Access and Identity

Webcast

Quantifying Access Risk: How to Sell the Access Governance Project to your CFO

KuppingerCole Webinar recording

Blog

The Identity Explosion – one reason to re-engineer not only our IAM

During my Opening Keynote at this year’s EIC (European Identity & Cloud Conference, www.id-conf.com), when talking about the Top Trends in IAM, Mobile Security, GRC, and Cloud Computing I used the term “Identity Explosion” to describe the trend that organizations will continue (or start)…

Executive View

Advisory Note: European Identity Award 2012: OpenID Connect - 70706

Best New Standard 2012 in Category „Best Innovation/New Standard in Information Security”: Providing the Consumerization of SAML. Driving the adoption of federation and making this much simpler.

Advisory Note

Best Practice: European Identity Award 2012: Swisscom - 70705

Special Award 2012 for „Mobile Security”: Swisscom MobileID – secure and easy authentication using the mobile phone with minimal impact on hardware based on ETSI Mobile Signature Standard.

Advisory Note

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

Advisory Note

Best Practice: European Identity Award 2012: Europol - 70703

Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including…

Advisory Note

Best Practice: European Identity Award 2012: Siemens AG - 70701

Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment.

Advisory Note

Advisory Note: Migration Options for your Legacy Provisioning - 70607

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Sun Microsystems by Oracle, of Novell by NetIQ, of Völcker by Quest Software and all the other acquisitions…

Advisory Note

Advisory Note: IAM and GRC Market – the Evolution in 2012/2013 - 70580

IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to…

Advisory Note

Advisory Note: Privilege Management - 70177

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]