Access and Identity

Product Report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM…

Webcast

Privileged Cloud Identity Management

Kuppinger Cole Webinar recording

Webcast

Kontextbasierte Authentifizierung im Active Directory Umfeld

Kuppinger Cole Webinar recording

Webcast

One Authentication Strategy for All - from Internals to the Customer

Kuppinger Cole Webinar recording

Webinar

Nov 30, 2010: Privileged Cloud Identity Management

In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche…

Webinar

Nov 26, 2010: Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen…

Webcast

Identity Federation: Essential Building Block for a Winning Cloud Strategy in your SAP Environment

Kuppinger Cole Webinar recording

Webinar

Nov 16, 2010: One Authentication Strategy for All – from Internals to the Customer

Martin Kuppinger of KuppingerCole will discuss the trends around authentication strategies, the breadth of options available today, and the future evolution towards a centralized layer for context-based authentication and authorization - for all types of users and for all types of services…

Blog

Soft biometrics for stronger authentication

I'm somewhat reluctant regarding biometrics. There are some good reasons that biometrics still are a niche approach: The need for specialized hardware, the aversion of users against some biometric approaches like fingerprints, the discussion about potential security weaknesses for example…

Webcast

Privileged User Management: Wer kontrolliert die Admins?

Kuppinger Cole Webinar recording

Blog

Security questions for authentication - a ticking privacy time bomb?

We all are familiar with external (and sometimes also internal) websites which require us to pick or define security questions and to provide answer to these questions. What is your mother's maiden name? Which is your favourite sports team? Which is the color you like most? And so on...…

Webcast

Machen Sie mehr aus dem Active Directory - Identity-Dienste für die heterogene IT

Kuppinger Cole Webinar recording

Product Report

Product Report: CA Access Control – Privileged User and Password Management

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity…

Webinar

Oct 08, 2010: Privileged User Management: Wer kontrolliert die Admins?

Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im Fokus dieses Webinars. Zunächst wird Martin Kuppinger einen Einblick in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über den Lösungsmarkt geben. Danach wird Klaus…

Webinar

Oct 12, 2010: Identity Federation: Essential Building Block for a Winning Cloud Strategy in your SAP Environment

In this webinar, Martin Kuppinger will give an overview on the current and future role of identity federation in hybrid cloud infrastructures with a focus on SAP environments. He will be followed by Keith Grayson from SAP, who will be talking on SAP user management optimization through SAML 2.0.

Webinar

Sep 29, 2010: Machen Sie mehr aus dem Active Directory - Identity-Dienste für die heterogene IT

Die meisten Unternehmen verfügen über eine zentrale Active Directory-Infrastruktur. Deshalb spricht viel dafür, darauf aufzubauen, um beispielsweise auch andere Systemumgebungen zu verwalten. So kann man bei geringem Integrationsaufwand noch mehr aus der ohnehin vorhandenen Infrastruktur…

Blog

Quest acquires Voelcker - the IAM market will change...

Today, Quest announced that they will acquire the German Völcker Informatik AG with its ActiveEntry product, a leading-edge identity provisioning solutions with some integrated Access Governance capabilities. From my perspective, that is a very interesting acquisition, which brings Quest…

Blog

Do we still have to care about directory services?

It became pretty quiet around directory services during the last years. When I remember the discussions back some 10, 15 or 20 years around NDS versus LAN Manager (and the underlying domain approach) or Active Directory when it came to market, and even the discussions which came up in the…

Webcast

How to Keep Entitlement Management Lean - in any Environment

Kuppinger Cole Webinar recording

Webinar

Jun 29, 2010: How to Keep Entitlement Management Lean - in any Environment

How to gain more flexibility and efficiency in an environment where requirements change very fast, and where users and services cannot be classified any more as easy as being "internal" or "external". This Webinar is about key decision criteria for lean entitlement management and…

Blog

Beyond LDAP - have a look at system.identity

LDAP (Lightweight Directory Access Protocol) is well established. It is the foundation for today's Directory Services, which support LDAP as a protocol and which usually build their data structure on the associated LDAP schema. There are many interfaces for developers to use LDAP, from the…

Webcast

Managed IAM Service Project at Piaggio

Best practices session at the European Identity Conference 2010 by Lorenzo Mastropietro, Piaggio

Webcast

Bringing BMW’s New Central Identity and Access Management System into Life

Best practices session at the European Identity Conference 2010 by Jürgen Skerhut, BMW and Dr. Andreas Neumann, Logica Deutschland

Webcast

Integrating Physical Access Control into Active Directory at King ICT, Croatia

Best practices session at the European Identity Conference 2010 by Adrian Castillo, HID Global and Kristian Koljatic and Nino Talian, KING ICT d.o.o.

Webcast

Identity and Access Management at Munich University Hospital

Best practices session at the European Identity Conference 2010 by Dr. Walter Swoboda and Simon Leutner, University Hospital of Munich

Webcast

From Creative Chaos to Modern Service Provisioning

Best practices session at the European Identity Conference 2010 by Dr. Nicola Stein, German Aerospace Center

Webcast

Migros Identity Management & SSO - Implementation and Perspectives

Best practices session at the European Identity Conference 2010 by Rudolf Gisler, Migros Dr. Peter Schill, SafeNet

Webcast

Business Oriented Entitlement Life-Cycle Management

Best practices session at the European Identity Conference 2010 by Henrik Siiskonen, If P&C Insurance Company Ltd and Pekka Hagström, RM5 Software

Webcast

The Most Valid Wins of IAM

Keynote at the European Identity Conference 2010 by Jackson Shaw, Active Directory, Identity Management Expert, Quest Software

Webcast

IAM into the Cloud: Improving Security with Cloud and Collaboration Technology

Keynote at the European Identity Conference 2010 by Tim Dunn, Vice President - Security Business Unit, CA

Webcast

Next-Generation Provisioning: A Governance-based Approach

Keynote at the European Identity Conference 2010 by Darran Rolls, Chief Technology Officer, Sailpoint

Product Report

Product Report: Aveksa Enterprise Access Governance Platform

The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without…

Webcast

One Entitlement Management For All - How to Manage All Users, Services, and Service Providers

Kuppinger Cole Webinar recording

Webinar

Apr 21, 2010: One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently

As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications.

Webcast

Access Governance: Implement Processes, Reduce Business Risks

Kuppinger Cole Webinar recording

Blog

Gemalto invests in Strong Auth Tokens

Just recently my Strong Authentication report has been published and now there is one vendor less in the scope: French-American card and token giant GEMALTO announced that it acquired the niche player TODOS:…

Blog

Strong authentication as business development

In my recent post on versatile authentication I touched the topic of national eID cards. Some two weeks ago, I did a presentation on eID interoperability from a private perspective. I started with the question about why strong authentication technologies are still not widely used. The…

Advisory Note

Technology Report: Access Governance Architectures

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions,…

Blog

Versatile authentication - break-through for mass adoption of strong authentication?

Versatile authentication is one of the hot topics in IT - more and more vendors start to support it in some way or another. Versatile, a not that common term, means the ability to flexibly switch between different authentication methods. In practice, versatile authentication solutions shall…

Webinar

Apr 15, 2010: Access Governance: Implement Processes, Reduce Business Risks

As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while…

Advisory Note

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…

Blog

Can authentication be both strong and flexible?

Whether you want to place a bid at eBay, check your bank balance online or your credit rating at Schufa or Experian, or access your corporate SAP account: Instead of asking you to please enter your user name and password, chances are the system nowadays will demand some other method of…

Blog

Back to the basics - you still need "core IAM"

In these days the industry talks a lot about IT GRC, Risk Management, Access Governance, Identity for the Cloud, and so on. However, we should keep in mind that the vast majority of organizations still have to do a lot of homework around basic Identity and Access Management.  And, even more:…

Webcast

From E-SSO to a Holistic Authentication- and Authorization Strategy

Kuppinger Cole Webinar recording

Webcast

Versatile Authentication - One Layer of (Strong) Authentication

Kuppinger Cole Webinar recording

Webcast

5 Quick Win Approaches to Achieve the Next Level of your IAM Infrastructure

Kuppinger Cole Webinar recording

Webcast

Provisioning and Access Governance Trends

Kuppinger Cole Webinar recording

Blog

Simplifying or over-simplifying authentication?

My colleague Jörg Resch recently blogged a lot about approaches for "lightweight" authentication and the risks associated with them. There are many companies out there with new or claimed-to-be-new approaches on more or less strong and more or less valid authentication. Whether that's the…

Webinar

Feb 10, 2010: From E-SSO to a Holistic Authentication- and Authorization Strategy

Expert panel showcasing best practices migrating to a holistic auth(z) and auth(n) strategy.

Webinar

Feb 09, 2010: Versatile Authentication - One Layer of (Strong) Authentication

Versatile authentication flexibly integrates a variety of open and proprietary authentication methods into one security layer, and strongly simplifies the implementation of multiple authentication methods in complex environments. In this panel, Dave Kearns will discuss with several…

Webinar

Feb 09, 2010: 5 Quick Win Approaches to Achieve the Next Level of your IAM Infrastructure

IT organisations are facing an increasing pressure to reduce costs, while at the same time compliance requirements increase and management is asking for more flexible solutions to faster react on new business requirements. In this Webinar, Martin Kuppinger, Principal Analyst at Kuppinger…

Webcast

Harnessing Sun's OpenSSO Authentication and Authorization Mechanisms

Kuppinger Cole Webinar recording

Webinar

Feb 09, 2010: Provisioning and Access Governance Trends

Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources…

Webinar

Jan 14, 2010: Harnessing Sun’s OpenSSO Authentication and Authorization Mechanisms

It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]