Reports

Reload reports without any filters applied

Selected Filter(s):

 All Reports  Advisory Note  Executive View  Leadership Brief  Leadership Compass  Product Report  Survey  Vendor Report  Whitepaper

 2016

top  

Date Title Price
Jul 26, 2016

Executive View: Deep Identity - 71453

Graham Williamson

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open to abuse. Deep Identity has developed an easy-to-use solution that adopts a role-based provisioning…

€190.00
Jul 22, 2016

Executive View: IBM QRadar Security Intelligence Platform - 72515

Alexei Balaganski

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and breaches, forensic analysis and incident response, as well as automated regulatory compliance.

€190.00
Jul 21, 2016

Executive View: Sophos Protection for Amazon Web Services - 71680

Mike Small

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges.

€190.00
Jul 19, 2016

Advisory Note: Blockchains and Risk - 71608

Mike Small

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks associated with the use of this technology and recommends an approach to managing…

€995.00
Jul 18, 2016

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Ivan Niccolai

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity assurance of connected things, scalable management of connected devices, and secure information transmission.

€995.00
Jul 18, 2016

Advisory Note: Blockchains and Cybersecurity - 71603

Ivan Niccolai

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the merely distributed critical systems the internet depends on today, but we cannot yet completely replace trusted third parties and human judgement with algorithms.

€995.00
Jul 18, 2016

Executive View: SailPoint IdentityIQ - 71319

Christian Himmer

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance, and minimizes risk by applying controls across all IAM services geared towards business users. They expand their libary of connectors and extend their integration of Mobile Device Management tools and cloud…

€190.00
Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

Ivan Niccolai

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its fine-grained database privilege management capabilities and well-designed administrator endpoint monitoring.

€190.00
Jul 06, 2016

Executive View: Auth0 Authentication Service - 71325

Graham Williamson

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are multiple identity providers to accommodate and problems are compounded when members of the public are…

€190.00
Jul 05, 2016

Executive View: ForgeRock OpenIDM - 71317

Ivan Niccolai

ForgeRock OpenIDM is a standards- and platform-centric product which combines proven reliability with ForgeRock’s commitment to innovation. Given the growing importance of customer-centric identity management, OpenIDM’s focus on performance, flexibility and the management of not only people, but devices and things makes this product worthy of serious consideration for…

€190.00
Jul 04, 2016

Executive View: Microsoft Azure Active Directory - 71550

Martin Kuppinger

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

€190.00
Jul 04, 2016

Executive View: Protected Networks 8MAN - 71520

Martin Kuppinger

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende Identity Management-Lösungen sinnvoll ergänzen.

€190.00
Jun 28, 2016

Executive View: EmpowerID Office 365 Manager - 71322

Alexei Balaganski

EmpowerID Office 365 Manager is an Identity and Access Management solution for Office 365 providing single sign-on, user provisioning and administration, and access governance functions in a single integrated package.

€190.00
Jun 27, 2016

Executive View: ForgeRock Identity Gateway - 71318

Alexei Balaganski

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

€190.00
Jun 16, 2016

Executive View: AdNovum Nevis Security Suite - 71094

Matthias Reinwarth

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

€190.00
Jun 15, 2016

Executive View: Bomgar Privileged Access Management - 71307

Matthias Reinwarth

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise infrastructure like IAM, SIEM, ITSM and Change Management systems. 

€190.00
Jun 09, 2016

Executive View: Forum Systems Sentry and Identity Federation - 72511

Matthias Reinwarth

Sentry, Forum Systems flagship product, implements a wide range of features: support for a wide range of federation use case scenarios are complemented with API Gateway functionality and mature Web Access Management services.

€190.00
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Alexei Balaganski

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged Activity Monitoring, and User Behavior Analytics into an integrated real-time security intelligence…

€190.00
Jun 07, 2016

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

Mike Small

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00
Jun 02, 2016

Executive View: Dell One Identity Manager v7.0.1 - 70894

Ivan Niccolai

Dell One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the major release (v7), and adds a significant number of new features along with performance improvements thanks to its new modular architecture.

€190.00
May 24, 2016

Executive View: PingAccess - 71507

Ivan Niccolai

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web Access Management products with its ability to provide policy- and context-driven access control to traditional on-premise web applications and cloud applications, as well as to REST-based APIs.

€190.00
May 23, 2016

Executive View: Omada Identity Suite v11.1 - 70835

Ivan Niccolai

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

€190.00
May 20, 2016

Executive View: Universal SSH Key Manager - 71509

Alexei Balaganski

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

€190.00
May 20, 2016

Executive View: CA Privileged Access Manager - 71264

Ivan Niccolai

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications. 

€190.00
May 09, 2016

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Dave Kearns

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

free
May 06, 2016

Leadership Brief: The 5 Biggest IAM Myths - 72001

Dave Kearns

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

free
May 03, 2016

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Martin Kuppinger

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while meeting legal and security requirements.

€190.00
May 03, 2016

Executive View: PointSharp Mobile Gateway - 71508

Alexei Balaganski

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

€190.00
May 03, 2016

Executive View: CyberArk Privileged Threat Analytics - 71540

Ivan Niccolai

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now provides real-time network threat detection and automated response capabilities. 

€190.00
Apr 29, 2016

Executive View: Atos DirX Identity V8.5 - 70896

Ivan Niccolai

Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for a business, rather than a technology-centric approach to identity management. 

€190.00
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

Ivan Niccolai

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker provides deep support for privilege management on…

€190.00
Apr 28, 2016

Executive View: Gigya Customer Identity Management Suite - 71529

Matthias Reinwarth

A feature-rich customer identity management platform providing strong analytics and tools for business-oriented decision-making processes while enabling compliance with legal and regulatory requirements and an adequately high level of security.

€190.00
Apr 28, 2016

Executive View: SAP Enterprise Threat Detection - 71181

Martin Kuppinger

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to threats is a must for protecting the core business systems.

€190.00
Apr 28, 2016

Executive View: Balabit Shell Control Box - 71570

Alexei Balaganski

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change business processes.

€190.00
Apr 21, 2016

Executive View: Balabit syslog-ng - 71571

Alexei Balaganski

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are relevant both as a complement to and a replacement for standard SIEM solutions.

€190.00
Apr 21, 2016

Executive View: Balabit Blindspotter - 71572

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00
Apr 19, 2016

Executive View: AirWatch Content Locker - 71505

Graham Williamson

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with intellectual property and sensitive information that must be shared between staff and business partners, a…

€190.00
Apr 12, 2016

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Matthias Reinwarth

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system development and delivery. It discusses why and how organisations should embed strong principles for…

€995.00
Mar 24, 2016

Executive View: Cayosoft Administrator - 72023

Alexei Balaganski

Cayosoft Administrator is an integrated solution for simplifying and automating management of Active Directory and Office 365 environments, including hybrid deployments. It replaces multiple native and legacy tools with a unified modern administrative console and a self-service web portal.

€190.00
Mar 24, 2016

Executive View: LSE LinOTP - 71452

Ivan Niccolai

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected resources.

€190.00
Mar 21, 2016

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

Matthias Reinwarth

Comprehensive framework for identity administration and governance in today's cloud-based, on-premises and hybrid infrastructures for both enterprise- and internet-scale environments.

€190.00
Mar 21, 2016

Leadership Compass: Access Management and Federation - 71102

Martin Kuppinger

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

€1295.00
Feb 29, 2016

Executive View: YubiKey by Yubico - 70842

Alexei Balaganski

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed by both enterprises and consumer-oriented online services.

€190.00
Feb 24, 2016

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Ivan Niccolai

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with privileged credential management. 

€190.00
Feb 24, 2016

Executive View: Enforcive Cross Platform Compliance - 71257

Matthias Reinwarth

Mapping existing policies to system-specific checks and initiating mitigating measures in case of deviations are major challenges for organizations relying on the use of IT systems. Enforcive CPC as an IT-GRC solution provides template-based compliance checks, alerting mechanisms and adjustment of misconfiguration, to maintain compliance in heterogeneous IT landscapes.

€190.00
Feb 19, 2016

Executive View: Intralinks VIA® - 71263

Graham Williamson

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when accessed and modified externally. The Intralinks VIA product provides a powerful solution that balances the user experience with document security.

€190.00
Feb 09, 2016

Executive View: akquinet SAST GRC Suite - 70979

Matthias Reinwarth

Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users, their access and roles. akquinet offers a full-featured product suite for GRC and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive area of SAP security and GRC.

€190.00
Feb 04, 2016

Executive View: Gurucul Predictive Risk Analytics - 71511

Mike Small

Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that focus on network traffic or technical vulnerabilities this solution focuses on identity, access and user activity to detect and prioritize risk.  

€190.00
Jan 29, 2016

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre Bedürfnisse optimal geeignetes Privilege Management-Produkt zu finden.

€1295.00
Jan 28, 2016

Advisory Note: Blockchain Impact on the Financial Industry - 71601

Bruce Hughes

The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within the Financial Sector, the benefits that can be achieved, the challenges and the changes to expect from this emerging technology.

€995.00
Jan 25, 2016

Executive View: Intermedia AppID® Enterprise - 71522

Mike Small

Intermedia AppID® Enterprise is a cloud based identity management platform for web applications. This provides a solution to many of the security and compliance needs of the agile connected business. As well as adding value to the cloud and hosting services provided by Intermedia it is also of interest to organizations that use web applications from other providers.

€190.00
Jan 22, 2016

Executive View: Nexis contROLE - 71502

Matthias Reinwarth

Nexis contROLE bietet ein effizientes und komfortables Role Lifecycle Management in Kombination mit Role Analytics, entweder als Standalone-Lösung oder als Add-on zu vorhandenen Identity and Access Management-Infrastrukturen.

€190.00
Jan 20, 2016

Executive View: IBM Cloud Security Enforcer - 71523

Mike Small

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

€190.00
Jan 20, 2016

Executive View: Centrify for Big Data - 71531

Mike Small

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.

€190.00
Jan 15, 2016

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Matthias Reinwarth

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise systems built in this heterogeneous manner is an important challenge that needs to be approached…

€190.00
Jan 13, 2016

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Matthias Reinwarth

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein angemessenes Sicherheitsniveau beizubehalten, ist eine ständige Herausforderung für ein Unternehmen…

free
Jan 13, 2016

Leadership Brief: Information Rights Management – Ready for Prime Time? - 72013

Bruce Hughes

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of sensitive or confidential information in a business-to-business model. Is it ready for prime time?

free
Jan 12, 2016

Leadership Brief: Join the Dots: Operational Technology and Informational Technology - 72012

Graham Williamson

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.  

free
Jan 04, 2016

Executive View: Nexis contROLE - 71502

Matthias Reinwarth

Nexis contROLE provides effective and convenient role lifecycle management combined with role analytics as either a stand-alone solution or as an add-on to existing Identity and Access Management infrastructures.

€190.00

 2015

top  

Date Title Price
Dec 10, 2015

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.

€1295.00
Dec 08, 2015

Executive View: FIDO Alliance - 71504

Mike Small

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

€190.00
Nov 26, 2015

Advisory Note: Demystifying the Blockchain - 71555

Ivan Niccolai

Investigating current and future blockchain use cases as it evolves from a secure distributed ledger to a full compute platform.

free
Nov 18, 2015

Executive View: Knowledge Vault - 71412

Alexei Balaganski

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

€190.00
Nov 12, 2015

Leadership Brief: Privileged Account Management Considerations - 72016

Mike Small

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

free
Nov 04, 2015

Executive View: MobilityLab WorksPad - 71402

Alexei Balaganski

WorksPad is an integrated enterprise mobile workplace solution combining secure access to corporate file resources and e-mail with innovative collaboration functions.

€190.00
Oct 30, 2015

Executive View: NextLabs Rights Management Platform - 71272

Martin Kuppinger

Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting XACML as a standard, with outstanding support for PLM environments and engineeering data.

€190.00
Oct 30, 2015

Executive View: WSO2 App Manager - 71296

Alexei Balaganski

WSO2 App Manager is an Open Source solution for unified management of enterprise applications providing identity and access management, as well as complete lifecycle governance for mobile and web apps.

€190.00
Oct 26, 2015

Vendor Report: AlertEnterprise - 71048

Matthias Reinwarth

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

€495.00
Oct 21, 2015

Executive View: Secure Islands IQProtector - 71297

Martin Kuppinger

Secure Islands IQProtector is a solution providing classification, encryption, usage rights management and enforcement, monitoring and analytics for information at the business, created by a wide variety of sources, both on-premise and in the cloud.  

€190.00
Oct 21, 2015

Executive View: AWS Directory Service and Identity and Access Management - 71450

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

€190.00
Oct 16, 2015

Executive View: Amazon API Gateway - 71451

Alexei Balaganski

Amazon API Gateway is a fully managed solution for publishing, maintaining and monitoring APIs. By providing tight integration with existing AWS cloud infrastructure, security and identity services, it enables exposing existing backend services or creating new ones quickly, without the need to manage resources or identities.

€190.00
Oct 16, 2015

Leadership Brief: Where to start investing for your Cyber Security Risk Management – It is not just your firewalls - 72002

Bruce Hughes

Cyber Security risk management needs to move up from the traditional IT areas of firewalls and anti-virus software management to the Executive and the Board level as the business risk of security failings in today’s information driven economy escalate. It is no longer just a technical issue.  Investment must be put into place to address this growing threat.

free
Oct 15, 2015

Executive View: Evidian Identity & Access Manager - 70871

Martin Kuppinger

Evidian Identity & Access Manager is an integrated solution for Identity Provisioning and Access Governance. It provides strong capabilities in these areas and excellent integration into the Evidian products such as Enterprise Single Sign-On.

€190.00
Oct 15, 2015

Executive View: AlienVault Unified Security Management (USM) Platform - 71307

Mike Small

AlienVault Unified Security Management (USM) platform provides a complete all in one security management solution for organizations with limited resources such as security staff, time and budget.

€190.00
Oct 09, 2015

Executive View: VMware Identity Manager - 71454

Martin Kuppinger

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications.

€190.00
Sep 22, 2015

Executive View: Waterfall Unidirectional Security Gateway - 71291

Alexei Balaganski

Waterfall Unidirectional Security Gateway technology combines specialized security hardware with a broad range of supported industrial protocols and applications to provide a level of network security unattainable by traditional firewalls.

€190.00
Sep 22, 2015

Leadership Brief: Breach and Incident Response & Employee Training - 71415

Bruce Hughes

From 2013 to 2014 data breaches nearly doubled. Well known consumer brands, financial institutions, retail chains and government agencies have all been affected. Organisations need to rethink or strengthen their data privacy strategies to cope with this rising threat. Lack of action and well thought out risk management and stakeholder management plans may subject your organisation to…

free
Sep 18, 2015

Advisory Note: Identity Information Quality - 70996

Matthias Reinwarth

Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.

€995.00
Sep 18, 2015

Executive View: BalaBit Blindspotter - 71202

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00
Sep 15, 2015

Advisory Note: Turning inattention into intention - 71501

Scott David

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

€995.00
Sep 07, 2015

Executive View: Axiomatics – Beyond Database Security - 71270

Graham Williamson

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

€190.00
Sep 03, 2015

Leadership Brief: Prevent, Detect, Respond: the Changing Face of IAM - 71305

Mike Small

As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.

free
Sep 03, 2015

Leadership Brief: How to Justify your IAM Investments - 71410

Mike Small

IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   

free
Sep 02, 2015

Advisory Note: Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation - 71302

Martin Kuppinger

Digital Transformation is on its way. Unstoppable, inevitable, with increasing speed. Organizations have to react, in particular for avoiding unpredictable risks. Digital Risk Mitigation is a key success factor in the digital transformation of businesses.

€995.00
Sep 02, 2015

Executive View: Using Certification for Cloud Provider Selection - 71308

Mike Small

An overview of how to use certification to assist in selecting a cloud service provider. 

€190.00
Aug 28, 2015

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Aug 26, 2015

Executive View: BalaBit syslog-ng - 71201

Martin Kuppinger

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

€190.00
Aug 19, 2015

Leadership Compass: Access Control/Governance für SAP-Umgebungen - 71104

Matthias Reinwarth    Martin Kuppinger

Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen signifikant verbessern, indem sie die richtigen Zugangskontrollkomponenten in ihre SAP-Infrastruktur…

€1295.00
Aug 19, 2015

Executive View: Zscaler Internet Security Platform - 71010

Alexei Balaganski

Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.

€190.00
Aug 13, 2015

Executive View: ForgeRock OpenAM - 71405

Martin Kuppinger

ForgeRock OpenAM provides a comprehensive offering for managing access, beyond traditional Web Access Management and Identity Federation, adding support also for e.g. connected things and a variety of other capabilities, providing high scalability supporting the requirements of the emerging field of Identity Relationship Management (IRM).

€190.00
Aug 13, 2015

Leadership Brief: CISO Security Essentials - 72018

Mike Small

Organizations are using the new technologies of cloud, social media and smart devices. The job of the CISO is to enable the organization to securely exploit these in an affordable way.  

free
Aug 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a tiempo real, y funciones avanzadas de protección frente a amenazas, en infraestructuras…

€190.00
Aug 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und -reaktion sowie fortgeschrittene Funktionen zum Schutz vor Bedrohungen in vorhandene Infrastrukturen…

€190.00
Aug 07, 2015

Leadership Brief: SAP Security Priorities - 72017

Matthias Reinwarth

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and governance challenge.

free
Aug 06, 2015

Advisory Note: Industrial Control Systems: Getting a Grip on OT Cyber Security - 71110

Graham Williamson

The time has come for a more inclusive approach to managing industrial control systems. The divide between Information Technology and Operational Technology is fading, to the benefit of the business.

€995.00
Aug 03, 2015

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

Mike Small

An overview of FireHost Secure Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00
Jul 28, 2015

Executive View: Virtustream IaaS – Security and Assurance - 71285

Mike Small

An overview of the Virtustream Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00
Jul 23, 2015

Executive View: Unify Identity Broker V5.0 - 71300

Graham Williamson

In today’s environment, with so many demands on identity information, an advanced identity provider service is required that can integrate disparate technology and bridge mature identity management environments to the new requirements of Cloud services, mobile device management and the Internet of things.

€190.00
Jul 22, 2015

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Jul 22, 2015

Leadership Compass: Secure Information Sharing - 72014

Graham Williamson

In approaching the selection of a vendor for the provision of secure information sharing solution it is important to take an information lifecycle approach whereby the processes around data generation, its transformation and classification, as well as data storage and data destruction, are well defined. This requires policy to be established to advise on the proper location of records,…

€1295.00
Jul 20, 2015

Executive View: neXus Dynamic Identity Platform - 70861

Alexei Balaganski

neXus Dynamic Identity Platform is a complete identity lifecycle solution that unifies physical and digital access for a broad range of supported identity types, authentication standards, and communication protocols.

€190.00
Jul 13, 2015

Leadership Compass: Access Control / Governance for SAP environments - 71104

Matthias Reinwarth    Martin Kuppinger

This report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate compliance with applicable laws and regulations. This report provides you with a compass to help you…

€1295.00
Jul 10, 2015

Leadership Compass: API Security Management - 70958

Alexei Balaganski

This report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This Leadership Compass helps you find the best solution that addresses your requirements, while maintaining the…

€1295.00
Jul 09, 2015

Executive View: HP Helion Managed Virtual Private Cloud – Security and Assurance - 71288

Mike Small

This report provides an overview of HP Helion Managed Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00
Jul 01, 2015

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

Mike Small

This report provides an overview of VMWare vCloud Air Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00
Jun 17, 2015

Best Practice: European Identity Award 2015: NORD/LB - 71401

Matthias Reinwarth

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern Business Process Outsourcing model. 

free
Jun 01, 2015

Executive View: Axiomatics Policy Management Suite - 70895

Graham Williamson

An enterprise-grade policy administration tool for managing access control policies in the Axiomatics product suite.

€190.00
May 29, 2015

Executive View: Oracle Privileged Account Manager - 71057

Alexei Balaganski

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity Governance suite.

€190.00
May 29, 2015

Leadership Brief: Rethink your organization chart for the Digital Transformation - 72010

Matthias Reinwarth

Integrate Digital Business Strategy and Information Risk Management into your organization for IT and business. Create a new type of collaborative organization, enabling the sustainable and risk-driven development of strategies for the Digital Enterprise.

free
May 26, 2015

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

free
May 26, 2015

Executive View: ITMC IDM365 - 71289

Martin Kuppinger

ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The product works in a task-centric way with a modern UI, backed by ITMC’s long experience in implementing IAM&IAG in an efficient way.

€190.00
May 26, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es ermöglicht eine detaillierte Analyse des Nutzerverhaltens und das Eingreifen in Live-Sessions.

€190.00
May 26, 2015

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Martin Kuppinger

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung.

€190.00
May 19, 2015

Leadership Brief: Facing the Future: Identity Opportunities for Telcos - 71287

David Goodman

Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising that data represents their most significant asset to provide added value to their customers in the…

free
May 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection functionality into existing risk and incident management infrastructures.

€190.00
May 11, 2015

Executive View: GlobalSign - 71051

Dave Kearns

GlobalSign, one of the world’s biggest certificate authorities, and a leading provider of identity services, recently acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management (IAM) solutions. Ubisecure’s leading IAM solutions coupled with GlobalSign’s authentication expertise and world-wide reach create a…

€190.00
May 06, 2015

Executive View: Forum Sentry API Gateway - 71204

Alexei Balaganski

Forum Sentry API Gateway is an integrated solution for API and service security, access management and threat protection with a strong focus on “security by design”, certified encryption, and comprehensive support for API formats and protocols.

€190.00
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Martin Kuppinger    Dave Kearns

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00
Apr 30, 2015

Executive View: Seclore FileSecure - 71295

Martin Kuppinger

Seclore with its FileSecure product provides an offering in the emerging market for Secure Information Sharing. Seclore FileSecure allows securely sharing and tracking documents within and beyond the organization, with a specific emphasis on securely sharing information in external collaboration.

€190.00
Apr 30, 2015

Executive View: Identity Automation RapidIdentity - 71203

Martin Kuppinger

Identity Automation’s RapidIdentity is a streamlined solution covering key functions of Identity and Access Management & Governance in an integrated offering. A particular strength is the strong out-of-the-box support for common requirements in that area.

€190.00
Apr 30, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

€190.00
Apr 28, 2015

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Martin Kuppinger

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access controls into a single solution.

€190.00
Apr 27, 2015

Executive View: iWelcome Identity & Access Management as a Service - 71205

Martin Kuppinger

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

€190.00
Apr 27, 2015

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Martin Kuppinger

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

€190.00
Apr 23, 2015

Executive View: Avencis SSOX - 71065

Alexei Balaganski

Avencis SSOX is an Enterprise Single Sign-On solution with a focus on flexible strong authentication and mobile device support. Combined with Avencis’ own IAM platform, it provides a foundation for a long-term Identity and Access Management strategy for any organization.

€190.00
Apr 22, 2015

Executive View: Dell One Identity Cloud Access Manager - 71250

Martin Kuppinger

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and external users to connect to internal, web-based applications.

€190.00
Apr 22, 2015

Executive View: AirWatch and Bring Your Own Device (BYOD) - 71259

Alexei Balaganski

AirWatch enterprise mobility management platform provides an integrated combination of technology, support and certification services to address every organization’s unique requirements for implementing a viable Bring Your Own Device strategy.

€190.00
Apr 17, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® est une solution de gestion d'authentification et d'accès intégrée fortement axée sur le secteur de la santé. Elle offre un accès rapide et sécurisé aux postes de travail, aux bureaux virtuels et aux applications en combinant une authentification forte avec l'identification unique pour les entreprises…

€190.00
Apr 17, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und Active Directory.

€190.00
Apr 17, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® ist eine integrierte Authentifizierungs- und Zugriffsmanagementlösung mit einem klaren Fokus auf das Gesundheitswesen. Sie bietet schnellen und sicheren Zugriff auf Workstations, Virtual Desktops und Anwendungen, indem sie die Vorteile der starken Authentifizierung mit Enterprise Single Sign-on vereint.

€190.00
Apr 09, 2015

Executive View: Microsoft Azure – Security and Assurance - 71282

Mike Small

This report provides an overview of the Microsoft Azure cloud services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00
Apr 08, 2015

Leadership Brief: 10 Security Mistakes That Every CISO Must Avoid - 72000

Amar Singh

As businesses both small or large become increasingly dependent on cyber space, errors and slip-ups in managing its security can have significant, sometimes destructive, consequences. In the past mistakes could be overlooked but today they could get you fired. 

free
Apr 02, 2015

Executive View: AWS – Security and Assurance - 71280

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services including compute, storage, database, analytics, application, and deployment. This report provides an overview of the security and assurance aspects of these services.

€190.00
Apr 01, 2015

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

Matthias Reinwarth

ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of enterprise SAP deployments.

€190.00
Mar 30, 2015

Executive View: IBM SoftLayer – Security and Assurance - 71281

Mike Small

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report provides an overview of the security and assurance aspects of these services.

€195.00
Mar 30, 2015

Advisory Note: Top Cyber Threats - 71032

Amar Singh

Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand and counter these threats.  

€995.00
Mar 27, 2015

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

Mike Small

This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00
Mar 27, 2015

Executive View: Prot-On - 71268

Martin Kuppinger

A solução Prot-On para o Compartilhamento Seguro de Informações (Secure Information Sharing) fornece uma solução importante para a proteção de arquivos de dados não estruturados localmente, compartilhados com parceiros e armazenados em nuvem.

€190.00
Mar 26, 2015

Leadership Compass: Infrastructure as a Service - 70959

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS service that best meets your needs.

€1295.00
Mar 23, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® is an integrated authentication and access management solution with a strong focus on the healthcare industry. It provides fast and secure access to workstations, virtual desktops and applications by combining strong authentication with enterprise single sign-on.

€190.00
Mar 19, 2015

Executive View: Wallix AdminBastion - 71266

Matthias Reinwarth

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing and recording, real-time supervision, analytics and scheduled reports.

€190.00
Mar 18, 2015

Leadership Brief: Alternatives to complex role projects and resource-consuming recertification - 72009

Matthias Reinwarth

Enterprise Role Management and Access Governance are at the core of today's IAM systems to achieve efficient administration processes and compliance with regulatory requirements. Costly processes for the design and maintenance of large role-based projects and for extensive annual recertification campaigns demand a next generation approach to Access Governance.

free
Mar 18, 2015

Leadership Brief: Your customer identities: How to do them right - 72006

Matthias Reinwarth

Digital business strategies require up-to-date and reliable customer identities. They are essential to target your marketing, to adjust the design of your products and services, to increase your earnings and to create long-term relationships with your customers.

free
Mar 17, 2015

Executive View: CA Privileged Identity Manager - 71059

Alexei Balaganski

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

€190.00
Mar 17, 2015

Executive View: Oracle Database Vault - 70899

Rob Newby

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database environment which can be used to protect application data from unauthorized access.  Oracle Database Vault comes pre-installed by default with Oracle Database 12c. 

€190.00
Mar 13, 2015

Leadership Brief: Security standards a CISO/CIRO should be aware of - 72003

Mike Small

Standards are the distilled wisdom of people with expertise in their subject matter.  A CISO should know which standards are relevant to the organization and choose which should be used internally and by external product and service providers.

free
Mar 13, 2015

Leadership Brief: Monetizing the Digital Transformation - 72015

Martin Kuppinger

The Digital Transformation of business is on its way. However, success in monetizing the Digital Transformation will not be based merely on selling things. It also requires a change in business models. 

free
Mar 12, 2015

Executive View: Prot-On - 71268

Martin Kuppinger

The Prot-On solution for Secure Information Sharing provides an important solution for the protection of unstructured data files on premise, shared with partners, and held in the cloud.  

€190.00
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

€190.00
Mar 04, 2015

Executive View: Covertix SmartCipher™ - 71267

Mike Small

The Covertix SmartCipher™ Product Suite provides an important solution for the protection of unstructured data files on premise, shared with partners and held in the cloud...

€190.00
Mar 03, 2015

Executive View: SecureAuth IdP - 70844

Dave Kearns

SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to both on-premise and cloud services...

€190.00
Feb 23, 2015

Executive View: RSA Archer GRC - 70888

Matthias Reinwarth

RSA Archer by RSA, The Security Division of EMC is a full-featured GRC-framework providing an enterprise-wide, systemic approach to implementing Governance, Compliance and Risk Management. With its platform approach it can be continuously adapted to maturing GRC-strategies towards risk-orientated business processes...

€190.00
Feb 23, 2015

Executive View: TITUS Classification Suite - 70951

Graham Williamson

Sharing information securely is becoming increasingly important within companies, be it to protect intellectual properly, meet regulatory requirements for privacy or simply to avoid embarrassing leaks of proprietary information. While it is easy to stop access to documents and files, it is much harder to manage sharing such information. Shared Information Security is a topic within Cyber…

€190.00
Feb 23, 2015

Advisory Note: ABAC done right - 71134

Graham Williamson

There is an increasing number of documents purporting to advise on how to migrate to an Attribute-Based Access Control environment. The real requirement is for Adaptive Policy-based Access Management. Here are some tips...

€995.00
Feb 20, 2015

Advisory Note: Studie zu digitalen Risiken und Sicherheitsbewusstsein - 71252

Martin Kuppinger

In einer weltweiten Online-Studie befragte KuppingerCole Experten aus dem Bereich der Informationssicherheit zu ihrer derzeitigen Wahrnehmung von digitalen Risiken und Sicherheit. Die Studie weist auf eine signifikant gestiegene Wahrnehmung beider Bedrohungen, d.h. von potenziellen Angriffen und Risiken, hin.

free
Feb 13, 2015

Executive View: ARCOS Privileged Identity Management Suite - 71028

Alexei Balaganski

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products for automated risk control, real-time risk assessment and privileged identity management. ARCON…

€190.00
Feb 05, 2015

Advisory Note: Digital Risk and Security Awareness Survey - 71252

Martin Kuppinger

A survey on the awareness of digital risks and security risks run and compiled by KuppingerCole. Providing insight into the current perception of digital and security risks, complemented with analysis and recommendations by KuppingerCole.

free
Jan 30, 2015

Executive View: SAP Cloud Identity Service - 71180

Martin Kuppinger

SAP Cloud User and Access Management solution for simple onboarding of external users in B2B and B2C scenarios and for managing access of all types of users to cloud services, run on the SAP HANA platform.

€190.00
Jan 29, 2015

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

David Goodman

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and really get to grips with what is needed and what is achievable.

€995.00
Jan 27, 2015

Executive View: NetIQ Access Manager - 71054

Alexei Balaganski

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid consistent architecture. Initially released in 2006, the product includes Single Sign-On for web…

€190.00
Jan 26, 2015

Executive View: i-Sprint AccessMatrix Universal Sign-On - 71064

Alexei Balaganski

i-Sprint Innovations is a vendor of Identity, Credentials and Access Management solutions based in Singapore. Established in 2000, i-Sprint is focusing on providing solutions for financial industry and other high security environments. Since 2011, the company is a wholly owned subsidiary of Automated Systems Holdings Ltd. Backed by Chinese investors, i-Sprint has a significant presence,…

€190.00
Jan 22, 2015

Advisory Note: Software Defined Infrastructures - 71111

Rob Newby

Enabling development speed and agility also brings heightened risk to the business. Risks can be greatly reduced by applying appropriate controls, and business benefits increased by leveraging SDI. 

€995.00
Jan 21, 2015

Advisory Note: Your Business is Moving to the Cloud - 71156

Graham Williamson

Take a pro-active rather that re-active approach to the adoption of Cloud services. Plan your move to the Cloud taking a strategic view of your requirements, processes and deployment options. Make the Cloud perform for you - not the other way around. The question posed in the title of this Advisory Note is rhetorical. The move to the Cloud is inevitable and to be embraced, not only for…

€995.00
Jan 19, 2015

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in mehreren Ländern Europas, den Vereinigten Staaten und Russland sowie über ein großes…

€190.00
Jan 16, 2015

Advisory Note: Redefining Access Governance - 71185

Matthias Reinwarth

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact…

€995.00
Jan 12, 2015

Executive View: Centrify Identity Service - 71186

Martin Kuppinger

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and cloud-based applications, as well as management for Mac and mobile devices and their apps. The company is VC funded and has raised significant funding from a number of leading investment companies. The company…

€190.00
Jan 06, 2015

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

Graham Williamson

There are three major trends driving the adoption of Gateway solutions: Proliferation of inter-connected devices, The need for “bring-your-own-device” (BYOD) support and Migration to Cloud services. The economic imperative to move our databases and applications to the Cloud is strong, but we need the tools to ensure we can protect our resources in the Cloud better than we can…

€190.00

 2014

top  

Date Title Price
Dec 09, 2014

Executive View: Courion Access Governance/Risk Products - 71046

Dave Kearns

The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market segments in that broader IAM/IAG market.Over the past few years, the field of Access Intelligence,…

€190.00
Nov 28, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren diese Technologien noch bis vor kurzem außerhalb von IT-Abteilungen nahezu unbekannt. Aber…

€190.00
Nov 17, 2014

Advisory Note: Security and the Internet of Everything and Everyone - 71152

Mike Small

The vision for the Internet of Everything and Everyone is for more than just an Internet of Things; it makes bold promises for the individual as well as for businesses. However the realization of this vision is based on existing systems and infrastructure which contain known weaknesses.

€995.00
Nov 06, 2014

Leadership Compass: IAM/IAG Suites - 71105

Martin Kuppinger

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management. Your compass for finding the right path in the market.

€1295.00
Oct 24, 2014

Executive View: SAP Audit Management - 71162

Martin Kuppinger

Audits are a must for any organization. The massively growing number of ever-tighter regulations in the past years and the overall growing relevance and enforcement of Corporate Governance and, as part of it, Risk Management, has led to an increase in both the number and complexity of audits. These audits affect all areas of an organization, in particular the business departments and IT.…

€190.00
Oct 13, 2014

Advisory Note: Security Organization, Governance, and the Cloud - 71151

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

€995.00
Oct 13, 2014

Advisory Note: Maturity Level Matrixes for Identity and Access Management/Governance - 70738

Amar Singh

KuppingerCole Maturity Level Matrixes for the major market segments within IAM (Identity and Access Management) and IAG (Identity and Access Governance). Foundation for rating the current state of your IAM/IAG projects and programs.

€995.00
Oct 09, 2014

Leadership Compass: Access Governance - 70948

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.

€1295.00
Oct 08, 2014

Executive View: Okta Cloud IAM Platform - 70887

Dave Kearns

Both Cloud computing and Identity and Access Management (IAM) can trace their beginnings to the late 1990’s. Cloud computing began as “web services” then developed into Software as a Service (SaaS) later expanding to cover areas such as Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) even, within the last couple of years, Identity as a Service…

€190.00
Sep 05, 2014

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Martin Kuppinger

Bei Enterprise Single Sign-On (E-SSO) handelt es sich um eine etablierte Technologie, die trotz der Fortschritte im Bereich Identity Federation auch heute noch eine wichtige Rolle spielt. Dies gilt auch im Hinblick auf die wachsende Zahl von Cloud-SSO-Lösungen, die als lokale, als cloud-basierte oder als individuelle Single Sign-On-Ansätze den Zugriff auf cloud-basierte…

€190.00
Aug 25, 2014

Executive View: IBM Security Policy Management - 70953

Graham Williamson

Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool to service multiple “relying” applications. It was released under the very successful Tivoli branding…

€190.00
Aug 18, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT departments. However, the ongoing trends in the IT industry have gradually shifted the focus of…

€190.00
Aug 18, 2014

Executive View: Oracle Audit Vault and Database Firewall - 70890

Rob Newby

Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the database firewall component and the databases themselves. It also collects audit data from other sources such as operating system log files, application logs, etc...

€190.00
Aug 14, 2014

Executive View: WSO2 Identity Server - 71129

Martin Kuppinger

In contrast to common application servers, WSO2 provides a more comprehensive platform, adding on the one hand features such as event processing and business rule management, but on the other hand also providing strong support for security features. The latter includes WSO2 API Manager, which manages API (Application Programming Interface) traffic and thus supports organizations in…

€190.00
Aug 14, 2014

Executive View: Druva inSync - 71131

Alexei Balaganski

Druva’s approach to information protection is quite unique among traditional solutions, since instead of maintaining a centralized data storage and enabling secure access to it from outside, inSync maintains a centralized snapshot of data backed up from all endpoints and operates on this snapshot only, leaving the original data on endpoints completely intact. Having its roots in a…

€190.00
Aug 04, 2014

Executive View: Introduction to Managing Risk - 71150

Mike Small

The word risk is in common use and means different things to different people. This range of use of the word risk makes for potential misunderstandings. This is especially the case where IT related risks are being discussed in a business context. This report is intended to introduce IT professionals to the concepts of risk management.

€190.00
Jul 24, 2014

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States and Russia and a large partner network. The company has won widespread recognition in the Open…

€190.00
Jul 18, 2014

Executive View: Symantec.cloud Security Services - 70926

Mike Small

Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT systems.   Symantec has a very strong reputation in the field of IT security that has been built…

€190.00
Jul 17, 2014

Leadership Compass: Cloud User and Access Management - 70969

Martin Kuppinger

Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market.

€1295.00
Jul 15, 2014

Leadership Compass: Cloud IAM/IAG - 71121

Martin Kuppinger

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that…

€1295.00
Jul 14, 2014

Executive View: Ergon Airlock/Medusa - 71047

Martin Kuppinger

Die Ergon Informatik AG ist ein in Zürich ansässiges Unternehmen. Neben einem großen Unternehmensbereich für Software-Individualentwicklungen ist Ergon schon seit vielen Jahren auch als Anbieter von Standard-Software am Markt präsent und hat eine signifikante Zahl von Kunden. Die Kernprodukte des Unternehmens sind die eng miteinander verbundenen Lösungen…

€190.00
Jul 14, 2014

Executive View: Centrify Server Suite - 70886

Martin Kuppinger

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single sign-on service for multiple devices and for cloud-based applications. The company is VC funded and has raised significant funding from a number of leading investment companies. The company as of today…

€190.00
Jul 07, 2014

Executive View: EU Guidelines for Cloud Service Level Agreements - 71154

Mike Small

In a press release on June 26 th , the European Commission announced the publication of new guidelines “to help EU businesses use the Cloud”. These guidelines have been developed by a Cloud Select Industry Group as part of the Commission’s European Cloud Strategy to increase trust in these services. These guidelines cover SLAs (Service Level Agreements)…

€190.00
Jul 07, 2014

Executive View: Microsoft ADFS: Active Directory Federation Services - 71126

Graham Williamson

There is a growing demand from organizations for tighter communication and collaboration with external parties and, in some cases, customers. At the same time the rapid growth of cloud services is driving the need for robust and flexible authentication solutions. As the network boundary fades, access management becomes increasingly important for agile organizations and drives the need…

€190.00
Jul 01, 2014

Advisory Note: Big Data Security, Governance, Stewardship - 71017

Mike Small

Big Data is often characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. These properties are usually referred to as volume, velocity and variety. However there are two other important properties that are sometimes ignored these are value and veracity. These latter properties can only be…

€995.00
Jun 23, 2014

Executive View: NetIQ Identity Manager - 70901

Martin Kuppinger

NetIQ is part of the Attachmate Group, which consists of a number of business units, including Novell and Attachmate. NetIQ is the entity, which now markets the former Novell Identity and Access Management products. The core product of NetIQ today is NetIQ Identity Manager, formerly known as Novell Identity Manager. NetIQ is consequently executing a roadmap of innovation and improvement…

€190.00
Jun 23, 2014

Executive View: CA SiteMinder® - 71022

Mike Small

CA SiteMinder® in conjunction with CA SiteMinder® Federation provides secure single sign-on and access management to Web applications and Web services either on-premise, at a partner’s site or in the cloud, from a web browser or a mobile device.

€190.00
Jun 23, 2014

Product Report: EmpowerID - 71115

Martin Kuppinger

EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG (Identity and Access Management/Governance) features. EmpowerID in 2013 announced a new release…

€495.00
Jun 04, 2014

Vendor Report: Thycotic - 71112

Martin Kuppinger

Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific administrative tasks. In contrast to several other vendors, all research, product…

€495.00
Jun 04, 2014

Executive View: IBM Security QRadar® - 70980

Mike Small

Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools.…

€190.00
Jun 04, 2014

Leadership Compass: Dynamic Authorization Management - 70966

Graham Williamson

Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network subnets, document repositories and applications can now be made in real-time by a centrally-managed…

€1295.00
Jun 03, 2014

Advisory Note: Extending your Active Directory to the Cloud - 71108

Martin Kuppinger

Most organizations have Microsoft Active Directory in place. The Active Directory (AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange Server, and some network infrastructure services including client configuration management based on…

€995.00
Jun 03, 2014

Executive View: Beta Systems SAM Enterprise Identity Manager - 70907

Martin Kuppinger

The Beta Systems Software AG (Beta Systems) SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated and traceable manner...

€190.00
Jun 03, 2014

Executive View: Beta Systems Garancy Access Intelligence Manager- 70906

Martin Kuppinger

Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen Teilbereich von IAG (Identity and Access Governance). Access Governance-Lösungen bieten…

€190.00
Jun 02, 2014

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

Rob Newby

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access Management. Within this broad set of technologies, there is ongoing change and evolution. Access…

€995.00
May 26, 2014

Advisory Note: EIC 2014: Trends and Hot Topics - 71127

Martin Kuppinger

EIC, the European Identity & Cloud Conference, took place for the 8 th time in Munich May 13 th to 16 th , 2014. The conference focuses on Information Security and Privacy. It covers a broad range of topics in four parallel tracks, complemented by parallel roundtables, pre-conference and post-conference workshops. This report, based on the feedback of KuppingerCole analysts Amar…

free
May 13, 2014

Advisory Note: IAM Predictions and Recommendations 2014-2018 - 71120

Dave Kearns    Martin Kuppinger

Identity and Access Management (IAM) is in constant flux. The merging into IAM of Access Governance and Access Control is a relatively new phenomenon with a high rate of growth. Based on new offerings and changing demand, KuppingerCole predicts several major changes in that market. We specifically identified the following areas where we see major change coming to IAM systems in the…

€995.00
May 13, 2014

Advisory Note: Connected Enterprise Step-by-step - 70999

Martin Kuppinger

Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more.

€995.00
May 13, 2014

Advisory Note: Real Time Security Intelligence - 71033

Mike Small

Organizations depend upon the IT systems and the information that they provide to operate and grow. However the information that they contain and the infrastructure upon which they depend is under attack. Statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. Real Time Security Intelligence (RTSI) seeks to remedy this.

€995.00
May 13, 2014

Advisory Note: Trends in Authentication and Authorization - 71043

Martin Kuppinger

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

€995.00
May 13, 2014

Executive View: Cloud Standards Cross Reference - 71124

Mike Small

Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have significant proprietary content and this can make the costs of changing provider high.  This document…

€190.00
May 07, 2014

Executive View: SailPoint IdentityNow - 70826

Martin Kuppinger

Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On experience to users. However, the tendency is towards offering more comprehensive solutions that go…

€190.00
May 07, 2014

Executive View: Omada Identity Suite - 70828

Martin Kuppinger

Omada, a Danish vendor, started as a provider of advanced Identity and Access Management solutions and services back in 2000. The core product of the company is its Omada Identity Suite. Omada focuses on adaptable business-centric and collaborative features such as workflows, attestation and advanced access analysis, role management, reporting, governance and compliance and application…

€190.00
May 06, 2014

Executive View: PingOne® - 70870

Martin Kuppinger

Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On experience to users...

€190.00
May 06, 2014

Vendor Report: Dell IAM - 70812

Dave Kearns

While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product lines acquired by Dell through the acquisition of Quest Software. The identity and access…

€495.00
May 02, 2014

Advisory Note: Working to the Business not the Auditors - 70865

Rob Newby

There can be many reasons to why a business embarks on a journey to improve its Information Security. There is however one reason which consistently recurs: “Because the auditors says that we need to…” Regulatory requirements include penalties for non-compliance but this often creates a tick-box approach to compliance, rather than a considered, strategic view. Where…

€995.00
Apr 25, 2014

Executive View: NetIQ SecureLogin - 71066

Martin Kuppinger

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both on-premise and cloud-based approaches but targeted on Single Sign-On to Cloud apps. However, in…

€190.00
Apr 22, 2014

Executive View: RSA Aveksa Identity Management & Governance - 70873

Martin Kuppinger

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking, to facilitate illegal actions, to name just a few. The large number of prominent incidents within the last…

€190.00
Apr 22, 2014

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Martin Kuppinger

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both as on-premise and cloud-based approaches but also as targeted Single Sign-On to Cloud apps.…

€190.00
Apr 10, 2014

Leadership Compass: Identity Provisioning - 70949

Martin Kuppinger

Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts with groups, roles, and other types of administrative entities to enable entitlements and…

€1295.00
Apr 08, 2014

Leadership Compass: Enterprise Key and Certificate Management - 70961

Rob Newby

Enterprise Key and Certificate Management (EKCM) is made up of two niche markets that are converging. This process still continues, and as with all major change of IT market segments, is driven by customer requirements. These customer requirements are driven by security and compliance needs. Up until recent times, compliance has been the bigger driver, but increasingly in the days of…

€1295.00
Apr 04, 2014

Executive View: NextLabs Control Center - 70847

Martin Kuppinger

NextLabs is a US-based vendor with headquarters in San Mateo, CA, and a strong footprint as well in the APAC (Asia/Pacific) region. The company focuses on what they call “Information Risk Management”. In fact, the focus is more on Information Risk Mitigation, i.e. practical solutions allowing better protection of critical information...

€190.00
Apr 01, 2014

Vendor Report: VASCO Data Security International - 70923

Rob Newby

VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In contrast to most other vendors who present single-purpose (or single-method) authentication…

€495.00
Mar 20, 2014

Advisory Note: Cloud IAM: More than just Single Sign-On to Cloud Applications - 71031

Martin Kuppinger

The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that…

€995.00
Mar 20, 2014

Advisory Note: Buyer’s Guide: Access Governance and Identity Provisioning - 71030

Martin Kuppinger

KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your guide for reducing your investment risks in Access Governance and Identity Provisioning.

€995.00
Mar 14, 2014

Advisory Note: Access Governance Architectures - 71039

Martin Kuppinger

Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal actions, to name just a few. The large number of prominent incidents within the last few years proves…

€995.00
Mar 10, 2014

Advisory Note: Migration Options for your Legacy Provisioning - 71118

Martin Kuppinger

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and all the other acquisitions we’ve seen in the past - customers become anxious regarding the…

€995.00
Mar 10, 2014

Executive View: Venafi Enterprise Key and Certificate Management - 70995

Rob Newby

Unlike the majority of their competitors, Venafi came from an ECM background to become a market leader in their field. Their main competition evolved from EKM devices and HSM manufacturers’ acquisition and consolidation of products. As a result Venafi has a well-developed software solution in the EKCM space which has all of the functionality that would be expected from a niche…

€190.00
Mar 10, 2014

Executive View: IBM Security Access Manager for Enterprise Single Sign-On - 71068

Martin Kuppinger

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both on-premise and cloud-based approaches but targeted on Single Sign-On to Cloud apps. However, in…

€190.00
Mar 06, 2014

Executive View: Oracle Entitlements Server (OES) 11gR2 - 70831

Martin Kuppinger

Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway...

€190.00
Mar 04, 2014

Executive View: SAP HANA for Big Data - 70994

Mike Small

Smart information is big data analyzed to provide answers to business questions. SAP HANA is the new runtime backend for SAP Enterprise Applications. It provides high performance database through “in-memory” processing and storage and is especially suited for instant analytics on the data managed by these applications.  It also includes integration with other sources of…

€190.00
Feb 27, 2014

Advisory Note: The new ABC for IT: Agile Businesses, Connected - 70998

Martin Kuppinger

Why Identity Federation, Cloud IAM, and API Management help organizations in meeting their business needs for agile business processes that connect the organization to their business partners and customers and manage access to Cloud applications. The need for a new organizational structure for IT. How to find the balance between pressing business demands and Information Security and…

€995.00
Feb 25, 2014

Executive View: Secude Halocore for SAP NetWeaver - 71050

Martin Kuppinger

Secude is a Swiss-based vendor with a long history in Information Security. Among other accomplishments, they developed today’s SAP NetWeaver Single Sign-On product that then was acquired by SAP and became part of SAP’s own security portfolio...

€190.00
Feb 24, 2014

Product Report: CrossIdeas IDEAS - 70897

Martin Kuppinger

A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining Access Governance and Dynamic Authorization Management. Providing connectivity to target systems based on direct connectors and through legacy Identity Provisioning systems...

€495.00
Feb 20, 2014

Product Report: CA IdentityMinder™ - 70914

Rob Newby

CA Technologies is amongst the largest infrastructure software vendors worldwide. They offer a broad portfolio of products in the IAM market segment, including CA IdentityMinder™ (formerly CA Identity Manager) as their solution for Identity Provisioning. IdentityMinder™ is built on tools CA Technologies has developed and acquired over time. The current version is well…

€495.00
Feb 19, 2014

Advisory Note: Entitlement & Access Governance - 71109

Martin Kuppinger

Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance (EAG)...

€995.00
Feb 19, 2014

Executive View: SAP HANA Security - 70810

Sachar Paulus

SAP HANA is the new runtime backend for SAP Enterprise Applications, and is especially suited for instant analytics on the data managed by the applications. This Executive View presents an overview on the security of SAP HANA and gives recommendations on how to address potential weaknesses...

€190.00
Feb 14, 2014

Executive View: Exostar Services for Life Sciences - 70878

Martin Kuppinger

Industry networks for secure collaboration are not a new thing. The evolution of these networks started back in the late ‘90s for some industries. While the initial focus sometimes was more about B2B marketplaces, enabling secure collaboration and managing the identities of the participants in the industry network quickly became the center of attention for these solutions.

€190.00
Feb 14, 2014

Executive View: SecureKey briidge.net™ - 71016

Mike Small

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There are two principal services: briidge.net Exchange which uses identity federation to allow consumers…

€190.00
Feb 13, 2014

Executive View: Microsoft Azure RMS - 70976

Martin Kuppinger

Secure Information Sharing is the number one challenge these days in Information Security. Organizations on the one hand must enable flexible collaboration with business partners as part of their evolution towards agile, connected businesses. On the other hand, the increasing Information Security challenges and compliance requirements put more pressure on protecting information, including IP...

€190.00
Feb 04, 2014

Product Report: Akamai Intelligent Platform - 70874

Rob Newby

Akamai is a software platform, originally built on Linux, and able to run on commodity hardware. According to Akamai’s own metrics, at any one time between 15% and 30% of web traffic is going between Akamai servers. It is not a separate network, running as it does over the Internet using the same backend connections, but it is resilient, and lessens traffic between Internet nodes.…

€495.00
Jan 28, 2014

Advisory Note: Enterprise Key and Certificate Management - 70885

Rob Newby

Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them.

€995.00
Jan 27, 2014

Leadership Compass: Enterprise Single Sign-On - 70962

Martin Kuppinger

The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of mature products that suit their needs. As always, however, it is about the details. Some solutions…

€1295.00
Jan 22, 2014

Leadership Compass: Privilege Management - 70960

Peter Cummings

This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly called “vault”), with some form of proxy/gateway to record RDP Sessions, while logging…

€1295.00
Jan 10, 2014

Executive View: Brainwave Identity GRC - 70985

Mike Small

Brainwave is a French vendor and their product Brainwave Identity GRC is focused on what they describe as identifying and mitigating the user risks. Compliance is an important driver for the acquisition of IAM technology and Brainwave Identity GRC is focused squarely on this need. It provides very strong capabilities in this area, allowing customers to efficiently and quickly analyze the…

€190.00

 2013

top  

Date Title Price
Dec 16, 2013

Advisory Note: Information Security Predictions and Recommendations 2014 - 71299

Martin Kuppinger

Recommendations for investing in Information Security in 2014. Predictions of the trends and hypes in Information Security in 2014. Advice on which of these trends and hypes to follow.

free
Dec 13, 2013

Product Report: Microsoft Windows Azure Active Directory - 70977

Martin Kuppinger

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

€295.00
Dec 03, 2013

Executive View: Stormpath Identity API - 71013

Alexei Balaganski

Information security in general and identity management in particular have become a critical, more and more sophisticated, and costly component for almost every online service. Developers must either invest a lot of effort to implement and maintain it or integrate a third party solution. Currently, the market for such solutions is very large and mature, but solutions from traditional…

€190.00
Nov 11, 2013

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70745

Martin Kuppinger    Dave Kearns

Life Management Platforms (LMPs) combine personal data stores, personal cloud-based computing environments, and trust frameworks. They allow individuals managing their daily life in a secure, privacy-aware, and device-independent way. In contrast to pure personal data stores, they support concepts, which allow interacting with other parties in a meaningful way without unveiling data. This…

€495.00
Nov 11, 2013

Product Report: CA GovernanceMinder™ - 70837

Martin Kuppinger

CA Technologies acquired Eurekify, a leading provider of role mining and role engineering, in November 2008. Using that technology, CA Technologies has built the current product CA GovernanceMinder. The product is tightly integrated with CA IdentityMinder™, the Identity Provisioning product provided by CA Technologies, and follows the same architectural and user interface paradigms.…

€295.00
Nov 05, 2013

Vendor Report: Courion Corporation - 70920

Dave Kearns

Identity, Security, and Risk Management as part of a broad solution portfolio. Well thought out IAM and IAG Business Case solution instead of a purely technical one. Choice of on-premise or cloud-based platform allows complete solution for all size businesses...

€295.00
Oct 31, 2013

Executive View: Oracle Big Data Solutions - 70993

Mike Small

Smart information is big data analyzed to provide answers to business questions. Oracle provides a range of integrated software and hardware tools needed to acquire and analyze big data into smart information. These tools have a particular focus on enterprise concerns including information security and the exploitation of the masses of data already held within corporate data warehouses.

€190.00
Oct 28, 2013

Advisory Note: Infrastructure as a Service Market Report - 71021

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with strengths in various areas.

€495.00
Oct 17, 2013

Executive View: RSA Adaptive Authentication - 70889

Rob Newby

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and context-based authentication and authorisation methodology provides transparent authentication for the majority…

€190.00
Oct 14, 2013

Advisory Note: The Future of IT Organizations - 71200

Martin Kuppinger

Prepare your IT Organization for the major evolutions affecting every business. Become ready to deal with today’s and tomorrow’s approaches to Cloud Computing. Build a competitive on-premise IT if you still need on-premise IT (and most will). Stay in control of your Business Services, IT Services, and Information Security.

€995.00
Oct 14, 2013

Executive View: EmpowerID 2013 - 70005

Peter Cummings

EmpowerID was founded in 2005 and is based out of Dublin, Ohio. EmpowerID was previously known as a niche player, with products like the Active Directory (AD) Self-Service Suite, which provides web-based white pages and password reset for AD...

€190.00
Oct 11, 2013

Vendor Report: SafeNet - 70876

Rob Newby

SafeNet’s Comprehensive data-centric security portfolio looks at business cases instead of solely technical solutions, and extends protection and ownership across the data lifecycle as it is stored, created, shared, accessed,and moved. The organisation looks forward to future-state virtual and Cloud deployments at the same time as making it possible integrate with current-state architectures.

€295.00
Oct 09, 2013

Executive View: Evidian Enterprise SSO - 70823

Martin Kuppinger

Despite being one of the more traditional and well-established areas of Identity and Access Management (IAM), and despite the fact there is still an obvious business benefit and quick-win potential in Enterprise Single Sign-On (E-SSO)  there are still many organizations that have not deployed an E-SSO solution. Enterprise Single Sign-On (E-SSO) is a well-established technology. Even…

€190.00
Oct 02, 2013

Whitepaper: Migrating to the CA Technologies Solution for Identity Management & Access Governance - 71001

Martin Kuppinger

Recommendations for migrating from legacy Identity Provisioning to CA Technologies Identity Management and Access Governance solutions. Technical issues in migration, planning for migration, best practices, and potential benefits.

€295.00
Oct 02, 2013

Executive View: IBM SmartCloud Services - 70785

Mike Small

IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand.  IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a new Cloud Services division.  This executive view provides an overview of IBM SmartCloud IaaS and…

€190.00
Sep 27, 2013

Leadership Compass: Access Management and Federation - 70790

Martin Kuppinger

With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access from externals and to external systems, including…

€1295.00
Sep 10, 2013

Product Report: SAP GRC Access Control 10 - 70737

Martin Kuppinger

The standard solution for managing Access and the related risks in SAP environments. Implement SoD controls, keep privileged users under control, and know what could happen in your SAP systems.

€295.00
Aug 23, 2013

Advisory Note: Secure your Cloud against Industrial Espionage - 70997

Rob Newby

Securing your business against industrial espionage is about knowing your competitors and stopping your IP getting into their hands. In a Cloud environment you need to be considering all of the risks around Cloud provision, conflicts of interest, legal environments in remote locations, and of course having a third party processing and controlling your most sensitive information. A…

€495.00
Aug 23, 2013

Executive View: MYDIGIPASS.COM - 70860

Alexei Balaganski

One of the most important consequences of the ongoing trend of IT consumerization driven by growing adoption of mobile and cloud computing has been the exponential growth of the number of identities businesses and consumers have to deal with. Unfortunately, as the number of ways for individuals and businesses to interact over the Internet is growing, controlling and securing these…

€190.00
Aug 16, 2013

Advisory Note: Managing Risks to Critical Infrastructure - 70819

Rob Newby

Threats to critical National technical infrastructure such as Finance, Energy, Telecommunications and Government are a result of human nature, although difficult to treat in the abstract, technical controls can be applied to prevent, detect and resist attempts to subvert...

€495.00
Aug 16, 2013

Executive View: PingFederate 7 - 70801

Martin Kuppinger

Ping Identity is a specialized vendor focusing on Identity Federation and related use cases. Ping calls this “Identity Bridges”. Their portfolio consists of two offerings: PingFederate is their enterprise solution for standards-based federated identity management; while PingOne provides cloud-based single sign-on to public and private cloud applications; and cloud-based SSO…

€190.00
Jul 30, 2013

Executive View: F5 Mobile App Manager - 70802

Martin Kuppinger

There are various approaches to tackle the BYOD challenge, from MDM (Mobile Device Management) to specialized, secure apps - for instance for email - virtualization approaches on mobile devices, and network security. However, despite the vendor promises there is no single solution that addresses all the challenges of Mobile Security Management. F5, a leading provider of what they call…

€190.00
Jul 22, 2013

Executive View: Joyent Cloud Services – Security and Assurance - 70636

Mike Small

Joyent offers a range of cloud services that are built on technology that Joyent has engineered rather than on generic virtualization technology. This is claimed to provide greater flexibility, resilience, and performance for cloud customers and their applications. This executive view provides an overview of these services focused on their security and assurance aspects.

€190.00
Jul 19, 2013

Advisory Note: Rating Methodology for Products and Vendors - 70555

Martin Kuppinger

KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Product Reports and KuppingerCole Vendor Reports...

free
Jul 11, 2013

Executive View: CloudSigma – Security and Assurance - 70637

Mike Small

CloudSigma is a pure IaaS provider and the CloudSigma platform is built on the Linux KVM hypervisor. The CloudSigma platform provides a number of interesting features including persistent storage for each VM, disk encryption by default, and automatic redundancy and failover. This executive view provides an overview of the CloudSigma platform focused on its security and assurance aspects...

€190.00
Jul 09, 2013

Executive View: McAfee One Time Password - 70748

Peter Cummings

In April 2013 McAfee announced the addition of several products addressing Identity and Access Management to its Security Connected portfolio. The products that were previously developed and sold by Intel include McAfee Cloud Single Sign On and McAfee One Time Password. In addition to the products McAfee also introduced the new McAfee Identity Centre of Expertise, which is staffed with…

€190.00
Jul 03, 2013

Executive View: Salesforce Platform as a Service – Security and Assurance - 70751

Mike Small

Salesforce.com is best known as the provider of a cloud based CRM system.  Salesforce also provides a platform which can be used to develop and deploy cloud based applications.  This executive view provides an overview of this platform focused on the security and assurance aspects...

€190.00
Jun 27, 2013

Executive View: Intel Expressway API Manager - 70642

Craig Burton

With the Expressway API Manager, Intel is attempting to define a new category of platform. It refers to this new platform as a “Composite Platform” designed to expose APIs to business partners and internal or external developers. The Expressway API Manager platform has a strong set of API management capabilities including developer on-boarding and lifecycle management,…

€190.00
Jun 20, 2013

Executive View: HP Virtual Private Cloud – Security and Assurance- 70739

Mike Small

The HP Virtual Private Cloud Service offering from HP Enterprise Services is one of the members of the HP Converged Cloud Strategy within the HP Managed Cloud Service Offering family.  This provides everything needed to run applications and to access them securely over a network.  This executive view provides an overview of these services focused on their security and assurance…

€190.00
Jun 13, 2013

Executive View: Amazon Web Services – Security and Assurance - 70779

Mike Small

Amazon Web Services (AWS) provides computing infrastructure that enables organizations to obtain computing power, storage, and other on-demand services in the cloud.  This executive view provides an overview of these services focused on their security and assurance aspects...

€190.00
Jun 12, 2013

Executive View: IBM Security Intelligence with Big Data - 70743

Mike Small

Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail.  IBM Security Intelligence with Big Data is a set of products and services that are intended to respond to these…

€190.00
Jun 11, 2013

Executive View: Omada Identity Management Suite - 70783

Martin Kuppinger

Omada, a Danish vendor started as supplier of advanced Identity and Access Management capabilities in year 2000. Today Omada has, in addition to its IAM capabilities, established itself as a vendor for IAG (Identity and Access Governance), providing compliance, overview and control across multiple platforms. The company has grown through the last decade from providing IAM solutions…

€190.00
May 23, 2013

European Identity & Cloud Award 2013: EVRY AS - 70777

Martin Kuppinger

KuppingerCole has bestowed the KuppingerCole European Identity Awards since 2008 in recognition of excellent projects in the area of Identity and Access Management (IAM), GRC (Governance, Risk Management, and Compliance), and Cloud Security. This report gives a brief overview of the project performed at EVRY ASA, a leading IT system integrator and service provider based in Norway. The…

free
May 22, 2013

Executive View: McAfee Cloud Single Sign On - 70746

Peter Cummings

In April 2013 McAfee announced the addition of Identity and Access Management solutions to its Security Connected portfolio. The products that were previously developed and sold by Intel include McAfee Cloud Single Sign On and McAfee One Time Password. In addition to the products McAfee also introduced the new McAfee Identity Center of Expertise, staffed with experts in identity and cloud…

€190.00
May 21, 2013

Executive View: Beta Systems Garancy Access Intelligence Manager - 70784

Martin Kuppinger

Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine neue, spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen Teilbereich von IAG (Identity and Access Governance). Access Governance-Lösungen bieten…

€190.00
May 15, 2013

European Identity & Cloud Award 2013: OAuth 2.0 - 70778

Martin Kuppinger

European Identity Award 2013 for „Best Innovation/New Standard in Information Security”: A new standard that rapidly gained momentum and plays a central role for future concepts of Identity Federation and Cloud Security.

free
May 15, 2013

European Identity & Cloud Award 2013: Volkswagen Financial Services AG - 70775

Martin Kuppinger

Special Award 2013 for „Bridging the organizational gap between Business and IT”: A project that was far above average when it comes to Business/IT Alignment, by successfully setting up a framework of guidelines and policies plus the required organizational entities and rolling this out into a global organization.

free
May 15, 2013

European Identity & Cloud Award 2013: Swiss Reinsurance Company Ltd - 70774

Martin Kuppinger

European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Holistic IAM/IAG approach following new architectural concepts and enabling Dynamic Authorization Management based on business rules.

free
May 15, 2013

European Identity & Cloud Award 2013: Schindler Informatik AG - 70771

Martin Kuppinger

Special Award 2013 for „Rapid Re-Design and Re-Implementation of the Entire IAM”: Moving from a traditional, Active Directory-centric environment to full HR integration on a global scale and full support for automated provisioning, based on a clearly defined roadmap for further improvement.

free
May 15, 2013

European Identity & Cloud Award 2013: Deutsche Bank AG - 70772

Martin Kuppinger

European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Implementing cross-divisional SoD rules on a global scale at business level, with full integration into the existing Access Governance solution.

free
May 14, 2013

Advisory Note: From Big Data to Smart Information - 70750

Mike Small

Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data. The term Big Data needs to be understood as data…

€495.00
May 14, 2013

Executive View: Big Data and Information Stewardship - 70744

Mike Small

Big Data provides many opportunities to solve emerging business challenges and Big Data technologies can create business value. However Big Data also creates security challenges that need to be considered by organizations adopting or using Big Data techniques and technologies. This paper outlines the information security risks involved in Big Data and recommends the responses to these…

€190.00
May 13, 2013

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

Craig Burton    Dave Kearns    Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended Enterprise” in IAM/IAG, the cloud stratification in various layers, increasing threats imposed by the rise of…

free
May 13, 2013

Advisory Note: Typical Risks and Pitfalls for IAM and IAG projects - 70749

Rob Newby

Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can help achieve this in a multitude of different ways for different departments and roles within them;…

€495.00
May 13, 2013

Advisory Note: Selecting your cloud provider - 70742

Mike Small

The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that organizations create and communicate a policy for their acquisition and use. This should be supported by…

€495.00
May 13, 2013

Advisory Note: Maturity Level Matrixes for Identity and Access - 70738

Martin Kuppinger

Most large organizations and a significant number of medium-sized organizations have heavily invested in IAM (Identity and Access Management) and IAG (Identity and Access Governance) during the past few years. Some projects went well; others did not deliver as expected. But even organizations that run successful IAM/IAG projects are challenged by new evolutions, such as the increasing…

€495.00
Apr 30, 2013

Product Report: Beta Systems Software AG SAM Enterprise Identity Manager - 70274

Martin Kuppinger

SAM Enterprise Identity Manager from Beta Systems Software AG (Beta Systems) belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different access control systems based on defined processes and connectors in a structured, automated and traceable manner. It also supports common…

€295.00
Apr 30, 2013

Product Report: Microsoft FIM 2010 R2 - 70106

Peter Cummings

In 1999 Microsoft entered the Identity and Access Management space with the introduction of Active Directory in Windows NT and the purchase of Zoomit Via which was renamed to Microsoft Metadirectory Server (MMS). MMS was eventually retired and Microsoft re-wrote the system from ground up and named it Microsoft Identity Integration Server 2003 (MIIS) with one of the major changes being the…

€295.00
Apr 26, 2013

Product Report: Qiy Independent Trust Framework - 70640

Alexei Balaganski

The ongoing trend of IT consumerization driven by growing adoption of mobile, social and cloud computing has made a profound impact on our society. It has brought many new challenges for both consumers and businesses, which are now struggling to adapt to the new demands for storing, sharing, and processing sensitive digital information and to comply with increasingly harsh privacy-related…

€295.00
Apr 26, 2013

Executive View: ServiceMesh Agility Platform - 70639

Craig Burton

ServiceMesh is a company out of Santa Monica, CA that fields a platform in the category of Enterprise Cloud Management, and places a heavy emphasis on policy-based cloud governance. This is a relatively new category and in particular the focus on “Enterprise Cloud Governance” needs some explaining. KuppingerCole agrees with the interpretation ServiceMesh uses for Governance in…

€190.00
Apr 25, 2013

Vendor Report: Atos DirX - 70741

Martin Kuppinger

Atos is one of the largest IT Service Providers worldwide, with more than 70.000 employees and global reach. Following the acquisition of Siemens IT Solutions and Services (SIS), the company changed its name from Atos Origin to just Atos. The company is listed on the Paris Stock Exchange. This vendor report focuses on a specific part of the Atos portfolio, the DirX products. These are…

€295.00
Apr 12, 2013

Whitepaper: Information Classification: Information Stewardship in Practice - 70740

Martin Kuppinger

Information stewardship uses good governance techniques to implement information centric security for all of your data. Information Stewardship involves the business as well as the IT services group. It creates a culture where the people in the organization understand the sensitivity of information and the ways in which this information can be put at risk. A key concept within…

€295.00
Apr 09, 2013

Advisory Note: Privilege Management - 70736

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while…

€495.00
Mar 18, 2013

Advisory Note: BYOD - Bring Your Own Device - 71003

Martin Kuppinger

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the…

€495.00
Mar 08, 2013

Leadership Compass: Access Governance - 70735

Martin Kuppinger

Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few vendors try to establish this as a new market segment, we understand enhanced analytical capabilities…

€1295.00
Feb 27, 2013

Product Report: Layer 7 Technologies - 70627

Craig Burton

The emerging API Economy is presenting significant challenges to all industry participants. When coupled with the Computing Troika—Cloud, Mobile, and Social computing—the API Economy is bringing about change in strategy requirements that have not ever been presented to organizations before. For example, the sheer number and nature if personas and identities and the need to…

€295.00
Feb 26, 2013

Executive View: Cloud standards and advice jungle - 70641

Mike Small

Cloud computing is one of three dimensions in which organizations are moving towards an economy based upon the interconnection IT services. This idea is described in KuppingerCole Advisory Note 70532 “The Open API Economy”. This success of this economy and hence of cloud computing depends on the availability clearly defined interfaces; standards have a key role to play in…

€190.00
Feb 25, 2013

Whitepaper: Using Information Stewardship within Government to Protect PII - 71002

Dave Kearns

Loss and theft of Personally Identifiable Information (PII) from government, military and defense organizations continues to be a significant problem. Given the amount of attention to this area and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information stewardship based on…

€295.00
Feb 08, 2013

Snapshot: Oracle Audit Vault and Database Firewall - 70631

Martin Kuppinger

Oracle Audit Vault and Database Firewall is a new offering combining and enhancing two existing products: Oracle Audit Vault and Oracle Database Firewall. The product monitors Oracle databases and databases from other vendors. On the one hand it can detect and block threats while on the other hand it consolidates audit data not only from the database firewall component but also from the…

€190.00
Jan 31, 2013

Snapshot: Vormetric Data Security - 70634

Craig Burton

Vormetric provides a family of data security products—The Vormetric Data Security platform—that protects data across a variety of operating systems, databases, applications and storage architectures. Vormetric provides data security solutions that meet the requirements of the ever growing regulatory environment around sensitive data. The Vormetric platform objectives are to…

€190.00
Jan 29, 2013

Snapshot: IBM InfoSphere Guardium V 9.0 - 70632

Martin Kuppinger

IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores, including data warehouses, big data environments, and file shares. IBM InfoSphere Guardium takes a big step forward from database protection towards data protection. IBM managed this balancing act…

€190.00
Jan 16, 2013

Snapshot: Thycotic Secret Server - 70633

Martin Kuppinger

Thycotic Software is one of the vendors in the emerging Privilege Management market. Their core product is called Secret Server and supports managing secrets, especially, but not limited to, administrative and service account passwords. In contrast to other vendors in that segment, Thycotic as of now focuses not on delivering a complete Privilege Management infrastructure covering all…

€190.00
Jan 08, 2013

Snapshot: GreenSQL Unified Database Security - 70588

Alexei Balaganski

GreenSQL Unified Database Security is an integrated database security solution for MySQL, PostgreSQL, Microsoft SQL Server and Microsoft Windows Azure SQL databases aimed at small and medium businesses. Depending on the license, GreenSQL offers different packages such as Database Security (in fact, a typical database firewall for preventing SQL injection and protecting from unauthorized…

€190.00

 2012

top  

Date Title Price
Dec 13, 2012

Snapshot: Oracle Mobile and Social Access Management - 70724

Martin Kuppinger

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding support for mobile devices and for logins based on social networks (social logins)...

€190.00
Dec 05, 2012

Product Report: Oracle ESSO - 70581

Sebastian Rohr

With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase. KuppingerCole offers a model designed to help IT organizations manage this dichotomy by changing the perspective on IT in general. We consider that an IT organization’s job should not only be viewed…

€295.00
Dec 05, 2012

Vendor Report: MetricStream - 70105

Martin Kuppinger

MetricStream is a vendor in the GRC (Governance, Risk Management, Compliance) market. Within that market, MetricStream is positioned as an Enterprise GRC vendor with good support for IT GRC, providing solutions that cover business aspects as well as provide the technical integration to IT systems. This is in contrast to pure-play Business GRC solutions which only focus on manual controls…

€295.00
Nov 30, 2012

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Mike Small    Dave Kearns

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information…

€495.00
Nov 16, 2012

Whitepaper: Assignment Management – think beyond access - 70734

Martin Kuppinger

The days when IT lived in an isolated silo within the enterprise and everything was managed from a technical perspective with only traditional computing devices are past. Today’s reality is about more users and new ways to interact with them (Social Computing), more devices (Mobile Computing), and other deployment models (Cloud Computing). But is IT out of control? Not if it is…

€295.00
Nov 02, 2012

Snapshot: salesforce.com - Salesforce Identity - 70630

Craig Burton

salesforce.com is one of the original enterprise cloud application vendors. Coupled with its flagship CRM solution, Salesforce is branching out its expertise into other areas of the cloud computing area. With the introduction of Salesforce Identity, the company is bringing its considerable infrastructure and knowledge to customers for managing application-independent identities for…

€190.00
Oct 19, 2012

Product Report: 3Scale API Management - 70626

Craig Burton

The emerging API Economy is presenting significant challenges to all industry participants. When coupled with the Computing Troika—Cloud, Mobile, and Social computing—the API Economy is bringing about change in strategy requirements that have not ever been presented to organizations before. For example, the sheer number and nature personas and identities and the need to give…

€295.00
Oct 17, 2012

Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager - 71000

Martin Kuppinger

This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle Waveset Identity Manager”. It focuses on the Sun Identity Manager (SIM) product, now also known as Oracle Waveset Identity Management and historically as Waveset Lighthouse. This product has an…

€295.00
Oct 16, 2012

Snapshot: Microsoft acquires Phonefactor - 70733

Martin Kuppinger

On October 4th Microsoft announced the acquisition of Phonefactor, a provider of phone-based multifactor authentication. Microsoft informed us about this acquisition only in a blog post on their Windows Azure blog at the MSDN (Microsoft Developer Network) website . There is no official press release out, but Phonefactor itself provides some information at their website . Obviously…

€190.00
Oct 15, 2012

Leadership Compass: Identity Provisioning - 70151

Martin Kuppinger

Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity Provisioning market segments. It shows that there are several established vendors with mature solutions,…

€1295.00
Oct 11, 2012

Vendor Report: NetIQ – the complete portfolio - 70624

Martin Kuppinger

Novell was acquired by The Attachmate Group in April 2011. The portfolio of Novell has been distributed across three business units of the Attachmate Group. The SUSE portfolio of Linux solutions was made into a business unit that is now simply called SUSE. The Novell business unit will continue to market and sell the collaboration, endpoint management and File and Networking Services...

€295.00
Oct 11, 2012

Vendor Report: NetIQ – the Novell Identity & Security Products - 70304

Martin Kuppinger

Novell was acquired by The Attachmate Group in April 2011. The portfolio of Novell has been distributed across three business units of the Attachmate Group.  The SUSE portfolio of Linux solutions was made into a business unit that is now simply called SUSE. The Novell business unit will continue to market and sell the collaboration, endpoint management and File and Networking…

€295.00
Oct 02, 2012

Advisory Note: Cloud Provider Assurance - 70586

Mike Small

Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer to this question can be found in the old Russian maxim, which was often quoted by President Ronald…

€495.00
Sep 21, 2012

Advisory Note: API Economy Ecosystem - 70625

Craig Burton

The nascent API Economy is rapidly maturing and is shaping up to be both promising and challenging. Meeting the challenges of The API Economy will be as important for customers as embracing the personal computer was in the 1980s or embracing the mobile and tablet trends are today. Customers are faced with the challenge of understanding the distinction of being both an API consumer…

€495.00
Sep 18, 2012

Vendor Report: Atos DirX - 70621

Martin Kuppinger

Atos ist einer der größten internationalen Anbieter von IT-Dienstleistungen mit mehr als 70.000 Mitarbeitern und einer globalen Präsenz. Das Unternehmen ist nach der Übernahme des Bereichs Siemens IT Solutions and Services (SIS) von Atos Origin in Atos umbenannt worden. Atos ist an der Pariser Börse im Segment Eurolist notiert. Dieser Vendor Report…

€295.00
Aug 28, 2012

Product Report: Beta Systems Software AG - SAM Enterprise Identity Manager - 70273

Martin Kuppinger

Der SAM Enterprise Identity Manager der Beta Systems Software AG (Beta Systems) ist in der Kategorie der Enterprise Provisioning-Systeme mit integrierter Access Governance–Funktionalität einzuordnen. Die Kernfunktionalität ist der strukturierte, automatisierte und nachvollziehbare Abgleich von Identitätsinformationen zwischen verschiedenen Zugriffschutzsystemen auf…

€295.00
Aug 28, 2012

Vendor Report: Beta Systems - 70150

Martin Kuppinger

Die Beta Systems Software AG (Beta Systems) ist ein in Berlin ansässiger Anbieter von Standardsoftwareprodukten in den Bereichen IAM (Identity und Access Management), Access Governance, GRC (Governance, Risk Management, Compliance), Data Center Automation, Data Center Audit und Document Processing and Audit. Zu letztgenanntem Bereich gehören Lösungen für die…

€295.00
Aug 22, 2012

Snapshot: Quest One Identity Manager Data Governance Edition - 70722

Martin Kuppinger

Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It is, though, a big step forward for organizations which have not only installed a piece of software but also implemented the required organization, guidelines, and processes...

€190.00
Aug 15, 2012

Snapshot: SAML Vulnerabilities - 70723

Martin Kuppinger

On August 10th, 2012, the University of Bochum (German Ruhr-Universität Bochum) published a research paper titled On breaking SAML: Be whoever you want to be . In that paper the authors provide an analysis of potential security weaknesses in SAML. They analyzed 11 out of 14 major SAML frameworks. Eleven of these frameworks showed XML Signature wrapping (XSW) vulnerabilities. The…

€190.00
Aug 15, 2012

Snapshot: OAuth 2.0 - 70725

Martin Kuppinger

Recently Eran Hammer, one of the – until then – co-authors and editors of the OAuth 2.0 standard which is currently finalized by an IETF (Internet Engineering Task Force) working group, declared that he will withdraw his name from the specification of OAuth 2.0. He posted about this in his blog . In that blog he raised several concerns about OAuth 2.0, ending up in a…

€190.00
Aug 09, 2012

Scenario: The Future of Authentication - 70341

Craig Burton

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to embrace and evangelize authenticated access to any resource by anyone from any device. At the…

€995.00
Jul 11, 2012

Scenario: Understanding Cloud Security - 70321

Mike Small

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be managed by effective IT service management using the KuppingerCole model. The Cloud provides an…

€995.00
Jul 11, 2012

Product Report: CrossIdeas IDEAS - 70620

Martin Kuppinger

CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM (Identity and Access Management). Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent software vendor in their core market segments. Concerns which have been voiced along the transition…

€295.00
Jun 28, 2012

Survey Report: Identity Access Management und Governance in der Finanzindustrie - 70584

Martin Kuppinger

Studie zum aktuellen Status der Umsetzung von Identity und Access Management sowie Identity und Access Governance in der Finanzindustrie in Deutschland und der Schweiz. Studie beauftragt von Beta Systems. Studie durchgeführt von KuppingerCole.

free
May 09, 2012

Advisory Note: Dealing with privacy risks in mobile environments - 70224

Alexei Balaganski

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread nearly impossible. Growing adoption of cloud-based services, while having obvious advantages, means…

€495.00
May 08, 2012

Business Report: Key Risk/Performance Indicators IAM and GRC - 70204

Mike Small

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report provides selected Key Risk Indicators (KRI) for the area of IAM and…

€495.00
May 07, 2012

Advisory Note: Migration Options and Guidelines for Oracle Waveset - 70610

Fulup Ar Foll

This document extends the Advisory Note #70,607 “Migration Options for your Legacy Provisioning” and focuses on Oracle's Waveset Identity Provisioning system which is also historically known as Sun Identity Management/Manager or, in short, SIM, which before the acquisition of Waveset by Sun was named Waveset Lighthouse. The product will usually be called Waveset IDM (Identity…

€495.00
Apr 30, 2012

Product Report: Virtual Forge CodeProfiler - 70585

Sachar Paulus

Die Analyse der Sicherheit von Programmcode ist eines der bedeutendsten Geschäftsfelder im Bereich der sicheren Software-Entwicklung. Für alle gängigen Programmiersprachen gibt es recht reife Produkte und die wichtigsten Innovatoren wurden von den großen Software-Herstellern aufgekauft. Es gibt jedoch einen wenig beachteten Bereich der Software-Entwicklung, der…

€295.00
Apr 26, 2012

Advisory Note: Making critical infrastructures in finance industry fit for the age of cyber attacks - 70405

Martin Kuppinger

When looking at the topic of this research note, there are two major aspects to look at. One is about “critical infrastructures”; the other is about “the age of cyber attacks”. We’re looking at critical infrastructures in finance industry. However, this is at least to some degree also about finance industry as a critical infrastructure. The finance industry…

€495.00
Apr 24, 2012

Advisory Note: IT-Initiativen 2012-2013: Eine 6*3-Matrix - 70609

Martin Kuppinger

Welche Initiativen sollen 2012/2013 auf der Agenda von CIOs ganz oben stehen? Diese Advisory Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei Initiativen vorgeschlagen, die für die kontinuierliche Weiterentwicklung der IT besonderen Nutzen…

€495.00
Apr 20, 2012

Trend Report: Top Trends 2012-2013 - 70516

Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of compromise of digital certificates, the proliferation of “Bring your own Device” (BYOD), and…

free
Apr 19, 2012

Advisory Note: European Identity Award 2012: OpenID Connect - 70706

Martin Kuppinger

Best New Standard 2012 in Category „Best Innovation/New Standard in Information Security”: Providing the Consumerization of SAML. Driving the adoption of federation and making this much simpler.

free
Apr 19, 2012

Advisory Note: IT-Initiatives 2012-2013: a 6*3-Matrix Report - 70612

Martin Kuppinger

Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT. They represent responses to current and future trends. The goal is an IT, which is fit for the…

€495.00
Apr 18, 2012

Best Practice: European Identity Award 2012: Swisscom - 70705

Martin Kuppinger

Special Award 2012 for „Mobile Security”: Swisscom MobileID – secure and easy authentication using the mobile phone with minimal impact on hardware based on ETSI Mobile Signature Standard.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Martin Kuppinger

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Europol - 70703

Martin Kuppinger

Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including external collaboration. Real-time monitoring beyond simple audit logs.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Siemens AG - 70701

Martin Kuppinger

Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment.

free
Apr 13, 2012

Advisory Note: Migration Options for your Legacy Provisioning - 70607

Martin Kuppinger

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Sun Microsystems by Oracle, of Novell by NetIQ, of Völcker by Quest Software and all the other acquisitions we’ve seen in the past - customers are anxious regarding the future roadmap and the impact on their own…

€495.00
Apr 13, 2012

Advisory Note: IAM and GRC Market – the Evolution in 2012/2013 - 70580

Martin Kuppinger

IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to their corporate information. That has put IAM and GRC on top of the IT agenda. However, IAM and…

€495.00
Apr 13, 2012

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70608

Martin Kuppinger

Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the individuals. They will enable new approaches for privacy- and security-aware sharing of that…

free
Apr 13, 2012

Advisory Note: Privilege Management - 70177

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while acquisitions have also led to vendors with broader…

€495.00
Apr 13, 2012

Scenario: Understanding Cloud Computing - 70157

Martin Kuppinger

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the varieties of Cloud services and delivery models, the principal risks associated with Cloud computing and how the Cloud fits within the IT service delivery options for an organization. It relates the…

€995.00
Mar 29, 2012

Product Report: Virtual Forge CodeProfiler - 70583

Sachar Paulus

Code security analysis has become one of the most important business segments servicing the secure development of software. Products are pretty mature for every mainstream programming language, and large IT companies have acquired the major technology innovators in that segment. There is, though, an area of software development that receives little attention, although being quite…

€295.00
Mar 27, 2012

Technology Report: Access Governance Architectures - 70219

Martin Kuppinger

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking to facilitate illegal actions, to name just a few. The large number of prominent incidents within the last few…

€495.00
Mar 26, 2012

Product Report: Oracle Database Firewall - 70339

Martin Kuppinger

Oracle Database Firewall is part of Oracle’s defense in depth approach to security, providing a first line of defense for databases by analyzing database traffic before it reaches the database. Oracle Database Firewall expands Oracle’s solutions for heterogeneous databases, supporting Oracle Database, SQL Server, IBM DB2 LUW, and Sybase ASE. MySQL support was introduced in the…

€295.00
Jan 31, 2012

Product Report: Blackbird Management Suite - 70402

Craig Burton

The Blackbird Management Suite is well architected and is designed to include high levels of integration with the existing support modules for Active Directory and the Windows Server File System. The administrative interface for Active Directory makes use of the Windows Snap-in architecture for 3rd party products with the Microsoft Management Console (MMC). The File System management is…

€295.00
Jan 12, 2012

Snapshot: ClusterSeven Enterprise Spreadsheet Manager - 70852

ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS Excel, but also desktop applications such as MS Access or other VBA based applications and files…

free

 2011

top  

Date Title Price
Dec 21, 2011

Product Report: Kaspersky Endpoint Security 8 and Kaspersky Security Center 9 - 70401

Alexei Balaganski

Kaspersky Endpoint Security and Kaspersky Security Center are two key components of Kaspersky Open Space Security – the integrated security suite from highly reputable security company Kaspersky Lab. Targeted primarily towards small and medium businesses, Kaspersky Open Space Security offers a flexible solution for protecting workstations, file and mail servers, network gateways,…

€195.00
Dec 16, 2011

Advisory Note: The Open API Economy - 70352

Craig Burton

How the Open API Economy is increasing and changing the need for Identity Management. Baking an organization’s core competence into an Open API is an economic imperative. It’s clear that three main trends are driving technology in all areas. It goes without saying that as digital identity is the gateway to all network-based products and services that identity is…

€295.00
Dec 08, 2011

Vendor Report: Oracle Cloud Security - 70160

Mike Small

This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which to build Cloud services. These services which can be built range from IaaS (Infrastructure as a Service) using Oracle VM Server software and Sun hardware through to SaaS (Software as a Service) built…

€195.00
Dec 01, 2011

Product Report: Quest One Identity Manager 5 - 70133

Martin Kuppinger

In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the German-speaking market and has…

€195.00
Dec 01, 2011

Product Report: Axiomatics Policy Management Suite - 70293

Martin Kuppinger

This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse Query The Axiomatics Policy Management suite falls into the category of Dynamic Authorization Management Systems, which are sometimes also called Entitlement Management or Policy Management…

€195.00
Nov 24, 2011

Snapshot: GTB Technologies – DLP solutions - 70357

GTB is a US-based vendor which delivers a suite of products focusing on the DLD and DLP issues, e.g. Data Loss Detection and Data Loss Prevention. The core product GTB Inspector acts as a content-aware reverse firewall which scans all outbound traffic and applies classification on these traffic in real-time. The second product is the GTP Endpoint DLP which is content-aware device control.…

free
Nov 16, 2011

Snapshot: Ilex Meibo and Meibo People Pack – IAM for the “big and not so big ones” - 70356

Ilex is a French company founded back in 1989. The company, which started with security consulting services, has been offering IAM products for many years, focusing mainly on France and other French speaking countries, but now expanding to other regions. Ilex offers, besides a solution for Single Sign-On, Web Access Management, and Federation, the tools Meibo and Meibo People Pack which…

free
Nov 16, 2011

Vendor Report: Fischer International - 70254

Martin Kuppinger

Fischer International differentiates itself from other vendors in the IAM market space especially through its strong focus on providing “Cloud Services” through a SaaS solution for the core functions of Identity Management. Unlike most others, Fischer International built its product completely around that particular approach. This brings specific technical advantages as far as…

€195.00
Nov 11, 2011

Vendor Report: Courion - 70353

Martin Kuppinger

Courion provides identity management solutions since 1996, is well established in North America,. Although the company has traditionally not had a strong presence in Europe, several large accounts in Germany, Switzerland and the UK are using Courion’s products. This is about to change: the company has prioritized Europe for the next years and plans to aggressively expanding there…

€195.00
Nov 02, 2011

Snapshot: Nervepoint Access Manager - 70354

Nervepoint Access Manager - Self-Service v0.5 is a free tool that provides self-service and password reset functionality as well as account unlock for Active Directory. The product is still deemed “beta” by Nervepoint Technologies, but the recently published v0.5 offers some additional benefit and valuable tools that can reduce help-desk calls in small to medium enterprises.…

free
Oct 28, 2011

Product Report: iT-CUBE agileSI - 70349

Martin Kuppinger

agileSI is a product which collects SAP security information and provides this information to Security Information and Event Management (SIEM) tools. The initial release supports ArcSight ESM, the market leader in the SIEM market. Beyond extracting the SAP security information, agileSI transforms that information for use in SIEM tools and adds standard configurations to ArcSight ESM which…

€195.00
Oct 25, 2011

Vendor Report: TITUS - 70301

Martin Kuppinger

TITUS (www.titus.com) is a privately held company specializing in information classification and data security, including Data Loss Prevention (DLP). The product portfolio consists of several products sup-porting the information classification and some aspects of DLP requirements in different types of environments, from email to SharePoint and Cloud security. TITUS has been covered in…

€195.00
Oct 21, 2011

Product Report: SailPoint IdentityIQ 5.2 - 70287

Martin Kuppinger

SailPoint is one of the pioneers in the emerging market for Access Governance. The company was founded in 2005 by a group of executives with long experience in IAM (Identity and Access Management) as well as in the general IT market. SailPoint is a company that started focusing exclusively on a platform that provides what they describe as “Identity Governance”. Designated…

€195.00
Oct 17, 2011

Product Report: DirX Identity 8.2 - 70134

Martin Kuppinger

With DirX Identity, Siemens has been able to establish itself amongst the technically leading vendors in the area of enterprise provisioning. As part of the Atos Origin acquisition of Siemens IT Solutions and Services (SIS) on 1st July 2011, the entire DirX product portfolio has been passed to Atos Origin. Atos Origin was renamed “Atos” to coincide with the takeover of SIS.…

€195.00
Oct 13, 2011

Vendor Report: Symplified - 70121

Dave Kearns

Securant Technology was a visionary vendor which created the web access management niche in the mid 1990’s. When that company was acquired by RSA, its management team immediately began thinking about what would come next. From that brain-storming emerged Symplified. Symplified was envisioned and built to be the identity service for the cloud-based computing platform that was…

€195.00
Oct 06, 2011

Product Report: Evidian Identity & Access Manager 9 - 70130

Martin Kuppinger

Corporate IT environments are growing more complex every day. Not only do users within and outside the organization need to access sensitive information, they need to do so on the road and from a wide range of different devices. Identity & Access Management (IAM) is increasingly being recognized as the key to both security and business success for enterprises around the world.…

€195.00
Oct 06, 2011

Scenario: Understanding Identity and Access Management - 70129

Martin Kuppinger

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with current trends and ramifications for corporate IT systems. IAM is primarily…

€995.00
Oct 06, 2011

Advisory Note: Avoiding Lock-in and Availability Risks in the Cloud - 70171

Mike Small

Cloud computing provides an opportunity for organizations to optimize the procurement of IT services from both internal and external suppliers. The Cloud is not a single model but covers a wide spectrum ranging from applications shared between multiple tenants to virtual servers used by a single customer. The risks associated with Cloud computing depend upon both the service model and the…

€295.00
Sep 22, 2011

Advisory Note: From Identity and Access Solutions to Access Governance - 70318

Mike Small

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations have not realised the benefits expected from the application of this technology, because they have…

€295.00
Sep 14, 2011

Product Report: CrossIdeas IDEAS - 70271

Martin Kuppinger

CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM. Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent software vendor in their core market segments. Like its predecessor, CrossIdeas is a one-product company, focusing entirely on their…

€195.00
Aug 29, 2011

Vendor Report: Microsoft® Cloud Security - 70126

Mike Small

This document is an evaluation of Microsoft’s Windows Azure™ Cloud platform from a security perspective. This platform allows organizations to build Cloud applications which are then hosted in the worldwide network of Microsoft datacenters. It also allows organizations to host existing applications that run under Windows Server 2008 and certain types of data in these Microsoft…

€195.00
Aug 19, 2011

Snapshot: Pawaa Enterprise Protection Suite - 70343

Pawaa is specialist on Enterprise Information Protection based in Bangalore, India, offering a number of products and modules for use cases such as integration with Google Docs, SAP Business Objects or as an online storage platform.

free
Aug 15, 2011

Vendor Report: Lieberman Software - 70107

Martin Kuppinger

Lieberman Software is an established vendor in the PxM (Privileged Access, Account, Identity, User Management) market, one of the fastest growing segments in the broader IAM and GRC market. The core product ERPM (Enterprise Random Password Manager) supports the management of all types of passwords in a heterogeneous environment by managing and securing the passwords. In addition to its…

€195.00
Aug 08, 2011

Product Report: DirX Identity 8.2 - 70134

Martin Kuppinger

Siemens hat sich mit DirX Identity als einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning etablieren können. Im Rahmen der Übernahme von Siemens IT Solutions and Services (SIS) durch Atos Origin zum 1. 7.2011 ist das gesamte DirX-Produktportfolio an Atos Origin gegangen. Mit der Übernahme von SIS wurde gleichzeitig Atos Origin in Atos…

€195.00
Aug 02, 2011

Scenario: Understanding IT Service and Security Management - 70173

Martin Kuppinger

This research note is the first of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the fundamental building blocks of, including what IT should be able to deliver to the business as well as the technical production of IT services. Together, these form the basis for effective…

€995.00
Jul 12, 2011

Advisory Note: BYOD - 70335

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the…

€295.00
Jun 14, 2011

Advisory Note: Authorization in the Cloud - 70217

Mike Small

Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that access to that data is mainly over the internet.  The need to identify users, to control what they…

€295.00
Jun 10, 2011

Advisory Note: „RSA SecurID – how to act after the hack? “ - 70344

Martin Kuppinger

As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time passwords) in a two-factor authentication approach used extensively by companies and government agencies…

free
Jun 09, 2011

Advisory Note: Strong Authentication - 70261

Martin Kuppinger

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides criteria for selecting the mechanism or combination of mechanisms which fits best to the different use…

€195.00
Jun 09, 2011

Advisory Note: IAM and GRC Market Evolution 2011/2012 - 70180

Martin Kuppinger

IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market growth, maturity, and cloud readiness. We expect to see significant changes within these market…

€95.00
Jun 08, 2011

Vendor Report: Vasco - 70303

Sebastian Rohr

Vasco is a vendor in the Authentication Management market which provides a number of differentiated solutions around strong authentication, electronic & digital signing. The vendor is well known for its broad range of hardware tokens for authentication & signatures and the complimentary software solutions acting as management server and validation point. To serve the different…

€95.00
Jun 08, 2011

Vendor Report: BiTKOO - 70110

Martin Kuppinger

BiTKOO is a privately held company that provides solutions for authorization/entitlement management in enterprise IT environments. The company was founded in 2006, starting with its product Keystone based on technology formerly developed for Walt Disney Company. BiTKOO has since broadened its product portfolio substantially and now offers several products around authorization management…

€95.00
May 24, 2011

Snapshot: alfabet planningIT IT Risk Management - 70380

planningIT is a platform for Business IT Management developed and offered by the German software manufacturer alfabet. planningIT has a number of modules and capabilities, but in the context of this snapshot we will confine ourselves to examining the IT Risk Management module which allows customers to perform IT Risk Management in a business-driven manner.

free
May 10, 2011

Business Report: IT-Initiativen 2011-2012: Eine 6*3-Matrix - 70265

Martin Kuppinger

Welche Initiativen sollen 2011/2012 auf der Agenda von CIOs ganz oben stehen? Die Research Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei Initiativen vorgeschlagen, die für die kontinuierliche Weiterentwicklung der IT besonderen Nutzen…

€95.00
May 10, 2011

Advisory Note: IAM and GRC Market - the Evolution in 2011/2012 - 70180

Martin Kuppinger

IAM and GRC are two of today's most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market growth, maturity, and cloud readiness. We expect to see significant changes within these market segments,…

€95.00
May 06, 2011

Vendor Report: Siemens - 70169

Martin Kuppinger

Siemens is one of the largest companies in the world. Siemens IT Solutions and Services (SIS), responsible for IT-products and services, is one of the different segments [referred to by Siemens as “sectors”] within the group. The established IAM and GRC products from Siemens are also allocated to this segment. In December of 2010, Siemens and Atos Origin announced that they…

€95.00
May 06, 2011

Vendor Report: IBM Cast Iron Systems - 70103

Martin Kuppinger

Application integration is a key requirement to support the business requirements for flexible business processes, spanning a variety of applications. With the cloud and an increasing number of SaaS services, e.g. applications hosted in the cloud, integration moves to a new level of complexity. The integration of cloud and on-premise application services requires new types of integration…

€95.00
May 06, 2011

Cloud Computing Overview - 70140

Mike Small

The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The Cloud covers a wide spectrum from shared applications delivered over the internet to virtual servers hosted internally.  The risks associated…

€95.00
May 06, 2011

Product Report: Entrust Identity Guard v9.3 - 70322

Sebastian Rohr

Entrust Identity Guard is a representative of the rather new market segment of Versatile Authentication Servers (VAS) and offers a single administration interface for managing up to twelve different authentication factors or authentication methods, respectively. The number of authentication factors and the internally created, low cost grid cards are the outstanding features of this…

€95.00
May 04, 2011

Vendor Report: Siemens - 70169

Martin Kuppinger

Siemens ist eines der größten Unternehmen weltweit. Innerhalb des in verschiedene Segmente [Siemens spricht hier von Sektoren] gegliederten Konzerns gibt es den Bereich Siemens IT Solutions and Services (SIS), der für IT-Produkte und –Dienstleistungen zuständig ist. Diesem Bereich sind auch die IAM- und GRC-Produkte von Siemens zugeordnet. Im Dezember 2010…

€95.00
May 03, 2011

Snapshot: SecurIT TrustBuilder - 70381

SecurIT TrustBuilder is a Versatile Authentication Server (VAS) provided by the Belgian company SecurIT. The product started as add-on for IBM Tivoli Access Manager but right now works with a broad set of different tools. Beyond the versatility features, TrustBuilder now provides the capability for transaction signing and security as a service to access management systems and applications.

free
Apr 27, 2011

Product Report: Oracle Database Vault/Oracle Audit Vault - 70112

Martin Kuppinger

The market for Database Security involves a number of different technical solution approaches which are not covered by a single product, but instead require a set of different products and features in order to secure content in databases. As a result, there are many different solutions on offer in the market today. In this report we will focus on Oracle Database Vault and Oracle Audit…

€95.00
Apr 27, 2011

Snapshot: Sun to Oracle Identity Upgrade - 70382

Oracle Sun to Oracle Identity Upgrade program is an initiative aimed at informing Sun customers about the company’s future strategy for former Sun Identity and Access Management (IAM) products, and about their planned migration paths. This program is a follow-up to when Oracle which unveiled the general product roadmap for Sun customers in the realm of IAM when the acquisition of…

free
Apr 13, 2011

Snapshot: Thales SafeSign Authentication Suite - 70383

Thales SafeSign is a set of stand-alone modules that comprises the full feature-set of so called Versatile Authentication Servers or Platforms (VAS or VAP). It can be deployed as authentication server for token and mobile based One Time Password (OTP), Challenge and Response, EMV/CAP and PKI based authentication or as a Token/Card Management Solution (CMS), but its full capability is used…

free
Mar 25, 2011

Vendor Report: Avatier - 70144

Martin Kuppinger

Avatier is a vendor in the Identity and Access Management (IAM) market which provides an integrated set of tools to cover core requirements in that market. The AIMS (Avatier Identity Management Suite) supports features like role mining, password management and reset, user provisioning, recertification of access and access requests. With this offering, AIMS fits into the Enterprise…

€95.00
Mar 24, 2011

KuppingerCole Top Trends 2011 - 70116

Martin Kuppinger

Wie jedes Jahr haben die Analysten von KuppingerCole wieder die wichtigsten Trends im Markt für allgemeine IT, Cloud Computing, Governance, Risk Management und Compliance (GRC), Identity und Access Management (IAM) und Mobile Computing herausgearbeitet. An der Spitze dieser Listen steht unserer Meinung nach eine noch stärkere Zusammenarbeit zwischen operativen…

free
Mar 23, 2011

Advisory Note: Cloud Computing - Cloud Security Management - 70139

Mike Small

The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between multiple tenants to virtual servers used by one customer and hosted internally.  The information…

€95.00
Mar 15, 2011

Advisory Note: Database Governance - 70102

Martin Kuppinger

Database Governance is the set of policies, procedures, practices and organizational structures ensuring the execution of database related activities in an organization according to defined strategies and controls. Database Governance is required to enforce Information Security for structured data held in databases. Within Enterprise GRC, Database Governance is an element of IT GRC.…

€95.00
Mar 15, 2011

Vendor Report: Symantec Cloud Security - 70115

Mike Small

The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The information security risks associated with Cloud computing depend upon both the service model and the delivery model adopted.   The…

€95.00
Mar 07, 2011

KuppingerCole Top Trends 2011 - 70116

Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix of…

free
Mar 05, 2011

Snapshot: Oracle Database Firewall - 70384

Oracle Database Firewall is one of several Oracle offerings in the database security market. It complements other products such as Oracle Database Vault that offer protection within the database by providing protection by analyzing database traffic outside the database. Like few other products in that area, Oracle Database Firewall analyzes database activity traffic over the network and…

free
Feb 24, 2011

Product Report: protected networks 8MAN - 70131

Martin Kuppinger

8MAN von protected-networks.com ist ein Access Control-Werkzeug, das derzeit Windows-Umgebungen mit dem Active Directory und File-Servern unterstützt. Eine Erweiterung auf weitere Zielsysteme ist in Vorbereitung. Das Produkt unterstützt die Analyse von Berechtigungen, die Protokollierung von Änderungen, die Vergabe von Berechtigungen, ihre Kontrolle durch Dateneigner und…

€95.00
Feb 14, 2011

Snapshot: CA Service Catalog 12.6 - 70385

CA Service Catalog 12.6 is a comprehensive offering in the Service Management market, going well beyond traditional ITSM and specifically ITIL focused approaches, but also supporting these use cases. The real strength of the product lies in the fact that it acts as centralized instance within a holistic approach to service management with a strong focus on business performance.

free
Feb 09, 2011

Snapshot: IBM Tivoli Live – service manager - 70386

IBM Tivoli Live - service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management Database), and Asset Management. It is provided as a joint initiative of the IBM Tivoli product group and IBM GTS workplace services. IBM plans to add additional features in the future. IBM Tivoli Live -…

free
Feb 09, 2011

Snapshot: HyTrust, Inc. - 70387

HyTrust is a venture financed company founded in 2007. It is located in Mountain View, CA. The management is experienced, with a history at different leading vendors in the IT industry. The company has successfully built partnerships with several large players, including VMware, Cisco, and RSA Security. It has achieved several innovation awards and has won a significant number of…

free
Feb 04, 2011

Vendor Report: SecureAuth Corporation - 70260

Martin Kuppinger

SecureAuth is a single-product vendor. The product SecureAuth IEP is a platform for a strong two-factor authentication based on X.509v3 certificates for web-based applications, federated environ-ments based on SAML, and VPNs. It is deployed as appliance (hard or soft) and provided as well in cloud deployments based on Amazon EC2 and by Managed Service Providers (MSPs). Beyond the support…

€95.00
Jan 25, 2011

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte von PxM innerhalb heterogener Umgebungen auf integrierte Weise zu adressieren. Cyber-Ark…

€95.00

 2010

top  

Date Title Price
Dec 22, 2010

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Martin Kuppinger

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM is defined as a suite by the vendor. However, it is more sort of an integrated product with several…

€95.00
Dec 21, 2010

Product Report: Zscaler Cloud Security

Alexei Balaganski

Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in SaaS security market is that their solution is entirely cloud-based and does not require any extra…

€95.00
Dec 06, 2010

Vendor Report: Novell - Identity and Security

Martin Kuppinger

Novell has a long history in the fields of identity and security. The company was one of the pioneers in network operating systems and the corresponding directory and security services. Over the year, it has continued to develop and expand its portfolio. Today, identity and security remain at the heart of Novell’s business model, along with products for data centers based on Novell…

€95.00
Nov 30, 2010

Virtualization Security Survey: Security – an essential prerequisite for successful virtualization

Martin Kuppinger

During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Organizations transitioning to a virtualized or cloud IT model need to invest in a security strategy, in organization and skills, and in technology. Vendors need…

free
Nov 30, 2010

Vendor Report: CA Technologies Virtualization Security

Martin Kuppinger

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization…

€95.00
Oct 12, 2010

Product Report: Novell Identity Manager 4

Martin Kuppinger

Novell Identity Manager 4 is a family of products in the category of enterprise provisioning, allowing synchronizing and managing identities and entitlements, including strong policy and reporting features. Beyond the basic capabilities, Novell has added advanced role management and policy management features as well as new reporting capabilities and support for cloud applications. That…

€95.00
Sep 30, 2010

Product Report: SECUDE Security Intelligence

Martin Kuppinger

SECUDE ist ein Hersteller, der sich auf Sicherheitslösungen spezialisiert hat. Ein wesentlicher Teil des Lösungsportfolios ist im SAP-Umfeld angesiedelt. Dazu zählen neben dem neuen Produkt SECUDE Security Intelligence für SAP insbesondere Funktionen für die sichere Authentifizierung und Kommunikation in SAP-Infrastrukturen. SECUDE Security Intelligence arbeitet…

€95.00
Sep 30, 2010

Product Report: SECUDE Security Intelligence

Martin Kuppinger

SECUDE is a vendor specializing in security solutions mainly for SAP customers. In addition to their latest product, SECUDE Security Intelligence, the company’s portfolio includes a number of solutions providing authentication and communication within SAP environments. SECUDE Security Intelligence works by providing a layer between the various protocols and SAP-related systems…

€95.00
Sep 28, 2010

Product Report: CA Access Control – Privileged User and Password Management

Martin Kuppinger

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity Management, depending on the product specifics and the vendors marketing) within the IAM (Identity…

€95.00
Sep 23, 2010

Vendor Report: Novell – Identity and Security

Martin Kuppinger

Novell hat eine sehr lange Historie im Bereich Identity und Security. Das Unternehmen hat mit Netzwerk-Betriebssystemen und den zugehörigen Verzeichnis- und Sicherheitsdiensten begonnen und zählt zu den Pionieren in diesem Markt. Über die Jahre wurde das Portfolio konsequent weiterentwickelt und ausgebaut. Auch heute zählt  der Bereich Identity und Security zu den…

€95.00
Sep 20, 2010

Product Report: Quest Defender

Martin Kuppinger

Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature, though hardly surprising coming from Quest, is the deep integration it provides with Active Directory,…

€95.00
Sep 20, 2010

Product Report: Oracle Database Security

Martin Kuppinger

Oracle Database Security is in fact not a single product but a set of products. It supports different features around securing content in databases. This report focuses mainly on Oracle Advanced Security and Oracle Database Vault but covers the other products as well. This is based on the fact that these two products are, from the KuppingerCole understanding, at the core of Oracle…

€95.00
Sep 17, 2010

Product Report: IBM Tivoli Identity Manager

Martin Kuppinger

The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner. IBM Tivoli Identity Manager supports some integrated Access Governance capabilities beyond…

€95.00
Sep 16, 2010

Vendor Report: Courion

Felix Gaehtgens

Courion provides identity management solutions since 1996 and is well established in North America. The company has traditionally not had a focus on Europe, even though several large accounts in Switzerland and the UK are using Courion’s products. This is about to change: the company has prioritized Europe for 2010 and is aggressively expanding there through new hires and…

€95.00
Aug 16, 2010

Product Report: Quest Defender

Martin Kuppinger

Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine Zwei-Faktor-Authentifizierung. Dabei werden sehr viele unterschiedliche Tokens unterstützt, so dass es dennoch eine große Bandbreite für die Authentifizierung gibt – sowohl im…

€95.00
Aug 09, 2010

Product Report: Beta Systems Software AG SAM Enterprise Identity Manager v1.1

Martin Kuppinger

The Beta Systems Software AG SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner. It also supports common provisioning features such as user self service,…

€95.00
Aug 09, 2010

Product Report: Adobe LiveCycle ES2 Rights Management

Martin Kuppinger

Adobe LiveCycle ES2 Rights Management ist ein Produkt, das von KuppingerCole der Kategorie Information Rights Management (IRM) zugeordnet wird. IRM ist aus Sicht von KuppingerCole eine der zentralen Funktionen für schlüssige, effiziente und durchgängige Konzepte der Informationssicherheit und damit ein Kernbaustein in jeder IT-Sicherheitsarchitektur. IRM setzt auf die…

€95.00
Jul 29, 2010

Trend Report: Desktop Virtualization and VDIs

Martin Kuppinger

Desktop Virtualization and VDIs (Virtual Desktop Infrastructures) are key topics for many IT managers and decision makers. However, like with every hype topic, there are shortcomings. Investments in VDIs and Desktop Virtualization thus have to be done carefully, after weighing the opportunities against the risks and the strengths against the weaknesses. From the perspective of…

€195.00
Jul 05, 2010

Product Report: Völcker ActiveEntry 4.1

Martin Kuppinger

Völcker Informatik AG based in Berlin has established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the German-speaking market and has succeeded in creating a substantial customer base including many large and…

€95.00
Jul 02, 2010

Trend Report: Hidden Gems 2010

Martin Kuppinger

This report covers vendors which are, from the KuppingerCole perspective, Hidden Gems in the mar-kets which we are analyzing. The “Hidden Gems” are vendors which are •    relatively small and •    innovative They might be established in a specific country (being sort of “world famous in Italy”) but not that visible beyond…

€195.00
May 21, 2010

Product Report: Völcker ActiveEntry 4.1

Martin Kuppinger

Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity und Access Management-Markt etabliert. Dabei ist es dem Unternehmen auch gelungen, insbesondere im deutschsprachigen Markt, eine sehr hohe Sichtbarkeit zu erreichen und eine signifikante Zahl auch von großen Kunden zu gewinnen. Mit der…

€95.00
May 04, 2010

Product Report: wikima4 mesaforte

Martin Kuppinger

Mesaforte is a product of the Swiss firm wikima4. The product arose out of experiences from numerous projects. A series of customers has licensed it and it is being advanced within the scope of regular product development. By now, the solution, originally geared toward monitoring the security of SAP infrastructures, has a greater functional breadth. It targets the control and monitoring…

€95.00
May 03, 2010

A Review of Cloud Business Models and Demonstrations in Finance and Health Clouds

By Victor Chang, Gary Wills and David De Roure This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forum´s Cloud Cube Model (CCM), we classify cloud computing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and…

€30.00
May 02, 2010

Business Report: GRC Market Structure

Martin Kuppinger

GRC stands for Governance, Risk Management, Compliance. It is used to describe Information Tech-nology which supports these specific business requirements. This report provides a segmentation of the overall GRC market with its different elements, from the C-level dashboards down to technical elements which are required to provide information for automated controls and the automated…

€165.00
Apr 30, 2010

Vendor Report: Passlogix

Martin Kuppinger

Passlogix is a software vendor which started in the field of E-SSO (Enterprise Single Sign-On) in 1996 and established itself as one of the leading vendors in that particular segment. The company has a significant direct and partner sales channel. In addition, Passlogix has built on the OEM channel. Oracle is still an OEM of Passlogix, but Passlogix is doing the major part of its business…

€95.00
Apr 29, 2010

Product Report: wikima4 mesaforte

Martin Kuppinger

Mesaforte ist ein Produkt des Schweizer Unternehmens wikima4. Das Produkt ist als Resultat von Erfahrungen aus zahlreichen Projekten entstanden, von einer Reihe von Kunden lizenziert und wird im Rahmen einer regulären Produktentwicklung vorangetrieben. Das ursprünglich auf die Sicherheitsüberwachung von SAP-Infrastrukturen ausgerichtete Lösung hat inzwischen eine…

€95.00
Apr 29, 2010

Product Report: Engiweb IDEAS

Martin Kuppinger

Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their platform IDEAS which is built around role management, authorization management, and other features.…

€95.00
Apr 28, 2010

10 Top Trends 2010

Martin Kuppinger

As in the past years, Kuppinger Cole has worked out 10 Top Trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). These are complemented by 10 Top Trends in Cloud Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix…

free
Apr 28, 2010

Die Top Ten Trends 2010

Martin Kuppinger

Wie jedes Jahr haben die Analysten von Kuppinger Cole wieder die zehn wichtigsten Trends im Markt für Identity und Access Management (IAM) sowie Governance, Risk Management und Compliance (GRC) herausgearbeitet. In diesem Jahr kommen erstmals die Top Ten Trends bei Cloud Computing hinzu. An der Spitze der drei Listen steht unserer Meinung nach eine noch stärkere Zusammenarbeit…

free
Apr 26, 2010

Vendor Report: RM5 Software

Martin Kuppinger

RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second…

€95.00
Apr 26, 2010

Product Report: Beta Systems Software AG SAM Enterprise Identity Manager v1.1

Martin Kuppinger

Der Beta Systems Software AG SAM Enterprise Identity Manager ist in der Kategorie der Enterprise Provisioning-Systeme einzuordnen. Die Kernfunktionalität ist der strukturierte, automatisierte und nachvollziehbare Abgleich von Identitätsinformationen zwischen verschiedenen Systemen auf Basis von definierten Prozessen und Connectoren zu den Zielsystemen. Wie bei…

€95.00
Apr 26, 2010

Product Report: Aveksa Enterprise Access Governance Platform

Martin Kuppinger

The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without technical integration. This is a significant step forward beyond the detective approach which was at…

€95.00
Apr 15, 2010

Product Report: SAP Business Objects GRC Access Control

Sachar Paulus

The SAP BusinessObjects GRC Access Control (in short AC) solution is a powerful set of tools that help to automate risk analysis and mitigation for user and authorization management in SAP and non-SAP systems. It is a strong product for the SAP ABAP world, and is able to cover non-SAP systems using real-time adapters from Greenlight. It covers a substantial subset of the overall GRC…

€95.00
Mar 30, 2010

Vendor Report: Cyber-Ark

Martin Kuppinger

Cyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In addition, Cyber-Ark is active in the field of secure file transfer for secure document handling. The company was founded in 1999 and is investor financed. Its flagship product is the Cyber-Ark…

€95.00
Mar 23, 2010

Technology Report: Access Governance Architectures

Martin Kuppinger

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions, to name just a few. The large number of prominent incidents within the last few years proves the…

€165.00
Mar 15, 2010

Vendor Report: Cyber-Ark

Martin Kuppinger

Cyber-Ark hat sich als einer der führenden Anbieter im Bereich von Privileged Access Management (PAM) etabliert und dürfte derzeit die größte funktionale Breite im Markt aufweisen. Darüber hinaus bietet das Unternehmen Lösungen für den sicheren Transfer von Dateien und den Umgang mit sensiblen Dokumenten an. Das Unternehmen wurde 1999 gegründet und…

€95.00
Mar 11, 2010

Product Report: Axiomatics Policy Server and Policy Auditor

Felix Gaehtgens

This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based XACML standard – Extensible Access Control Markup Language – to define authorisation policies and make access control decisions. Agents are available for the Java and .NET platform that…

€95.00
Mar 08, 2010

Market Overview Strong Authentication

Sebastian Rohr

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with…

€695.00

 2009

top  

Date Title Price
Dec 04, 2009

Vendor Report: TESIS SYSware

Martin Kuppinger

TESIS SYSware, part of the TESIS group, is a private company located in Munich. The group consists of three divisions that are involved in a variety of IT fields. TESIS SYSware’s (hereafter referred to as TESIS) core business is in IT security and identity management. They are a provider of standardized software for these markets. The company’s focus is on password,…

€95.00
Nov 09, 2009

Product Report: Quest Single Sign-On solutions for SAP

Martin Kuppinger

The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between Active Directory-infrastructures and SAP-environments on the basis of Kerberos. Quest also offers a „classic“ SSO solution called Quest Enterprise Single Sign-On as an option for…

€95.00
Oct 29, 2009

Cloud Vendor Report: Amazon

Martin Kuppinger

Amazon is widely known as online retailer, having expanded its bookstore business to many other areas over time. Some time ago Amazon has entered the Cloud Computing market. Amazon provides a broad set of services under their label Amazon Web Services (AWS), with the Amazon Elastic Compute Cloud (EC2) as the most popular one. Amazon’s strategy for providing web services based on…

€95.00
Oct 07, 2009

Product Report: Quest Single Sign-On solutions for SAP

Martin Kuppinger

Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen Active Directory-Infrastrukturen und SAP-Umgebungen auf Basis von Kerberos an. Als Option für Infrastrukturen, in denen man keine Kerberos-basierende Lösung einsetzen möchte, gibt es…

€95.00
Oct 05, 2009

Overview Report: A GRC Reference Architecture

Sachar Paulus

Governance, Risk & Compliance - these three terms, in short "GRC" are pretty widely used in these days. Unfortunately, there is great confusion in how this term is used. The reason for this confusion is with high probability the fact that it allows to sell pretty easily all kind of technology under the umbrella of "Risk" and "Compliance" solutions. But…

€195.00
Sep 29, 2009

Technology Report: XACML – Extensible Access Control Markup Language

Felix Gaehtgens

This report explains XACML, an evolving standard in the field of access control. Access control in IT is of vital importance. Companies use access control technology to protect sensitive systems and information, and to keep assets safe. At the same time, compliance with external regulations and internal policies is very important and access control technology is key. We can think about…

€165.00
Sep 23, 2009

Business Report: Identity & Security in the Cloud

Tim Cole

Cloud Computing ist seit etwa zwei Jahren das Modewort schlechthin in der IT-Branche. Historisch geht Cloud Computing auf verschiedene Ansätze zur externen Bereitstellung von Anwendungen oder Speicherplatz, um die Unternehmens-IT zu entlasten oder sogar ganz zu ersetzen. ASP („Application Service Providing“) wurde bereits in den 90ern mit dem Aufkommen des Internet…

€165.00
Aug 18, 2009

Overview Report: SAP Security – Getting the Whole Picture

Sachar Paulus

SAP Security is a wide field. Most SAP Technology Experts think that SAP Security is all about authorizations, user management, roles, profiles and all that highly complicated stuff. But it is like with protecting a house: if you only look at who has which keys for the doors, but forget to close the windows, then your security might be pretty weak. Therefore, it is important to get…

€165.00
Aug 18, 2009

Cloud Vendor Report: Citrix

Martin Kuppinger

Citrix Systems (Citrix) is an established IT vendor which started with Terminal Server products in Windows environments, allowing users to access sessions which are running on a Windows Server remotely. Based on the success of these market-leading technology, Citrix has consequently expanded its portfolio over the course of the years to address as well more complex virtualization and…

€95.00
Aug 18, 2009

Product Report: Siemens DirX Identity 8.1

Martin Kuppinger

Siemens hat sich mit der seit 2007 verfügbaren Version 8.0 von DirX Identity als einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning etablieren können. Mit der seit August 2009 erhältlichen Version 8.1 hat Siemens die Funktionalität wiederum erheblich erweitert. Das Pro-dukt zählt zu den technisch marktführenden Lösungen.…

€95.00
Jul 16, 2009

Vendor Report: SAP

Martin Kuppinger

SAP is the world’s leading vendor of enterprise business systems, with a core focus on ERP (Enterprise Resource Planning), but as well delivering application platforms for business processes and business intelligence solutions. Within the broad portfolio of SAP, the areas of GRC (Governance, Risk Management, and Compliance) and IAM (Identity and Access Management) became more…

€95.00
Jul 16, 2009

Product Report: Quest ActiveRoles Server

Martin Kuppinger

Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for role-based administration of both Active Directory and a growing number of other system environments. As is to be expected, its greatest strengths are in management of Active Directory environments, where its…

€95.00
Jul 15, 2009

Market Report: Cloud Computing

Martin Kuppinger

Cloud Computing wird häufig als der Bezug von Diensten aus dem Internet gesehen. Diese Definition ist nach unserer Einschätzung nicht korrekt. Der wesentliche Aspekt des Cloud Computings liegt darin, IT als Services zu betrachten, die flexibel bezogen und konfektioniert werden können, um die Anforderungen des Business zu betrachten. Grundlegend neu ist dabei der flexible…

€165.00
May 26, 2009

Product Report: Siemens DirX Access

Martin Kuppinger

Siemens managed to enter the web access management and identity federation market successfully by buying in and then significantly developing technology. Siemens DirX Access’ version 8.1 is a technically accomplished solution with a flexible and modular architecture concept. Siemens DirX Access 8.1 covers all standard requirements for solutions in this segment and in addition offers…

€95.00
May 26, 2009

Vendor Report: Siemens

Martin Kuppinger

Siemens is one of the largest companies in the world. Siemens IT Solutions and Services (SIS), responsible for IT-products and services, is one of the different segments [Siemens refers to these as “sectors”] of the company group. The established IAM and GRC products from Siemens are also allocated to this segment. Biometric solutions, smartcards, card management and public…

€95.00
May 05, 2009

Vendor Report: Aveksa

Martin Kuppinger

Aveksa's claim is "Enterprise Access Governance". The company is one of several startups which provide a GRC platform to support requirements of what Kuppinger Cole calls IAM-GRC, e.g. the Identity and Access Management related aspects of GRC (Governance, Risk Management, and Compliance). Aveksa was founded in 2006, by an experienced team including several former executives from…

€95.00
May 05, 2009

Vendor Report: Beta Systems

Martin Kuppinger

Die Beta Systems Software AG ist ein in Berlin ansässiger Anbieter von Standardsoftwareprodukten. Das Unternehmen unterstützt die Bereiche Security (mit Fokus auf Identity und Access Management) und Compliance sowie Dokumentenverarbeitung, die Verarbeitung von großen Datenmengen in Rechenzentren und das Management und die Automatisierung in Rechenzentren. Die…

€95.00
May 05, 2009

Product Brief: Microsoft Forefront Identity Manager

Felix Gaehtgens

On Monday the 23rd of March, Microsoft announced that it would - again - delay the launch of ILM 2, the "Identity Lifecycle Manager". The release was now pushed back one whole year, to give Microsoft more time to "validate ILM in long-running live deployments before release". As can be expected, this announcement has caused a considerable amount of reactions, ranging from delight to…

€95.00
May 05, 2009

Vendor Report: vps ID Systeme

Martin Kuppinger

Die vps ID Systeme GmbH (vps) ist eine 100%ige Tochtergesellschaft der börsennotierten Digital Identi-fication Solutions AG. Letztere ist wiederum aus dem Bereich Identifikations- und Sicherheitssysteme des KODAK-Konzerns entstanden und 2003 als unabhängiges Unternehmen gegründet worden. Die Digital Identification Solutions AG ist seit 2006 börsennotiert. Die vps…

€95.00
May 05, 2009

Market Report: The SAP Identity Management Strategy

Martin Kuppinger

About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it was two years ago. The product called SAP NetWeaver Identity Management has gained a lot of…

€165.00
May 02, 2009

Trend Report: SSO 2009

Martin Kuppinger

Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten. Innerhalb der Vielzahl von unterschiedlichen technischen Ansätzen für das Single…

€195.00
May 02, 2009

Trend Report: The impact of claims-based approaches

Martin Kuppinger

The term of “claims-based identity” and the idea overall of using the term “claim” in Identity and Access Management (IAM) has been introduced by Microsoft some two years ago but the concepts can be used in any environments and technologies can (and sometimes are) provided by other vendors as well. A claim is a piece of information about a user provided by an…

€125.00
May 02, 2009

Technology Report: Strong authentication for user-centric Identity Management

Martin Kuppinger

Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite the fact, that there are several open questions regarding business models for identity providers…

€95.00
May 02, 2009

Market Report: Die Identity Management-Strategie von SAP

Martin Kuppinger

Seit der Übernahme des norwegischen Herstellers MaXware durch SAP sind inzwischen rund zwei Jahre vergangen. Seit diesem Zeitpunkt hat sich SAP IM im Identity Management-Markt positioniert. Die von MaXware übernommenen Produkte wurden in dieser Zeit signifikant wei-terentwickelt. Auch in der Strategie gibt es inzwischen deutlich mehr Klarheit als noch vor zwei Jahren. Das als…

€165.00
May 02, 2009

Market Report: Oracle buys Sun – the Impact on IAM and GRC strategies and tactics

Felix Gaehtgens

The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that point of time, both vendors will have to act separately and are not allowed to publish a combined…

€165.00
May 02, 2009

Market Report: GRC 2009

Martin Kuppinger

GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. Kuppinger Cole observes an trend towards tools which integrate analysis, attestation, authorization management, risk management, Segregation of Duties controls, and role management functionalities to provide an overall GRC solution with focus on access controls and authorization…

€165.00
May 01, 2009

Product Report: Omada Identity Manager

Martin Kuppinger

Der dänische Hersteller Omada hat sich in den vergangenen Jahren als wichtigster Technologiepartner von Microsoft im Umfeld von MIIS und Forefront Identity Manager positionieren können. Gemeinsam mit Microsoft wurden eine Reihe von großen Projekten gewonnen und zusammen mit unterschiedlichen Integrationspartnern umgesetzt. Omada erweitert dabei die derzeit primär auf…

€95.00
May 01, 2009

Product Report: Quest ActiveRoles Server

Martin Kuppinger

Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für die rollenbasierte Verwaltung von Active Directory-Umgebungen, das inzwischen auch eine zunehmende Zahl von anderen Systemumgebungen unterstützt. Entsprechend liegen die spezifischen Stärken…

€95.00
May 01, 2009

Vendor Report: Siemens

Martin Kuppinger

Siemens ist eines der größten Unternehmen weltweit. Innerhalb des in verschiedene Segmente [Siemens spricht hier von Sektoren] gegliederten Konzerns gibt es auch den Bereich Siemens IT Solutions and Services (SIS), der für IT-Produkte und –Dienstleistungen zuständig ist. Diesem Bereich sind auch die etablierten IAM- und GRC-Produkte von Siemens zugeordnet. Zu…

€95.00
May 01, 2009

Vendor Report: TESIS SYSware

Martin Kuppinger

Die TESIS SYSware ist ein in München beheimatetes Unternehmen in Privatbesitz, das Teil der TESISGruppe ist. Diese Unternehmensgruppe besteht aus drei Teilunternehmen, die sich mit unterschiedlichen IT-Themenfeldern beschäftigen. Die TESIS SYSware (im Folgenden kurz als TESIS bezeichnet) hat ihren Schwerpunkt in den Bereichen IT-Security und Identity Management und ist ein…

€95.00
Apr 30, 2009

Produktbericht: Radiant Logic Virtual Directory Server

Felix Gaehtgens

Mit dem Release 5.0 des Virtual Directory Server hat Radiant Logic seine Produktlinie in die VDS Proxy Edition und die VDS Context Edition aufgespaltet, um den spezifischen Anforderungen der Verzeichnisvirtualisierung besser entsprechen zu können. Viele der Anforderungen an Virtual Directories entstehen aus den spezifischen Umsetzungsproblemen, die überwunden werden müssen…

€95.00
Apr 30, 2009

Produktbericht: SailPoint IdentityIQ

Martin Kuppinger

SailPoint IdentityIQ ist eines der führenden Produkte im aufstrebenden Marktsegment der Identiy/Access-GRC-Plattformen, das leistungsstarke Funktionen in den Bereichen Attestierung, Audit, Analyse und Rollenverwaltung bietet – Letzteres wurde im aktuellen Release deutlich verbessert. Das Produkt unterstützt einen Risiko-Scoringansatz mit Schwerpunkt auf dem…

€95.00
Mar 27, 2009

Vendor Report: Econet

Martin Kuppinger

Die econet AG ist ein in München ansässiges Unternehmen, das 1994 gegründet wurde. Der Fokus des in Privatbesitz befindlichen Unternehmens liegt auf der Unterstützung von IT-Geschäftsprozessen und IT-Diensten. Der Ansatz zielt auf die Verbindung von Identity Management und Service Management und eine Unterstützung von GRC-Anforderungen ab. Spezifische…

€95.00
Mar 27, 2009

Product Report: Siemens DirX Access

Martin Kuppinger

Siemens hat auf einer zugekauften und signifikant weiterentwickelten Technologiebasis den Einstieg in den Markt für Web Access Management und Identity Federation erfolgreich bewältigt. Mit der Version 8.1 von Siemens DirX Access wird eine technisch ausgereifte Lösung mit einem flexiblen, modularen Architekturkonzept angeboten. Siemens DirX Access 8.1 deckt alle…

€95.00
Mar 27, 2009

Product Report: Engiweb IDEAS

Martin Kuppinger

Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their platform IDEAS which is focused around role management, authorization management, and other…

€95.00
Mar 27, 2009

Vendor Report: IBM’s IAM and GRC offerings

Martin Kuppinger

IBM is amongst the vendors which have entered the IAM market early. Right now, IBM can deliver in most areas of the IAM market, with only few missing elements in their overall portfolio. In the GRC market, the current focus of IBM is more towards SIEM-related GRC issues and log analysis, whilst IBM offers no specific platform for IAM-GRC. Anyhow, we expect IBM to be able to provide…

€95.00
Mar 04, 2009

Vendor Report: Oracle

Martin Kuppinger

Oracle has, largely through making acquisitions, transformed itself over the past few years into one of the leading suppliers in the IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance) areas. Within these IT market segments, the Company is now in a position to deliver solutions covering the majority of requirements and it maintains one of the broadest…

€95.00
Feb 20, 2009

Product Report: SailPoint IdentityIQ

Martin Kuppinger

SailPoint IdentityIQ is one of the leading products in the emerging market segment of Identity/Access-oriented GRC platforms, providing strong capabilities in the areas of attestation, auditing and analysis, and role management – the latter with significant improvements in the current release. The product supports a risk scoring approach that focuses on identity risk; but it…

€95.00
Feb 20, 2009

Vendor Report: Oracle

Martin Kuppinger

Oracle hat sich in den vergangenen Jahren insbesondere durch Zukäufe zu einem der führenden Anbieter im Bereich IAM (Identity und Access Management) und GRC (Governance, Risk Management, Compliance) entwickelt. Das Unternehmen kann in diesen Segmenten des IT-Markts inzwischen Lösungen für den überwiegenden Teil der Anforderungen bereitstellen und verfügt…

€95.00
Feb 09, 2009

Business Report: Key Risk/Performance Indicators IAM and GRC

Martin Kuppinger

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for a quick overview on the progress of organizations. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report provides 25 selected Key Risk Indicators (KRI) for the area of IAM and GRC. These indicators are easy to…

€165.00
Feb 05, 2009

Vendor Report: Evidian

Martin Kuppinger

Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio. Despite the breadth of their portfolio, Evidian isn’t usually recognized amongst the leading IAM ven-dors – which they should be. Evidian…

€95.00
Feb 05, 2009

Vendor Report: BHOLD

Martin Kuppinger

BHOLD ist ein spezialisierter Anbieter, der sich auf das Enterprise Authorization Management, also die Verwaltung von Autorisierungen für den Zugriff auf IT-Systeme aus Business-Sicht, spezialisiert hat. Diese Funktion stellt eine der Kernfunktionen von generischen GRC-Anwendungen (Governance, Risk Management, Compliance) mit Fokus auf Identity und Access Management (IAM-GRC) dar.…

€95.00
Feb 04, 2009

Vendor Report: Entrust 2009

Martin Kuppinger

Entrust zählt zu den bekannten und etablierten Anbietern im Identity Management-Markt. Historisch hat sich das Unternehmen primär als Hersteller und Service-Anbieter im Bereich der Zertifikatsdienste und PKIs (Public Key Infrastructures) positioniert. Im Rahmen der Restrukturierung und Repositionierung hat Entrust allerdings inzwischen ein deutlich breiteres Produktportfolio…

€95.00
Jan 26, 2009

Product Report: Radiant Logic Virtual Directory Server

Felix Gaehtgens

With release 5.0 of Virtual Directory Server, Radiant Logic has split up its product line into VDS proxy edition and VDS context edition to cater better to the specific demands for directory virtualisation. Many virtual directory requirements arise out of specific deployment problems that must be overcome, and are best addressed with targeted point solutions. Radiant Logic’s VDS…

€95.00
Jan 23, 2009

Vendor Report: Arcot Systems

Martin Kuppinger

Arcot Systems targets the authentication segment of the IAM market with focus on software-based strong authentication with support for versatile authentication and risk-based authentication. The companies’ revenue model is backed by well established hosted services for the financial industry, mainly in providing cardholder authentication to credit card companies. The company…

€95.00
Jan 23, 2009

Product Report: Sun Identity Manager

Martin Kuppinger

Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core features we expect from products in that market segment, with strong provisioning capabilities and a…

€95.00
Jan 20, 2009

Vendor Report: ActivIdentity

Martin Kuppinger

ActivIdentity is a vendor for solutions around strong authentication, Enterprise Single Sign-On (E-SSO), device and credential management, and secure information transfer. The company has been founded in 1985 with headquarters in the US and in Suresnes, France. The company acts as a niche player in the mentioned market segments, with specific strengths in the fields of versatile…

€95.00
Jan 16, 2009

Trend Report: Enterprise Role Management

Martin Kuppinger

Enterprise Role Management describes an enterprise-wide approach for defining role models and roles for every type of system which requires roles, going beyond IAM and GRC requirements. Within that concept, there are typically three levels of roles, which we define as Business Roles, IT-functional Roles, and System-level Roles. These concepts are accepted and implemented by an increasing…

€125.00
Jan 13, 2009

Vendor Report: Quest Software

Martin Kuppinger

Quest Software has become, after a series of acquisitions, the leading vendor in the segment of Win-dows Management tools. Overall, Quest provides specialized tools to support IT operations in the areas of Windows Management, Application Management, Database Management, and Virtualization Management. Amongst these tools, several solutions support Identity and Access Management (IAM)…

€95.00

 2008

top  

Date Title Price
Nov 13, 2008

Vendor Report: Lieberman Software

Martin Kuppinger

Lieberman Software is an established software vendor with focus on Add-ons for Windows manage-ment. The core focus is solutions for mass management and PAM (Privileged Account Management). Lieberman Software provides valuable tools for specific problems. These targeted add-ons are very common in the Windows system management market.

€95.00
Oct 29, 2008

Identity Management Roadmap 2009 Overview

Martin Kuppinger

Free teaser for the complete Identity Management Roadmap 2009

free
Oct 29, 2008

Product Report: ipg rolmine® 1.1

Martin Kuppinger

Die aktuellen Marktanalysen von Kuppinger Cole machen deutlich, dass sich das Rollenmanagement in den vergangenen drei Jahren zu einem Kernthema für das Identity und Access Management und das neu entstandene Marktsegment GRC (Governance, Risk Management, Compliance) entwickelt hat. In kaum einem anderen Teilbereich sind so viele Projekte geplant.

€95.00
Oct 15, 2008

Identity Management Roadmap 2009

Martin Kuppinger
€695.00
Sep 24, 2008

Trend Report IAM and GRC 2009-2019

Martin Kuppinger
€295.00
Sep 22, 2008

Product Report: Symlabs Virtual Directory and LDAP Proxy

Felix Gaehtgens

Symlabs has launched version 4.0 of its "Virtual Directory Server" and "LDAP Proxy" products in April 2008. Both products are essentially the same code base, but differ in bundled functionality. The LDAP Proxy offers load-balancing, routing and fail-over of directory requests and can also remap data dynamically. The "Virtual Directory Server" adds…

€95.00
Sep 16, 2008

Identity Management 2008

Martin Kuppinger

Kuppinger Cole + Partner (KCP) hat als Ergebnis einerseits einer Ende 2007 durchgeführten Online-Befragung und zusätzlicher, im Zeitraum Dezember 2007 bis Juli 2008 durchgeführter persönlicher Interviews eine umfassende Studie zum Identity Management-Markt insbesondere im deutschsprachigen Raum durchgeführt. Diese erweitert die bereits 2006 durchgeführte…

€195.00
Aug 26, 2008

Product Report Völcker Informatik Active Entry 3.2

Martin Kuppinger

Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity Management-Markt etabliert. Dabei ist es dem Unternehmen auch gelungen, insbesondere im deutschsprachigen Markt eine für einen Spezialisten sehr hohe Sichtbarkeit zu erzielen. Mit der Version 3.2 von ActiveEntry, dem Produkt des…

€95.00
Aug 12, 2008

Product Report CA Identity Manager r12

Sebastian Rohr

CA hat mit seinem Identity Manager Release 12 ein Produkt aktualisiert, welches Funktionalitäten des eTrust Admin und des 2005 akquirierten Netegrity IdentityMinder Web umfasst. Durch die neuen Möglichkeiten der Administration und die stark anpassbaren Oberflächen kann sich dieses Release unter den führenden Produkten im Enterprise Provisioning-Markt behaupten. Die…

€95.00
Jul 23, 2008

Evaluation Report: OPENLiMiT

Tim Cole

Die OPENLiMiT Group ist ein junges, ehrgeiziges Unternehmen, dass sich vorgenommen hat, im Markt für so genannte Digitale Signaturen (auch „Zertifikate“ oder „eCarnets“) eine führende Rolle zu spielen. Während andere Anbieter ihre Produkte in der Regel auf ein bestimmtes Computer-Betriebssystem ausgerichtet haben oder als reine Server-basierte…

€95.00
Jun 23, 2008

Microsoft Vendor Report

Sebastian Rohr

Microsoft entered the market of Identity Management providers very late and at this stage adapted its portfolio of in-house tools for user account administration and access privileges to the challenges of managing customers' heterogeneous IT infrastructures. Since the strategists in Redmond realized the importance of an opening for third parties, Microsoft has been working at full speed…

€95.00
May 07, 2008

Product Report - Omada Identity Manager

Martin Kuppinger

Over the past 2 years the Danish software company Omada has reached the position as Microsoft's most important technology partner in the field of MIIS and ILM. In cooperation with Microsoft the vendor was able to win several major clients.

€95.00
Apr 22, 2008

Trend Report: IAM und SOA 2008

Martin Kuppinger

Eine gemeinsame Studie von KCP und Ernst & Young AG Wirtschaftsprüfungsgesellschaft Steuerberatungsgesellschaft Deutschland

€295.00
Apr 19, 2008

Trend Report SSO 2008

Martin Kuppinger

Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity Management. Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten.

€195.00
Apr 19, 2008

Product Report: Omada Identity Manager

Martin Kuppinger

Der dänische Hersteller Omada hat sich in den vergangenen beiden Jahren als wichtigster Technologiepartner von Microsoft im Umfeld von MIIS und ILM positionieren können. Gemeinsam mit Microsoft wurden mehrere Großkunden gewonnen. 

€95.00
Apr 19, 2008

Market Report: GRC 2008

Martin Kuppinger

GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. KCP expects that there will be tools which integrate analysis, attestation, authorization management, risk management, and role management functionalities to provide an overall GRC solution which can be applied to all applications and all Compliance regulations which are relevant to…

€165.00
Apr 14, 2008

Product Report: Imprivata OneSign 4.0

Martin Kuppinger

Imprivata OneSign is a hardware-appliance-based solution for enterprise single sign-on, which supports mechanisms for strong authentication and convergence to physical access-control systems. The product holds an exceptional position in this market due to the chosen appliance approach.

€95.00
Apr 06, 2008

Product Report: Imprivata OneSign 4.0

Martin Kuppinger

Imprivata OneSign ist eine auf einer Hardware-Appliance basierende Lösung für Enterprise Single Sign-On, die Mechanismen für die starke Authentifizierung und die Konvergenz zu physischen Zugangskontrollsystemen unterstützt. Durch den gewählten Appliance-Ansatz nimmt das Produkt eine Sonderstellung in diesem Marktsegment ein.

€95.00
Apr 01, 2008

Vendor Report: Microsoft

Sebastian Rohr

Microsoft ist sehr spät in den Markt der Identity Management-Anbieter eingestiegen und hat in diesem Zuge sein Portfolio über die im Hause vorhandenen Werkzeuge zur Administration von Benutzerkonten und Zugriffsrechten an die Herausforderungen des Managements heterogener IT-Infrastrukturen der Kunden angepasst. Seit die Strategen in Redmond die Bedeutung einer Öffnung…

€95.00
Mar 19, 2008

Product Report: Citrix Password Manager 4.6

Martin Kuppinger

Citrix ist im Markt in erster Linie als Anbieter der Presentation Server-Produkte bekannt. Das Unternehmen hat aber in den vergangenen Jahren um diese Presentation Server herum kon-sequent ein ergänzendes Portfolio aufgebaut. Ein wichtiges Element dabei ist die Access Stra-tegy, unter der verschiedene Komponenten für einen kontrollierten, flexiblen Zugang zu IT-Ressourcen des…

€95.00
Mar 12, 2008

Vendor Report: Sun

Martin Kuppinger

Sun Microsystems ist einer der führenden Anbieter im Identity Management-Markt. Nach einer schwie-rigen Phase von Verlusten und sinkenden Umsätzen ist dem Unternehmen der Turnaround gelungen. Das spiegelt sich auch in deutlich verbesserten Produkten im Identity Management und der Akquisition von Vaau, einem Anbieter für das Business Role Management, wieder. Sun hat…

€95.00
Mar 12, 2008

Vendor Report: CA Deutschland GmbH

Sebastian Rohr

CA hat in den vergangenen Jahren eine Reihe größerer Akquisitionen von spezialisierten Herstellern durchgeführt und damit sein eigenes Portfolio an Produkten für das Identity und Access Management erweitert und abgerundet. CA bietet damit ein sehr breites Spektrum an Einzellösungen und positioniert diese auch als komplette IAM-Suite am Markt. Mit dem umfassenden…

€95.00
Mar 06, 2008

Vendor Report: Entrust

Martin Kuppinger

Entrust zählt zu den bekannten und etablierten Anbietern im Identity Management-Markt. Historisch hat sich das Unternehmen primär als Hersteller und Service-Anbieter im Bereich der Zertifikatsdienste und PKIs (Public Key Infrastructures) positioniert. Im Rahmen der Restrukturierung und Repositionierung hat Entrust allerdings inzwischen ein deutlich breiteres Produktportfolio…

€95.00

 2007

top  

Date Title Price
Dec 11, 2007

Vendor Report: BHOLD

Martin Kuppinger

BHOLD is a specialized vendor focussing on Enterprise Authorization Management, i.e. the administration of authorizations to access IT systems from business level. In our opinion, this clearly defined and addressed orientation is responsible for BHOLD´s unique position in the market. Therefore, BHOLD is not seen as a typical vendor of Enterprise Role Management products, although the…

€95.00
Nov 12, 2007

Die Identity Management-Strategie von SAP

Martin Kuppinger

Der Report analysiert die aktuell vorgestellte Identity Management-Strategie von SAP und bewertet diese. Dabei wird sowohl auf die technische Ebene als auch die Service-Orientierung und Business-Orientierung einschließlich der Verbindung zu GRC-Ansätzen eingegangen. Der Report liefert einen top-aktuellen, detaillierten Einblick und eine Einschätzung der SAP-Strategie in…

€165.00
Oct 24, 2007

Vendor Report: BHOLD

Martin Kuppinger

BHOLD ist ein spezialisierter Anbieter, der sich auf das Enterprise Authorization Management, also die Verwaltung von Autorisierungen für den Zugriff auf IT-Systeme aus Business-Sicht, spezialisiert hat. Mit dieser konsequent umgesetzten Positionierung nimmt BHOLD nach unserer Einschätzung eine Allein-stellung im Markt ein. Damit ist BHOLD kein typischer Anbieter des Enterprise…

€95.00
Oct 23, 2007

Trend Report: Application Security Infrastructure

Martin Kuppinger

Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der einen Seite und den Anwendungen auf der anderen Seite.

€165.00
Oct 09, 2007

Product Report: Oracle Identity Manager

Martin Kuppinger

Der Oracle Identity Manager ist die Lösung für das Enterprise Provisioning innerhalb des Oracle-Produktportfolios. Das Produkt zeichnet sich durch eine sehr große Leistungsfähigkeit und Flexibilität in den meisten Bereichen aus und zählt damit aus Sicht von KCP zu den führenden Lösungen in diesem Segment.

€95.00
Oct 09, 2007

Product Report: Passlogix v-GO SSO 6

Martin Kuppinger

Passlogix zählt zu den etablierten Anbietern im Enterprise Single Sign-On-Markt. Mit dem Kernprodukt v-GO SSO und ergänzenden Komponenten werden alle wichtigen Anforderungen im Bereich Single Sign-On abgedeckt. Die Lösung ist einfach zu implementieren und zu admi-nistrieren. Viele gängige Anwendungen sind vorkonfiguriert, weitere Anwendungen lassen sich über eine…

€95.00
Aug 08, 2007

Product Report: Novell Identity Manager 3.5

Martin Kuppinger

Novell hat mit der Version 3.5 seines Identity Managers wieder eine Reihe neuer Funktionen implementiert und die kontinuierliche Entwicklung des Produkts fortgesetzt. Der Identity Manager 3.5 bleibt damit auch weiterhin eines der führenden Produkte im Enterprise Provisioning- Markt.

€95.00
Aug 08, 2007

Vendor Report HP 2007

Martin Kuppinger

HP hat bereits vor einigen Jahren mit der Akquisition mehrerer Hersteller und Produkte im Bereich Identity und Access Management auf sich aufmerksam gemacht. Allerdings ist es dem Unternehmen im Anschluss zunächst nicht gelungen, größere Sichtbarkeit zu erlangen. Das hat sich inzwischen mit der auf die von HP als Business Technology Optimization (Business/IT Service…

€95.00
Aug 08, 2007

Vendor Report Secude 2007

Martin Kuppinger

SECUDE ist ein Spezialist im Bereich der IT-Sicherheitslösungen, dessen Zielsetzung es ist, alle Lösungen aus einer Hand anzubieten, um Informationen zu schützen. Mit Produkten in den Bereichen SAP-Sicherheit, Datenverschlüsselung, sichere Authentifizierung und Smartcard-/Token-Infrastrukturen bietet SECUDE dafür inzwischen ein breites Portfolio.

€95.00
Jul 25, 2007

Trend Report: Identity as a service

Martin Kuppinger

Identity Management muss und wird sich von monolithischen, funktional orientierten Produkten in den kommenden Jahren in Richtung zu service-orientierten Ansätzen entwickeln. Dabei gibt es viele Facetten. Diese werden in diesem Report vorgestellt und bewertet. Insbesondere wird dabei auch darauf eingegangen, welche der Ansätze sich bis 2010 etablieren werden.

€95.00
Jul 25, 2007

Product Report Imprivata OneSign 3.5

Martin Kuppinger

Imprivata OneSign ist eine auf einer Hardware-Appliance basierende Lösung für Enterprise Single Sign-On, die Mechanismen für die starke Authentifizierung und die Konvergenz zu physischen Zugangskontrollsystemen unterstützt. Durch den gewählten Appliance-Ansatz nimmt das Produkt eine Sonderstellung in diesem Marktsegment ein.

€95.00
Jul 10, 2007

Product Report Siemens DirX Identity 8 english

Martin Kuppinger

Product Report Siemens DirX Identity 8 The report describes and analyzes the Siemens DirX Identity 8 product, an offering in the provisioning market segment.

€95.00
Jul 10, 2007

Vendor Report Siemens

Tim Cole

Vendor Report Siemens Der Report beschreibt das Produktportfolio von Siemens im Bereich Identity Management und bewertet die Positionierung des Unternehmens in diesem Markt.

€95.00
Jul 10, 2007

Vendor Report Oracle

Tim Cole

Vendor Report: Oracle Der Report beschreibt und bewertet das Identity Management-Angebot von Oracle und die Positionierung des Anbieters.

€95.00
Jun 12, 2007

Product Report Völcker Informatik Active Entry 3.1

Martin Kuppinger

Die Völcker Informatik AG ist mit ihrem Produkt ActiveEntry 3.1 einer der interessantesten Anbieter im Provisioning-Markt. Darüber hinaus unterstützt das Produkt Rollenmanagement-Funktionen und liefert Auditing-Dienste. Das Konzept von ActiveEntry 3.1 unterscheidet sich stark von den meisten Mitbewerbern, bietet aber in vielen Bereichen Vorteile. Das Produkt zählt aus…

€95.00
Mar 16, 2007

Product Report Siemens DirX Identity 8

Martin Kuppinger

Siemens ist mit der seit 2005 verfügbaren Version DirX Identity 7 einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning geworden, auch wenn die Sichtbarkeit des Produkts am Markt größer hätte sein können. Technologisch war die Version 7 aber definitiv wettbewerbsfähig. Mit der Version 8 rückt das Produkt nun in die enge…

€95.00

 2016

top  

Date Title Price
Jul 19, 2016

Advisory Note: Blockchains and Risk - 71608

Mike Small

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks associated with the use of this technology and recommends an approach to managing…

€995.00
Jul 18, 2016

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Ivan Niccolai

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity assurance of connected things, scalable management of connected devices, and secure information transmission.

€995.00
Jul 18, 2016

Advisory Note: Blockchains and Cybersecurity - 71603

Ivan Niccolai

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the merely distributed critical systems the internet depends on today, but we cannot yet completely replace trusted third parties and human judgement with algorithms.

€995.00
Apr 12, 2016

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Matthias Reinwarth

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system development and delivery. It discusses why and how organisations should embed strong principles for…

€995.00
Jan 28, 2016

Advisory Note: Blockchain Impact on the Financial Industry - 71601

Bruce Hughes

The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within the Financial Sector, the benefits that can be achieved, the challenges and the changes to expect from this emerging technology.

€995.00

 2015

top  

Date Title Price
Nov 26, 2015

Advisory Note: Demystifying the Blockchain - 71555

Ivan Niccolai

Investigating current and future blockchain use cases as it evolves from a secure distributed ledger to a full compute platform.

free
Sep 18, 2015

Advisory Note: Identity Information Quality - 70996

Matthias Reinwarth

Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.

€995.00
Sep 15, 2015

Advisory Note: Turning inattention into intention - 71501

Scott David

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

€995.00
Sep 02, 2015

Advisory Note: Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation - 71302

Martin Kuppinger

Digital Transformation is on its way. Unstoppable, inevitable, with increasing speed. Organizations have to react, in particular for avoiding unpredictable risks. Digital Risk Mitigation is a key success factor in the digital transformation of businesses.

€995.00
Aug 28, 2015

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Aug 06, 2015

Advisory Note: Industrial Control Systems: Getting a Grip on OT Cyber Security - 71110

Graham Williamson

The time has come for a more inclusive approach to managing industrial control systems. The divide between Information Technology and Operational Technology is fading, to the benefit of the business.

€995.00
Jul 22, 2015

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Jun 17, 2015

Best Practice: European Identity Award 2015: NORD/LB - 71401

Matthias Reinwarth

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern Business Process Outsourcing model. 

free
May 26, 2015

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

free
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Martin Kuppinger    Dave Kearns

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00
Mar 30, 2015

Advisory Note: Top Cyber Threats - 71032

Amar Singh

Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand and counter these threats.  

€995.00
Feb 23, 2015

Advisory Note: ABAC done right - 71134

Graham Williamson

There is an increasing number of documents purporting to advise on how to migrate to an Attribute-Based Access Control environment. The real requirement is for Adaptive Policy-based Access Management. Here are some tips...

€995.00
Jan 29, 2015

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

David Goodman

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and really get to grips with what is needed and what is achievable.

€995.00
Jan 22, 2015

Advisory Note: Software Defined Infrastructures - 71111

Rob Newby

Enabling development speed and agility also brings heightened risk to the business. Risks can be greatly reduced by applying appropriate controls, and business benefits increased by leveraging SDI. 

€995.00
Jan 21, 2015

Advisory Note: Your Business is Moving to the Cloud - 71156

Graham Williamson

Take a pro-active rather that re-active approach to the adoption of Cloud services. Plan your move to the Cloud taking a strategic view of your requirements, processes and deployment options. Make the Cloud perform for you - not the other way around. The question posed in the title of this Advisory Note is rhetorical. The move to the Cloud is inevitable and to be embraced, not only for…

€995.00
Jan 16, 2015

Advisory Note: Redefining Access Governance - 71185

Matthias Reinwarth

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact…

€995.00

 2014

top  

Date Title Price
Nov 17, 2014

Advisory Note: Security and the Internet of Everything and Everyone - 71152

Mike Small

The vision for the Internet of Everything and Everyone is for more than just an Internet of Things; it makes bold promises for the individual as well as for businesses. However the realization of this vision is based on existing systems and infrastructure which contain known weaknesses.

€995.00
Oct 13, 2014

Advisory Note: Security Organization, Governance, and the Cloud - 71151

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

€995.00
Oct 13, 2014

Advisory Note: Maturity Level Matrixes for Identity and Access Management/Governance - 70738

Amar Singh

KuppingerCole Maturity Level Matrixes for the major market segments within IAM (Identity and Access Management) and IAG (Identity and Access Governance). Foundation for rating the current state of your IAM/IAG projects and programs.

€995.00
Jul 01, 2014

Advisory Note: Big Data Security, Governance, Stewardship - 71017

Mike Small

Big Data is often characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. These properties are usually referred to as volume, velocity and variety. However there are two other important properties that are sometimes ignored these are value and veracity. These latter properties can only be…

€995.00
Jun 03, 2014

Advisory Note: Extending your Active Directory to the Cloud - 71108

Martin Kuppinger

Most organizations have Microsoft Active Directory in place. The Active Directory (AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange Server, and some network infrastructure services including client configuration management based on…

€995.00
Jun 02, 2014

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

Rob Newby

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access Management. Within this broad set of technologies, there is ongoing change and evolution. Access…

€995.00
May 26, 2014

Advisory Note: EIC 2014: Trends and Hot Topics - 71127

Martin Kuppinger

EIC, the European Identity & Cloud Conference, took place for the 8 th time in Munich May 13 th to 16 th , 2014. The conference focuses on Information Security and Privacy. It covers a broad range of topics in four parallel tracks, complemented by parallel roundtables, pre-conference and post-conference workshops. This report, based on the feedback of KuppingerCole analysts Amar…

free
May 13, 2014

Advisory Note: IAM Predictions and Recommendations 2014-2018 - 71120

Dave Kearns    Martin Kuppinger

Identity and Access Management (IAM) is in constant flux. The merging into IAM of Access Governance and Access Control is a relatively new phenomenon with a high rate of growth. Based on new offerings and changing demand, KuppingerCole predicts several major changes in that market. We specifically identified the following areas where we see major change coming to IAM systems in the…

€995.00
May 13, 2014

Advisory Note: Connected Enterprise Step-by-step - 70999

Martin Kuppinger

Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more.

€995.00
May 13, 2014

Advisory Note: Real Time Security Intelligence - 71033

Mike Small

Organizations depend upon the IT systems and the information that they provide to operate and grow. However the information that they contain and the infrastructure upon which they depend is under attack. Statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. Real Time Security Intelligence (RTSI) seeks to remedy this.

€995.00
May 13, 2014

Advisory Note: Trends in Authentication and Authorization - 71043

Martin Kuppinger

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

€995.00
May 02, 2014

Advisory Note: Working to the Business not the Auditors - 70865

Rob Newby

There can be many reasons to why a business embarks on a journey to improve its Information Security. There is however one reason which consistently recurs: “Because the auditors says that we need to…” Regulatory requirements include penalties for non-compliance but this often creates a tick-box approach to compliance, rather than a considered, strategic view. Where…

€995.00
Mar 20, 2014

Advisory Note: Cloud IAM: More than just Single Sign-On to Cloud Applications - 71031

Martin Kuppinger

The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that…

€995.00
Mar 20, 2014

Advisory Note: Buyer’s Guide: Access Governance and Identity Provisioning - 71030

Martin Kuppinger

KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your guide for reducing your investment risks in Access Governance and Identity Provisioning.

€995.00
Mar 14, 2014

Advisory Note: Access Governance Architectures - 71039

Martin Kuppinger

Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal actions, to name just a few. The large number of prominent incidents within the last few years proves…

€995.00
Mar 10, 2014

Advisory Note: Migration Options for your Legacy Provisioning - 71118

Martin Kuppinger

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and all the other acquisitions we’ve seen in the past - customers become anxious regarding the…

€995.00
Feb 27, 2014

Advisory Note: The new ABC for IT: Agile Businesses, Connected - 70998

Martin Kuppinger

Why Identity Federation, Cloud IAM, and API Management help organizations in meeting their business needs for agile business processes that connect the organization to their business partners and customers and manage access to Cloud applications. The need for a new organizational structure for IT. How to find the balance between pressing business demands and Information Security and…

€995.00
Feb 19, 2014

Advisory Note: Entitlement & Access Governance - 71109

Martin Kuppinger

Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance (EAG)...

€995.00
Jan 28, 2014

Advisory Note: Enterprise Key and Certificate Management - 70885

Rob Newby

Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them.

€995.00

 2013

top  

Date Title Price
Dec 16, 2013

Advisory Note: Information Security Predictions and Recommendations 2014 - 71299

Martin Kuppinger

Recommendations for investing in Information Security in 2014. Predictions of the trends and hypes in Information Security in 2014. Advice on which of these trends and hypes to follow.

free
Nov 11, 2013

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70745

Martin Kuppinger    Dave Kearns

Life Management Platforms (LMPs) combine personal data stores, personal cloud-based computing environments, and trust frameworks. They allow individuals managing their daily life in a secure, privacy-aware, and device-independent way. In contrast to pure personal data stores, they support concepts, which allow interacting with other parties in a meaningful way without unveiling data. This…

€495.00
Oct 28, 2013

Advisory Note: Infrastructure as a Service Market Report - 71021

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with strengths in various areas.

€495.00
Oct 14, 2013

Advisory Note: The Future of IT Organizations - 71200

Martin Kuppinger

Prepare your IT Organization for the major evolutions affecting every business. Become ready to deal with today’s and tomorrow’s approaches to Cloud Computing. Build a competitive on-premise IT if you still need on-premise IT (and most will). Stay in control of your Business Services, IT Services, and Information Security.

€995.00
Aug 23, 2013

Advisory Note: Secure your Cloud against Industrial Espionage - 70997

Rob Newby

Securing your business against industrial espionage is about knowing your competitors and stopping your IP getting into their hands. In a Cloud environment you need to be considering all of the risks around Cloud provision, conflicts of interest, legal environments in remote locations, and of course having a third party processing and controlling your most sensitive information. A…

€495.00
Aug 16, 2013

Advisory Note: Managing Risks to Critical Infrastructure - 70819

Rob Newby

Threats to critical National technical infrastructure such as Finance, Energy, Telecommunications and Government are a result of human nature, although difficult to treat in the abstract, technical controls can be applied to prevent, detect and resist attempts to subvert...

€495.00
Jul 19, 2013

Advisory Note: Rating Methodology for Products and Vendors - 70555

Martin Kuppinger

KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Product Reports and KuppingerCole Vendor Reports...

free
May 14, 2013

Advisory Note: From Big Data to Smart Information - 70750

Mike Small

Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data. The term Big Data needs to be understood as data…

€495.00
May 13, 2013

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

Craig Burton    Dave Kearns    Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended Enterprise” in IAM/IAG, the cloud stratification in various layers, increasing threats imposed by the rise of…

free
May 13, 2013

Advisory Note: Typical Risks and Pitfalls for IAM and IAG projects - 70749

Rob Newby

Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can help achieve this in a multitude of different ways for different departments and roles within them;…

€495.00
May 13, 2013

Advisory Note: Selecting your cloud provider - 70742

Mike Small

The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that organizations create and communicate a policy for their acquisition and use. This should be supported by…

€495.00
May 13, 2013

Advisory Note: Maturity Level Matrixes for Identity and Access - 70738

Martin Kuppinger

Most large organizations and a significant number of medium-sized organizations have heavily invested in IAM (Identity and Access Management) and IAG (Identity and Access Governance) during the past few years. Some projects went well; others did not deliver as expected. But even organizations that run successful IAM/IAG projects are challenged by new evolutions, such as the increasing…

€495.00
Apr 09, 2013

Advisory Note: Privilege Management - 70736

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while…

€495.00
Mar 18, 2013

Advisory Note: BYOD - Bring Your Own Device - 71003

Martin Kuppinger

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the…

€495.00

 2012

top  

Date Title Price
Nov 30, 2012

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Mike Small    Dave Kearns

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information…

€495.00
Oct 02, 2012

Advisory Note: Cloud Provider Assurance - 70586

Mike Small

Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer to this question can be found in the old Russian maxim, which was often quoted by President Ronald…

€495.00
Sep 21, 2012

Advisory Note: API Economy Ecosystem - 70625

Craig Burton

The nascent API Economy is rapidly maturing and is shaping up to be both promising and challenging. Meeting the challenges of The API Economy will be as important for customers as embracing the personal computer was in the 1980s or embracing the mobile and tablet trends are today. Customers are faced with the challenge of understanding the distinction of being both an API consumer…

€495.00
Aug 09, 2012

Scenario: The Future of Authentication - 70341

Craig Burton

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to embrace and evangelize authenticated access to any resource by anyone from any device. At the…

€995.00
Jul 11, 2012

Scenario: Understanding Cloud Security - 70321

Mike Small

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be managed by effective IT service management using the KuppingerCole model. The Cloud provides an…

€995.00
May 09, 2012

Advisory Note: Dealing with privacy risks in mobile environments - 70224

Alexei Balaganski

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread nearly impossible. Growing adoption of cloud-based services, while having obvious advantages, means…

€495.00
May 08, 2012

Business Report: Key Risk/Performance Indicators IAM and GRC - 70204

Mike Small

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report provides selected Key Risk Indicators (KRI) for the area of IAM and…

€495.00
May 07, 2012

Advisory Note: Migration Options and Guidelines for Oracle Waveset - 70610

Fulup Ar Foll

This document extends the Advisory Note #70,607 “Migration Options for your Legacy Provisioning” and focuses on Oracle's Waveset Identity Provisioning system which is also historically known as Sun Identity Management/Manager or, in short, SIM, which before the acquisition of Waveset by Sun was named Waveset Lighthouse. The product will usually be called Waveset IDM (Identity…

€495.00
Apr 26, 2012

Advisory Note: Making critical infrastructures in finance industry fit for the age of cyber attacks - 70405

Martin Kuppinger

When looking at the topic of this research note, there are two major aspects to look at. One is about “critical infrastructures”; the other is about “the age of cyber attacks”. We’re looking at critical infrastructures in finance industry. However, this is at least to some degree also about finance industry as a critical infrastructure. The finance industry…

€495.00
Apr 24, 2012

Advisory Note: IT-Initiativen 2012-2013: Eine 6*3-Matrix - 70609

Martin Kuppinger

Welche Initiativen sollen 2012/2013 auf der Agenda von CIOs ganz oben stehen? Diese Advisory Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei Initiativen vorgeschlagen, die für die kontinuierliche Weiterentwicklung der IT besonderen Nutzen…

€495.00
Apr 20, 2012

Trend Report: Top Trends 2012-2013 - 70516

Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of compromise of digital certificates, the proliferation of “Bring your own Device” (BYOD), and…

free
Apr 19, 2012

Advisory Note: IT-Initiatives 2012-2013: a 6*3-Matrix Report - 70612

Martin Kuppinger

Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT. They represent responses to current and future trends. The goal is an IT, which is fit for the…

€495.00
Apr 18, 2012

Best Practice: European Identity Award 2012: Swisscom - 70705

Martin Kuppinger

Special Award 2012 for „Mobile Security”: Swisscom MobileID – secure and easy authentication using the mobile phone with minimal impact on hardware based on ETSI Mobile Signature Standard.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Martin Kuppinger

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Europol - 70703

Martin Kuppinger

Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including external collaboration. Real-time monitoring beyond simple audit logs.

free
Apr 18, 2012

Best Practice: European Identity Award 2012: Siemens AG - 70701

Martin Kuppinger

Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment.

free
Apr 13, 2012

Advisory Note: Migration Options for your Legacy Provisioning - 70607

Martin Kuppinger

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Sun Microsystems by Oracle, of Novell by NetIQ, of Völcker by Quest Software and all the other acquisitions we’ve seen in the past - customers are anxious regarding the future roadmap and the impact on their own…

€495.00
Apr 13, 2012

Advisory Note: IAM and GRC Market – the Evolution in 2012/2013 - 70580

Martin Kuppinger

IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to their corporate information. That has put IAM and GRC on top of the IT agenda. However, IAM and…

€495.00
Apr 13, 2012

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70608

Martin Kuppinger

Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the individuals. They will enable new approaches for privacy- and security-aware sharing of that…

free
Apr 13, 2012

Advisory Note: Privilege Management - 70177

Martin Kuppinger

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have enhanced their offerings significantly, while acquisitions have also led to vendors with broader…

€495.00
Apr 13, 2012

Scenario: Understanding Cloud Computing - 70157

Martin Kuppinger

This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the varieties of Cloud services and delivery models, the principal risks associated with Cloud computing and how the Cloud fits within the IT service delivery options for an organization. It relates the…

€995.00
Mar 27, 2012

Technology Report: Access Governance Architectures - 70219

Martin Kuppinger

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking to facilitate illegal actions, to name just a few. The large number of prominent incidents within the last few…

€495.00

 2011

top  

Date Title Price
Dec 16, 2011

Advisory Note: The Open API Economy - 70352

Craig Burton

How the Open API Economy is increasing and changing the need for Identity Management. Baking an organization’s core competence into an Open API is an economic imperative. It’s clear that three main trends are driving technology in all areas. It goes without saying that as digital identity is the gateway to all network-based products and services that identity is…

€295.00
Oct 06, 2011

Scenario: Understanding Identity and Access Management - 70129

Martin Kuppinger

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with current trends and ramifications for corporate IT systems. IAM is primarily…

€995.00
Oct 06, 2011

Advisory Note: Avoiding Lock-in and Availability Risks in the Cloud - 70171

Mike Small

Cloud computing provides an opportunity for organizations to optimize the procurement of IT services from both internal and external suppliers. The Cloud is not a single model but covers a wide spectrum ranging from applications shared between multiple tenants to virtual servers used by a single customer. The risks associated with Cloud computing depend upon both the service model and the…

€295.00
Sep 22, 2011

Advisory Note: From Identity and Access Solutions to Access Governance - 70318

Mike Small

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations have not realised the benefits expected from the application of this technology, because they have…

€295.00
Aug 02, 2011

Scenario: Understanding IT Service and Security Management - 70173

Martin Kuppinger

This research note is the first of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the fundamental building blocks of, including what IT should be able to deliver to the business as well as the technical production of IT services. Together, these form the basis for effective…

€995.00
Jul 12, 2011

Advisory Note: BYOD - 70335

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit) consent. And ever since, IT departments have been worrying about losing control and how to halt the…

€295.00
Jun 14, 2011

Advisory Note: Authorization in the Cloud - 70217

Mike Small

Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that access to that data is mainly over the internet.  The need to identify users, to control what they…

€295.00
Jun 10, 2011

Advisory Note: „RSA SecurID – how to act after the hack? “ - 70344

Martin Kuppinger

As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time passwords) in a two-factor authentication approach used extensively by companies and government agencies…

free
Jun 09, 2011

Advisory Note: Strong Authentication - 70261

Martin Kuppinger

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides criteria for selecting the mechanism or combination of mechanisms which fits best to the different use…

€195.00
Jun 09, 2011

Advisory Note: IAM and GRC Market Evolution 2011/2012 - 70180

Martin Kuppinger

IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market growth, maturity, and cloud readiness. We expect to see significant changes within these market…

€95.00
May 10, 2011

Business Report: IT-Initiativen 2011-2012: Eine 6*3-Matrix - 70265

Martin Kuppinger

Welche Initiativen sollen 2011/2012 auf der Agenda von CIOs ganz oben stehen? Die Research Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei Initiativen vorgeschlagen, die für die kontinuierliche Weiterentwicklung der IT besonderen Nutzen…

€95.00
May 10, 2011

Advisory Note: IAM and GRC Market - the Evolution in 2011/2012 - 70180

Martin Kuppinger

IAM and GRC are two of today's most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market growth, maturity, and cloud readiness. We expect to see significant changes within these market segments,…

€95.00
May 06, 2011

Cloud Computing Overview - 70140

Mike Small

The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The Cloud covers a wide spectrum from shared applications delivered over the internet to virtual servers hosted internally.  The risks associated…

€95.00
Mar 24, 2011

KuppingerCole Top Trends 2011 - 70116

Martin Kuppinger

Wie jedes Jahr haben die Analysten von KuppingerCole wieder die wichtigsten Trends im Markt für allgemeine IT, Cloud Computing, Governance, Risk Management und Compliance (GRC), Identity und Access Management (IAM) und Mobile Computing herausgearbeitet. An der Spitze dieser Listen steht unserer Meinung nach eine noch stärkere Zusammenarbeit zwischen operativen…

free
Mar 23, 2011

Advisory Note: Cloud Computing - Cloud Security Management - 70139

Mike Small

The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between multiple tenants to virtual servers used by one customer and hosted internally.  The information…

€95.00
Mar 15, 2011

Advisory Note: Database Governance - 70102

Martin Kuppinger

Database Governance is the set of policies, procedures, practices and organizational structures ensuring the execution of database related activities in an organization according to defined strategies and controls. Database Governance is required to enforce Information Security for structured data held in databases. Within Enterprise GRC, Database Governance is an element of IT GRC.…

€95.00
Mar 07, 2011

KuppingerCole Top Trends 2011 - 70116

Martin Kuppinger

As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix of…

free

 2010

top  

Date Title Price
Jul 29, 2010

Trend Report: Desktop Virtualization and VDIs

Martin Kuppinger

Desktop Virtualization and VDIs (Virtual Desktop Infrastructures) are key topics for many IT managers and decision makers. However, like with every hype topic, there are shortcomings. Investments in VDIs and Desktop Virtualization thus have to be done carefully, after weighing the opportunities against the risks and the strengths against the weaknesses. From the perspective of…

€195.00
Jul 02, 2010

Trend Report: Hidden Gems 2010

Martin Kuppinger

This report covers vendors which are, from the KuppingerCole perspective, Hidden Gems in the mar-kets which we are analyzing. The “Hidden Gems” are vendors which are •    relatively small and •    innovative They might be established in a specific country (being sort of “world famous in Italy”) but not that visible beyond…

€195.00
May 03, 2010

A Review of Cloud Business Models and Demonstrations in Finance and Health Clouds

By Victor Chang, Gary Wills and David De Roure This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forum´s Cloud Cube Model (CCM), we classify cloud computing business models into eight types: (1) Service Provider and Service Orientation; (2) Support and…

€30.00
May 02, 2010

Business Report: GRC Market Structure

Martin Kuppinger

GRC stands for Governance, Risk Management, Compliance. It is used to describe Information Tech-nology which supports these specific business requirements. This report provides a segmentation of the overall GRC market with its different elements, from the C-level dashboards down to technical elements which are required to provide information for automated controls and the automated…

€165.00
Apr 28, 2010

10 Top Trends 2010

Martin Kuppinger

As in the past years, Kuppinger Cole has worked out 10 Top Trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). These are complemented by 10 Top Trends in Cloud Computing. The most important trends are, from our perspective, an increasing level of Business-IT-Alignment and the evolution towards hybrid IT environments based on a well-managed mix…

free
Apr 28, 2010

Die Top Ten Trends 2010

Martin Kuppinger

Wie jedes Jahr haben die Analysten von Kuppinger Cole wieder die zehn wichtigsten Trends im Markt für Identity und Access Management (IAM) sowie Governance, Risk Management und Compliance (GRC) herausgearbeitet. In diesem Jahr kommen erstmals die Top Ten Trends bei Cloud Computing hinzu. An der Spitze der drei Listen steht unserer Meinung nach eine noch stärkere Zusammenarbeit…

free
Mar 23, 2010

Technology Report: Access Governance Architectures

Martin Kuppinger

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions, to name just a few. The large number of prominent incidents within the last few years proves the…

€165.00
Mar 08, 2010

Market Overview Strong Authentication

Sebastian Rohr

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with…

€695.00

 2009

top  

Date Title Price
Oct 05, 2009

Overview Report: A GRC Reference Architecture

Sachar Paulus

Governance, Risk & Compliance - these three terms, in short "GRC" are pretty widely used in these days. Unfortunately, there is great confusion in how this term is used. The reason for this confusion is with high probability the fact that it allows to sell pretty easily all kind of technology under the umbrella of "Risk" and "Compliance" solutions. But…

€195.00
Sep 29, 2009

Technology Report: XACML – Extensible Access Control Markup Language

Felix Gaehtgens

This report explains XACML, an evolving standard in the field of access control. Access control in IT is of vital importance. Companies use access control technology to protect sensitive systems and information, and to keep assets safe. At the same time, compliance with external regulations and internal policies is very important and access control technology is key. We can think about…

€165.00
Sep 23, 2009

Business Report: Identity & Security in the Cloud

Tim Cole

Cloud Computing ist seit etwa zwei Jahren das Modewort schlechthin in der IT-Branche. Historisch geht Cloud Computing auf verschiedene Ansätze zur externen Bereitstellung von Anwendungen oder Speicherplatz, um die Unternehmens-IT zu entlasten oder sogar ganz zu ersetzen. ASP („Application Service Providing“) wurde bereits in den 90ern mit dem Aufkommen des Internet…

€165.00
Aug 18, 2009

Overview Report: SAP Security – Getting the Whole Picture

Sachar Paulus

SAP Security is a wide field. Most SAP Technology Experts think that SAP Security is all about authorizations, user management, roles, profiles and all that highly complicated stuff. But it is like with protecting a house: if you only look at who has which keys for the doors, but forget to close the windows, then your security might be pretty weak. Therefore, it is important to get…

€165.00
Jul 15, 2009

Market Report: Cloud Computing

Martin Kuppinger

Cloud Computing wird häufig als der Bezug von Diensten aus dem Internet gesehen. Diese Definition ist nach unserer Einschätzung nicht korrekt. Der wesentliche Aspekt des Cloud Computings liegt darin, IT als Services zu betrachten, die flexibel bezogen und konfektioniert werden können, um die Anforderungen des Business zu betrachten. Grundlegend neu ist dabei der flexible…

€165.00
May 05, 2009

Market Report: The SAP Identity Management Strategy

Martin Kuppinger

About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it was two years ago. The product called SAP NetWeaver Identity Management has gained a lot of…

€165.00
May 02, 2009

Trend Report: SSO 2009

Martin Kuppinger

Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten. Innerhalb der Vielzahl von unterschiedlichen technischen Ansätzen für das Single…

€195.00
May 02, 2009

Trend Report: The impact of claims-based approaches

Martin Kuppinger

The term of “claims-based identity” and the idea overall of using the term “claim” in Identity and Access Management (IAM) has been introduced by Microsoft some two years ago but the concepts can be used in any environments and technologies can (and sometimes are) provided by other vendors as well. A claim is a piece of information about a user provided by an…

€125.00
May 02, 2009

Technology Report: Strong authentication for user-centric Identity Management

Martin Kuppinger

Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite the fact, that there are several open questions regarding business models for identity providers…

€95.00
May 02, 2009

Market Report: Die Identity Management-Strategie von SAP

Martin Kuppinger

Seit der Übernahme des norwegischen Herstellers MaXware durch SAP sind inzwischen rund zwei Jahre vergangen. Seit diesem Zeitpunkt hat sich SAP IM im Identity Management-Markt positioniert. Die von MaXware übernommenen Produkte wurden in dieser Zeit signifikant wei-terentwickelt. Auch in der Strategie gibt es inzwischen deutlich mehr Klarheit als noch vor zwei Jahren. Das als…

€165.00
May 02, 2009

Market Report: Oracle buys Sun – the Impact on IAM and GRC strategies and tactics

Felix Gaehtgens

The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that point of time, both vendors will have to act separately and are not allowed to publish a combined…

€165.00
May 02, 2009

Market Report: GRC 2009

Martin Kuppinger

GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. Kuppinger Cole observes an trend towards tools which integrate analysis, attestation, authorization management, risk management, Segregation of Duties controls, and role management functionalities to provide an overall GRC solution with focus on access controls and authorization…

€165.00
Feb 09, 2009

Business Report: Key Risk/Performance Indicators IAM and GRC

Martin Kuppinger

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for a quick overview on the progress of organizations. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report provides 25 selected Key Risk Indicators (KRI) for the area of IAM and GRC. These indicators are easy to…

€165.00
Jan&