Advisory Note: EIC 2015 Trends and Hot Topics - 71301

Report Details

10 Information Security topics that were central at European Identity & Cloud Conference 2015


Date Title Price
May 26, 2015

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

free Get Access

Latest Related Reports

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs.  We examine the market segment, vendor product and service…

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-party identities puts an extra strain on existing IAM tools but management solutions that provide added…

Analyst Advice

Business Resilience Management (Crisis Roadmap for Beginners)

Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Leadership Brief

Security Fabric: A Methodology for Architecting a Secure Future

Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up…

Advisory Note

Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Utilities & Energy - 80265

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids are a more efficient offering for energy management, and new business models beyond the prosumer will require…

Executive View

Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80400

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office 365, SharePoint, Teams). Virtualization, encryption and fragmentation of data enabling secure and…

Executive View

Executive View: iWelcome IDaaS and CIAM - 80328

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-users as well as app developers. As an EU-based company, iWelcome strives to fulfill regional…

Leadership Brief

Leadership Brief: Beyond Marketing: The Future of Customer Interaction - 80292

Customer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as marketing, sales, service, support, and consultancy are part of customer experience (CX). Furthermore,…

Leadership Brief

Leadership Brief: 5G Impact on Organizations and Security - 80238

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains what it is and its likely impact on organizations and their security.

Executive View

Executive View: Onegini Connect - 80168

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expanding across Europe, and has global ambitions. They have expertise in EU regulations such as GDPR, PSD2 and…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Does Microsoft Double Key Encryption Help with Schrems II?

Does Microsoft Double Key Encryption Help with Schrems II?

On July 16th, 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for commercial purposes by an economic operator established in an EU Member State to another economic operator established in a third country.  The use of cloud services is now commonplace and has been increased due to the need for working from home due to the coronavirus pandemic.  In addition, [...]

Latest Insights

Hot Topics

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00