System and Network Security

Product Report

Product Report: Zscaler Cloud Security

Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in…

Blog

Without standards for DRM and IRM Cloud Security will remain a daydream

IT Security in and for the Cloud is one of today’s hottest topics. Unfortunately, it is almost as complicated as the Cloud itself, spanning from Identity Management and logging intelligence to data encryption. This article explores the various scenarios and demonstrates both strengths and…

Survey

Virtualization Security Survey: Security – an essential prerequisite for successful virtualization

During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Organizations transitioning to a virtualized or cloud IT…

Vendor Report

Vendor Report: CA Technologies Virtualization Security

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system…

Webcast

Virtualization Security Trends & Insights: Results from KuppingerCole's Recent Survey

Kuppinger Cole Webinar recording

Webinar

Nov 26, 2010: Virtualization Security Trends & Insights: Results from KuppingerCole´s Recent Survey

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look…

Seminar

Oct 19, 2010: Enterprise Cloud Security Summit

Innerhalb weniger Jahre hat sich das Cloud Computing zu einem dominierenden Trend entwickelt, der sich zudem wie kaum ein Trend zuvor verändernd auf die IT-Infrastruktur auswirkt. Im Gegensatz zu typischen, Technologie-getriebenen Trends, geht die Nachfrage nach Cloud Computing Services von…

Webcast

Virtualization Security Trends & Insights

Kuppinger Cole Webinar recording

Webinar

Sep 14, 2010: Virtualization Security Trends & Insights

In this webinar, Martin Kuppinger will talk about security in virtualized environments and the developments happening in this space. How does state-of-the-art security in virtual environments look like? And what should be a future roadmap that works?

Congress

May 10 - 13, 2011: European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Advisory Note

Trend Report: Desktop Virtualization and VDIs

Desktop Virtualization and VDIs (Virtual Desktop Infrastructures) are key topics for many IT managers and decision makers. However, like with every hype topic, there are shortcomings. Investments in VDIs and Desktop Virtualization thus have to be done carefully, after weighing the…

Blog

Cloud Security = IDM+ERM, BUT: who will drive it is the real question!

My last blog on the future necessities to really, really secure applications in the cloud was heavily discussed, which I think is a good sign, obviously there is something to discuss... But let's get a bit more down to the real problems. Of course, DRM is not the same thing as ERM (let me…

Blog

Beyond LDAP - have a look at system.identity

LDAP (Lightweight Directory Access Protocol) is well established. It is the foundation for today's Directory Services, which support LDAP as a protocol and which usually build their data structure on the associated LDAP schema. There are many interfaces for developers to use LDAP, from the…

Blog

Cloud Security = Interoperability for DRM

This week was very interesting for me. I have had a number of calls and meetings with people dealing with software components and architectures that will make  the cloud secure. And the most interesting observation is: actually everything is there. We as an industry could simply start doing…

Webcast

Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity

Best practices session at the European Identity Conference 2010 by Jonas Hogberg, Ericsson

Webcast

From Plastic to Secured Bits - a Wallet for Virtual Cards on the Mobile Phone

Best practices session at the European Identity Conference 2010 by Jörg Heuer, Deutsche Telekom Laboratories

Webcast

Login for the Mobile Internet - What new Challenges arise from Mobile Internet Usage?

Best practices session at the European Identity Conference 2010 by Michael Gärtner, Deutsche Telekom AG

Webcast

Managing Cloud Security and Cloud Risk

Kuppinger Cole Webinar recording

Blog

Myths about Cloud Security

There are so many myths out there about Cloud Security - time to start putting them away... The cloud is inherently insecure. No, not really. There are providers which deliver a high level of security. The cloud can be more secure than internal IT, given that services are frequently…

Webinar

Mar 26, 2010: Managing Cloud Security and Cloud Risk

Martin Kuppinger will discuss in this presentation risk-based approaches to manage cloud security. The issue, from his perspective, isn’t that the cloud is inherently insecure. The real issue is to deal in appropriate way with the specifics of the cloud – which includes not only security but…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions

Informatica just announced that they agreed to acquire Compact Solutions, a vendor of Enterprise Metadata Management with engineering and professional services being based out of Krakow, Poland. Compact Solutions core product is MetaDex, which enables full end-to-end visibility of data flows, especially around some complex data sources, and thus helps organizations in understanding, tracking, managing, and protecting data flows and increasing efficiency in their broader data and analytics [...]