English   Deutsch

Reports

Filter
By topic:

2014
Date Title Price
20.03.14 The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity… €995.00
20.03.14 KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your… €995.00
14.03.14 Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal… €995.00
10.03.14 Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and… €995.00
27.02.14 Why Identity Federation, Cloud IAM, and API Management help organizations in meeting their business needs for agile business processes that connect the organization to their business partners and customers and manage access to Cloud applications. The need for a new organizational structure… €995.00
19.02.14 Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance… €995.00
28.01.14 Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them. €995.00

2013
Date Title Price
16.12.13 Recommendations for investing in Information Security in 2014. Predictions of the trends and hypes in Information Security in 2014. Advice on which of these trends and hypes to follow. free
11.11.13 Life Management Platforms (LMPs) combine personal data stores, personal cloud-based computing environments, and trust frameworks. They allow individuals managing their daily life in a secure, privacy-aware, and device-independent way. In contrast to pure personal data stores, they support… €495.00
28.10.13 This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with… €495.00
14.10.13 Prepare your IT Organization for the major evolutions affecting every business. Become ready to deal with today’s and tomorrow’s approaches to Cloud Computing. Build a competitive on-premise IT if you still need on-premise IT (and most will). Stay in control of your Business… €995.00
23.08.13 Securing your business against industrial espionage is about knowing your competitors and stopping your IP getting into their hands. In a Cloud environment you need to be considering all of the risks around Cloud provision, conflicts of interest, legal environments in remote locations, and… €495.00
16.08.13 Threats to critical National technical infrastructure such as Finance, Energy, Telecommunications and Government are a result of human nature, although difficult to treat in the abstract, technical controls can be applied to prevent, detect and resist attempts to subvert... €495.00
19.07.13 KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Product Reports and KuppingerCole Vendor Reports... free
14.05.13 Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a… €495.00
13.05.13 As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended… free
13.05.13 Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can… €495.00
13.05.13 The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that… €495.00
13.05.13 Most large organizations and a significant number of medium-sized organizations have heavily invested in IAM (Identity and Access Management) and IAG (Identity and Access Governance) during the past few years. Some projects went well; others did not deliver as expected. But even… €495.00
09.04.13 Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years,… €495.00
18.03.13 Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)… €495.00

2012
Date Title Price
30.11.12 Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these… €495.00
02.10.12 Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer… €495.00
21.09.12 The nascent API Economy is rapidly maturing and is shaping up to be both promising and challenging. Meeting the challenges of The API Economy will be as important for customers as embracing the personal computer was in the 1980s or embracing the mobile and tablet trends are today.… €495.00
09.08.12 A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to… €995.00
11.07.12 This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be… €995.00
09.05.12 The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread… €495.00
08.05.12 The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to… €495.00
07.05.12 This document extends the Advisory Note #70,607 “Migration Options for your Legacy Provisioning” and focuses on Oracle's Waveset Identity Provisioning system which is also historically known as Sun Identity Management/Manager or, in short, SIM, which before the acquisition of… €495.00
26.04.12 When looking at the topic of this research note, there are two major aspects to look at. One is about “critical infrastructures”; the other is about “the age of cyber attacks”. We’re looking at critical infrastructures in finance industry. However, this is at… €495.00
24.04.12 Welche Initiativen sollen 2012/2013 auf der Agenda von CIOs ganz oben stehen? Diese Advisory Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei… €495.00
20.04.12 As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of… free
19.04.12 Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT.… €495.00
13.04.12 Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Sun Microsystems by Oracle, of Novell by NetIQ, of Völcker by Quest Software and all the other acquisitions… €495.00
13.04.12 IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to… €495.00
13.04.12 Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the… free
13.04.12 Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have… €495.00
13.04.12 This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the varieties of Cloud services and delivery models, the principal risks associated with Cloud computing… €995.00
27.03.12 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking to… €495.00

2011
Date Title Price
16.12.11 How the Open API Economy is increasing and changing the need for Identity Management. Baking an organization’s core competence into an Open API is an economic imperative. It’s clear that three main trends are driving technology in all areas. It goes without saying… €295.00
06.10.11 In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation… €995.00
06.10.11 Cloud computing provides an opportunity for organizations to optimize the procurement of IT services from both internal and external suppliers. The Cloud is not a single model but covers a wide spectrum ranging from applications shared between multiple tenants to virtual servers used by a… €295.00
22.09.11 The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations… €295.00
02.08.11 This research note is the first of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the fundamental building blocks of, including what IT should be able to deliver to the business as… €995.00
12.07.11 Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)… €295.00
14.06.11 Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that… €295.00
10.06.11 As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time… free
09.06.11 This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides… €195.00
09.06.11 IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market… €95.00
10.05.11 Welche Initiativen sollen 2011/2012 auf der Agenda von CIOs ganz oben stehen? Die Research Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei… €95.00
10.05.11 IAM and GRC are two of today's most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market… €95.00
06.05.11 The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The Cloud covers a wide spectrum from shared… €95.00
24.03.11 Wie jedes Jahr haben die Analysten von KuppingerCole wieder die wichtigsten Trends im Markt für allgemeine IT, Cloud Computing, Governance, Risk Management und Compliance (GRC), Identity und Access Management (IAM) und Mobile Computing herausgearbeitet. An der Spitze dieser Listen steht… free
23.03.11 The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between… €95.00
15.03.11 Database Governance is the set of policies, procedures, practices and organizational structures ensuring the execution of database related activities in an organization according to defined strategies and controls. Database Governance is required to enforce Information Security for… €95.00
07.03.11 As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of… free

2010
Date Title Price
29.07.10 Desktop Virtualization and VDIs (Virtual Desktop Infrastructures) are key topics for many IT managers and decision makers. However, like with every hype topic, there are shortcomings. Investments in VDIs and Desktop Virtualization thus have to be done carefully, after weighing the… €195.00
02.07.10 This report covers vendors which are, from the KuppingerCole perspective, Hidden Gems in the mar-kets which we are analyzing. The “Hidden Gems” are vendors which are •    relatively small and •    innovative They might be established in… €195.00
03.05.10 By Victor Chang, Gary Wills and David De Roure This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forum´s Cloud Cube Model (CCM), we classify cloud… €30.00
02.05.10 GRC stands for Governance, Risk Management, Compliance. It is used to describe Information Tech-nology which supports these specific business requirements. This report provides a segmentation of the overall GRC market with its different elements, from the C-level dashboards down to… €165.00
28.04.10 As in the past years, Kuppinger Cole has worked out 10 Top Trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). These are complemented by 10 Top Trends in Cloud Computing. The most important trends are, from our perspective, an increasing level of… free
28.04.10 Wie jedes Jahr haben die Analysten von Kuppinger Cole wieder die zehn wichtigsten Trends im Markt für Identity und Access Management (IAM) sowie Governance, Risk Management und Compliance (GRC) herausgearbeitet. In diesem Jahr kommen erstmals die Top Ten Trends bei Cloud Computing… free
23.03.10 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions,… €165.00
08.03.10 For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought… €695.00

2009
Date Title Price
05.10.09 Governance, Risk & Compliance - these three terms, in short "GRC" are pretty widely used in these days. Unfortunately, there is great confusion in how this term is used. The reason for this confusion is with high probability the fact that it allows to sell pretty easily all… €195.00
29.09.09 This report explains XACML, an evolving standard in the field of access control. Access control in IT is of vital importance. Companies use access control technology to protect sensitive systems and information, and to keep assets safe. At the same time, compliance with external regulations… €165.00
23.09.09 Cloud Computing ist seit etwa zwei Jahren das Modewort schlechthin in der IT-Branche. Historisch geht Cloud Computing auf verschiedene Ansätze zur externen Bereitstellung von Anwendungen oder Speicherplatz, um die Unternehmens-IT zu entlasten oder sogar ganz zu ersetzen. ASP… €165.00
18.08.09 SAP Security is a wide field. Most SAP Technology Experts think that SAP Security is all about authorizations, user management, roles, profiles and all that highly complicated stuff. But it is like with protecting a house: if you only look at who has which keys for the doors, but forget to… €165.00
15.07.09 Cloud Computing wird häufig als der Bezug von Diensten aus dem Internet gesehen. Diese Definition ist nach unserer Einschätzung nicht korrekt. Der wesentliche Aspekt des Cloud Computings liegt darin, IT als Services zu betrachten, die flexibel bezogen und konfektioniert werden… €165.00
05.05.09 About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it… €165.00
02.05.09 Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service… €195.00
02.05.09 The term of “claims-based identity” and the idea overall of using the term “claim” in Identity and Access Management (IAM) has been introduced by Microsoft some two years ago but the concepts can be used in any environments and technologies can (and sometimes are)… €125.00
02.05.09 Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite… €95.00
02.05.09 Seit der Übernahme des norwegischen Herstellers MaXware durch SAP sind inzwischen rund zwei Jahre vergangen. Seit diesem Zeitpunkt hat sich SAP IM im Identity Management-Markt positioniert. Die von MaXware übernommenen Produkte wurden in dieser Zeit signifikant wei-terentwickelt.… €165.00
02.05.09 The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that… €165.00
02.05.09 GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. Kuppinger Cole observes an trend towards tools which integrate analysis, attestation, authorization management, risk management, Segregation of Duties controls, and role management… €165.00
09.02.09 The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for a quick overview on the progress of organizations. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report… €165.00
16.01.09 Enterprise Role Management describes an enterprise-wide approach for defining role models and roles for every type of system which requires roles, going beyond IAM and GRC requirements. Within that concept, there are typically three levels of roles, which we define as Business Roles,… €125.00

2008
Date Title Price
29.10.08 Free teaser for the complete Identity Management Roadmap 2009 free
15.10.08 €695.00
24.09.08 €295.00
16.09.08 Kuppinger Cole + Partner (KCP) hat als Ergebnis einerseits einer Ende 2007 durchgeführten Online-Befragung und zusätzlicher, im Zeitraum Dezember 2007 bis Juli 2008 durchgeführter persönlicher Interviews eine umfassende Studie zum Identity Management-Markt insbesondere… €195.00
23.07.08 Die OPENLiMiT Group ist ein junges, ehrgeiziges Unternehmen, dass sich vorgenommen hat, im Markt für so genannte Digitale Signaturen (auch „Zertifikate“ oder „eCarnets“) eine führende Rolle zu spielen. Während andere Anbieter ihre Produkte in der Regel… €95.00
22.04.08 Eine gemeinsame Studie von KCP und Ernst & Young AG Wirtschaftsprüfungsgesellschaft Steuerberatungsgesellschaft Deutschland €295.00
19.04.08 Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity Management. Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten. €195.00
19.04.08 GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. KCP expects that there will be tools which integrate analysis, attestation, authorization management, risk management, and role management functionalities to provide an overall GRC… €165.00

2007
Date Title Price
12.11.07 Der Report analysiert die aktuell vorgestellte Identity Management-Strategie von SAP und bewertet diese. Dabei wird sowohl auf die technische Ebene als auch die Service-Orientierung und Business-Orientierung einschließlich der Verbindung zu GRC-Ansätzen eingegangen. Der Report… €165.00
23.10.07 Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der… €165.00
25.07.07 Identity Management muss und wird sich von monolithischen, funktional orientierten Produkten in den kommenden Jahren in Richtung zu service-orientierten Ansätzen entwickeln. Dabei gibt es viele Facetten. Diese werden in diesem Report vorgestellt und bewertet. Insbesondere wird dabei… €95.00
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole