Access and Identity

Webcast

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Kuppinger Cole Webinar recording

Webcast

XACML: The Holy Grail of Access Governance?

Kuppinger Cole Webinar Recording

Webcast

5 Golden Rules for Efficiently Implementing Access Governance

Kuppinger Cole Webinar Recording

Webcast

Getting the Big Picture: How Access Governance fits into IT Governance and Risk Management

Kuppinger Cole Webinar Recording

Webcast

The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

Kuppinger Cole Webinar Recording

Product Report

Product Report: Quest Single Sign-On solutions for SAP

The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between Active Directory-infrastructures and SAP-environments on the basis of Kerberos. Quest also offers a…

Webinar

Dec 08, 2009: 5 Golden Rules for Efficiently Implementing Access Governance

How to do Access Governance right? Which are the key success factors you have to focus on for as well quick-wins as long-term success? This session explains how to solve the access governance needs best.

Webinar

Dec 09, 2009: XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed…

Webinar

Dec 08, 2009: Getting the Big Picture: How Access Governance fits into IT Governance and Risk Management

Access Governance is a key element in every strategy for information and system security as well as IT Governance. However, there are many different approaches from system-level access control management tools for ERP systems with some SoD support up to “Enterprise GRC” solutions which focus…

Blog

#sapteched: too much twittering.. ;-) - but not enough on IAM & GRC

Did you find yourself adding hash-tags in emails or "old-fashioned" blog posts recently? Well, I think we are all tweeting quite a lot (except for me, I do not spend to much time on it) and organizing tweets that way is a good thing, for sure... In between two Netweaver security tracks I…

Webinar

Dec 08, 2009: The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

Access Governance is commonly associated with “recertification” or “attestation” as approaches for a recurring review of existing access controls by the responsible managers in IT and business. But knowing the problems isn’t sufficient – enforcing changes and implementing continuous…

Webcast

Ein Passwort für alles - Enterprise Single Sign-on

Kuppinger Cole Webinar recording

Webinar

Dec 10, 2009: Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

Webinar

Nov 11, 2009: Single Sign-on for SAP Environments

The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar,…

Webcast

The Role of Entitlement Management in Governance, Risk and Compliance Management

Kuppinger Cole Webinar recording

Webcast

Sicherheit mit automatisiertem Provisioning

Kuppinger Cole Webinar recording

Product Report

Product Report: Quest Single Sign-On solutions for SAP

Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen Active Directory-Infrastrukturen und SAP-Umgebungen auf Basis von Kerberos an. Als Option für…

Webcast

Minimizing Business Risks through Enterprise SSO

Webinar

Oct 13, 2009: The Role of Entitlement Management in Governance, Risk and Compliance Management

Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive,…

Webinar

Oct 23, 2009: Ein Passwort für alles - Enterprise Single Sign-on

Es gibt kaum einen Anwender, der nicht schon einmal sein Passwort vergessen hat und das Helpdesk mit einem Passwort Reset beschäftigen musste. Die Arbeit des Helpdesk nimmt exponentiell zu, wenn die Anwender sich mehrere unterschiedliche Passwörter für unterschiedliche Anwendungen merken…

Webinar

Oct 09, 2009: Sicherheit mit automatisiertem Provisioning

Nicht nur in grossen Unternehmen ist die Benutzerverwaltung durch ständige Änderungen und Ergänzungen eine ressourcenzehrende Herausforderung. Auch wenn die Prozesse für die Provisionierung von Benutzerkonten in den unterschiedlichen Anwendungen sauber definiert sind - manuelles Arbeiten…

Webinar

Sep 17, 2009: Minimizing Business Risks through Enterprise Single Sign-on

Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging…

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for Privileged Account Management (PAM). That’s interesting. I’ve blogged some time ago about the…

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for Privileged Account Management (PAM). That's interesting. I've blogged some time ago about the…

Blog

About trademarks in the IAM business

These days I have learned that Fischer International Identity has trademarked to pretty generic terms: Identity as a Service (TM) IaaS (TM) I wondered (and still wonder) about that. Fischer declared that they have invented that type of business ("a services-based architecture built from…

Blog

Virtual Directory Innovations

As someone actively covering directory services and virtual directories, several innovations have caught my attention. The players within the virtual directory space are (in alphabetical order) Optimal IDM, Oracle, SAP, Radiant Logic, Red Hat, and Symlabs. When it comes to product…

Blog

Stronger and simpler authentication

I've seen many approaches for strong authentication - most of them are either too expensive, too complicated, or they aren't really appealing. The latter is true for approaches like "passfaces" have to pick one or some known faces from different pictures. Many approaches are complicated to…

Webcast

Messbare Vorteile für Sicherheit und Kosten durch Single Sign-On mit starker Authentifizierung

Kuppinger Cole Webinar recording

Blog

Hooray, LDAPcon 2009 is coming up!

I was delighted when I saw that LDAPcon is happening again this year. I went to the first event in Cologne, Germany 2007, and was very impressed. When you have the "creme de la creme" from the LDAP community talking about their favourite topic, you're guaranteed an interesting and…

Webinar

Jun 09, 2009: Messbare Vorteile für Sicherheit und Kosten durch Single Sign-On mit starker Authentifizierung

In diesem Webinar wird auf den quantitativen und qualitativen Nutzen von Enterprise Single Sign-On-Projekten in Verbindung mit starker Authentifizierung eingegangen.

Webcast

Is there a difference between the European way of doing IAM/GRC and „the rest of the world“?

Keynote at the European Identity Conference 2009 by Paul Heiden , BHOLD COMPANY BV, Prof. Dr. Audun Josang , Queensland University of Technology, and Oslo University, Darran Rolls , Sailpoint, Chris Harvison , Scotiabank  

Product Report

Product Brief: Microsoft Forefront Identity Manager

On Monday the 23rd of March, Microsoft announced that it would - again - delay the launch of ILM 2, the "Identity Lifecycle Manager". The release was now pushed back one whole year, to give Microsoft more time to "validate ILM in long-running live deployments before release". As can be…

Advisory Note

Trend Report: SSO 2009

Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service…

Advisory Note

Technology Report: Strong authentication for user-centric Identity Management

Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite…

Advisory Note

Market Report: Oracle buys Sun – the Impact on IAM and GRC strategies and tactics

The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that…

Product Report

Produktbericht: Radiant Logic Virtual Directory Server

Mit dem Release 5.0 des Virtual Directory Server hat Radiant Logic seine Produktlinie in die VDS Proxy Edition und die VDS Context Edition aufgespaltet, um den spezifischen Anforderungen der Verzeichnisvirtualisierung besser entsprechen zu können. Viele der Anforderungen an Virtual…

Blog

10 Top Trends 2009 for IAM and GRC

As in the past years, Kuppinger Cole has worked out 10 top trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). Things are going forward in 2009, despite the economic crisis – even more, especially GRC vendors are benefiting from the crisis and…

Webcast

Enterprise Single Sign-On in der Praxis

Kuppinger Cole Webinar recording

Webinar

Apr 23, 2009: Enterprise Single Sign-On in der Praxis

Konfrontiert mit einer zunehmenden Flut an Passworten für Benutzerkonten in einer steigenden Zahl an Anwendungen, gewinnt das unternehmensweite Single Sign-on zunehmend an Bedeutung. Einerseits zur Steigerung der Produktivität und zur Reduzierung der Helpdesk-Kosten, andererseits aber auch…

Blog

Is SSO the key to the desktop?

I recently had a cup of coffee with a couple of interesting youngsters from Hamburg, Christian Evers and Philipp Spethmann, who have set themselves a truly impressive goal. They are out to wrest nothing less than the control of German desktops from giants like iGoogle, T-Online, Yahoo!…

Vendor Report

Vendor Report: IBM’s IAM and GRC offerings

IBM is amongst the vendors which have entered the IAM market early. Right now, IBM can deliver in most areas of the IAM market, with only few missing elements in their overall portfolio. In the GRC market, the current focus of IBM is more towards SIEM-related GRC issues and log analysis,…

Blog

There are many facets of Privileged Account Management

The PAM/PIM/PUM (Privileged Account/Identity/User Management; I prefer PAM) market is one of the boom markets in IT. I've blogged about that recently (here and here). And I've talked with many vendors in that market segment about what they are currently delivering and about what they have in…

Blog

Innovations in the world of LDAP

I've recently been to Sun's directory labs in the the beautiful city of Grenoble, France to talk about what Sun has in store with their two directory servers: DSEE and OpenDS. I've used many predecessors of DSEE (starting with the good old Netscape Directory Server) on several projects over…

Webcast

Wer war Root? Was Sie über Privileged Account Management (PAM) wissen sollten

Kuppinger Cole Webinar recording

Blog

Privileged Account Management

Over the course of the last few months, PAM (Privileged Account Management), also called PIM (Privileged Identity Management) or PUM (Privileged User Management) became increasingly popular. The main driving force behind this increase in popularity are the auditors, which more frequently…

Webcast

Fraud Prevention and Multi-factor Authentication

Kuppinger Cole Webinar recording

Blog

The need for a holistic approach to IAM, GRC, DLP, PAM, and IRM

IT is very well-known for first its ability to create three-letter acronyms and second the mix-up of different marketing terms, leading to overlapping and sometimes pretty unclear market segments. Besides, many vendors try to convince people that their (and only their) solution is sort of…

Blog

Novell enters PAM market - the first deal in the next wave of acquisitions in IAM?

Novell has announced that they have acquired the technology for privileged account management (PAM) from Fortefi Ltd. PAM addresses the need to better manage privileged accounts. It is a broad field, starting with root account management in the Unix and Linux environments and reaching out to…

Webcast

Zehn Gründe, warum Sie gerade jetzt in IAM und GRC investieren sollten

Kuppinger Cole Webinar recording

Blog

Is there a bright future for directory services?

Last week I've been talking with Andrew Ferguson and Steven Legg of eB2Bcom. Probably you've never heard of them, at least as long as you are neither from the APAC region nor working in the government and defense business where they have most of their customers outside the APAC region.…

Advisory Note

Business Report: Key Risk/Performance Indicators IAM and GRC

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for a quick overview on the progress of organizations. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report…

Webinar

Mar 02, 2009: Der Weg zu schlanken, fokussierten IAM- und GRC-Projekten (Storniert)

Martin Kuppinger gibt in diesem Webinar Hinweise aus der Beratungspraxis und der Analyse von Kuppinger Cole für die optimierte Gestaltung von IAM-Projekten.

Blog

Why to invest in IAM and GRC - especially in these days

There is no doubt: We are in economic turmoils. And no one really knows when things will become better again. It is definitely interesting to observe what is happening from a risk management perspective (Why didn't governments have pre-defined actions prepared? Why didn't financial…

Webinar

Feb 13, 2009: Zehn Gründe, warum Sie gerade jetzt in IAM und GRC investieren sollten

Martin Kuppinger nennt und erläutert zehn Gründe dafür, warum man gerade jetzt in IAM und GRC investieren sollte, um die IT besser und Unternehmen leistungs- und wettbewerbsfähiger zu machen und Risiken zu reduzieren.

Webinar

Mar 11, 2009: Fraud Prevention and Multi-factor Authentication

In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk…

Blog

1-day eema-Workshop: Role Life Cycle Management and IAM - 5 March 2009

This meeting is a one-day event aimed at Ascure, Belgium and is organized in cooperation with Kuppinger Cole and EEMA. This workshop will discuss the approach and importance for setting up Role Life Cycle Management in your IAM Program. Currently many enterprises are investing in having a…

Blog

The European IAM and GRC landscape

These days, we've been mentioned by Marcus Lasance, an independent IAM consultant who formerly managed MaxWare U.K., in his blog. Dave Kearns commented on this today in his Network World newsletter. Both, Marcus' blog and Daves newsletter were about IAM in Europe - and the fact that there…

Product Report

Product Report: Radiant Logic Virtual Directory Server

With release 5.0 of Virtual Directory Server, Radiant Logic has split up its product line into VDS proxy edition and VDS context edition to cater better to the specific demands for directory virtualisation. Many virtual directory requirements arise out of specific deployment problems that…

Blog

Identity as a Service

Some days ago, I had a very interesting discussion with John de Santis and some of his colleagues from TriCipher, one of the vendors which provide IaaS (Identity as a Service) solutions, in that case particularly with their MyOneLogin service. That discussion is one in a row of others I had…

Webcast

Entitlement Management - Business and Technical Perspectives

Kuppinger Cole Webinar recording

Blog

Some new Kuppinger Cole surveys on IAM

We've compiled some questionnaires on different aspects of the IAM and GRC markets and put them online. We'd greatly appreciate your participation on these surveys. Most of the questionnaires are very lean, consisting of 10 to 12 questions - only the IAM market survey 2009 is quite a bit…

Blog

Authentication 2.0 - Beyond username and passwords

More and more organizations –driven by the vast amount of media coverage on data loss incidents –realize that the increased security requirements can not to be met by making password policies more complex. Users are already overwhelmed by the sheer number of password they have to memorize,…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]