Media Coverage

Consumer identity management a growing trend

Consumer identity and access management is a growing trend, but system choice is still challenging, according to KuppingerCole Consumer identity and access management  (CIAM) systems first appeared around 2014, but the market is still immature, according to  Martin Kuppinger , principal analyst at KuppingerCole. “The strengths of CIAM systems vary depending on their roots, which means organisations need to be clear what their objectives are to choose the right system or systems to meet those needs,” he told  Consumer Identity World Europe 2017...

Read More

GDPR likely to affect internal processes heavily, warns lawyer

Businesses should not overlook the fact that the EU’s new data protection laws may require fundamental changes to internal business processes, warns a data protection lawyer The  General Data Protection Regulation  (GDPR) means that most businesses that deal with the personal data of European Union (EU) citizens will have to change the way they think about data protection, according to  Tim Maiorino , a data protection lawyer at Osborne Clarke based in Germany. “This is the view of the UK’s information commissioner  Elizabeth Denham ,...

Read More

Businesses need to balance user experience, privacy and security

Balancing user experience, privacy and security for the connected consumer is a key challenge for online businesses, according to KuppingerCole A change in approach will help  businesses achieve the right balance  between user experience,  privacy  and security more easily, says  Martin Kuppinger , principal analyst at KuppingerCole. “Most businesses are making the fundamental mistake of thinking inside-out, but by thinking outside-in, they will automatically put the consumer first,” he told  Consumer Identity World Europe 2017...

Read More

Data breach an opportunity to build trust

In the light of the high number of data breaches, organisations should embrace the inevitable and ensure they can build better trust if they are breached, an information security professional advises Consumers are the lifeblood of any business organisation, so it is important to protect their data, according to  Thom Langford , chief information security officer (CISO) at Publicis Groupe. “We need to ensure that security processes are embedded throughout the organisation, so that business data as well as customer data is protected,” he told  Consumer...

Read More

Use GDPR to future-proof business models

Businesses should look beyond compliance with new data regulations to ensure that their business processes and models are in line with future requirements, advises a privacy innovation expert Collaboration across business units is vital to compliance with the European Union’s (EU’s) General Data Protection Regulation (GDPR), according to  Katryna Dow , CEO and founder of life management firm  Meeco . Too many organisations have approached  GDPR  compliance as something that can be fixed by legal teams putting something in a policy document,...

Read More

17 B2B Social Media Campaigns to Learn from in 2017

Every year, we hear about the most memorable social media campaigns. They range from Oreo’s famous ‘ dunk in the dark ’ Tweet during the Super Bowl to NASA’s  #AYearInSpace  campaign. It always seems to be the B2C campaigns that are talked about. Big branding campaigns with the goal of reaching hundreds of millions of people. B2B marketing typically has a different goal. Reach a targeted audience and drive demand, leads or sales conversations. That’s why we decided to highlight the best B2B social media marketing campaigns to learn from in...

Read More

Open standards will ease GDPR risk, says Kantara

Open standards will help organisations comply with new EU data protection regulations, while ensuring interoperability and a good user experience, according to a global standardisation group The use of open standards can help organisations comply with requirements of the EU’s  General Data Protection Regulation (GDPR), says  Colin Wallis , Executive Director of the  Kantara Initiative . “A key requirement of the GDPR is gathering user consent for collecting personal data, which is an example of where an open specification can be used...

Read More

Go beyond GDPR for a competitive edge

By exceeding the bare minimum requirements set by privacy regulations, businesses can win customers by offering greater assurances, says a business adviser Companies should use a risk-based approach to privacy to go beyond regulations such as the  EU’s General Data Protection Regulation  (GDPR) to gain a competitive advantage, according to  Phil Lam , co-founder of  Lam Advisory . “If companies consider privacy not just as a way to meet some new regulation, but as a way to differentiate themselves from competitors, that could give them an...

Read More

Consumer identity management will benefit business

Businesses should embrace consumer identity management to improve marketing capabilities and help drive regulatory compliance, says KuppingerCole Consumer identity and access management (CIAM) is the fastest-growing subset of identity management because of the benefits to business, says  John Tolbert , lead analyst at KuppingerCole.  “CIAM is not going away and many organisations are starting to realise the value of better targeted marketing as well as different kinds of regulatory compliance,” he told Computer Weekly. The biggest reason businesses are...

Read More

Industrial Control Systems: Understanding the Access Risks and Security Challenges by KuppingerCole Analysts

For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for operational technology units responsible for managing those systems: after all, they weren’t even connected to office networks. This webinar will analyze the risks of unprotected industrial networks, the impact of IIoT applications on control systems and how organizations can successfully manage these...

Read More

Atos' Enterprise SSO as-a-Service brings password-free logins to both Cloud and on-premises applications

Atos, a global leader in digital transformation, launches Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS), through Bull, its brand for HPC and cybersecurity products. This is the only solution on the market that enables users to access their applications, without the need to enter passwords, on both Cloud-based and on-premises applications. Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS) provides end-users with Single Sign-On access to both web and non-web applications, thus simplifying their daily lives by eliminating the need to constantly remember and re-enter...

Read More

Atos brings password-free logins to both cloud and on-premises applications

Atos launches Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS), through Bull, its brand for HPC and cybersecurity products. The solution enables users to access their applications, without the need to enter passwords, on both Cloud-based and on-premises applications. Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS) provides end-users with Single Sign-On access to both web and non-web applications, thus simplifying their daily lives by eliminating the need to constantly remember and re-enter passwords. Additionally it reduces resource on Security Management teams to...

Read More

Gigya Presents a New Approach to Customer Consent and Preference Management at SAP® Hybris® Live: Global Summit

Gigya , a leader in customer identity and access management (CIAM), today announced that it will be showcasing its new Gigya Enterprise Preference Manager product at the SAP ® Hybris ® Live: Global Summit , Oct. 17 to 19 in Barcelona, at stand P23. Also, Gigya CEO Patrick Salyer will speak at the summit in a session titled “Fuel Trusted Customer Relationships with Personalization, Preference & Privacy” on Wednesday, October 18, at 17:00. Gigya Enterprise Preference Manager , available now, is a complete solution for centrally managing all aspects of...

Read More

IAM solutions to support GDPR compliance and help reduce helpdesk calls by 30%

Atos, a global leader in digital transformation, launches Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS), through Bull, its brand for HPC and cybersecurity products. This is the only solution on the market that enables users to access their applications, without the need to enter passwords, on both Cloud-based and on-premises applications. Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS) provides end-users with Single Sign-On access to both web and non-web applications, thus simplifying their daily lives by eliminating the need to constantly remember and...

Read More

Was man an IAM heute haben muss – und was als Nächstes kommt

Identity und Access Management (IAM) ist mittlerweile eine etablierte Fähigkeit in den IT-Infrastrukturen mittlerer und großer Unternehmen. Allerdings ist es mit grundlegenden Provisioning-Diensten und ein bisschen Access Governance längst nicht mehr getan. Eine effektive und effiziente Verwaltung von Benutzern und ihren Zugriffsberechtigungen ist für die Benutzerfreundlichkeit, die Administrationseffizienz, die Erfüllung von Compliance-Anforderungen und die Reduktion von IT-Sicherheitsrisiken unverzichtbar. Die Anforderungen wachsen aber stetig, wobei zwei...

Read More

Data protection, firmata Gigya la soluzione che allinea alla Gdpr

Gigya, specialista nel Customer Identity and Access Management (Ciam), amplia il suo raggio d’azione e lancia Enterprise Preference Manager, modulo specifico standalone che abilita le organizzazioni ad indirizzare puntualmente la conformità con la normativa Gdpr (General Data Protection Regulation, UE 2016/679) e a costruire relazioni di fiducia con i propri clienti. Enterprise Preference Manager permette di centralizzare la gestione dei dati personali dei clienti, dei canali di comunicazione preferiti, di interessi e gusti relativi a brand o prodotti e dei consensi...

Read More

Centrify Included in Gartner’s 2017 Market Guide for Privileged Access Management

Centrify, the leader in securing hybrid enterprises through the power of identity services, today announced it has been named a representative vendor in Gartner’s 2017 Market Guide for Privileged Access Management (PAM) . The increasingly hybrid nature of infrastructure, driven by the adoption of cloud-based workloads, is driving the need to secure privileged access across on-premises, private-cloud and public cloud infrastructure and apps with a single solution. Gartner predicts that “Through 2020, more than half of security failures associated with IaaS and PaaS will be...

Read More

German Software Company Buys Israeli Gigya for $350 Million

SAP, the largest software company in Europe and the fourth largest in the world, is acquiring Israeli software company  Gigya  for $350 million in cash, theMarker reported Saturday. The deal has been signed and will be finalized within a few weeks. Gigya leads the customer identity and access management (CIAM) market according to recent reports from Gartner and KuppingerCole. Advertisement The three founders of Gigia – Eyal Magen (VP of Strategy), Roly Eliazarov (President) and Eran Kutner (CEO), who hold 5% of the company, will receive $17 million each....

Read More

Axiomatics Data-Centric Dynamic Authorization Product Suite Recommended in New KuppingerCole Analyst Report

Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “ Executive View – Axiomatics Data Security .” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these...

Read More

The Cargo Cult of Cybersecurity

I’ve been working in IT my whole life and since I’ve joined KuppingerCole 10 years ago, cybersecurity has been my job. Needless to say, I like my job: even though we industry analysts are not directly involved in forensic investigations or cyberthreat mitigation, being up-to-date with the latest technological developments and sharing our expertise with both end users and security vendors is our daily life, which is always challenging and exciting at the same time. However, occasionally I am having doubts about my career choice. Does everything I do even matter? Cybersecurity...

Read More

iWelcome Joins EEMA Think Tank to Share Digital Identity Knowledge and Expertise Across Europe

EEMA, the leading independent not for profit European think tank focussing on identification, authentication, privacy, risk management, cyber security, the Internet of Things and mobile applications, today announced iWelcome as its latest corporate member. Based in The Netherlands, iWelcome delivers Identity & Access Management as-a-Service (IDaaS) solutions to organisations across Europe. The company has joined EEMA to share knowledge and expertise on issues relating to privacy and Consent Lifecycle Management (in the context of GDPR and PSD2), public digital identities and market...

Read More

SAP to acquire Gigya – “Company Building is a Marathon, not a Sprint”

SAP announced the intent to acquire customer identity management leader Gigya to further drive Gigya’s mission to enable businesses to build trusted digital relationships with their customers. As an early investor in the company since 2008, I’m thrilled by the team’s achievements and excited to watch the next phase of their journey. Gigya helps companies turn unknown site visitors into known, loyal and engaged customers. More than 700 of the world’s leading enterprises, rely on Gigya to build identity-driven relationships with over 1.3 billion customers while...

Read More

KuppingerCole Executive View Report Cites Axiomatics for its Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data Solutions

Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “Executive View – Axiomatics Data Security.” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these...

Read More

A Treasure Trove of Good Advice for Marketing and Privacy Teams to Get Aligned

The lack of communication between marketing and privacy/compliance teams within organizations. During the presentation, Rita Heimes, data protection officer of the IAPP; Shopify’s Associate General Counsel, Privacy, Vivek Narayanadas; and I asked our audience of privacy professionals the following flash poll question: “Do you have a regularly scheduled meeting with your marketing team?” A large majority of respondents (62%) said they did not. On the surface, this result confirms the teams’ oppositional nature. Marketers sit on one side with their insatiable...

Read More

What I Learned at KuppingerCole's Consumer Identity World

I recently was able to attend Consumer Identity World USA 2017, a new event that's put on by KuppingerCole. If the title isn't obvious enough, the event is all about how enterprises are tackling the ever-growing topic of consumer (or customer) identity. At Ping, the challenges around customer identity have been a major focus of ours for a long time now. We've taken a lead in our industry by acknowledging that customer identity challenges can't easily be solved with legacy enterprise IAM solutions. But knowing what we know and what we've been able to solve for our customers, I wanted to...

Read More

Axiomatics’ David Brossard Speaks on Protecting Customer Identities at KuppingerCole’s Consumer Identity World USA 2017

Vice president of customer relations at Axiomatics will join other industry leaders on the panel, “How to Work Together in a Privacy Preserving Way to Mitigate Risks” at KuppingerCole’s Consumer Identity World (CIW) USA 2017. Axiomatics , the leader in fine-grained dynamic authorization, today announced that David Brossard, vice president of customer relations, will join other industry leaders on the panel, “How to Work Together in a Privacy Preserving Way to Mitigate Risks” at KuppingerCole’s Consumer Identity World (CIW) USA 2017 from September 12...

Read More

Raus aus der Komfortzone

Der Security-Anbieter Balabit aus Ungarn konzentriert sich gezielt auf das Privileged Access Management. Die Kontrolle der Administratoren ist aber nur auf den ersten Blick ein Nischenthema. Viele Managed-Security-Anbieter sagen, Unternehmen sollten sich auf ihr Geschäft konzentrieren und die Cyber Security den Experten überlassen. Das ist zweifellos der richtige Ansatz, denn Security erfordert Expertenwissen und Speziallösungen. Betrachtet man jedoch die Entwicklung bei Security-Anbietern, so fällt auf, dass viele Anbieter ihr Portfolio laufend erweitern,...

Read More

KuppingerCole Joins Gartner and Forrester In Giving Top Scores to Gigya

  Gigya  today announced that KuppingerCole, a global research firm specializing in security and data protection, has recognized Gigya as the Overall Leader in Customer Identity and Access Management (CIAM) for the second year in a row, in a new Leadership Compass report on CIAM Platforms. A full copy of the report is available now at  www.gigya.com/compass . KuppingerCole joins two other analyst firms that have recently given Gigya the highest scores in customer identity management: Gartner gave Gigya the top product score for the Business-to-Consumer (B2C) use...

Read More

Warum man in fünf Jahren (hoffentlich) nicht mehr über Blockchains reden wird…

Blockchains sind ein Hype. Das wird spätestens dann deutlich, wenn man auf Unternehmen trifft, die aktiv einen Blockchain-Anwendungsfall suchen. Man könnte auch sagen: Es wird ein Problem für die Lösung gesucht. Das ist offensichtlich der falsche Ansatz: Entweder hat man Probleme, Herausforderungen oder Anforderungen, die man mit den vorhandenen Technologien nicht oder nicht gut oder zumindest unter Nutzung von Blockchains besser lösen könnte – oder man hat sie nicht. Mit Blockchains können ohne jeden Zweifel bestimmte Anforderungen besser...

Read More

Wie Applikationen zu einer Identität kommen

Für die Sicherheit und den Komfort von Applikationen ist es wichtig, die Anwendungen mit IAM-Lösungen, also ins Identity and Access Management zu integrieren. Hierfür bieten sich spezielle Konnektoren an. Integration spart nicht nur Aufwand Es gibt Bereiche, in denen in der Regel davon abgeraten wird, selbst Funktionen zu entwickeln, stattdessen soll man bestehende Module integrieren. Ein solcher Bereich ist bekanntlich die Verschlüsselung. Doch auch das Identity and Access Management (IAM) ist ein solcher Fall, auch hier geht es um ein sehr komplexes,...

Read More

Why GDPR is so relevant to the business

The EU  General Data Protection Regulation  (GDPR) has a huge impact on businesses, particularly due to the new consent rules. Instead of a fuzzy consent, given once in the form of: “This site uses cookies. If you continue using the site, you accept that we collect all data we can and do whatever we want to with the information,” the GDPR mandates consent per purpose. It must also be informed, unambiguous and freely given. This also means that any new purpose of using data requires additional explicit, informed, and unambiguous consent. And that consent can be...

Read More

CA Technologies Named an Overall Leader in Privilege Management for Fourth Consecutive Year

CA Technologies (NASDAQ: CA) announced it has been named an “Overall Leader” in Privilege Management in this year’s Leadership Compass report issued by KuppingerCole, a leading analyst firm for identity-focused information security. “Privilege management is among the most relevant areas of Identity and Access Management, but also tightly connected to cybersecurity, given that privileged users are a primary target of attackers. Even the most sophisticated attacker would find it almost impossible to succeed without having access to privileged credentials,”...

Read More

Warum sich Entwickler auf die Blockchain-Ökonomie vorbereiten sollten

Blockchain-Technologien ermöglichen viele neue und disruptive Geschäftsmodelle. Bewegt sich die Welt auf eine Blockchain-basierte Ökonomie zu? Die Welt bewegt sich auf eine  Blockchain -basierte Wirtschaft zu. Grund ist die höhere Sicherheit von Blockchain und der Verzicht auf Drittakteure, so der Unternehmensberater und Autor William Mougayar. „Die Blockchain-Ökonomie wird in den nächsten Jahren größer sein als die Webwirtschaft“, sagt Mougayar auf der  European Identity & Cloud Conference 2017 Mitte Mai in...

Read More

Identity & Access Management Systems are on the Rise

Digital transformation involves different thinking, innovation, a modification in leadership & new business models and incorporating digital strategy into all aspects of the business to improve the experience of your organization’s employees, customers, suppliers, and partners. To build those new, innovative company cultures, business models, and digital strategies, organizations need a solid IT infrastructure that supports all the upcoming changes with agility, innovativeness, and security.


Read More

Data Security in Financial Services: It’s Likely Not What You Think

With so much confidential information in their keeping, you’d think that banks and other financial institutions would have stellar  financial data security  in place. But new research has shown quite the opposite to be true. In the Financial Services breach  report  from Bitglass, data leaks nearly doubled between 2014 and 2015, and the same trend is being seen in 2016. Last year 87 breaches were reported in the  financial services sector  up from 45 in 2014. In the first half of 2016, 37 banks reported breaches. In other research, only one of...

Read More

Analyst Companies Publish Survey about the Current State of Identity and Access Management in Organizations on behalf of BetaSystems

KuppingerCole Ltd., together with CXP Group have conducted a joint survey on the current state of Identity and Access Management in organizations. The survey is written on behalf of BetaSystems. The survey looks at how prepared organizations are for upcoming requirements imposed by the Digital Transformation, such as the need for better managing consumer identities, protecting PII and ensuring that both access to internals and externals to such information is restricted, regardless of whether the information is handled by cloud services or on premises. The majority of...

Read More

KuppingerCole und CXP-Group veröffentlichen Studie zum aktuellen Stand des Identitäts- und Zugriffsmanagements in Unternehmen im Namen von Beta Systems

KuppingerCole Ltd., ein internationales und unabhängiges Analystenhaus mit starkem Fokus auf Informationssicherheit, Identitäts- und Zugriffsmanagement sowie allen Bereichen der digitalen Transformation, hat gemeinsam mit der CXP-Group, einem unabhängigen europäischen Forschungs- und Beratungsunternehmen im Bereich digitaler Services sowie Software- und IT-Services, eine Studie zum aktuellen Stand des Identitäts- und Zugriffsmanagements in Unternehmen durchgeführt. Die Studie wurde im Namen von Beta Systems, einem der führenden unabhängigen Anbieter...

Read More

MaRisk, DSGVO & PIM: „Überwachung privilegierter Benutzerkonten greift zu kurz“

Viel Panikmache gibt es momentan rund um die Datenschutz-Grundverordnung der EU. Unternehmen seien darauf nicht adäquat vorbereitet, heißt es. Nehmen wir das Thema Privileged Identity Management (PIM). So finden sich schon in der MaRisk Vorgaben für die Vergabe und Überwachung von Zugriffsrechten. Reicht das nicht? Wir wollen von Frank Balow, Senior Manager, CISSP, NTT Security, wissen ob – und wenn ja wie – die EU-DSGVO Banken also überhaupt betrifft.


Read More

Visionary – ForgeRock Shines in Latest Gartner Magic Quadrant

Gartner published its most recent  Magic Quadrant for Access Management, Worldwide  earlier this month, with ForgeRock leading the way – for the first time – in the Visionaries quadrant. While perhaps not quite as impressive a result as our standing in the  KuppingerCole CIAM Leadership Compass report  (we were named an Overall Leader, and also named leader in the Product and Innovation categories, and a Technology Leader in the Product and Innovation Matrix) it’s important to note that  the Gartner Access Management Quadrant and the...

Read More

GDPR Awareness Roundtable Discussion

This discussion is moderated by Matthias Reinwarth, Senior Analyst, KuppingerCole and he welcomes Nima Baiati, Senior Director of Product Development at Absolute Software and Rashmi Knowles, Field CTO EMEA at RSA. They discuss how there is less than a year until the GDPR comes into full effect on 25th May 2018. They also cover the results of a surveys where large company CIOs estimate that 50% of US companies store and process data on EU citizens. Therefore, it is a big concern to organisations. So why aren’t companies serious about GDPR and is being “good...

Read More

Ping Identity Named a Product Leader in KuppingerCole Leadership Compass for Customer IAM Platforms

Ping Identity® , the Identity Security Company, today announced that it has been named a product leader in the KuppingerCole Leadership Compass for Consumer Identity and Access Management (CIAM) Platforms. The Leadership Compass provides an overview of the market segment, 23 vendors and their CIAM product and service functionality, relative market share, and innovative approaches to providing CIAM solutions. Click  here  to view a complimentary copy of the report.   KuppingerCole defines the CIAM market as a sub-genre of traditional Identity and Access Management...

Read More

KuppingerCole reconfirmes iWelcome ‘Product and Innovation leadership’ in its 2017 Leadership Compass for CIAM platforms

Identity, security & cloud analyst KuppingerCole again ranked iWelcome the #1 Innovation leader and #2 Product leader for Consumer Identity and Access Management (CIAM) platforms, and the only Vendor with 4 out of 5 ‘Strong Positive’ endorsements for its functionality. Frictionless GDPR The analyst values iWelcome’s CIAM, with a special recognition of its in-depth GDPR functionality and IoT support. iWelcome’s CIAM service: provides fine-grained consent mechanisms and transparent privacy management dashboards for consumers to control their...

Read More

Centrify Named a Leader in the KuppingerCole Privilege Management Leadership Compass

KuppingerCole just released the KuppingerCole Privilege Management, Leadership Compass. And I am excited to announce that Centirfy has been named a  Leader! Centrify’s privileged access security solution received the highest ratings —  strong positive —  for  functionality, security, integration  and  usability . This year’s Leadership Compass expanded the definition of the PxM market, acknowledging the need for  “ managing the ownership  and knowing all privileged accounts, both individual and shared...

Read More

Preparing for the Digital Transformation

Today’s business environment is increasingly reliant on web and open source applications, which in turn increases companies’ digital security challenges. Advanced Identity Access Management can lend a helping hand. Employees have become digital in their way of working, bringing consumer digital habits into the workplace and merging work and home applications on single devices, whilst external partners are accessing resources via web browsers and social media channels. These are trends that are likely here to stay, but need to be carefully managed to keep security in...

Read More

AdNovum expands board and strengthens NEVIS

As of June 1, 2017, Stephan Schweizer is appointed Chief Product Officer NEVIS and member of the Executive Board of AdNovum. With the introduction of a separate position on the board, AdNovum confirms its commitment to the expansion and internationalization of its security product NEVIS. Stephan Schweizer, Head of NEVIS, is appointed Chief Product Officer NEVIS and member of the executive board of AdNovum as of June 1, 2017. In this position, he will be responsible for the strategic development of NEVIS Security Suite products. AdNovum’s CEO Chris Tanner comments:...

Read More

ForgeRock Crosses into Overall Leader Category in KuppingerCole Leadership Compass Report for Customer Identity and Access Management Platforms

ForgeRock®, the leading platform provider of digital identity management solutions, today announced that is has been named for the first time to the top leader section in the Overall Leadership category of the 2017 KuppingerCole Leadership Compass CIAM Platforms Report. KuppingerCole is the leading European analyst firm, and is widely regarded as the most authoritative voice on Customer Identity and Access Management (CIAM) technologies, and the vendors in the space. The Leadership Compass Report, written by Lead Analyst John Tolbert to provide market guidance for purchasers of digital...

Read More

KuppingerCole EIC 2017 – GDPR, KYC, IoT, Blockchain, AI, Security

KuppingerCole organized its 11th European Identity & Cloud Conference (EIC) May 9 — 12, 2017. EIC is about Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), and Cloud Security. I was there for the first time in 2007, when Martin Kuppinger, Tim Cole & co organized it for the first time at the Deutsches Museum Munich. A lot has changed in 10 years, including the venue. This year, at Infinity BallhausForum Unterschleißheim, there were more than 700 participants worldwide, including vendors, end users, analysts, and thought leaders....

Read More

PSD2 – Eine Herausforderung für die Finanzwirtschaft

Die überarbeitete Payment Services Directive der EU tritt bereits im Januar kommenden Jahres, am 13. Januar 2018, in Kraft. Das gibt für eine Anpassung bestehender Prozesse und eine angemessene Zukunftsstrategie nur wenig zeitlichen Spielraum Ein zentrales Thema, das in der Finanzwirtschaft zu erheblichen Änderungen führen wird, hat sich in der öffentlichen Wahrnehmung noch nicht umfassend durchgesetzt. Dies ist anders als bei der  Europäischen Datenschutz-Grundverordnung (EU-DSGVO ), die sich durch stetigen Hinweis durch Presse, Hersteller,...

Read More

Künstliche Intelligenz schützt digitale Identitäten

Beim Identity Management kommt vermehrt Künstliche Intelligenz zum Einsatz, wie auf der European Identity & Cloud Conference 2017 deutlich wurde. Darin liegen Chancen für Hersteller und ihre Partner. „Cognitive Identity Privacy“ hieß das Motto der European Identity & Cloud Conference (EIC) 2017, die im Mai in Unterschleißheim stattfand. Mehr als 700 Teilnehmer besuchten das Event. Entwicklungen wie Cognitive Computing und die  Datenschutz-Grundverordnung  ( DSGVO  /  GDPR ) bestimmen derzeit das Marktsegment. So befassten...

Read More

Künstliche Intelligenz schützt digitale Identitäten

Beim Identity Management kommt vermehrt Künstliche Intelligenz zum Einsatz, wie auf der European Identity & Cloud Conference 2017 deutlich wurde. Darin liegen Chancen für Hersteller und ihre Partner. „Cognitive Identity Privacy“ hieß das Motto der European Identity & Cloud Conference (EIC) 2017, die im Mai in Unterschleißheim stattfand. Mehr als 700 Teilnehmer besuchten das Event. Entwicklungen wie Cognitive Computing und die Datenschutz-Grundverordnung (DSGVO / GDPR) bestimmen derzeit das Marktsegment. So befassten sich die...

Read More

Banking-Supper-Club – Bizagi hilft Banken bei der digitalen Transformation

Die digitale Transformation stellt gerade Banken vor große Herausforderungen. Neue Wege der Kundenerfahrung sind dabei nur ein Thema. Eine ebenso prominente Rolle spielen die sich verschärfenden Anforderungen des Datenschutzes. Daher lädt Bizagi, führender Anbieter von Lösungen zur Automatisierung digitaler Prozesse und für digitale Transformation, IT-Entscheidungsträger der Branche zum Meinungsaustausch auf dem ersten „Banking Supper Clubs“ in Frankfurt am Main ein. Die Schwerpunktthemen Risk und Compliance am Beispiel von Datenschutz mit...

Read More

SecurID Access: RSA baut Funktionen zur Identitätssicherung aus

Zu den Erweiterungen von RSA SecurID Access zählen beispielsweise eine Cloud-basierte Authentication-as-a-Service-Option und eine zusätzliche dynamische Risikobewertungsfunktionalität. RSA, ein Unternehmen von Dell Technologies, bietet eine Reihe neuer Funktionalitäten für  RSA SecurID Access , wie das Unternehmen in einem  Blogbeitrag  mitteilt. Sie sind ab sofort verfügbar. Zu den Erweiterungen gehört eine Cloud-basierte Authentication-as-a-Service-Option, die einen nahtlosen Zugriff sowohl auf On-Premise- als auch auf...

Read More

Impressions from European Identity & Cloud Conference 2017

No new standards, no protocol declared dead – but new compliance directives which have huge impact on business practices and deployed IAM services. The  General Data Protection Regulation (GDPR)  and the  Revised Directive on Payment Services (PSD2)  will be applied in 2018 after a two-years transition period. From the importance of establishing a legal identity for developing countries as part of every person’s basic human rights and as a precondition for access to health and wealth services, via  SSI  (self-sovereign identity, aka...

Read More

KuppingerCole Recognizes Gigya as Only Overall Leader in Customer Identity Management

We’re pleased to announce that, after a lengthy evaluation process, global security and data protection research firm KuppingerCole has recognized Gigya as the Overall Leader in the Customer Identity and Access Management (CIAM) market! In KuppingerCole’s new report – “Leadership Compass – CIAM Platforms” – twelve CIAM vendors are rated in four categories: Overall Leadership, Product Leadership, Market Leadership, and Innovation Leadership. Not only is Gigya the one company to be named an Overall Leader, but also the only one to be named a...

Read More

RSA Extends Identity Assurance to the Cloud

RSA, a Dell Technologies business, extends its authentication market leadership with a series of new capabilities for its RSA SecurID Access solution. Enhancements include a cloud-based Authentication-as-a-Service option aimed at delivering seamless access to both on-premises and cloud-based resources and systems, and additional dynamic, risk scoring functionality that is designed to deliver convenient and secure access for any user, anywhere, any time. As cloud and mobile use grows, and the user access base expands to include contractors, vendors, partners and customers, organizations...

Read More

PATECCO’S TEAM TALKS ABOUT DIGITAL TRANSFORMATION AND DATA SECURITY AT EIC 2017

PATECCO Management team takes part in European Identity & Cloud Conference 2017 in Munich. The company team made a video production and panel discussion on the hot topics about Digital Transformation and Privacy & Data Security. PATECCO Management team takes part in European Identity & Cloud Conference 2017 in Munich. The company team made a video production with the principal analyst of Kuppingercole – Mr. Martin Kuppinger. The interview discussion was focused on the topic about “Knowing and Managing the Risk of Service Based Digital Business...

Read More

Microsegmentation in the data center Improved Separation

Microsegmentation promises substantial improvements over classic architectures for the protection of applications and increased security when building out the efficiency of a data center. Microsegmentation breaks a network or data center into various segments to enhance its efficiency or security. The idea behind segmentation became an established technique once virtual local area networks (VLANs) came into use. From the very beginning, security was a central focus for VLAN segmentation, because it divided network domains into smaller parts and then protected movement of data among...

Read More

Five cyber security imperatives for all companies

There are five things all companies should ensure they are doing in terms of cyber security All organsations should do everything they can to control what they can to improve their resilience to cyber attack, according to Scott Carlson, technical fellow and executive security advisor at BeyondTrust. “There are five things that I think are non-optional when it comes to cyber security and controlling identity and privilege,” he told the  European Identity & Cloud Conference 2017  in Munich.

Read More

One Identity Customer Nestlé Wins Prestigious 2017 KuppingerCole European Identity and Cloud Award

One Identity , a proven leader in helping organizations get identity and access management (IAM) right, today announced its long-standing customer, Nestlé, the world’s leading nutrition, health and wellness company has been recognized by industry-leading analyst firm KuppingerCole as a winner in the “Best Identity and Access Management” category at this year’s European Identity and Cloud Conference. The distinguished accolade was presented to Nestlé for its deployment of One Identity solutions (including One Identity Manager, One Identity Password...

Read More

Allianz researchers working with car makers on cyber security

Allianz Germany is working with the local car manufacturing industry to highlight the vulnerabilities in the electronics systems of vehicles that can be exploited by criminals As the number of electronic systems in cars has increased, they have become more vulnerable to cyber attack, according to Stephan Gerhager, chief information security officer at Allianz Germany. “I started a research project into these vulnerabilities because, as insurers, we wanted to understand how vehicles are protected from criminals,” he told the  European Identity & Cloud Conference...

Read More

Blockchain economy on the horizon

Blockchain technologies will enable many new and disruptive business models than the internet itself, an expert predicts The world is moving towards a  blockchain -based economy because of its inherent security and lack of third-party involvement, according to  William Mougayar , venture advisor and author.  “The blockchain economy will be even bigger than the web economy in the next couple of years,” he told the  European Identity & Cloud Conference 2017  in Munich.

Read More

Automation can turn tables on cyber attackers

Security defenders should use automation to turn the tables on attackers, according to the CTO of the US Department of Homeland Security Cyber security is an economics problem, according to Richard Struse, chief advanced technology officer at the US Department of Homeland Security. “The application of cyber threat intelligence with automation can help change the economics away from benefiting our adversaries to benefitting the defenders in cyber space,” he told the  European Identity & Cloud Conference 2017  in Munich.

Read More

Cognitive security is the future, says Martin Kuppinger

Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger User organisations should investigate  cognitive  security now because that is the future, according to  Martin Kuppinger , principal analyst at KuppingerCole. “Security suppliers should understand the potential of cognitive security and hire the rare experts in this area,” he told the opening session of the  European Identity & Cloud Conference 2017  in...

Read More

Wie aus vielen Cloud Services eine integrierte Lösung wird

Wenn Unternehmen in "die Cloud gehen", muss die IT-Abteilung sich wandeln. Sie wird noch stärker als bisher zum Dienstleister der Fachabteilungen. Cloud-Integratoren können dabei entscheidend helfen. Mehr als die Hälfte der Unternehmen (55 Prozent) betrachtet ihre IT als "hybrid". Das ergab die Studie "How to Balance Digital Transformation and User Security" von  KuppingerCole und Pierre Audoin Consultants . Zu einem ähnlichen Ergebnis kommt der  CIO-Report 2016 von BT.  Demnach gaben zwei Drittel der weltweit befragten  IT-Entscheider...

Read More

Cloud-Computing - machen wir!

Aber was ist denn CASB? Cloud-Computing wächst rasant und hat die IT-Landschaft grundlegend verändert. Und dies auch im Unternehmensbereich. Laut Cloud-Monitor 2016 des Branchenverbandes Bitkom nutzten im vergangenen Jahr erstmalig mehr als 50 Prozent aller deutschen Unternehmen Cloud-Dienste (54 Prozent, ganz genau gesagt). Die Gründe dafür sind vielfältig. Geringere Kosten, bessere Skalierbarkeit und unerreichte Flexibilität beim ortsunabhängigen Zugriff dürften aber im Mittelpunkt stehen. Kleinere Unternehmen profitieren davon, dass die eigene...

Read More

Cognitive security is key to cyber arms race, says KuppingerCole

Cognitive computing technology is an area of artificial intelligence that is expected to help provide businesses with the security tools they need to deal with new and emerging cyber threats The data breaches that are frequently making news headlines indicate that businesses need new tools and approaches to cyber security, according to  Martin Kuppinger , principal analyst at KuppingerCole. “Attackers are becoming increasingly professional, so we need to find better ways to defend organisations,” he told Computer Weekly. There is a growing realisation that there...

Read More

Fake tech support spiders on the world wide web

Fake tech support should be incorporated into security awareness training as it can be a highly effective way to trick employees into granting access to enterprise computer systems Cyber criminals are always innovating: improving their malware products and “ leaning  out their processes” to find new ways to take money from unsuspecting users. To protect against cyber crime, data breaches, and botnets, we train our users to avoid  social engineering ,  phishing , and questionable online content. For example, many of us are familiar with the cold calls...

Read More

Forum Systems wird auf KuppingerColes European Identity & Cloud Conference Erkenntnisse zur API-Sicherheit vermitteln

Workshop unter Leitung von CTO Jason Macy behandelt Compliance mit PSD2, Open Banking-Standards und GDPR Forum Systems Inc.  kündigte heute an, dass CTO Jason Macy im Rahmen der  European Identity & Cloud Conference 2017  (EIC) Best Practices für die API-Sicherheit und Einhaltung der aufkommenden API-basierten Industriestandards vermitteln wird. Das mittlerweile im 11. Jahr stattfindende KuppingerCole-Event wird vom 9. - 12. Mai im Dolce Ballhaus Forum Unterschleissheim in München (Deutschland) ausgerichtet und Themen abdecken, die im Zusammenhang...

Read More

UBS applies data protection for compliance and competitive advantage

Swiss bank UBS aims to get greater value out of investments in sensitive data protection systems by using its security capabilities as a differentiator UBS  recognised the growing importance of protecting sensitive customer data and has been honing its systems to ensure that critical data is always kept secure. This applies not only to customer data in IT applications, but also when such data is extracted in the form of files. “Our goal was to have a sophisticated system for protecting customer data that can also be used as a way of differentiating us from our...

Read More

PSD2: An Open Concept in Banking Mandating the Use of APIs

A revolution is occurring in European banking and APIs are leading the way. Adopted in 2007, the  Payment Services Directive (PSD)  “provides the legal foundation for an EU single market for payments, to establish safer and more innovative payment services across the EU.” Legislated by the European Commission, the objective of the PSD “is to make cross-border payments as easy, efficient and secure as ‘national’ payments within a Member State.” To accommodate the rapid rise of new online payment providers – third-party payment...

Read More

PSD2 – Eine Herausforderung für die Finanzwirtschaft

Die überarbeitete Payment Services Directive der EU tritt bereits im Januar kommenden Jahres, am 13. Januar 2018, in Kraft. Das gibt für eine Anpassung bestehender Prozesse und eine angemessene Zukunftsstrategie nur wenig zeitlichen Spielraum Ein zentrales Thema, das in der Finanzwirtschaft zu erheblichen Änderungen führen wird, hat sich in der öffentlichen Wahrnehmung noch nicht umfassend durchgesetzt. Dies ist anders als bei der  Europäischen Datenschutz-Grundverordnung (EU-DSGVO ), die sich durch stetigen Hinweis durch Presse, Hersteller,...

Read More

5 Alternatives to The Gartner Magic Quadrant for SIEM

Gartner is one of the loudest voices in enterprise technology— they’re world’s largest information technology research and advisory company, and generally, the first source consulted when it comes to evaluating enterprise IT solutions, and enterprise Identity Management is no exception. But while the Gartner’s flagship  Magic Quadrant  report for SIEM  i s a great resource for finding out who the top contenders are, it doesn’t give a particularly in-depth analysis behind what each solution offers or how they perform across different...

Read More

Information security key to digital era business models

Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way In the digital era, boundaries between the various industry sectors are becoming blurred as they begin to collaborate for mutual benefit, according to Laurens Hamerlinck, innovation manager at ABN AMRO. Traditionally, banking institutions have been large, closed organisations that developed and managed a huge range of products themselves, but that is changing as some seek to work more...

Read More

KuppingerCole names SecureAuth as Leader for Product and Innovation in Adaptive Authentication

SecureAuth is named Leader for its secure and innovative solutions that are both modern and flexible as they implement rapidly, scale effortlessly, and adapt to each customer’s unique needs and infrastructure. What does KuppingerCole Say About SecureAuth? "As a pure play adaptive authentication product, SecureAuth is one of the most compelling choices. Their broad support of innovative MFA, federation, and directory options is outstanding. Wide support of IAM standards allows interoperability with many other vendors’ products.”   – John Tolbert,...

Read More

IBM Guardium Takes the Overall Leadership Position in the First Database Security Leadership Compass by KuppingerCole

We’re pleased to announce that IBM Guardium was named the overall leader in the “KuppingerCole Leadership Compass for Database Security.” The report focused on 10 vendors and selected the overall leader based on a combined rating that accounts for the strength of products, the market presence and the innovation of vendors. Digging Into the Database Security Market Segment Author Alexei Balaganski wrote: “Databases are arguably still the most widespread technology for storing and managing business-critical digital information. Manufacturing process...

Read More

Getting Ready for GDPR

G-D-P-R is an abbreviation that could be among the four most important letters in digital marketing privacy compliance. It is shorthand for the General Data Protection Regulation, and in May 2018 it will become the privacy and data handling standard for the European Union.  If your company has even  one  customer in the EU, you need to know the ins and outs of the GDPR and start preparing now. Dr. Karsten Kinast , a data protection and privacy researcher at the firm KuppingerCole and an expert in GDPR, explained these ins and outs in a Nov. 10 webinar sponsored by...

Read More

Wie aus vielen Cloud-Services eine integrierte Lösung wird

Wenn Unternehmen in „die Cloud gehen“, muss die IT-Abteilung sich wandeln. Sie wird noch stärker als bisher zum Dienstleister der Fachabteilungen. Cloud-Integratoren können dabei entscheidend helfen. Mehr als die Hälfte der Unternehmen (55 Prozent) betrachtet ihre IT als "hybrid". Das ergab die Studie "How to Balance Digital Transformation and User Security" von  KuppingerCole und Pierre Audoin Consultants . Zu einem ähnlichen Ergebnis kommt der  CIO-Report 2016 von BT.  Demnach gaben zwei Drittel der weltweit befragten...

Read More

Netzpiloten sind Partner der European Identity & Cloud Conference 2017

Vom 9. bis 12. Mai ist es wieder soweit und die nunmehr 11.  European Identity & Cloud Conference  (EIC) von Veranstalter KuppingerCole findet statt. Veranstaltungsort ist das Dolce Ballhaus Forum in Unterschleissheim bei München. Die EIC ist das führende Event für Identitäts- und Zugriffsmanagement, Unternehmensführung, Risikomanagement und Compliance und Cloud Security. Rund 700 Teilnehmer von internationalen Unternehmen werden auf der EIC Best Practices und Diskussionen anbieten. 29 internationale Top-Speaker werden zu Themen...

Read More

Probleme durch Bereitstellung von APIs für Drittanbieter

Während die Änderungen bei den Authentifizierungsverfahren im Rahmen der PSD2 (European Payment Services Directive) aktuell viel Aufmerksamkeit erhalten, geht ein wesentlich heikleres Thema mit viel größeren und komplexeren Auswirkungen auf die IT-Sicherheit beinahe unter: Die verpflichtende Bereitstellung von APIs für Drittanbieter. Neben den  Änderungen bei den Authentifizierungsverfahren (Fachbeitrag auf Security-Insider)  verlangt die PSD2, dass Application Programming Interfaces (APIs) zu verschiedenen Aspekten rund um den Zahlungsverkehr...

Read More

IAM a core building block for GDPR compliance

Identity and access management is key to enabling organisations to become compliant with the GDPR, increase security and improve customer relationships, according to a senior analyst at KuppingerCole A strong indemnity and access management (IAM) strategy is an important element of any programme to prepare organisations to comply with new European Union data protection rules, a senior analyst has said. “A strong, robust, reliable and trustworthy IAM strategy and capability is a core building block required to achieve compliance with the [ General Data Protection Regulation ]...

Read More

Wie aus vielen Cloud-Services eine integrierte Lösung wird

Wenn Unternehmen in „die Cloud gehen“, muss die IT-Abteilung sich wandeln. Sie wird noch stärker als bisher zum Dienstleister der Fachabteilungen. Cloud-Integratoren können dabei entscheidend helfen. Mehr als die Hälfte der Unternehmen (55 Prozent) betrachtet ihre IT als "hybrid". Das ergab die Studie "How to Balance Digital Transformation and User Security" von  KuppingerCole und Pierre Audoin Consultants . Zu einem ähnlichen Ergebnis kommt der  CIO-Report 2016 von BT.  Demnach gaben zwei Drittel der weltweit befragten...

Read More

Probleme durch Bereitstellung von APIs für Drittanbieter

Während die Änderungen bei den Authentifizierungsverfahren im Rahmen der PSD2 (European Payment Services Directive) aktuell viel Aufmerksamkeit erhalten, geht ein wesentlich heikleres Thema mit viel größeren und komplexeren Auswirkungen auf die IT-Sicherheit beinahe unter: Die verpflichtende Bereitstellung von APIs für Drittanbieter. Neben den  Änderungen bei den Authentifizierungsverfahren  verlangt die PSD2 (European Payment Services Directive), dass APIs (Application Programming Interfaces) zu verschiedenen Aspekten rund um den Zahlungsverkehr...

Read More

Diversity is strength

During wintertime in Norway, when the sunlight doesn’t last more than a couple of hours a day, Balázs Némethi, as a fresh expatriate didn’t have friends around to fight the lonely evenings. When others would find a hobby or watch TV, he decided to start a project to focus on. The project he ended up with is not what one would call  small . Taqanu is a startup for providing financial inclusion for refugees. They want to create a blockchain-based digital identity and offer banking services. If you want to do anything in a new country: find a job, find...

Read More

Propentus attending EIC 2017 as a silver sponsor

Propentus is attending  European Identity and Cloud Conference 2017  as an exhibitor and silver sponsor. The event is taking place May 9-12 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany.  We'll be there to talk about  our turnkey IGA solution  shifting the focus from technology to business value creation. You can find us in the Wintergarden area - stop by for a chat. This is the 11th time for EIC - Europe's leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC) and Cloud Security....

Read More

Cloud Security : PATECCO Takes Part as a Silver Sponsor in EIC 2017

For the third time the Identity and Access Management company PATECCO will be a silver sponsor and exhibitor at the  European Identity & Cloud Conference  2017, organised by Kuppingercole. It takes place  May 09  – 12, 2017 at the Dolce Ballhaus Forum Unterschleissheim,  Munich, Germany . EIC 2017 is known as Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as  Cloud Security . The Conference also provides world class list of thought leaders and experts providing a...

Read More

Newly Focused One Identity Finishes Record Year of Helping Organisations Get Identity and Access Management Right

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, today announced a series of corporate milestones and record achievements, headlined by recognising nearly a quarter billion dollars in bookings during the recently concluded fiscal year. A newly focused business operating within Quest Software, One Identity’s phenomenal growth is due to the increased reliance of customers and partners on the company’s continued commitment to customer success and solution innovation. Having recently divested from Dell, and now operating...

Read More

Customer IAM as Seen Through the Eyes of KuppingerCole

The fact that customer experience is the new competitive battleground is no longer news. Building engaging customer experiences is becoming an important digital business initiative for enterprises all over the world. However, the architecture that supports these experiences must be scalable and secure, and and it must ensure compliance with privacy regulations. These requirements are driven by a number of factors including increased competition from brands that are building engaging customer experiences, diverse privacy regulations across industries and geographies and a growing number of...

Read More

Strategien für eine adaptive Authentifizierung

PSD2, die European Payment Services Directive soll Kunden bei Online-Zahlungen besser schützen, bei Zahlungen über europäische Grenzen hinweg mehr Sicherheit bieten und die Entwicklung und Nutzung von innovativen mobilen und Online-Zahlungen fördern. Damit hat die ab dem 13.01.2018 wirksame EU-Direktive auch unmittelbare Auswirkungen auf die IT-Sicherheit bei den betroffenen Payment-Providern. Für Zahlungsdienstleister lassen sich im Wesentlichen drei Themenblöcke identifizieren, die beachtet und für die geeignete Lösung umgesetzt werden...

Read More

PATECCO Takes Part as a Silver Sponsor in EIC 2017

For the third time the  Identity and Access Management company  - PATECCO - will be a silver sponsor and exhibitor at the European Identity & Cloud Conference 2017, organised by Kuppingercole. It takes place May 09 – 12, 2017 at the Dolce Ballhaus Forum Unterschleissheim, Munich, Germany. EIC 2017  is known as Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. The Conference also provides world class list of thought leaders and experts providing a unique mix of best...

Read More

Ganzheitliche Sicherheit für ein digitales Wirtschaftswunder

Über eine Milliarde Dollar pro Jahr investiert Microsoft in den Bereich Sicherheit, um seine Kunden bestmöglich zu schützen. Hierbei verfolgen wir einen  einheitlichen Ansatz , um eine umfassende Sicherheitslösung zu bieten, die sowohl Pre-Breach- als auch Post-Breach-Maßnahmen integriert. Microsofts  ganzheitlicher Sicherheitsansatz  bietet Firmenkunden gezielte Angebote zum Schutz von  Geräten ,  Identitäten ,  Apps und Daten  sowie der  Infrastruktur . Das Besondere: Die Technologien werden kombiniert...

Read More

Cybercrime auf der Spur: Microsofts digitale Detektive

Cybersicherheit ist eines der wichtigsten Themen unserer Zeit. Die „digitale Revolution“ verändert unsere Lebens- und Arbeitswelt auf nachhaltige Weise. So bietet die Digitalisierung einzigartige Möglichkeiten für Wachstum und Zukunftsfähigkeit, mit der exponentiellen Vernetzung wächst aber auch die potentielle Angriffsfläche von Unternehmen wie Kunden. Jeden Tag werden weltweit circa  eine Millionen Menschen Opfer  von Cyberkriminalität – pro Sekunde trifft es 12 Menschen, die gerade online sind. Schadsoftware kostet der...

Read More

Preparing for “The Year of the Customer”

In 2017, the most successful companies will figure out how to combine data protection and security with true customer personalization. Gigya CEO, Patrick Salyer shares five predictions that will help businesses improve customer interactions and prepare for “the year of the customer” Customer identity management has become a critical focus for nearly every marketing team in every industry. A solution that allows marketers to convert anonymous online visitors into known customers is a major advantage to your organization and the linchpin that sets you apart from the...

Read More

ForgeRock an Innovation Leader in KuppingerCole Leadership Compass for Adaptive Authentication

We’re excited to share that ForgeRock has been named an Innovation Leader in the latest  KuppingerCole  Leadership Compass for Adaptive Authentication. Adaptive authentication, called  ‘Adaptive Risk’  in the ForgeRock Identity Platform, leverages contextual information including time of day, location, and if the request is from a known device to assess the risk of connections and apply the proper policies. This allows organizations to have greater control over the conditions in which they allow access to a resource. Adaptive authentication...

Read More

Leadership Compass: Database Security - 70970 - KuppingerCole

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a...

Read More

APAC banks warming up to big data

Financial institutions in the APAC region fear they may be left behind if they don’t embrace big data While global banks in Asia-Pacific (APAC) have been adopting big data in droves, more local banks in the region are now doing so to gain a “second-mover advantage”, according to a senior executive from Cloudera. Without naming specific banks, Cloudera’s financial services industry lead Steve Totman said the smaller banks in APAC now know that they need to embrace big data to  detect fraud  and  gain deeper consumer insights . The drivers for...

Read More

Banking customers want more biometrics than what banks are offering, says KuppingerCole

Banking customers want more biometric authentication systems than what is currently being offered by their banks, according to a study by  KuppingerCole .  Customers want to use the device of their choice and an authentication process they are familiar with, for example built-in biometrics, or an approach which is convenient to them, says KuppingerCole. The analyst adds that the lack of support for adaptive authentication and biometrics “stands in stark contrast to this expectation”. The KuppingerCole study, The Future of Banking...

Read More

IoT und Smart Home: Privatsphäre im intelligenten Zuhause

Das intelligente Zuhause rückt immer mehr in den Fokus der Anwender und der Industrie. Hersteller und Dienstanbieter, aber auch die Anwender stehen vor der Herausforderung, eine sinnvolle Herangehensweise an dieses sensible und komplexe Thema zu finden. Hier sind nicht zuletzt auch Standards und die steuernde Einflussnahme der Politik relevante Faktoren. Smart Home stellt einen immens wachsenden und strategisch wichtigen Marktsektor für viele Anbieter von Produkten, Apps und Services dar. Doch der Blick auf Sicherheit, Vertraulichkeit und Nachhaltigkeit erfordert es, dass...

Read More

CA Technologies named an Overall Leader in Adaptive Authentication

CA Southern Africa has revealed that CA Technologies (NASDAQ: CA) has been named an " Overall Leader" in Adaptive Authentication  in the recently released Leadership Compass report from KuppingerCole, a leading analyst firm for identity and access management. CA Advanced Authentication  was evaluated for the report, which assessed solutions focused on adaptive authentication – the process of gathering additional attributes about users and their environments, and evaluating the attributes in the context of risk-based policies. "CA Advanced Authentication is quite...

Read More

Getting from Here to There: Best Practices for Data Migration When Moving to a Modern Customer Identity Platform

Customer Identity and Access Management (CIAM) is a hot topic of late for enterprises that directly communicate online with their customers, attracting attention from analyst firms including  Gartner ,  Forrester and  KuppingerCole . However, a CIAM system isn’t really useful if it contains no customer identities, or if those identities don’t retain sufficient data about customers to be useful.  When a company migrates to a new CIAM solution, it is very common to also migrate data from their old site, and perhaps merge data from multiple digital...

Read More

HOW NOT TO FAIL WITH YOUR IAM PROGRAM – THE STAKEHOLDERS’ PERSPECTIVE

Do you want to successfully plan and deploy an identity and access management (IAM) program? If this is your goal, then ignore your multiple stakeholders at your peril. Yes, the challenge of stakeholder engagement can be daunting. After all, the various stakeholders across an enterprise bring a range of diverse and divergent interests, capabilities, and values to an IAM implementation. These stakeholders all have significant–even if differing–interests in IAM. This is because IAM variously supports (a) rapid, dynamic growth within enterprises, (b) the expansion of boundaries to...

Read More

European Identity Cloud Conference 2017

Comme tous les ans, le cabinet de conseil Kuppingercole organise un évènement Européen centré sur la gestion des identités et le cloud. Cette année, l’EiC se tiendra du 9 au 12 mai 2017 à Munich, en Allemagne. L’agenda vient d’être mis en ligne, vous le retrouverez [  ICI  ] Certains  speakers  sont de grande qualité, comme tous les ans Kim Cameron sera de la partie. Je préfère vous prévenir, ce n’est pas donné, mais c’est le prix de...

Read More

CipherCloud Wins Nine 2017 Info Security Products Guide (ISPG) Global Excellence Awards at RSA 2017

CipherCloud, the industry pioneer and leader in cloud security, data protection and governance, today announced that it has been named a winner in nine different award categories, including a Grand Trophy for industry awards leader, at the 2017 ISPG Global Excellence Awards®.  CipherCloud also earned the 2017 Cybersecurity Excellence Award for Mobile Device Management (MDM) for its new mobile app launched this week at RSA 2017. These industry awards recognize CipherCloud's advanced leadership in data security in the cloud, including the first end-to-end encryption from...

Read More

Securonix Unveils Big Data Security Analytics Platform With Unprecedented Threat Prediction, Detection and Response Capabilities

The cyber threat landscape has become more treacherous with advanced targeted attacks, porous perimeters and increased business interdependencies. The landscape has evolved, but legacy security tools have not. To address this challenge, organizations need a comprehensive security solution that can perform context-based, advanced analytics over massive volumes of data in real time and provide actionable intelligence. SNYPR delivers on the promise that legacy tools such as SIEM have failed to fulfill. Leveraging a big data platform that is scalable and economical, along with patented,...

Read More

Securonix Unveils Big Data Security Analytics Platform With Unprecedented Threat Prediction, Detection and Response Capabilities

Securonix, the market leader in security analytics and predictive cyber threat detection, announced today the general availability of a next-generation security analytics platform that combines a big data security lake, security incident and event management (SIEM), user and entity behavior analytics (UEBA) and cross-channel fraud monitoring and detection. The SNYPR Security Analytics Platform can be delivered as a complete, end-to-end platform or in modular components. The cyber threat landscape has become more treacherous with advanced targeted attacks, porous perimeters and increased...

Read More

CA Technologies Named an Overall Leader in Adaptive Authentication

CA Advanced Authentication  was evaluated for the report, which assessed solutions focused on adaptive authentication — the process of gathering additional attributes about users and their environments and evaluating the attributes in the context of risk-based policies. “CA Advanced Authentication is quite flexible: it is available as a standalone product, but also integrates with CA’s and other IAM vendors’ products. It can be deployed on-premises or in the cloud, where it is fully multi-tenant,” John Tolbert, lead analyst at KuppingerCole, wrote in...

Read More

Beratungsunternehmen sehen Gigya als führend im Bereich Customer Identity and Access Management

Das kalifornische Unternehmen Gigya wurde von den KuppingerCole-Analysten in einer vor kurzem veröffentlichten Studie als marktführendes Unternehmen im Bereich CIAM (Customer Identity and Acess Management) eingestuft. (PM) Hamburg, 24.01.2014 - KuppingerCole mit Hauptsitz in Wiesbaden ist ein führendes Analystenhaus mit Schwerpunkt auf den Segmenten Information Security und Identity und Access Management (IAM). Im neuen Bericht „Leadership Compass for CIAM” haben die Analysten zwölf CIAM-Anbieter detailliert untersucht und anhand der Kriterien...

Read More

Risk, Governance, and Compliance is all about Visibility

It is no secret that enterprises moving towards digital transformation are taking on more risk. However, measuring and managing that risk has evolved into more of an art than science. And as will any art, judging effectiveness is all but impossible.  A critical failing when it comes to identifying risk and its consequences. While risk is nothing new, technology has changed how risk is viewed and more importantly, how risk is amplified. Something enterprises have become well aware of as their intellectual property transforms from the physical realm to the digital realm. Add to...

Read More

EU-Datenschutz-Grundverordnung: weniger als 500 und fallend

I n nicht mal mehr 500 Tagen wird die Europäische Datenschutz-Grundverordnung bindend. Eine Vielzahl Unternehmen hat bislang noch nicht angemessene Maßnahmen und deren Umsetzung initiiert. Es empfiehlt sich, heute damit zu beginnen, sich konkret und umfassend mit der Ermittlung und Erfüllung ihrer Anforderungen zu beschäftigen. Jeder, der aktiv in IT-Projekten involviert ist, lernt, dass der produktive Anteil am Gesamtumfang und die tatsächliche Laufzeit eines Projektes sich in der Praxis deutlich unterscheiden. Von der Budgetplanung zum Design, von der...

Read More

The Impact of GDPR Outside the EU

On 25 May 2018, the General Data Protection Regulation, or GDPR [1] , takes effect in the European Union.  The regulation mandates strict protection requirements over personal data concerning EU citizens.  Governments and companies inside the EU have been preparing, but many companies outside of the EU may yet be unaware of how this regulation will affect their businesses.   GDPR applies to any organization that holds or processes data on EU citizens, regardless of where it is headquartered.   This includes companies that have employees in the EU, sell or market...

Read More

TechDemocracy Introduces Intellicta – the First Platform to Offer Enterprises Holistic Assessment of Compliance, Security, Risk and Governance Tools

-  TechDemocracy, LLC,  a global cyber risk assurance solutions provider, today announced the availability of the  Intellicta platform  to help boards of directors and senior management teams bridge the visibility gaps across their compliance, security, risk, and governance functions. The platform, informed by a standards-based framework and risk assurance center, analyzes in-depth the effectiveness of existing cyber risk and compliance solutions and offers a consolidated view of enterprise risk posture. Companies today face significant hurdles implementing...

Read More

Identitätsmanagement-Plattform ForgeRock setzt mit neuer Zustimmungslösung neue Datenschutzvorschriften für Kundendaten um

ForgeRock, führender Open-Platform-Anbieter von Identitätsmanagement-Lösungen, stellt seine neueste Plattform vor. Integraler Bestandteil der Identity Management Plattform ist die Implementierung des „User-Managed Access“-Standards (UMA). Aufbauend auf den Prinzipien „Consent by Default“ und „Consent by Design“, ist die ForgeRock Identity Platform die erste Identitätsmanagement-Plattform, die eine UMA-Implementierung unterstützt, in der das Zustimmungsmanagement von Verbrauchern und die Weitergabe von Daten gebündelt sind....

Read More

Top 3 Things CMOs Need to Know About Customer Identity and Access Management

Thankfully for marketers, trying to engage large demographics with one-size-fits-all messaging is becoming a distant memory. Digital business opens up direct one-to-one avenues of connection. It's made our jobs imminently more interesting and, at the same time, more challenging. Personalized, relevant interaction creates opportunities to win and retain customers in ways that have never been possible before. It also requires that we know our customers individually. Digital personalization depends on accurate customer identity data collected and used in real time across multiple...

Read More

CA Technologies

CA Technologies helps thousands of companies succeed in the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate -across mobile, private and public cloud, distributed and mainframe environments. “CA Technologies’ solutions are known for the broadest range of supported systems, including the most exotic and legacy ones, and a high degree of integration between individual products. This makes it a...

Read More

New game, new rules: 3 steps to secure your bank in the digital age

Banks all around the world are re-imagining their businesses to put customer demands front and center. They are undergoing massive digital transformation processes to do so; however, these transformations, coupled with an always-connected, digitally savvy customer and an emerging “hacker industry,” create new and heightened security risks that banks must deal with immediately. This is a new normal for banks, as evidenced by  recent attacks such as the SWIFT hack , and maintaining the security of their systems and customer data will require them to follow new rules...

Read More

Beratungsunternehmen sehen Gigya als führend im Bereich Customer Identity and Access Management

Das kalifornische Unternehmen Gigya wurde von den KuppingerCole-Analysten in einer vor kurzem veröffentlichten Studie als marktführendes Unternehmen im Bereich CIAM (Customer Identity and Acess Management) eingestuft.  KuppingerCole mit Hauptsitz in Wiesbaden ist ein führendes Analystenhaus mit Schwerpunkt auf den Segmenten Information Security und Identity und Access Management (IAM). Im neuen Bericht „Leadership Compass for CIAM” haben die Analysten zwölf CIAM-Anbieter detailliert untersucht und anhand der Kriterien Marktposition,...

Read More

Milliarden für die IT-Sicherheit – Dennoch Angriffe so leicht wie nie

Unternehmensnetze werden immer komplexer, aber auch die Investitionen in die Entwicklung von Sicherheitstechnologien steigen stark. Dennoch scheint es, als ob es noch nie leichter war, ein Unternehmensnetzwerk zu infiltrieren als heute. Cloud, Mobility, fehlende Fachkräfte, falsches Sicherheitsbewusstsein, IoT-Geräte, die Liste von potenziellen Einfallstoren für Cyberkriminelle lässt sich wohl noch eine Weile fortsetzen. Kritisch ist unter vielen Faktoren auch die Tatsache, dass die Kriminellen nicht mehr wie in alten Tagen darauf aus sind, Strukturen zu...

Read More

Netzpiloten sind Partner der Digital Finance World 2017

Vom 01. Bis 02. März 2017 findet in Frankfurt der Kongress  KuppingerCole ’s  Digital Finance World  2017 (DFW) statt. Die Finanz- und Versicherungswelt trifft sich dort, um sich über Innovation und die digitale Transformation ihrer Betriebe auszutauschen. An zwei Tagen von jeweils 8 bis 18 Uhr bedient die Digital Finance World ihre Besucher mit allerlei Informationen zu den Themen Blockchain, Bitcoins, Big Data und das Internet der Werte (IoV). Der Veranstalter KuppingerCole ist eine seit 2004 international und unabhängig arbeitende...

Read More

AdNovum IAM Leader in Germany with NEVIS

In 2016, AdNovum was awarded Security Rising Star by the German research and consulting company Experton for the NEVIS Security Suite for the first time. In addition, it was awarded product and innovation leader status in access management and federation by KuppingerCole. Now, AdNovum's Security Suite NEVIS has consolidated its position in Germany. In its "Security Vendor Benchmark 2017", the Experton Group identifies and compares 27 companies as relevant providers in the German market for the identity and access management (IAM) solutions segment and positions AdNovum in the leader...

Read More

Stärkung der eigenen Marke durch White-Label-Lösungen

Die Möglichkeit Cloud-Sicherheitslösungen unter der eigenen Marke anzubieten, bedeutet für CensorNet-Partner ein Zusatzgeschäft München/Unterföhring (ots)  -  Partner, Reseller und Managed Service Provider (MSP) können ihr Portfolio mit White-Label-Lösungen von CensorNet erweitern. Die cloud-basierten Mail-, Web- und Cloud Application Control-Sicherheitslösungen von CensorNet können so gestaltet werden, dass sie in der Optik komplett dem Markenauftritt eines Partners, Resellers oder MSP entsprechen. Diese erhalten dadurch...

Read More

Risiken privilegierter und gemeinsam genutzter Accounts

Privilege Management bezeichnet die Teildisziplin von IAM (Identity and Access Management), die sich darum kümmert, die Risiken hoch privilegierter Benutzer zu reduzieren. Wie kaum ein anderer Bereich von IAM befindet sich dieses Themenfeld im Wandel. Privilege Management wird je nach Anbieter auch als Privileged Account Management, Privileged User Management, Privileged Identity Management, aber auch als Shared Account Password Management und in anderer Form bezeichnet. Als Abkürzung bietet sich PxM an, für all die Sichtweisen auf das Management hoch privilegierter...

Read More

IT-Security @home: Wie ich das Botnetz vermeide

Technik und Gadgets haben sicher auch dieses Jahr für Kinder, Jugendliche und Erwachsene unterm Weihnachtsbaum gelegen. Doch wie damit umgehen? Anwender und Technikfreunde stehen vor der Herausforderung, zwischen Begeisterung und Faszination einerseits und Sicherheit und Privatsphäre andererseits tragfähige Entscheidungen auf Basis sinnvoller Maßstäbe zu finden. Um es vorwegzuschicken: Ich liebe technisches Spielzeug und Gadgets aller Art und habe in meinem Leben viel Nützliches, Unnützes und völlig Überflüssiges besessen,...

Read More

Gurucul Wins 2016 Homeland Security Platinum Award for Cyber Excellence

Gurucul , a leader in user and entity behavior analytics (UEBA) and identity analytics (IdA) for on-premises and the cloud, today announced that Gurucul Risk Analytics (GRA) received the Platinum Award for Best Cyber Excellence Solution in the AST Homeland Security Awards, aka the “ASTORS”, presented by  American Security Today . “Winning the 2016 ‘ASTORS’ Homeland Security Platinum Award capped a banner year for Gurucul,” said Saryu Nayyar, CEO of Gurucul. “This and the other awards we received last year provide further validation that...

Read More

Compliance: The GDPR and Consumer Identity Management

The upcoming General Data Protection Regulation (EU GDPR) will change the requirements for managing consumers’ personal data across the globe. The regulation’s scope is broad and also affects organizations outside of the EU. Striking a balance between meeting the new regulatory requirements and effectively serving customers in the age of Digital Transformation mandates a shift from siloed consumer data management to centralized Customer Identity Management platforms that support the balance between compliance, user consent, and optimizing the customer experience. In this...

Read More

Netzsicherheit und Betrugserkennung

Barc und KuppingerCole veröffentlichen gemeinsame Studie zum Thema Big Data und Informationssicherheit  Annähernd 90 Prozent der Befragten, die ihre Firma zu den Best-in-Class-Unternehmen zählen, sind der Überzeugung, dass Big-Data-Security-Analytics-Technologien beträchtliche Vorteile bringen In ihrer gemeinsam durchgeführten Studie "Big Data und Informationssicherheit" gehen KuppingerCole Ltd. und das Business Application Research Center (Barc) dem Einsatz von Big Data Anlytics im Kontext von Netzsicherheit und Betrugserkennung auf den Grund. Die...

Read More

Grizzly Steppe – what every organization needs to do

On December 29 th,  the FBI together with CERT finally released a  Joint Analysis Report  on the cyber-attacks on the US Democratic Party during the US presidential election.Every organization, whether they are based in the US or not, would do well to read this report and to ensure that their organization takes account of its recommendations.Once released into the wild – the tools and techniques and processes (TTPs) used by state actors are quickly taken up and become widely used by other adversaries. There are several well-known areas of vulnerability that are...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News