized by  KuppingerCole  as the Only API Management Vendor “with a Primary Focus on Security” and an...

Read More

Forum Systems revolutioniert sichere Federated Identity

Die neueste Version von Forum Sentry verfügt über Identitätsverarbeitung   der nächsten Generation und bietet Multikontext-Authentifizierung Die umfassende "Federation-in-a Box" Lösung ist ein skalierbarer,   codefreier, agentenloser Ansatz bei SSO Forum Systems Inc. ( http://www.forumsys.com/ ) gab heute die Verfügbarkeit des Forum Sentry API Gateway mit der ersten Multikontext-Authentifizierungsfunktion der Branche bekannt, die Unternehmen und Regierungsorganisationen einfache, sichere Identity Federation (...

Read More

KYC: a financial services business enabler

In the financial services arena, know your customer (KYC) is set to emerge as a key strategic element of organisations’ business models Digital business transformation  is here now and it will change how businesses compete for many years to come. In the financial services area,  know your customer  (KYC) will emerge as a key strategic element of organisations’ business models and will be a key component and enabler of the digital transformation process. Financial services institutions (FSIs) are facing an ever more demanding regulatory environment, a...

Read More

Passwörter: Der Umgang mit Untoten

Sicherere Identifizierung von Anwendern im Unternehmen und im Internet ist auf dem Vormarsch. Parallel verharrt aber eine Vielzahl von existierenden und neu entstehenden Diensten auf dem unzureichenden Sicherheitsniveau eines Logins mit Passwörtern. Befragt man ausgewiesene Experten im Bereich Identity und Access Management (IAM) zum Thema klassische Authentifizierung mit Benutzernamen und Passwörter, so bekommt man schnell klare Aussagen. Dieses System wird weitestgehend als unzureichend und konzeptionell fehlerhaft betrachtet. Vergleiche von Passwörtern...

Read More

Top 10 Resources for Evaluating Identity Management Solutions

Identity management is a fundamental part of organizational information security, yet too many businesses still rely on username and password combinations, the simplest, oldest form of authentication, to do the job. But times are changing, and as traditional methods prove dangerously insecure many organizations are looking to modernize their Identity and access management (IAM) solutions and practices. In order to do that, IT workers, CIOs, and CISOs need to conduct extensive research to correctly plan, assess, and deploy the right solution for their organization. So where should...

Read More

Am Ende bleibt das Passwort

Schon oft wurden Passwörter in der IT-Welt für risikoreich und tot erklärt. Doch obwohl das erste Merkmal zutrifft, werden sie vermutlich alles andere überleben. Ansätze für sicherere Alternativen gibt es längst. Sie sind aber entweder technisch anspruchsvoller zu realisieren oder sie beanspruchen mehr Zeit als die Eingabe von Passwörtern und stoßen von daher auf weniger Akzeptanz bei den Anwendern. Mehr Sicherheit als Passwörter allein bietet Multi-Faktor-Authentifizierung. Hierbei finden mindesten zwei der drei allgemein gängigen...

Read More

So schützen Provider die Cloud-Identitäten

Cloud-Provider wie Microsoft, IBM, Google, AWS, T-Systems und SAP haben eigene Lösungen für den Schutz der Identitäten in der Cloud. Wir geben einen Überblick. Die lange Ausstellerliste bei Veranstaltungen wie der  European Identity & Cloud Conference 2016  macht deutlich, wie viele Anbieter und Lösungen es für das  Identity and Access Management (IAM) in der (hybriden) Cloud  gibt. Viele dieser Lösungen besitzen bereits standardmäßig Schnittstellen für die Anbindung an die großen  Cloud...

Read More

Modernes Access Management statt Checkliste

Angemessene, intelligente Prozesse für die Überwachung und Entfernung erteilter Berechtigungen können aufwändige Rezertifizierungs-Kampagnen vermeiden helfen. Mit der grundlegenden Ausrichtung an rechtlichen Anforderungen und der immer wichtiger werdenden Erfüllung  regulatorische Anforderungen  in vielen Branchen haben neue Prozesse im Bereich der  Verwaltung von Benutzerrechten  Einzug in die Unternehmen gehalten. Wichtige, grundlegende Prinzipien werden in diesen Prozessen verankert. So bedeutet das Minimalprinzip, dass ein...

Read More

Neun Gründe für sichere Identitäten in der Cloud

Identity Management wurde von vielen Unternehmen lange eher als Stiefkind ihrer Security-Strategie gesehen. Derzeit vollzieht sich aber ein Wandel in dieser Wahrnehmung. Warum ist das so? Wer man ist und was man darf, sind die zentralen Informationen bei der Nutzung von IT-Systemen - sei es als Bürger, als Mitarbeiter, als Kunde, als  Administrator  oder in beliebigen anderen Rollen. Das Identitätsmanagement stellt Unternehmen gerade in der Cloud vor neue und große Herausforderungen. Die Verwaltung von Identitäten und deren Zugriffsrechten war bislang...

Read More

Potential of blockchain technology for financial auditing

The blockchain (BC) is rising to prominence for immutable data services. One area where it is obvious that this distributed ledger technology will have deep business impact, if it succeeds, is financial auditing. The BC is in its infancy and, much like the internet was in its early stages, it is still unknown to many non-experts. In short, the BC is the technological infrastructure component behind bitcoin, the virtual currency invented in 2008. Recently there has been more interest in the BC, than the application which once made it famous. For a number of years now there has not...

Read More

CipherCloud im Bericht „Leadership Compass" von KuppingerCole als CASB Leader benannt

Erster Wettbewerbsbericht der CASB-Branche benennt CipherCloud als „Overall Leader" SAN JOSE, Kalifornien, 24.  August 2016  /PRNewswire/ --  CipherCloud , führend im Bereich Cloud-Sicherheit und ‑Transparenz, hat heute die Ernennung zum „Overall Leader" im Bericht „Leadership Compass: Cloud Access Security Brokers"  von KuppingerCole  des Jahres 2016 bekannt gegeben. Dieser Bericht ist die erste Zusammenfassung des schnell wachsenden CASB-Bereichs. Technik und Marktposition von mehr als 10 Anbietern werden analysiert. CipherCloud...

Read More

Get back in control of your company's privileged accounts

CA Technologies is putting its customers back behind the wheel of their privileged accounts. The company has just released significant enhancements to its comprehensive privileged access management portfolio, giving customers control over the accounts that support a hybrid IT environment. By implementing this update and integration, CA Technologies says it’s reducing the risk of data breaches by extending the depth and breadth of control end-to-end and all from a single management console. Vic Mankotia, vice president of Security & API Management at CA Technologies,...

Read More

CA Technologies Enhances Industry’s Most Comprehensive Privileged Access Management Portfolio, Reducing Risk of Data Breaches at Both Network and Server

CA Technologies (NASDAQ:CA) has released significant enhancements to its comprehensive  privileged access management portfolio , giving customers control over the privileged accounts that support a hybrid IT environment and are a frequent vector for cyberattacks. By updating and integrating  CA Privileged Access Manager  (formerly Xceedium Xsuite) and  CA Privileged Access Manager Server Control , CA helps reduce the risk of data breaches by extending the depth and breadth of control over privileged users end-to-end – from the gateway to the server and from the...

Read More

Access und Identity: Identitätsbasierter Schutz für Web-Ressourcen

Ein Großteil heutiger Applikationen werden heute mit dem Web Browser als allgemeinem Enduser-Client genutzt. Ein Höchstmaß an Komfort, Effizienz und die Umsetzung von nahtloser Sicherheit sind hierbei zentrale Herausforderungen. Web Access Management und Identity Federation sind zentrale Säulen, um dies zu erreichen. In vielen Unternehmen steigt die Notwendigkeit, dass im Rahmen der Zusammenarbeit mit externen Partnern, aber auch mit Endanwendern der Zugriff auf Ressourcen, Insbesondere Applikationen und Daten ermöglicht werden muss. Damit entsteht...

Read More

Ping Identity Delivers Enhanced Contextual Access Management Capabilities to the Ping Identity Platform

At the Gartner Catalyst Conference,  Ping Identity® , the leader in Identity Defined Security, today announced enhancements to the Ping Identity Platform with new Contextual Access Management capabilities to help enterprises undergo digital transformation and accelerate cloud and mobile initiatives. This gives enterprises security that reacts dynamically to location, device, and network ensuring only the right people have access to the right applications and data. Enterprises looking to modernize their Web Access Management solutions to secure APIs, cloud and mobile apps,...

Read More

Does digital identity need blockchain technology?

Everywhere you turn it seems there are research projects, new product proposals and services claiming a new dawn of blockchain driven technologies that fix a multitude of problems. Identity is a space where many of these claims are being made so it is useful if we explain our thinking and the approach we are advising when it comes to digital identity. The focus on shiny new technology, rather than the right technology to meet user needs, may limit the uptake of blockchain based solutions in areas such as digital identity. Views are polarised but a growing number of experts, myself...

Read More

Blockchain - don't get carried away by the hype

Everywhere you turn it seems there are research projects, new product proposals and services claiming a new dawn of blockchain driven technologies that fix a multitude of problems. Identity is a space where many of these claims are being made so it is useful if we explain our thinking and the approach we are advising when it comes to digital identity. The focus on shiny new technology, rather than the right technology to meet user needs, may limit the uptake of blockchain based solutions in areas such as digital identity. Views are polarised but a growing number of experts, myself...

Read More

DTO eyes biometric identity system

When the Digital Transformation Office takes  the wraps off its identity framework at the end of the month it will feature a previously unannounced biometric component. At an Identity Summit in Sydney this week, the DTO’s head of identity Rachel Dixon said that the verification framework that the Commonwealth identity service will use needs “well anchored” biometrics, though she didn’t specify which biometric data would be used. While the identity platform will be opt-in rather than compulsory, it could still be a hard sell to the general public –...

Read More

Wrapping up the Inaugural Sydney Identity Summit

As everyone tuning into the Olympics this week has heard, August is winter time in the southern hemisphere. Which means cool, breezy days here in Sydney – perfect weather for ForgeRock’s first-ever Identity Summit in Australia. We had a perfect venue also in the Museum of Contemporary Art (MCA), Australia’s premier museum for modern art from the region and globally. MCA has a world-class meeting space on Level 6 of its art deco headquarters, a building that formerly functioned as home base for Australia’s Maritime Services Board, and on Tuesday morning that’s...

Read More

Blockchains – wichtig aber bald kaum noch im Gespräch

Blockchain hat sicher das Potenzial zum IT-Schlagwort des Jahres. Es wird sehr viel darüber geredet, geschrieben und getweetet. Manches davon ist richtig, manches nicht, wie es immer bei neuen Themen der Fall ist. Inzwischen hat sich auf breiter Basis die Erkenntnis durchgesetzt, dass es viele Arten von Blockchains gibt. Ursprünglich tauchte das Schlagwort im Zusammenhang mit Bitcoins auf, mittlerweile gibt es auch die Ethereum-Blockchain und noch viele weitere. Dabei unterscheiden sich auch die Ansätze signifikant. Es gibt anonyme Blockchains, die nach einem als...

Read More

Consumer identity management is the core of real CRM

Identity and access management  (IAM) is the core of real customer relationship management  (CRM). Why? Because it lets us create one view of the customer across all systems holding customer data regardless of the data repository or application where the customer data originated. I will explain this opening statement and by the end of this brief essay I hope that this position will not only seem uncontroversial but a natural evolution of two historically distinct technology disciplines. Let’s first take a quick look at traditional, pre-internet...

Read More

Apple, IBM and the digital transformation of everything

IBM  and  Amica , the oldest US mutual automobile insurer, have announced a new Apple + IBM outcome in which iPads and iPhones will be used to handle insurance claims. I caught up with IBM and Amica to talk about it. iOS is getting everywhere The insurer is to use the IBM MobileFirst for iOS Claims Adjust app, one of over 100 industry-specific iOS apps  Apple and IBM have developed together  over the last two years. Big enterprise firms including Abu Dhabi Islamic Bank, Air Canada,  Alior Bank ,  Boots UK , Bosch Home Appliance Group,  Japan Post ,...

Read More

Review: Ping Identity PingAccess Server

Product Review:  Ping Identity PingAccess Server PingAccess server is designed to be a complete access management solution for enterprise customers, particularly large enterprises. The company behind the product, Ping Identity, is a fourteen year old small business with an  impressive list of clients . The company recently announced that it has been acquired by  Vista Equity Partners , a leading private equity firm focused on software, data and technology enabled businesses. Moreover, the company boasts a 95 percent customer retention rate since the...

Read More

Ping Identity expands mission to customers with UnboundID acquisition

Ping Identity  announced its first acquisition  since being acquired by Vista Equity Partners in June for $600 million , grabbing Austin-based  UnboundID  for an undisclosed purchase price. The purchase, which Ping CEO Andre Durand says wouldn’t have been possible before the acquisition, expands his company’s mission beyond protecting pure business identity to customer identity and all that entails. Perhaps more importantly, UboundID also gives Ping its own identity data store, a foundational piece for its identity platform. “The...

Read More

Ping buys UnboundID, FIPS 201-compliant PACs

Ping acquires UnBoundID Ping Identity announced that it has acquired UnboundID, a provider of customer identity and access management software, to help enterprises improve customer engagement. Terms were not disclosed. The acquisition gives Ping a foothold in the consumer identity and access management market. With the addition of UnboundID, the Ping Identity Platform adds a scalable user directory for social login, customer preference and profile management. Ping plans to combine Unbound’s customer offering with its existing multi-factor authentication, single sign-on and...

Read More

Digital transformation requires digital risk

nterprises need to recognize that digital transformation isn’t just about structural and cultural change – it will also create some major security challenges as we see new ways of interconnecting technology emerging. As enterprises make the transition to digital business, a lack of directly owned infrastructure and services outside of IT departments’ control will need to be addressed by cybersecurity, according to Gartner . The analyst firm predicts that by 2020, 60 percent of digital businesses will suffer major service failures due to the inability of IT security...

Read More

Real-Time Security Intelligence, the future of security

Over 40 years ago, my father broke the lock on the front door of our house. He never fixed or replaced it, so the front door was never locked – even if we all left on a week-long trip. At the same time, he religiously locked the backdoor every night. His theory was, I believe, that the back door could only be seen from one window of one neighboring house while the front door was overlooked by a half-dozen or more other homes. Long before “neighborhood watch” or “see something, say something” my dad could be sure that any anomalous behavior seen by our...

Read More

KuppingerCole Report Reveals Tremendous Growth in Interest of Web Access Management and Identity Federation

Just like Polaroid pictures and vinyl records, web access management and  identity federation technologies  may not be new, but they sure are popular today, according to the latest KuppingerCole Leadership Compass report. KuppingerCole explained that the recent growth in the interest and adoption of web access management and federation is being driven by new business requirements. “The business challenge to solve is ‘supporting the extended and connected enterprise,'” the report explained. This makes sense: With 86 percent of workloads expected to be...

Read More

ForgeRock’s Latest Identity Platform Finally Kills the Password, Ushers in New Era of the Frictionless User Experience

SAN FRANCISCO--( BUSINESS WIRE )-- ForgeRock ® , the leading open  platform  provider of identity management solutions, today announced the latest edition of the ForgeRock Identity Platform, with advanced new capabilities that will enable organisations to orchestrate highly secure, frictionless user experiences using push authentication. The ForgeRock Identity Platform is the industry’s first end-to-end open source identity management solution to support passwordless login and frictionless second factor authentication capabilities for continuous...

Read More

Objets connectés : la PKI, avec des certificats éphémères

Pour Kevin Bocek, de Venafi, les infrastructures à clés publiques ont encore de beaux jours devant elles dans le monde des objets connectés. Moyennant quelques évolutions. Quelle solution pour assurer l’intégrité, l’authenticité et la confidentialité des échanges avec les objets connectés ? A l’occasion d’une rencontre récente, Dan Butnaru, directeur marketing d’IDnomic, estimait que les infrastructures à clés publiques (PKI)  seraient appelées...

Read More

ForgeRock Identity Summit, Sydney – Agenda Announced

There are only a few weeks left before the ForgeRock Identity Summit Series makes its inaugural trip to Sydney, Australia! I wanted to provide a brief preview of the great event we have planned. The Identity Summit will be held on the rooftop of the  Museum of Contemporary Art Australia (MCA) on 9 August . It’s a beautiful location with breathtaking views of Sydney Harbour, the Opera House and the city skyline. We are bringing together industry analysts and the ForgeRock community of customers, partners, developers, and executives to discuss the latest in identity,...

Read More

Omada Introduces Partner Program to Accelerate Global Growth

Omada is poised to deliver acclaimed identity management offerings to a wider audience through implementation partners and resellers Copenhagen, Denmark – July 12, 2016 –   Omada, a market leader in IT security solutions for identity management and access governance, today announced the launch of the global Omada Partner Program, to support the company’s plans for aggressive, global growth. The partner program will serve to extend the reach of Omada’s implementation services and sales efforts. Omada is an acclaimed provider of technology solutions and...

Read More

Privilege Management: Veränderte Administrationsrollen und deren Steuerung

Cloud, Digitalisierung und geänderte Geschäfts-Prozesse verändern auch die Handhabung von administrativen Konten in vielen Organisationen. Sowohl die Prozesse als auch die Produkte für das Privilege Management passen sich den neuen Herausforderungen an. Die Verwaltung administrativer Konten, das sogenannte Privilege Management, ist ein zentraler Aspekt bei der Administration und Überwachung sensibler Systeme. Für jegliche Art von Organisationen, von kommerziellen Unternehmen bis Behörden und Verwaltungen, ist ein strategischer Ansatz zur...

Read More

«Keep the target small» – Schaden durch Cyber-Attacken minimieren

Im Zeitalter der Digitalisierung ist eine Öffnung der Systeme eines Unternehmens gegen aussen unabwendbar. Diese Öffnung verspricht mehr Business-Value. Sie erhöht aber auch das Risiko Ziel einer Cyber-Attacke zu werden! Was können Unternehmen tun, um den Hackern das Leben so schwer wie möglich zu machen? Wie können die Security-Ressourcen eines Unternehmens effizient und effektiv eingesetzt werden? Viele Vorträge und Workshops auf der  European Identity & Cloud Conference 2016  haben gezeigt, dass die Etablierung eines Privileged...

Read More

Compliance-Fragen in der Industrie 4.0

Industrie 4.0 und das Internet der Dinge (Internet of Things, IoT) haben die Diskussion um IT-Sicherheit befeuert. Gleichzeitig sind Fragen der Produkthaftung in vielen Unternehmen in den Fokus gerückt. Wer ist eigentlich für was verantwortlich, wenn eine Firma vernetzte Dinge vertreibt beziehungsweise selbst einsetzt? In der Welt des Smart Manufacturing kommunizieren Dinge, Geräte und Maschinen autonom miteinander. In Echtzeit tauschen sie riesige Datenmengen untereinander aus, um Produkte unter anderem flexibel auf individuelle Wünsche maßzuschneidern....

Read More

What is an API?

Over the last year, I’ve participated in lots of conversations across domains — in media, and particularly in ed-tech — about APIs and how they affect the way we use the internet. Particularly in education and in open source circles, there’s also been a lot of talk about  personal APIs , or the  personal cloud . I want to talk through what an API actually is (and what it isn’t), and then discuss some of these open source ideas. API: Application Programming Interface When you interact with software, you use a  human interface . The...

Read More

You're about to become part of the 'Attribute Economy'

Oh wait, you already are. Only up until now you haven’t realised the direct value of this model. Up until now, your attributes i.e. your data or your information, has been captured and is now in the control of organisations. It’s mostly anonymsed, aggregated and is then shared with other organisations as part of a B2B commercial transaction. To highlight the model we are the subjects of, Madhumita Venkatramanan, Senior Editor Wired UK, detailed the below in her 2014 article titled,  Madhumita Venkataramanan: My identity for sale . " I’m a 26 year-old...

Read More

A one-size-fits-all blockchain just won’t do

With manifold use cases and specific requirements for blockchains, businesses will have to choose the right variety rather than deploy a single ‘interoperable’ blockchain There will certainly be some major developments for  blockchain technology in the coming years. The basic idea of tamper-proof, distributed data structures with time-stamped and replicable transactions stored in chained and  encrypted  blocks will undoubtedly stand the test of time. However, one blockchain alone will not solve every problem. The technology is also much more driven...

Read More

The Great Analyst Debate Over Consumer IAM

Analysts typically are pretty close in their opinions. They’re analyzing the same markets and pool of vendor solutions, so it stands to reason that they wouldn’t depart much from each other. So it can be entertaining when they disagree, except that as a practitioner, eventually you will have to make a decision on which one is right. It’s like trying to decide for Donald Trump or  Hillary Clinton  if you’re a US citizen. Remain in or leave the UK. Pasta or chicken on the international flight. The choices are tough, because the implications are so...

Read More

IT-Sicherheit ist wichtiges Ziel bei Digitalisierung

Die Digitalisierung ist in einem Großteil der europäischen Unternehmen angekommen – und damit auch neue Herausforderungen an die IT-Sicherheit. So hält laut einer Studie des Analystenhauses Pierre Audoin Consultants (PAC) in Zusammenarbeit mit KuppingerCole knapp die Hälfte der europaweit rund 200 befragten Chief Information Security Officers (CISOs) die Abwehr von Bedrohungen und Angriffen für eine besonders wichtige Grundvoraussetzung für die digitale Transformation. Die Benutzer- und Berechtigungsverwaltung wird in diesem Zusammenhang als...

Read More

BENUTZER- UND BERECHTIGUNGSVERWALTUNG IM DIGITALEN ZEITALTER

Die digitale Transformation erfasst derzeit ganz Europa – und das über die unterschiedlichsten Branchen hinweg. Die erhofften Mehrwerte: die Wettbewerbsfähigkeit verbessern, die Effizienz steigern oder eine größere Nähe zu Kunden und der Lieferkette herstellen. Damit eng verbunden ist aber auch das Bewusstsein der Unternehmen dafür, dass die IT-Sicherheit eine zentrale Rolle bei der digitalen Transformation spielen muss. Vor allem die  Frage, wie die exponentiell anwachsenden digitalen Identitäten künftig zuverlässig gesichert und...

Read More

SAST GRC-Suite wächst in den Niederlanden

Die akquinet AG weitet ihre Vertriebsaktivitäten in den Niederlanden aus und geht eine Vertriebs-Partnerschaft mit dem SAP-Beratungshaus Newitera ein.  Die 2011 gegründete Newitera B.V. bietet Implementierung und Hosting von SAP-Lösungen an sowie Infrastruktur-Leistungen, Prozessoptimierung und Change Management. Seit Kurzem vertreibt der SAP-Spezialist auch die SAST GRC Suite von akquinet. Hierdurch strebt Newitera an, sein Beratungsangebot für SAP Security auszubauen und in den Niederlanden bester Reselling-Partner für SAST-Software zu werden. Henny...

Read More

STIX, CybOX & TAXII

A friend of mine runs a small legal firm and he was the victim of a ransom-ware attack. He decided not to pay and it took him two days to get his server up and running again, and the best part of a week to recreate documents that had not been backed up. It caused him a lot of worry and embarrassment with his clients, and it cost him money to pay for staff over time. He doesn’t know definitively how it happened, he suspects a phishing attack on a user account with system level access. No it shouldn’t be that easy for hackers but unfortunately it is – in millions of...

Read More

De l’IAM à Blockchain pour faire face aux défis des objets connectés

La gestion des identités et des accès s’étend au-delà de son périmètre historique. Blockchain peut aussi apporter sa contribution. L’arrivée des objets connectés fait émerger de nombreux défis en matière de gestion des identités et des accès (IAM), mais également de confidentialité et d’intégrité des données. Pour Ivan Niccolai, directeur des opérations de KuppingerCole en Asie-Pacifique et analyste en chef, de nombreuses entreprises se...

Read More

Privilege Management: Nachhaltig & sicher administrieren

Die konsequente und weitreichende Umsetzung von Maßnahmen zum Privilege Management erfordert eine strategische Herangehensweise von technischer und organisatorischer Seite. In vielen Organisationen ist über die Jahre die Erkenntnis gewachsen, dass der Zugriff auf hoch privilegierte Konten innerhalb einer IT-Landschaft mit  hohen Risiken  verbunden ist. Gerade in Organisationen, die regulatorischen oder gesetzlichen Anforderungen unterworfen sind, zum Beispiel Unternehmen im Bereich der  Finanzdienstleistungen , helfen bei dieser Erkenntnis auch gerne mal...

Read More

Web Access Management e Identity Federation: sfida tra soluzioni e vendor

In questo studio realizzato da KuppingerCole sono riportati tutti i dati relativi ai prodotti dei principali vendor attivi negli ambiti Web Access Management e Identity Federation: ne esce un quadro molto puntuale di pregi e difetti delle diverse soluzioni presenti sul mercato KuppingerCole, società di ricerche di mercato indipendente, ha pubblicato nel mese di Marzo un’indagine sulle tecnologie di Web Access Management e Identity Federation dei principali vendor attivi in tali ambiti. In questo report è illustrato il panorama dei protagonisti dell’offerta,...

Read More

Atos manages security for dm-drogerie markt through Evidian solutions

Atos supports drugstore company dm-drogerie markt with comprehensive security solutions. dm-drogerie market uses the Evidian solution Enterprise Single Sign-On (E-SSO) for personalized authentication processes, which is user-friendly and enables secure login processes. Evidian's solutions are part of the Bull portfolio, the Atos brand for technology products and software. The contract will improve operational efficiency for up to 50,000 dm-employees at over 3,000 locations across Europe. It not only offers a strong authentication via RFID badge in combination with a password, but once...

Read More

Analyst KuppingerCole Executive View on Dell One Identity Manager v7

Traditional perimeter-based security, while still needed, is getting less important. Previously adequate strategies for implementing tools and processes for achieving governance and for providing evidence for compliance need to be adapted and extended to meet the above given new challenges. Many organizations and many vendors have understood that with the changing landscape as described above, the role of identity and its associated access is getting increasingly important. The simplistic, but nevertheless true statement that “identity is the new perimeter” illustrates the...

Read More

Atos manages security for dm-drogerie markt through Evidian solutions

Solutions for authentication and single sign-on facilitate registration in the back office of branches and increase security level  KuppingerCole awards dm for identity and access management (IAM) with the European Identity & Cloud Award 2016 Atos, an international leader in digital services, supports drugstore company dm-drogerie markt with comprehensive security solutions. dm-drogerie market uses the Evidian solution Enterprise Single Sign-On (E-SSO) for personalized authentication processes, which is user-friendly and enables secure login processes....

Read More

Enterprise IDaaS: Reflecting on the Gartner Magic Quadrant and KuppingerCole Leadership Compass

Silicon Valley has been buzzing over the past decade with the development of software for audiences outside of data centers. Applications are no longer solely purchased and administered by IT. Thousands of companies have popped up to develop software as a service (SaaS) and mobile apps that are used by everyone and often dedicated to a specific function within the organization. As a result, enterprises are undergoing a digital transformation. They want to move their apps and data to the cloud and give their employees the freedom to take advantage of this change: to safely go...

Read More

Human error causes more data loss than malicious attacks

Human error is the main cause of data breaches, according to statistics obtained from the UK’s Information Commissioner’s Office Figures obtained by Egress Software Technologies via a Freedom of Information (FOI) request found that human error accounted for almost two-thirds (62%) of the incidents reported to the ICO – far outstripping other causes, such as insecure webpages and hacking, standing at 9% combined. The most common type of beach occurred as a result of someone sending data to the wrong person. Data posted or faxed to the wrong recipient accounted...

Read More

Neue Identitäten für den Channel

Im Fokus der „European Identity & Cloud Conference (EIC) 2016“ standen Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC) und Cloud-Sicherheit. Wir haben uns umgesehen, welche Chancen sich dem Channel bieten. Themen wie Identity and Access Management (IAM) scheinen nur etwas für Experten zu sein, die Services sind auf Consulting und Implementierung ausgerichtet, das Geschäft machen wenige Spezialisten, die die notwendige Erfahrung und das erforderliche Personal haben. Doch der Markt ist groß und aussichtsreich, wie die...

Read More

KuppingerCole Rates Omada’s Identity Management and Access Governance Solution Favorably in Executive View

Omada , a market leader in identity management and access governance, is pleased to announce a favorable review from KuppingerCole, the analyst company focusing on information security and identity and access management in the recently published “ Executive View: Omada Identity Suite v11.1 .” According to the Executive View, KuppingerCole ”strongly recommends including Omada Identity Suite into evaluations for IAG offerings and for combined Identity Provisioning/Access Governance projects.” 1 “To successfully deliver solutions in the identity and...

Read More

TomTom Wins “Best Consumer Identity Project” at EIC

Breaking news! ForgeRock customer  TomTom  won “Best Consumer Identity Project” at Europe’s biggest identity conference,  EIC, presented by KuppingerCole. “TomTom has initiated a program for delivering a new identity platform that manages identities of customers and devices worldwide at very large scale. The identity platform is a global solution. It is a great example of a way to manage all identities ─ of peoples, devices, and things ─ in a consistent way.” KuppingerCole 2016

Read More

Breaking News! TomTom wins Identity Award!

Breaking news! Everett customer  TomTom  has won the Award for the “Best Consumer Identity Project” in 2016 at Europe’s biggest identity conference,  EIC, presented by KuppingerCole. “TomTom has initiated a program for delivering a new identity platform that manages identities of customers and devices worldwide at very large scale. The identity platform is a global solution, where strict legal regulations are required. It is a great example of a way to manage all identities ─ of peoples, devices, and things ─ in a consistent and efficient...

Read More

Implementing Identity and Access Control? Don’t Forget the Data!

Last weeks European Identity and Cloud conference (EIC) hosted by KuppingerCole in Munich, Germany, proved to be the start of a week full of conversations focusing on the questions and challenges surrounding identity. Conversations around terms and phrase such as “Centralized Identity”, “Hybrid-Cloud” and the latest hot topic of “Blockchain” filled the hall and exhibition center but the one conversation binding them all was “Security”, more specifically how to secure the actual data that identities are communicating without complicating the...

Read More

Cloud Security : PATECCO Was a Silver Partner of the 10th Anniversary of European’s Identity & Cloud Conference 2016

Herne,  Germany ,  May 21, 2016  --(PR.com)-- On  May 10-13, 2016 , PATECCO took part in the 10th  European Identity & Cloud Conference 2016 under the motto "Enabling Agility and Innovation in the Age of Digital Transformation." Hosted in Dolce Ballhaus Forum Unterschleissheim,  Munich/Germany  and known as Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as  Cloud Security . As an international company, with a 20 years’ experience in IAM, Governance Risk...

Read More

Wither Blockchain

Blockchain – it’s either the greatest technological advance since hypertext transport protocol (http, the protocol of the world wide web) or the biggest technological hype since FDDI and ATM were touted to be the 100 mbps protocol of the future some 20 years ago. In reality, both might be true. Certainly “blockchain” is being invoked by dozens and dozens of startups looking for (and getting) funding. On the other hand, blockchain is the foundation for Bitcoin, which may yet revolutionize banking, finance, trade and all other monetary transactions. The key is...

Read More

Four Reasons Ping is a Leader in Modern IAM, According to KuppingerCole

By now, we can all agree that firewalls and passwords just don't cut it anymore. In today's hyperconnected and extended enterprise, everyone is an insider--not just employees. Now, identity and access management must also cover business partners, suppliers and customers who need access. If it doesn't, your business can't move forward. At Ping, we believe that identity is the new "perimeter" when it comes to not only protecting your cloud and on-premises applications and data, but granting secure access to a larger and increasingly diverse group of users. We call it  Identity...

Read More

CYBER CRIME MUST BE BEATEN FOR DIGITAL TRANSFORMATION TO WORK

Results of a new study show European CIOs, CISOs and IT Security managers are looking at consumer identities, improving customer experience and operational efficiencies as part of their planning but believe digital transformation could only achieve its benefits if security is improved. Identity and access management (IAM) is seen as key to meeting the security challenges of digital transformation with 93 per cent pledging to maintain or increase spending on IAM in the next three years. Companies with less than 5000 employees are matching large enterprises with over 10,000 employees...

Read More

ForgeRock Leads the Way in KuppingerCole’s Latest Access Management and Federation Leadership Compass

Named as a Leader in each of the report’s four categories, ForgeRock positioned ahead of all other entrants in the Innovation category LONDON--( BUSINESS WIRE )-- ForgeRock ®, the leading open  platform  provider of identity management solutions, today announced that it has been named a Leader in the Product, Innovation, Market and Overall categories in KuppingerCole’s 2016 Access Management and Federation   Leadership Compass,  taking top honours in Innovation as the category leader. KuppingerCole is the leading European analyst...

Read More

Cloud Access Manager Shines in KuppingerCole Leadership Compass on Access Management and Federation

If you’ve been following Dell Security in the identity and access management (IAM) market, you know that we engage with a number of analyst firms to validate our strategy, assess our market position, and socialize those areas where we feel the Dell One Identity solutions excel. One of the firms that we work with is KuppingerCole, a European analyst group that focuses exclusively on the IAM market and IAM technologies. KuppingerCole has long been an advocate for the Dell One Identity Manager provisioning and governance platform. Recently Martin Kuppinger, one of the principals of the...

Read More

10 key facts businesses need to note about the GDPR

With less than two years before the new EU data protection rules come into force, there are key areas businesses need to focus on to ensure they will be compliant The European Union’s new data protection regulation is complicated, but there are 10 key facts businesses need to know, says privacy lawyer and  KuppingerCole  analyst  Karsten Kinast . “The  General Data Protection Regulation  (GDPR) comes into force in less than two years’ time, but it is not too late for organisations to start responding to these key facts,” he told...

Read More

Time to shift information security focus away from prevention, says Swiss bank CISO

Organisations need a new approach which recognises security is “breakable”, according to Michael Meli Most organisations need to shift their focus to hacking detection and intervention – and away from prevention – the  European Identity & Cloud Conference 2016  in Munich has heard. “There will always be someone who clicks on a malicious link, or an unpatched system, obsolete software, zero-day vulnerability or unknown vulnerability which attackers can exploit,” said Michael Meli, chief information security officer (CISO) at global...

Read More

Be prepared for blockchain, says consultant

The blockchain endgame is unclear, but organisations should ensure they are aware of what is happening at the very least, says consultant Sebastien Meunier Whether or not organisations believe  blockchain  has a future, they should ensure they are prepared in case it takes off, according to Sebastien Meunier, management consultant at Chappius Halder & Co . The  distributed ledger technology  underlying the bitcoin crypto-currency has come under increasing scrutiny since 2014, but continues to divide opinion.

Read More

Security a serious market differentiator, says Publicis CISO

Security can be an important market differentiator, especially when there is no real product-based competitive edge, according to Thom Langford, chief information security officer (CISO) at Publicis Groupe. “Ensure the organisation understands this and embraces a security culture by marketing it internally to evoke a visceral response,” he told the European Identity & Cloud Conference 2016 in Munich. Security professionals should not merely try to “sell” security, said Langford, but engage everyone in the business by showing them what security means to them....

Read More

IT security leaders set to maintain or increase IAM spending

Senior IT decision-makers understand the need for identity and access management (IAM) systems to meet the challenges and opportunities of the digital age Most European IT security leaders plan to maintain or increase spending on identity and access management (IAM), a survey has revealed. The  study report  polled senior IT and security executives at 200 businesses across Europe, including the UK, in March 2016. It was conducted by market research and strategy company  Pierre Audoin Consultants  (PAC) in collaboration with global analyst firm ...

Read More

European CIOs, CISOs and IT security managers list their priorities

Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation Centralised  identity and access management  (IAM) is a key enabler for  Deutsche Bank’s  digital transformation, the European Identity & Cloud Conference 2016  in Munich heard. This approach – along with an  application program interface (API) architecture – is enabling the bank to integrate up-to-date and legacy systems to meet the expectations of the Google...

Read More

A Technologies delivers real-time analytics to help streamline Identity and access governance

CA Technologies (NASDAQ:CA) today announced the latest release of  CA Identity Suite , its leading identity and access governance solution. Announced during the  KuppingerCole European Identity and Cloud Conference , CA Identity Suite adds real-time analytics to strengthen operational efficiencies. It also provides new personalization and mobility capabilities plus pre-configured deployment scenarios that simplify the business user experience and drive faster implementation and time-to-value. “The identity and access governance functions that are critical to the security...

Read More

U2F BEST INNOVATION IN EGOVERNMENT AWARDED AT EIC 2016

Last night at the European Identity & Cloud Conference 2016 ( EIC ) Awards Ceremony, Yubico and  Digidentity ’s submission for “Best Innovation in eGovernment/eCitizen” was awarded to the GOV.UK Verify project! The award was accepted by Adam Cooper, Identity Assurance Programme, Government Digital Service for GOV.UK Verify. Beginning in April 2016, GOV.UK Verify began offering beta support for the  YubiKey  and the FIDO Universal 2nd Factor (U2F) protocol, through Yubico partner Digidentity, one of the original identity providers (IdP) for...

Read More

Qvarn Platform wins top industry prize

 Munich, Germany 12.05.2016 – The free and open source Qvarn Platform – for managing digital identities – has been awarded the prize for “Best Approach on Improving Governance and Mitigating Risks” at the European Identity & Cloud Awards 2016. Organized each year by industry-leading analyst firm KuppingerCole, the awards honour outstanding projects and initiatives in Identity & Access Management, Governance, Risk Management & Compliance, and Cloud Security. In presenting the award to the Qvarn team, KuppingerCole analyst Paul...

Read More

Engage with business to drive IAM, says Axel Springer CISO

Axel Springer CISO Henning Christiansen teams up with business stakeholders to get board approval for an identity and access management (IAM) initiative Collaboration with stakeholders across the business is key to implementing  an identity and access management  (IAM) system, according to  Axel Springer ’s chief information security officer (CISO. “We faced significant difficulties in convincing the board of the importance of IAM,” said Henning Christiansen, CISO at the German publishing firm.

Read More

Security a serious market differentiator, says Publicis CISO

Everyone in an organisation should be made to realise what digital safety means to them, says Thom Langford Security can be an important market differentiator, especially when there is no real product-based competitive edge, according to Thom Langford, chief information security officer (CISO) at  Publicis Groupe . “Ensure the organisation understands this and embraces a security culture by marketing it internally to evoke a visceral response,” he told the  European Identity & Cloud Conference 2016  in Munich.

Read More

European CIOs, CISOs and IT security managers list their priorities

CIOs, chief information security officers  and IT security managers across Europe are looking at consumer identities, improving customer experience and operational efficiencies as part of their planning but believe digital transformation could only achieve its benefits if security is improved.  That is a key finding from a new study by market research and strategy company, Pierre Audoin Consultants (PAC), which has conducted a IT leaders' survey in collaboration with global analysts, KuppingerCole. Identity and access management (IAM) was seen as essential to meeting...

Read More

Yubico at EIC: the Future of Strong Authentication - Simple, Open, Mobile

MUNICH, GERMANY and PALO ALTO, CA--(Marketwired - May 10, 2016) -  Yubico , the leading provider of simple and open online identity protection, today announced the company's participation and activities at the European Identity & Cloud Conference 2016 (EIC), May 10-13, in Munich, Germany. At EIC, Yubico's CEO and Founder, Stina Ehrensvard, will be delivering an opening day keynote and also participating in an authentication panel discussion. Product demonstrations at the Yubico Booth #G5 include new YubiKey partner integrations and  FIDO Universal 2nd Factor...

Read More

Customer relationships still key to competitive advantage, says Martin Kuppinger

There are five essential areas to which businesses need to pay attention to build competitive advantage in the rapidly evolving digital world, according to analyst Martin Kuppinger Customer relationships remain important to competitive advantage in a world of continual digital transformation, according to  Martin Kuppinger , principal analyst at  KuppingerCole . “But while the importance of technology to the business continues to grow, technological capability is becoming less relevant to competitive advantage as businesses increasingly rely on standard cloud-based...

Read More

Businesses must address digital transformation security risks, says analyst

The security elements of business IT, the internet of things and operational technology are now all deeply interconnected, claims Martin Kuppinger Businesses need to recognise that the process of  digital transformation  will affect all of their major areas, creating new security problems as once separate systems are connected in new ways, said  Martin Kuppinger , principal analyst at  KuppingerCole . “Just about everything companies do in terms of digital transformation means that all these new information security risks are effectively business...

Read More

Tools and tips for successfully preventing data leakage

More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history After the breaking news this week about  one of the biggest IT security breaches in history with 11.5 million documents stolen  containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private. Many companies and...

Read More

Beta Systems Software presents at the European Identity & Cloud Conference in Munich 2016

Berlin, 3 May, 2016 -  Beta Systems will showcase their risk-driven Identity and Access Management suite at the European Identity & Cloud Conference which will be held in Munich on May 10-13, 2016. The GARANCY IAM Suite allows for collection and administration in a central repository for all information associated with users (identities, groups, roles), with components of the IT system (target systems) and with access rights. The use of Governance Workflows in the IAM system makes it possible for an enterprise to digitally design and accelerate all its processes associated to...

Read More

Big data analytics a useful security tool

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant. “A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the Business Application Research Center (Barc)....

Read More

Empresas estão mal preparadas para adoção de seviços digitais

Apenas uma em cada cinco empresas está preparada para a transição para  serviços digitais , o que pode causar  problemas de segurança  na  gestão de identidade  e acesso. Isso é o que aponta pesquisa realizada pela KuppingerCole, encomendada pela Capgemini e pela RSA, Para o levantamento foram entrevistados 831 executivos do alto escalão de empresas dos Estados Unidos, Alemanha e França, de departamentos de vendas, marketing, RH, financeiro e - especialmente - TI. Ainda de acordo com o...

Read More

IPv6 alone will not secure IoT, warns GE CISO

It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen Internet Protocol version 6  (IPv6)  alone will not make  internet of things  (IoT) communications secure, warns  Hanns Proenen , chief information security officer (CISO) at GE Europe. Although IPv6, also known as  Internet Protocol next generation  (IPng), is essential to IoT communications by enabling every device to have its own address on the internet,...

Read More

Kuppinger Cole: Computer-Centric Identity Management

Yesterday, I enjoyed attending a webcast entitled, “ Computer-Centric Identity Management .” Led by  Ivan Nicolai , Lead Analyst at Kuppinger Cole, the presentation was subtitled, “From Identity Management to Identity Relationship Management.  The changing relationship between IAM, CRM and Cybersecurity.” I found the presentation to be concise, informative, and thought-provoking – particularly the concept that the IAM practitioner must transition from the role of “protector” to “enabler”. I think the following diagram...

Read More

Track Moderator at KuppingerCole EIC Conference

Looking forward to an action packed KuppingerCole European Identity Conference, or EIC. Participating on the Analyst Panel “ Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of IAM ”:  It will great to revisit this topic, which turns electronic identity management, and the way relationships are managed, on its head by looking at the customer point of view. (Flashbacks to parts of 2013 and 2014 working with a company called Respect Network on creating a “personal cloud network” with an underlying trust framework,...

Read More

Big data analytics a useful security tool, says analyst

The majority of companies using big data security analytics report a high business benefit, according to the Business Application Research Center Big data analytics is a useful tool for enabling organisations to become more resilient in the face of increasing cyber attacks, according to a software market analyst and IT consultant. “A recent survey found that 53% of organisations that are using big data security analytics report a ‘high’ business benefit,” said Carsten Bange, founder and managing director of the  Business Application Research Center...

Read More

Presentadas nuevas tecnologías de control de accesos como resultado del Proyecto ACIO Access Control in Organizations

El proyecto, desarrollado por un consorcio de empresas y universidades españolas e israelíes, persigue el objetivo de la mejora y unificación del control de acceso de personas, vehículos y mercancías  en las organizaciones, tanto a nivel físico como lógico, desde la perspectiva de la usabilidad y la seguridad. Los resultados del proyecto ACIO han sido demostrados en una instalación portuaria pero son aplicables a cualquier organización o instalación en la que, por su actividad, el control de accesos constituya un...

Read More

How Identity Management CEOs Lead in a Security-First World

With all the mainstream media attention that cybersecurity breaches receive, you’d think that identity management  would be a mainstay on CNN, Forbes.com, or Business Insider. Maybe that’s a good thing. Why? If identity management (IDM) platforms were the scapegoat behind most breaches, their CEOs would be walking around with more bullseyes on their backs. But outside of enterprise IT, IDM simply isn’t well known. Seriously, ask even your more tech-savvy friends and family members what they know about IT security. And you’ll likely get responses that...

Read More

Security collaboration key, says BFA-Bankia CISO

CISOs across all sectors need to work together to increase the security capabilities of their organisations and grow together, according to BFA-Bankia's CISO Maria González The business IT environment is changing significantly, which means IT security needs to change accordingly, says  Isabel María Gómez González , CISO for group Spanish banking group  BFA-Bankia . “The IT environment and the way people are working is changing every day. Consequently, the role of the CISO is changing with a new mission, vision and values,” she told...

Read More

D & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and variable authentication reports Danny Bradbury* The Bible story of Jacob wearing hairy kid-goat skins on his hands and neck to fool his blind father Isaac into believing that he was his more hirsute brother Esau is possibly the earliest recorded case of biometric ID theft - some 4,000 or more years ago. And as the tokens of our identity have grown more complex – from military insignia to passports and encryption keys, so...

Read More

Organisations still fail to understand IAM, says KuppingerCole analyst

IAM is seen as being part of IT and not business, and investments tend to be aimed at mitigating one-off incidents, says KuppingerCole analyst Matthias Reinwarth Many organisations are still failing to understand the role and benefits of  identity and access management (IAM) systems , according to  Matthias Reinwarth , senior analyst at KuppingerCole. “Many organisations still do not see IAM as a necessity for implementing security and policy or as an enabler of business models requiring customer or partner interaction,” Reinwarth told Computer Weekly....

Read More

Information rights management: an analyst’s view

Your digital assets are growing exponentially, and the need to access them, any time from any place, across various devices and platforms, has become a critical success factor. Information rights management is no longer a critical IT issue, it’s a critical business issue. To stay competitive, modern businesses must be increasingly connected to their employees, business partners, suppliers, current and future customers, and even smart devices (or things). Unsurprisingly, the demand for solutions that provide strongly protected storage, fine-grained access control and secure...

Read More

Forum Systems to Present at KuppingerCole's European Identity & Cloud Conference

CTO  Jason Macy  to Lead Workshop on Identity Federation and API Security BOSTON ,  April 19, 2016  /PRNewswire/ --Forum Systems Inc. today announced that CTO  Jason Macy  will be exploring best practices in identity federation and API security through a featured workshop session at KuppingerCole's 10 th  annual European Identity &  Cloud   Conference (EIC). Taking place  May 10-13  at the Dolce Ballhaus Forum Unterschleissheim in Munich, Germany , EIC 2016 is  Europe's  leading event for identity and...

Read More

Blockchain and Risk

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering.  This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications.  But what are the risks associated with the use of this technology? Distributed ledgers offer a range of potential benefits to both private sector organizations as well as government and public services.  They can be widely distributed and yet at the same time precisely controlled. They reduce...

Read More

Von der reaktiven Abwehr zum aktiven Schutz

Privilegierte Benutzerkonten stellen für jedes Unternehmen, aber auch jede Behörde eine erhebliche Sicherheitsgefahr dar. Das hat die jüngste Vergangenheit ganz klar gezeigt: ­Nahezu immer wurden bei Fällen von Daten­sabotage oder -diebstahl privilegierte Benutzerkonten als Einfallstor genutzt. Datenpannen, Datenmissbrauch, Datenlecks, Identitätsdiebstahl: Vorfälle dieser Art nehmen auf breiter Front zu, auch wenn sie nicht immer publik werden. Hohe öffentliche Aufmerksamkeit zog vor allem der Sony-Hack auf sich. Bei der Attacke auf den...

Read More

Tools and tips for successfully preventing data leakage

More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history After the breaking news this week about  one of the biggest IT security breaches in history with 11.5 million documents stolen  containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private. Many companies and...

Read More

UK and European firms invest in data protection ahead of GDPR

European firms are set to invest in data protection in 2016, with enforcement of the EU General Data Protection Regulation just two years away, Computer Weekly’s IT priorities survey shows Data loss prevention  (DLP) is to be the top  security  initiative by UK firms in 2016, according to the latest annual TechTarget/Computer Weekly IT Spending Priorities survey. This shows a shift away from identity and access management (IAM), which was the  top area of investment  for firms in the UK and Europe in 2015, to focus more directly on data protection.

Read More

Apenas uma em cinco empresas está preparada para gerenciar identidades com segurança

Uma pesquisa realizada pela Capgemini, um provedor de serviços de consultoria, tecnologia e terceirização, e RSA, divisão de segurança da EMC, revelou que, à medida que as organizações buscam capitalizar as oportunidades digitais por meio do rápido desenvolvimento e da hospedagem de novos serviços online, frequentemente investem pouco em medidas de segurança cibernética. Assim, criam grandes riscos, principalmente em relação ao acesso do usuário. "Identity Crisis: How to Balance...

Read More

Reminiscing about identity and access management (IAM)

Ten years ago identity and access management (IAM) was nicely compartmentalised and relatively easy to understand. There were a dozen vendors in the market and after deciding a company’s size and propensity for an enterprise directory, it was relatively easy to define a solution. I enjoyed visiting clients, listening to how vendors had bamboozled them and then recommending to them a succinct way forward to reaching their IAM goals. Then the “Cloud” came. All of a sudden it was necessary to throw out the old paradigm of a central directory and firewalls at the...

Read More

L’IDaaS, l’autre eldorado de la sécurité ?

Le marché de l’identité as a service apparaît plus attractif que jamais, jusqu’à conduire des partenaires de longue date à se tourner le dos. Mais ce pourrait n’être qu’un début avant une convergence IDaaS, CASB et EMM, portée par la transformation numérique des entreprises. Capgemini et RSA ont récemment sollicité KuppingerCole et Pierre Audoin Consultants (PAC) pour produire  une étude sur la gestion des identités en entreprise  (IAM). Et...

Read More

WHY MARKETING, HR AND FINANCE SHOULD HAVE A BIGGER SAY IN YOUR IDAAS STRATEGY THAN YOU MAY THINK

My colleague Darren Platt  recently weighed in  on the undeniable upward trend of organizations moving toward Identity as a Service, or IDaaS. While only 15% of organizations report having a cloud-based pure play for their identity solutions, more than 55% are saying they have a mix of cloud and traditional. Cloud-hosted identity solutions appear to be here to stay. And that’s why when planning your identity future you had better assemble a team of your best IAM strategists, IT personnel, cloud architects and….marketing. Wait, what? Yes, that’s right....

Read More

How to prepare for EU Standard General Data Protection Regulation?

Take-away summary   The GDPR shows that states in the EU are aware of the risk in the cyber world. Protection of private data and personal information are highly important European values and policy-wise organisations have to get ready for new standards. The EU-directive affects all organisations, even if they are not to be seen as part of the critical infrastructure. Also, the BSI in Germany speaks about further national policies. This shows that preparation is necessary.  It is difficult to estimate the content of laws and new rules. General norms like ISO 27001 provide...

Read More

Bad Option – the lemming approach

I’ve never actually seen lemmings jumping off a cliff but I have observed companies blindly following others into bad decisions regarding their security. It seems CEOs and CIOs are unwilling to spend the time analysing their requirements and undertaking a robust selection process to ensure those requirements are met. They prefer to “follow the crowd”. One area in which I’ve seen bad decisions being made is in the selection of mobile device management solutions. Many companies prefer to select the same solution as their competitors. I assume the thinking is...

Read More

Only one in five organizations set up to securely manage user identities

Capgemini and RSA survey finds that most businesses are ill-prepared for the digital services transition, causing a shortfall in identity and access management security Paris and San Francisco – A survey conducted by Capgemini, one of the world's foremost providers of consulting, technology and outsourcing services, and RSA, The Security Division of EMC (NYSE:EMC), revealed that as organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity...

Read More

Stage IAM Analytics & Intelligence

Atos SE (Société Européenne), est une entreprise leader de services numériques avec un chiffre d'affaires annuel de 11 milliards d'euros et 93 000 collaborateurs dans 72 pays. Atos fournit à ses clients du monde entier des services de conseil et d'intégration de systèmes, d'infogérance et de BPO, de Big Data et de Cyber-sécurité, d'opérations Cloud et des services transactionnels par l'intermédiaire de Worldline, le leader européen et un acteur mondial dans les services de paiement....

Read More

Why relying on standards is best for secure Cloud Computing

Why relying on standards is best for secure Cloud Computing   Who will have access to what? In a complex world where soon everyone and everything – people, things and services – will be connected everywhere and anytime through a global cloud, IAM is one of the best means to protect enterprise security, especially when firewalls are not sufficient any more. However, to guard cloud computing, the IAM technology must be further developed. For this, standards play a central role.   The mere defining of roles for individual access permissions is no longer...

Read More

Please Stop Using Snowden as Evidence of the Necessity of Data Loss Prevention Technology!

Rarely a day goes by as an IT Security professional that one will not hear a security vendor or consulting firm using the  Edward Snowden  affair as proof that their security product is necessary for data loss prevention (DLP) protection. Insider threats must be mitigated, and whistleblowers such as Snowden are lumped together with rogue or disgruntled employees as an example of common insider threat actors. The reality is that whistleblowers are a unique type of actor at the cause of confidential data loss, and the response of information security to this type of insider...

Read More

KUPPINGERCOLE RECOGNIZES GURUCUL FOR USER BEHAVIOR ANALYTICS APPROACH TO THREAT DETECTION

LOS ANGELES -- (BUSINESS WIRE) --  Gurucul , the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here:...

Read More

Security Think Tank: Top five issues in taking a structured approach to security in the cloud

Last week, experts discussed the need to focus on the basics of security in the cloud. Here, the security think tank expert panel covers a structured approach to cloud computing security. The term "cloud" has been turned into a marketing platform by many suppliers and this has obscured what it really is - a way to procure and deliver IT services. The cloud covers a wide spectrum of services and delivery models. The common security concerns are ensuring the confidentiality, integrity and availability of the services and data delivered through a cloud environment.

Read More

KuppingerCole Recognizes Gurucul for User Behavior Analytics Approach to Threat Detection

LOS ANGELES--( BUSINESS WIRE )-- Gurucul , the user behavior analytics and identity access intelligence company, today announced that information security analyst firm KuppingerCole has published a report on the benefits of the Gurucul Risk Analytics platform. The report cites the advantages of user behavior analytics (UBA) for detecting a range of threats including the use of compromised credentials, insider abuse, data exfiltration, access misuse and zero day attacks -- which evade traditional perimeter security tools. The full report is available here: ...

Read More

Blockchain or Bulls**t

When the UK government published its report “ Distributed Ledger Technology: beyond block chain ” this attracted some sceptical comments on various internet forums.  Is Blockchain the answer to many problems or is it just another over-hyped technology looking for problems? Well there are plenty of problems around trust in information that need to be solved and the report provides plenty of examples.  Some of these examples refer to existing solutions and these provide some confidence that there is value in the technology.  Others are more futuristic with a...

Read More

CA Technologies is an Overall Leader for privilege management, says KuppingerCole

CA Technologies  has been named an Overall Leader in privilege management in the recent  Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator. “The scope of privilege management though quite broad can be summed up as ‘automating the management of who can access your most critical data and systems when, from where, at...

Read More

Ringing in the new year with great news

The sound of bells might have you all wince given the wild opens/closes in the stock market but I’ve got news that should both cheer you up and makes your lives better! Today I am beyond excited to share with you some insightful analyst reviews on the information protection space, an early look on how we plan to integrate the Secure Islands product into our overall information protection offering, and upcoming updates to the Azure Rights Management service. 


Read More

PATECCO is Taking Part at European Identity & Cloud Conference (EIC) 2016

Herne, Germany, January 28, 2016 --( PR.com )-- As a company in the field of Identity and Access Management, PATECCO will be a sponsor and exhibitor at the European Identity & Cloud Conference 2016. It takes place May 10 – 13, 2016 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany. EIC 2016 is known as the event where identity management, cloud and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation driven IT. Read more: ...

Read More

ForgeRock Identity Platform Addresses Evolving Customer Data Privacy Regulations With First-of-Its-Kind Consent Solution

SAN FRANCISCO, CA -- (Marketwired) -- 01/27/16 --  ForgeRock ®, the leading open platform provider of identity management solutions, today introduced its newest identity management platform, including an implementation of the  User-Managed Access (UMA) standard . Built on consent-by-default and consent-by-design principles, the ForgeRock Identity Platform™ is the first identity management platform to support an UMA implementation designed for  consumer consent and data sharing  purposes. "Highly scalable platform architecture is becoming increasingly...

Read More

Noticeable Stock: CA, Inc.

On January 20, 2016, CA, Inc. (CA)announced it has been named an “Overall Leader” in Privilege Management in the recent Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator.


Read More

CA Technologies Named an Overall Leader in Privilege Management

AUSTRALIA, Jan. 21, 2016 – CA Technologies (NASDAQ: CA) today announced it has been named an “Overall Leader” in Privilege Management in the recent Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security. CA Privileged Access Manager was evaluated for the report, which assessed solutions focused on controlling access and activity of privileged users, such as those used by an IT administrator.


Read More

Why relying on standards is best for secure Cloud Computing

Who will have access to what? In a complex world where soon everyone and everything – people, things and services – will be connected everywhere and anytime through a global cloud, IAM is one of the best means to protect enterprise security, especially when firewalls are not sufficient any more. However, to guard cloud computing, the IAM technology must be further developed. For this, standards play a central role. 


Read More

Information Rights Management explained

(Initiative Mittelstand) With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay competitive, modern businesses must be increasingly connected to their business partners, suppliers, current and future customers and even smart devices (or things). New digital businesses therefore have to be  agile and connected .

Read More

Report: CyberArk named privilege management leader by KuppingerCole

CyberArk  (NASDAQ:  CYBR ), the company that protects organisations from  cyber attacks  that have made their way inside the network perimeter, has been named the Overall Leader by independent analyst firm KuppingerCole in its  Leadership Compass: Privilege Management 2015 report . CyberArk surpassed the other vendors by being positioned as the leader across all the report's evaluation categories: Overall, Product, Market and Innovation. To help companies make intelligent vendor choices to protect against privileged account compromise, the firm analysed 12...

Read More

Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report

WASHINGTON ,  Jan. 6, 2016  /PRNewswire/ -- Thycotic, a leading provider of enterprise  privileged account management  solutions for more than 3,500 global organizations, today announced that KuppingerCole, a global analyst firm focused on Information Security and Identity and Access Management (IAM), recently published a report on Privileged Account Management (PAM) and how to protect the "keys to the kingdom" against cyber-attacks and insider threats.

Read More

Thycotic Recognized as a Leading Provider of Privileged Account Management Solutions in Latest KuppingerCole Security Report

Global Analyst Firm Praises Thycotic for Lean and Rapid-To-Deploy Privileged Account Security Solutions that Combat Cyber-Attacks WASHINGTON ,  Jan. 6, 2016  /PRNewswire/ --Thycotic, a leading provider of enterprise  privileged account management  solutions for more than 3,500 global organizations, today announced that KuppingerCole, a global analyst firm focused on Information  Security  and Identity and Access Management (IAM), recently published a report on Privileged Account Management (PAM) and how to protect the "keys to the kingdom"...

Read More

Named Leader in KuppingerCole Leadership Compass for Privilege Management

Leading global analyst firm KuppingerCole has released its 2015 Leadership Compass for Privilege Management, and BeyondTrust is pleased to be represented as a  leader in every category in the report  – as an  Overall Leader ,  Product Leader ,  Market Leader  and  Innovation Leader . BeyondTrust continues to move up in the report, reflecting our continued product innovation and customer focus.

Read More

Report: CyberArk Named the Privilege Management Leader by KuppingerCole

NEWTON, Mass.--( BUSINESS WIRE )-- CyberArk  (NASDAQ:  CYBR ), the company that protects organizations from  cyber attacks that have made their way inside the network perimeter, has been named the Overall Leader by independent analyst firm KuppingerCole in its  Leadership Compass: Privilege Management 2015 report .

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News