Information Security

Congress

European Identity & Cloud Conference 2018

Get to the place where the Digital Transformation is alive. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture out of best practice discussions, visionary presentations and networking with a future orientated community. More than 800 participants consisting…

Webcast

Security Management im digitalen Unternehmen: Business-orientiert, agil, effektiv

Wie schön waren die Zeiten, in denen man die physische wie digitale Sicherheit in seinem Unternehmen als eine Art Ritterburg mit umlaufendem Wassergraben („Perimeter“) abbilden konnte.Doch diese Zeiten sind vorbei. Die Mitarbeiter sind über die ganze Welt verstreut,…

Blog

The Power of Utility in the Future of Marketing

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab In the future, marketing will be driven neither by demographics, on- or off-line behavioral identifiers or psychographics, but by understanding and fulfilling the individual utility expectations of the…

Webcast

GDPR: The Six Critical Steps to Compliance and Brand Differentiation

From May 2018 when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. Companies collecting such information from their customers will have to adapt to fundamental changes both in the very definition of…

Executive View

Executive View: Entrust IdentityGuard for Enterprise - 71321

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and…

Webcast

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Just like traditional IAM, CIAM requires identity governance to verify and maintain the required quality of the identity attributes collected from consumers. “Quality over quantity” should be your motto from now on: not only it ensures that the data your marketing and business…

Blog

Cryptography’s Darkest Hour

For anyone working in IT security, this week surely did not start well. Not one, but two major cryptography-related vulnerabilities have been disclosed, and each of them is at least as massive in scale and potential consequences as the notorious Heartbleed incident from 2014. First, a…

Blog

The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry

The EU’s General Data Protection Regulation (GDPR) will force many changes in technology and processes when it comes into effect in May 2018.  We have heard extensively about how companies and other organizations will have to provide capabilities to: Collect explicit consent…

Whitepaper

Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for practically every organization. Understanding the risk posture and providing transparency while…

Webcast

The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018

Many organizations are currently looking into deploying their own CIAM programs, because they recognize CIAM’s potential to provide better marketing insights, improve customer registration experience and increase security. However, in the light of the upcoming data protection…

Leadership Brief

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

Webcast

Top Considerations for Selecting an Identity and Access Management as a Service Vendor

As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming…

Executive View

Executive View: Axiomatics Data Security - 70345

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules…

Advisory Note

Advisory Note: Redefining Access Governance - Beyond annual recertification - 72529

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25 th , 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Blog

Blog

The Power of Utility in the Future of Marketing

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab In the future, marketing will be driven neither by demographics, on- or off-line behavioral identifiers or psychographics, but by understanding and fulfilling the individual utility expectations of the [...]