Access and Identity

Blog

Why Distributed Public Ledgers such as Blockchain will not solve the identification and thus the authentication problem

There is a lot of talk about Blockchain and, more generally, Distributed Public Ledgers (DPLs) these days. Some try to position DPLs as a means for better identification and, in consequence, authentication. Unfortunately, this will not really work. We might see a few approaches for stronger…

Webcast

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Leadership Compass

Leadership Compass: Privilege Management - 71100

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management…

Webinar

Jan 28, 2016: Identitätsmanagement im Mittelpunkt der digitalen Transformation

Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich…

Webinar

Jan 19, 2016: How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged…

Executive View

Executive View: FIDO Alliance - 71504

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

Executive View

Executive View: Knowledge Vault - 71412

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

Webcast

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to…

Webcast

Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Leadership Brief

Leadership Brief: Privileged Account Management Considerations - 72016

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

Webinar

Jan 12, 2016: Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company.…

Executive View

Executive View: WSO2 App Manager - 71296

WSO2 App Manager is an Open Source solution for unified management of enterprise applications providing identity and access management, as well as complete lifecycle governance for mobile and web apps.

Webcast

Intelligente Protokollierung von Aktivitäten

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten…

Vendor Report

Vendor Report: AlertEnterprise - 71048

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

Webcast

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Webinar

Dec 15, 2015: Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Executive View

Executive View: AWS Directory Service and Identity and Access Management - 71450

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

Webinar

Nov 12, 2015: Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Webcast

Universal SSO: Strategies & Standards for Single Sign-On Across Web and Native Applications

Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall…

Blog

Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses

With its recent announcement of Microsoft Azure Active Directory B2B (Business-to-Business) and B2C (Business-to-Customer/consumer/client), which are in Public Preview now, Microsoft has extended the capabilities of Azure AD (Active Directory). Detailed information is available in the Active…

Executive View

Executive View: Evidian Identity & Access Manager - 70871

Evidian Identity & Access Manager is an integrated solution for Identity Provisioning and Access Governance. It provides strong capabilities in these areas and excellent integration into the Evidian products such as Enterprise Single Sign-On.

Executive View

Executive View: VMware Identity Manager - 71454

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications.

Webcast

7 Common Symptoms of IAM & IAG Diseases

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webinar

Nov 17, 2015: The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to…

Webcast

Access Governance in a Cloudy Environment

Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.

Advisory Note

Advisory Note: Identity Information Quality - 70996

Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.

Executive View

Executive View: BalaBit Blindspotter - 71202

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

Webcast

Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Advisory Note

Advisory Note: Turning inattention into intention - 71501

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

Webinar

Oct 27, 2015: Intelligente Protokollierung von Aktivitäten

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten…

Analysts' View

KuppingerCole Analysts' View on IAM 3.0/4.0

Identity Management and Access Management are on their way into the first line of defence when it comes to enterprise security. With changing architecture paradigms and with the identity of people, things and services being at the core of upcoming security concepts, maintaining identity and…

Blog

Different, better and compliant – Business-orientated Access Governance

Identity Management and Access Management are on their way into the first line of defence when it comes to enterprise security. With changing architecture paradigms and with the identity of people, things and services being at the core of upcoming security concepts, maintaining identity and…

Leadership Brief

Leadership Brief: Prevent, Detect, Respond: the Changing Face of IAM - 71305

As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.

Leadership Brief

Leadership Brief: How to Justify your IAM Investments - 71410

IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   

Advisory Note

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Webinar

Oct 22, 2015: One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Executive View

Executive View: BalaBit syslog-ng - 71201

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

Blog

Windows 10: Finally - Stronger Authentication

Windows 10 comes with the promise of changing computing from ground up. While this might be marketing speak in many aspects that might be true for one central aspect of daily computing life: secure user authentication for the operating system, but also for websites and services. Microsoft…

Analysts' View

KuppingerCole Analysts' View on Consumer Identities

When The Digital Transformation is a game changer for many traditional organisations and a business enabler for many new trading companies and service providers in the digital world. When dealing with consumers and customers directly the most important asset for any forward-thinking…

Webinar

Oct 08, 2015: 7 common symptoms of IAM & IAG diseases - the causes and how to heal them

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webinar

Sep 22, 2015: Access Governance in a Cloudy Environment

Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.

Executive View

Executive View: Unify Identity Broker V5.0 - 71300

In today’s environment, with so many demands on identity information, an advanced identity provider service is required that can integrate disparate technology and bridge mature identity management environments to the new requirements of Cloud services, mobile device management and…

Advisory Note

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Executive View

Executive View: neXus Dynamic Identity Platform - 70861

neXus Dynamic Identity Platform is a complete identity lifecycle solution that unifies physical and digital access for a broad range of supported identity types, authentication standards, and communication protocols.

Webinar

Sep 15, 2015: Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Webinar

Oct 15, 2015: Universal SSO: Strategies & Standards for Single Sign-on Across Web and Native Applications

Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall…

Webcast

Controlling and Monitoring Administrative Access to Enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Webcast

How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Advisory Note

Best Practice: European Identity Award 2015: NORD/LB - 71401

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern…

Webcast

Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Analysts' View

KuppingerCole Analysts' View on User Empowerment / Life Management

When talking about user empowerment, we are talking about enabling the user to control their data. When looking at the fundamental concept we have outlined initially back in 2012 as Life Management Platforms (there is an updated version available, dating late 2013), this includes the…

Webcast

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Executive View

Executive View: Oracle Privileged Account Manager - 71057

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Executive View

Executive View: ITMC IDM365 - 71289

ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The product works in a task-centric way with a modern UI, backed by ITMC’s long experience in implementing IAM&IAG in an efficient way.

Executive View

Executive View: ObserveIT User Activity Monitoring - 71258

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es…

Webinar

Jun 17, 2015: How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Webcast

Bedrohungen für privilegierte Zugänge erkennen und abwenden

Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um…

Webcast

The Future of Federation

Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.

Leadership Brief

Leadership Brief: Facing the Future: Identity Opportunities for Telcos - 71287

Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising…

Webcast

Louis-Marie Fouchard - Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM

Identity and Access Management is one of the core building blocks to address IT/OT challenges. The specific situation of OT solutions and critical infrastructures, however, entails a set of functional and non-functional requirements which cannot be fulfilled by off-the-shelf IAM products…

Webcast

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being…

Webcast

Nick Tuffs - The Good, the Bad and the Ugly of IAM: An Enterprise View

Vodafone’s Workforce Identity and Access Management (WIAM) platform treads the line between Security - being a guardian of the Vodafone brand – and a Business Enabler – providing an agile, cost-effective, simple method of allowing 350,000 users to access IS and telecom…

Webcast

Ravi Srinivasan - Digital Identities = Security Threats. Is your IAM Program Ready?

Digital Identities are transforming the way companies architect their IT environment. They adapt and optimize by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering…

Webinar

Jun 16, 2015: Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Analysts' View

KuppingerCole Analysts' View on Analytics

There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data…

Executive View

Executive View: GlobalSign - 71051

GlobalSign, one of the world’s biggest certificate authorities, and a leading provider of identity services, recently acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management (IAM) solutions. Ubisecure’s leading…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Executive View

Executive View: Identity Automation RapidIdentity - 71203

Identity Automation’s RapidIdentity is a streamlined solution covering key functions of Identity and Access Management & Governance in an integrated offering. A particular strength is the strong out-of-the-box support for common requirements in that area.

Executive View

Executive View: ObserveIT User Activity Monitoring - 71258

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

Webcast

Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access…

Executive View

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

Webinar

May 19, 2015: The Future of Federation

Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.

Webcast

Lean, Intelligent IAM Processes for the ABC - Agile, Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Webinar

Jun 02, 2015: Ground Control to Major CRO: Is Identity Governance a risky experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Executive View

Executive View: Avencis SSOX - 71065

Avencis SSOX is an Enterprise Single Sign-On solution with a focus on flexible strong authentication and mobile device support. Combined with Avencis’ own IAM platform, it provides a foundation for a long-term Identity and Access Management strategy for any organization.

Webcast

Enabling Cloud Governance

While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.

Webcast

External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Webinar

Jun 25, 2015: Controlling and monitoring administrative access to enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Blog

Redesigning access controls for IAM deployments?

A few weeks ago I read an article in Network World, entitled “A common theme in identity and access management failure: lack of Active Directory optimization”. Essentially, it is about the fact that Microsoft Active Directory (AD) commonly needs some redesign when starting an IAM…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® est une solution de gestion d'authentification et d'accès intégrée fortement axée sur le secteur de la santé. Elle offre un accès rapide et sécurisé aux postes de travail, aux bureaux virtuels et aux…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® ist eine integrierte Authentifizierungs- und Zugriffsmanagementlösung mit einem klaren Fokus auf das Gesundheitswesen. Sie bietet schnellen und sicheren Zugriff auf Workstations, Virtual Desktops und Anwendungen, indem sie die Vorteile der starken…

Webcast

Monitor Your Cloud Administrators and Managed Service Operators – Avoid Privilege Abuse and Fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged…

Webinar

May 19, 2015: Bedrohungen für privilegierte Zugänge erkennen und abwenden

Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um…

Webinar

Apr 28, 2015: Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® is an integrated authentication and access management solution with a strong focus on the healthcare industry. It provides fast and secure access to workstations, virtual desktops and applications by combining strong authentication with enterprise single sign-on.

Executive View

Executive View: Wallix AdminBastion - 71266

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing…

Leadership Brief

Leadership Brief: Alternatives to complex role projects and resource-consuming recertification - 72009

Enterprise Role Management and Access Governance are at the core of today's IAM systems to achieve efficient administration processes and compliance with regulatory requirements. Costly processes for the design and maintenance of large role-based projects and for extensive annual…

Leadership Brief

Leadership Brief: Your customer identities: How to do them right - 72006

Digital business strategies require up-to-date and reliable customer identities. They are essential to target your marketing, to adjust the design of your products and services, to increase your earnings and to create long-term relationships with your customers.

Executive View

Executive View: CA Privileged Identity Manager - 71059

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

Webinar

Apr 22, 2015: Enabling Cloud Governance

While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.

Webcast

Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Webinar

Apr 21, 2015: External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

Executive View

Executive View: SecureAuth IdP - 70844

SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to both on-premise and cloud services...

Webinar

Apr 23, 2015: Lean, Intelligent IAM processes for the ABC - Agile Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Blog

UMA and Life Management Platforms

Back in 2012, KuppingerCole introduced the concept of Life Management Platforms. This concept aligns well with the VRM (Vendor Relationship Management) efforts of ProjectVRM, however it goes beyond in not solely focusing on the customer to vendor relationships. Some other terms occasionally…

Blog

Windows 10 will support FIDO standards for strong authentication

At KuppingerCole, we have been following the progress of FIDO alliance for quite some time. Since their specifications for scalable and interoperable strong authentication have been published last year, FIDO has already had several successful deployments in collaboration with such industry…

Webcast

Managing the Password Chaos

More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.

Executive View

Executive View: ARCOS Privileged Identity Management Suite - 71028

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products…

Blog

Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization

It’s not RBAC vs. ABAC – it’s APAM. Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access Control), Dynamic Authorization Management (DAM) and standards such as XACML. Other terms such as RiskBAC…

Webinar

Apr 14, 2015: Monitor your cloud administrators and managed service operators – avoid privilege abuse and fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged…

Analysts' View

KuppingerCole Analysts' View on Mobile Enterprise

It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but…

Blog

UMA in the Enterprise: There’s far more potential for UMA

UMA, the upcoming User Managed Access Protocol, is a profile of OAuth 2.0. The specification itself defines the role of UMA as follows: “UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on…

Executive View

Executive View: SAP Cloud Identity Service - 71180

SAP Cloud User and Access Management solution for simple onboarding of external users in B2B and B2C scenarios and for managing access of all types of users to cloud services, run on the SAP HANA platform.

Advisory Note

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and…

Executive View

Executive View: NetIQ Access Manager - 71054

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid…

Executive View

Executive View: i-Sprint AccessMatrix Universal Sign-On - 71064

i-Sprint Innovations is a vendor of Identity, Credentials and Access Management solutions based in Singapore. Established in 2000, i-Sprint is focusing on providing solutions for financial industry and other high security environments. Since 2011, the company is a wholly owned subsidiary of…

Webcast

Mastering the Digitalization of Business: Digital Identities and the Cloud

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their…

Executive View

Executive View: BalaBit Shell Control Box - 71123

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in…

Advisory Note

Advisory Note: Redefining Access Governance - 71185

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think…

Webinar

Mar 10, 2015: Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Executive View

Executive View: Centrify Identity Service - 71186

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and cloud-based applications, as well as management for Mac and mobile devices and their apps. The company is VC…

Webinar

Feb 12, 2015: Managing the Password Chaos

More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Conversational AI Building Platforms (Market Compass Preview)

AI-based conversational interfaces developed plenty of hype for use cases within marketing, sales, and service management. Various types of solutions are on the market, offered by both small start-ups and large, international, established enterprises. More than a hype Conversational interfaces experienced hype in 2016, followed by some disillusionment in the next years, as many solutions were technical gadgets rather than delivering real value. This is about to change, as many solutions are [...]