Security

Blog

Virtualization – changing the IT world

Over the last few years, virtualization has become a main topic of IT. Even though it isn’t a new concept, there have been many changes which affect IT in various areas, from data center design and operations to software delivery and future business models. One of the most interesting…

Blog

More Crystal Balls... PKI v.2, convergence and the like

One of our jobs as analysts to provide insight and vision on what an when things are going to change and how it is going to happen. Sometimes though, my fellow analysts are far off with their predictions, sometimes one just underestimates the market pull or some impressive marketing stunt…

Product Report

Product Report: Symlabs Virtual Directory and LDAP Proxy

Symlabs has launched version 4.0 of its "Virtual Directory Server" and "LDAP Proxy" products in April 2008. Both products are essentially the same code base, but differ in bundled functionality. The LDAP Proxy offers load-balancing, routing and fail-over of directory…

Blog

Ping Identity repositions itself by adding important SaaS Features

On September 9th, Ping Identity announced the availability of version 5.2 of PingFederate. This comes on the heels of Ping Identity’s acquisition of the SXIP Access product from Vancouver based SXIP in March. Ping Identity had acquired SXIP Access in order to extend its reach in the…

Blog

CardSpace Business Cards - PKI 2.0?

As the Gurus of User-Centric ID Management have discussed here and here, the idea of using CardSpace and special "Managed Cards", issued through the use of the Microsoft Acrtive Directory, InfoCards could actually become sort of an authentication token not only for your self, but for you…

Blog

SaaS - unmanageable, but (still) successful

SaaS is becoming more and more popular, especially in the US. In Europe the growth is much slower, but that is no surprise – Europe is usually some 12 to 36 months behind the US in adopting new technologies. But there is one thing to be considered regarding SaaS – most of the SaaS offerings…

Blog

Why Information Rights Management is mandatory...

Information Rights Management (IRM) is one of these technologies which isn’t really successful until now, even while it is discussed and available for a pretty long time. IRM is about protecting the information directly, through signatures, encryption and a direct assignment of rights. These…

Advisory Note

Trend Report: IAM und SOA 2008

Eine gemeinsame Studie von KCP und Ernst & Young AG Wirtschaftsprüfungsgesellschaft Steuerberatungsgesellschaft Deutschland

Webcast

IAM und SOA

8 Minutes audio enhanced presentation

Blog

Still unsolved: The relationship between IAM, SOA, and BSM

In a, may be, simplistic view on IT there are three important pillars on the IT infrastructure level. Using the - sometimes improper - buzzwords, these are Identity (and Access) Management (IAM) SOA - in fact more the technologies for business processes and flexible applications, e.g.…

Blog

identity theft & offline fraud in banking industry

In a recent post, I  wrote about those 25 Million British people, whose bank information had been "lost". Jeremy Clarkson, a British TV presenter, wrote in his Sun newspaper column, that such a loss is of no value for somebody who may now own this data. To proof this, he published his own…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or vendors - let us start by simply being consumers.  Consumers of online services for banking, e-commerce, education, entertainment, and more.  And by thinking as consumers, we can all tell endless stories of poor user experiences with respect to using those services. Those poor user experiences [...]