Access and Identity

Product Report

Product Report: Microsoft Windows Azure Active Directory - 70977

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

Webcast

Business Ready IAM with Sony Computer Entertainment and Simeio Solutions

KuppingerCole Webinar recording

Webcast

Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?

KuppingerCole Webinar recording

Blog

Safer, stronger authentication

In my last post (“Dogged Determination”) I briefly mentioned the FIDO alliance (Fast Identity Online) with the promise to take a closer look at the emerging internet password-replacing-authentication system this time. So I will. But first, an aside. It’s quite possible that the alliance…

Blog

IAM@IBM: Finally back to leadership

It has been somewhat quiet around IBM’s IAM offering for the past few years. Having been one of the first large vendors entering that market, other vendors had overhauled IBM, being more innovative and setting the pace in this still emerging market. This seems to be over now and IBM is…

Webcast

Moving Access Governance to the Next Level: Beyond Check-box Compliance

KuppingerCole Webinar recording

Webinar

Dec 10, 2013: Best Practice Webinar: Business Ready IAM with Sony Computer Entertainment and Simeio Solutions

In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important…

Blog

BYOI Revisited

Some time ago, in the wake of Wired journalist Mat Honan’s story of his account compromise (“How Apple and Amazon Security Flaws Led to My Epic Hacking”), I wrote about  BYOI – Bring Your Own Identity – and how “In the enterprise, there’s even less reason to support today’s BYOI.” Some time…

Webinar

Dec 04, 2013: Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?

Many organizations have started their journey into the world of IAM several years ago.

Executive View

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and…

Webinar

Nov 19, 2013: Moving Access Governance to the next level: Beyond check-box compliance

Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It…

Executive View

Executive View: Evidian Enterprise SSO - 70823

Despite being one of the more traditional and well-established areas of Identity and Access Management (IAM), and despite the fact there is still an obvious business benefit and quick-win potential in Enterprise Single Sign-On (E-SSO)  there are still many organizations that have not…

Whitepaper

Whitepaper: Migrating to the CA Technologies Solution for Identity Management & Access Governance - 71001

Recommendations for migrating from legacy Identity Provisioning to CA Technologies Identity Management and Access Governance solutions. Technical issues in migration, planning for migration, best practices, and potential benefits.

Blog

Azure Active Directory: What is the Graph API?

In Azure Active Directory (AAD) there is a Graph API. This is the main API to access AAD. The idea of a Graph API is not entirely new. The one provided by Facebook is already well established. But what is this really about and why does AAD provide such an API? First of all, I neither like…

Leadership Compass

Leadership Compass: Access Management and Federation - 70790

With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that…

Blog

Understanding Azure Active Directory

Some time ago Microsoft unveiled its Azure Active Directory (AAD). During recent weeks, I have had several discussions about what AAD is. First of all: It is not just an on-premise AD ported to Azure and run as a Cloud service. Despite relying in its inner areas on proven AD technology, it…

Blog

I ♥ Biometrics

If you’ve followed my writings for very long, you know I’m a strong believer in biometric authentication. (See, for example, this Network World column from over a dozen years ago) Why? Well, for one reason, unlike a password or a hardware token, you can’t misplace or lose a biometric…

Blog

Take strong authentication into your own hands

It was just a couple of months ago that trend-watcher The Next Web announced that Google Chrome had overtaken Microsoft’s Internet Explorer as the Web’s most used browser, a position that IE had held since, well, way back in the last century. So it’s unfortunate that just last week it was…

Webcast

The Future of Authentication and Authorization

KuppingerCole Webinar recording

Blog

GEICO prepares to take IAM to new levels

GEICO the third-largest private passenger auto insurer, serving more that 12 million private passenger customers, have selected the Open Identity Stack from ForgeRock to help them take IAM to the next level. The ForgeRock Open Identity Stack is a 100 percent open source identity stack to…

Blog

RSA acquires Aveksa: Will they redefine the IAM/IAG market?

Today RSA Security, a part of EMC [officially it’s “RSA, The Security Division of EMC”], has officially announced the acquisition of Aveksa, a company based in Waltham, MA. The deal closed on July 1st, 2013. Aveksa is a leading provider in the area of Identity and Access Governance (IAG), as…

Webinar

Jul 23, 2013: The Future of Authentication and Authorization

Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and…

Webcast

Panel Discussion - From Risk to Value: The Future of Social Media and their Role as Catalysts in Enterprise IAM

Session at the European Identity & Cloud Conference 2013 May 16, 2013 15:30

Webcast

Panel Discussion - Access Intelligence: The New Standard Feature of Access Governance?

Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:00

Webcast

Ulrich Haumann - IAM Governance Outside IT

Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:30

Webcast

Panel Discussion - Access Governance: How to Govern all Access

Session at the European Identity & Cloud Conference 2013 May 15, 2013 12:00

Webcast

Martin Kuppinger - Redefining Access Governance: Going well beyond Recertification

Session at the European Identity & Cloud Conference 2013 May 15, 2013 11:30

Webcast

Peter Weierich - Consumer IAM: Business Drivers and Challenges

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Webcast

Philip Lieberman - Securing Privileged Identities in the Real World: A Proposed Maturity Model of Competence and Capabilities

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Webcast

Karl Markgraf - Compliance Driven Identity & Access Governance

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Webcast

Panel Discussion - The Future of IAM

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Blog

Passwords, Authentication’s Zombies

Another European Identity (and Cloud) Conference has come and gone, and once again it was an exciting week with packed session rooms, and excellent attendance at the evening events. I’m not sure we can continue to call it the “European” Id Conference, though, as I met folks from Australia,…

Executive View

European Identity & Cloud Award 2013: OAuth 2.0 - 70778

European Identity Award 2013 for „Best Innovation/New Standard in Information Security”: A new standard that rapidly gained momentum and plays a central role for future concepts of Identity Federation and Cloud Security.

Executive View

European Identity & Cloud Award 2013: Deutsche Bank AG - 70772

European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Implementing cross-divisional SoD rules on a global scale at business level, with full integration into the existing Access Governance solution.

Advisory Note

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended…

Advisory Note

Advisory Note: Typical Risks and Pitfalls for IAM and IAG projects - 70749

Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can…

Webcast

The Common Credentials Dilemma - How to Get a Grip on Password Sprawl for Privileged Accounts

KuppingerCole Webinar recording

Webinar

May 10, 2013: The Common Credentials Dilemma – how to get a grip on password sprawl for privileged accounts

A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as…

Blog

The FIDO Alliance – game changer for Internet Security?

Last week, Google announced that it has joined the FIDO Alliance. FIDO stands for Fast Identity Online. The alliance was formed in July 2012. The mission is to change the nature of online authentication by providing interoperability among strong authentication devices. The alliance is…

Webcast

Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!

KuppingerCole Webinar recording

Webinar

Apr 23, 2013: Bridging (the gap between) Access Governance and Privileged User Management … and they lived happily ever after!

Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within…

Advisory Note

Advisory Note: Privilege Management - 70736

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years,…

Blog

How to license Identity and Access Management software?

Recently I had some conversations with both vendors and customers about licensing models for IAM (Identity and Access Management) software. Historically, most licensing models were (and still are) based on the number of users, typically “named” users (rather than “concurrent” users). License…

Leadership Compass

Leadership Compass: Access Governance - 70735

Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few…

Blog

Do we need to kill IAM to save it?

Last week I received a newsletter from Radiant Logic, a vendor of Virtual Directory Services and some other IAM stuff like Federation Services. This newsletter pointed to a video of a presentation of Gartner analyst Ian Glazer titled “Killing Identity Management in Order to Save it,” which…

Webcast

Rethinking Identity and Access Governance in a World of Change and Complexity

KuppingerCole Webinar recording

Blog

Yubico – will Google bring the breakthrough?

Recently a story about Google hit the news, according to an article in Wired, “Google declares war on the password”. Google wants to integrate this into the browser. Their approach is based on the idea of using a USB key or a NFC (Near Field Communication) device to log into applications.…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Top 5 Recommendations for Reducing Cyber Risks in 2020

The turn of the year has been an occasion for many cybersecurity news outlets to talk about trends and challenges in cybersecurity. Despite the importance of knowing what the trends and challenges are, we want to give you some hands-on recommendations to increase security for your company. Of course the following recommendations are just a selection out of many possible measures. We are happy to discuss with you in more detail the implications for your concrete business model. 1. Beyond [...]