Search

Page 92 of 1000 results

Blog

The best product for IdM?

by Martin Kuppinger

... in the LinkedIn group “Identity Management Specialists Group” asked for the ... understood as Identity and Access Management, given that access is a bigger issue than ... day, business mainly cares about access. Within the discipline of IAM ... , including Identity Provisioning, Access Governance, Access Management and Federation, Privilege Management, Enterprise Single Sign-On ...

Workshop

KuppingerCole Industry Round Table: Cloud Computing und Datenschutzrecht

... weniger starkem Druck ihres Top Managements das Cloud Computing Zeitalter einleuten ... – Data Location Identity & Access Management in der Cloud Privilege Management Verfügbarkeit Datensicherheit Autorisierungsmanagement und ...

Keynote

Cloud Computing und die Zukunft der Informationssicherheit: Die 10 wichtigsten Herausforderungen

by Martin Kuppinger

Cloud Computing ist keine neue Technologie, sondern eine neue Lieferform für Anwendungen und Informationen. Eine Lieferform, die bisher nicht gekannte Rationalisierungseffekte bei gleichzeitig mehr Flexibilität ermöglicht und deshalb besonders in wirtschaftlich unsicheren Zeiten an Attraktivität gewinnt.Doch die extreme Skalierbarkeit und die hohe Flexibilität der Cloud sind nicht nur Freund, sondern auch Feind, wenn man sie vom Standpunkt der Informationssicherheit aus betrachtet. In diesem Vortrag ...

Blog

Why is IBM TIM 5.1 just a minor release?

by Martin Kuppinger

... Management, SoD support, attestation and, last not least, support for some Privileged ... Account Management (or Privileged Identity Management, the term IBM ... solutions, beyond IAM-GRC and access controls (and IBM is amongst ...

Blog

Secured by Design: The smart streets of San Francisco

by Martin Kuppinger

... with access to certain devices as well as certain rights and privileges ... are just another channel demanding access to the internet. It has ... relations, and for managing their access there are too many hindrances ... Access (UMA) a new standard eventually evolved that’s taking care of the management ... of access rights. With UMA, millions ... users can manage their own access rights and keep full control ...

Congress

European Identity Conference 2010

... of Virtualization Safely Managing Privileged Identities Access Governance – Controlling access and ensuring information ... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and ... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and ... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and ... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and ...

Press Release

Terminblocker: European Identity Conference 2010

... Markt rund um Identity Management, Governance, Risk Management und Compliance (GRC) ... Markt rund um Identity Management, Governance, Risk Management und Compliance (GRC) ... Value for less through Identity Management and GRC Value Through ... Linking Identity Management and GRC to Corporate Performance Access Governance – Controlling Access and ... Authentication and Authorization Safely Managing Privileged IdentitiesMöglichkeiten schaffen, weniger Kosten ... VALUE FOR LESS THROUGH IDENTITY MANAGEMENT AND GRC. Mehr als ...

Press Release

Save the date: European Identity Conference 2010

... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) ... topics such as Identity Management, Governance, Risk Management and Compliance (GRC) ... Value for less through Identity Management and GRC Value Through ... Linking Identity Management and GRC to Corporate Performance Access Governance – Controlling Access and ... Role Based & Attribute Based Access Control Finding the Best Possible ... Authentication and Authorization Safely Managing Privileged Identities Creating opportunities, spending ...

Blog

Managed Identity Services: Talking the talk with Covisint

by Felix Gaehtgens

... federated logins, and streamlined the management of federation agreements and trust ... by building a comprehensive suite of management tools. Diversification was next - what ... focusing mostly on the identity management service offerings, Covisint offers other ... with large organisations' internal Identity Management systems, partly by hosting identities ... that deal with context and privilege or group information. Covisint here ... a Service" Covisint also offers access management and authorisation through its "Trusted ...

Blog

Data Leakage Prevention - Something (not only) Swiss Banks Should have a Closer Look Into

by Joerg Resch

... ). So, data leakage prevention, access governanve, privileged user management - these basic disciplines of ...