Access Management

Executive View

Snapshot: Oracle Mobile and Social Access Management - 70724

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding…

Webcast

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

KuppingerCole Webinar recording

Webcast

Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning

KuppingerCole Webinar recording

Webinar

Dec 04, 2012: Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

Webinar

Nov 29, 2012: Reach the Next Maturity Level in your IAM Deployment – Beyond Classical Provisioning

Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest…

Webcast

Best Practices for Business-Driven Identity & Access Management

KuppingerCole Webinar recording

Webinar

Nov 06, 2012: Best Practices for Business-Driven Identity & Access Management

Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access…

Blog

Open Source IAM – is it right for you?

Open Source projects usually get short shrift from pundits and journalists. Open source Identity projects get even less shrift. (“Shrift”, by the way, has an interesting etymology, at least to those who wonder about where the words we use come from). Commercial vendors have whole staffs of…

Webcast

XACML and the Externalization of Authorization: How to do it Right

KuppingerCole Webinar recording

Webcast

Intelligent Access Management - Vorsprung vor dem Auditor

KuppingerCole Webinar recording

Survey

Survey Report: Identity Access Management und Governance in der Finanzindustrie - 70584

Studie zum aktuellen Status der Umsetzung von Identity und Access Management sowie Identity und Access Governance in der Finanzindustrie in Deutschland und der Schweiz. Studie beauftragt von Beta Systems. Studie durchgeführt von KuppingerCole.

Webinar

Jul 03, 2012: Intelligent Access Management – Vorsprung vor dem Auditor

Nie war es wichtiger als heute, genau darüber Bescheid zu wissen, wer wozu berechtigt ist und wer was getan hat. In diesem Webinar geht es um das intelligente Management von Zugriffsrechten. Um Risiken zu reduzieren, Compliance sicherzustellen und um den Anwendern selbst die Möglichkeit zu…

Training

Aug 14, 2012: XACML and the Externalization of Authorization: How to do it Right

This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in…

Webcast

EIC 2012 Session: Identity & Access Management as a Key Element for a Value focused Security Strategy

Ralf Knöringer, Atos IT Solutions and Services GmbH Hassan Maad, Evidian Shirief Nosseir, CA Technologies Christian Patrascu, Oracle Peter Weierich, iC Consult GmbH April 18, 2012 17:00

Webcast

EIC 2012 Session: How to successfully get business to participate in IAM and Access Governance

Dr. Martin Kuhlmann, Omada Edwin van der Wal, Everett April 18, 2012 15:30

Webcast

EIC 2012 Session: Munich Re’s Identity & Access Management - Experience Report and Best Practices

Wolfgang Zwerch, MunichRe April 18, 2012 14:30

Webcast

EIC 2012 Session: IAM Governance in the New Commerzbank

Dirk Venzke, Director, Commerzbank AG April 18, 2012 14:00

Advisory Note

Business Report: Key Risk/Performance Indicators IAM and GRC - 70204

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to…

Webcast

EIC 2012 Keynote: How do Today’s Technology Challenges make Real IAM Possible?

Jonathan Sander, Director of IAM Business Development, Quest Software April 17, 2012 17:50

Blog

The Identity Explosion – one reason to re-engineer not only our IAM

During my Opening Keynote at this year’s EIC (European Identity & Cloud Conference, www.id-conf.com), when talking about the Top Trends in IAM, Mobile Security, GRC, and Cloud Computing I used the term “Identity Explosion” to describe the trend that organizations will continue (or start)…

Advisory Note

Best Practice: European Identity Award 2012: Europol - 70703

Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including…

Advisory Note

Best Practice: European Identity Award 2012: Siemens AG - 70701

Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment.

Advisory Note

Advisory Note: IAM and GRC Market – the Evolution in 2012/2013 - 70580

IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to…

Webcast

Identity & Access Management in the Cloud: Real or a Mirage?

KupingerCole Webinar recording

Webcast

Conducting an Orchestra - The New Role of IAM

KuppingerCole Webinar recording

Webcast

Returning (or finally bringing?) Identity and Access Management (IAM) to the User

KuppingerCole Webinar recording

Webinar

Mar 22, 2012: Conducting an Orchestra – The New Role of IAM

With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security…

Webcast

Best Practice Driven Identity & Access Management

KuppingerCole Webinar Recording

Webinar

Mar 29, 2012: Identity & Access Management in the Cloud: Real or a Mirage?

Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.

Blog

IAM legacies – bad for your business

It’s been almost 15 years since Business Layers and Oblix ushered in the new age of Identity and Access Management Systems (IAM systems) with what I called at the time the “killer app” for Directory Services – electronic provisioning. Even more incredible is that it’s almost 20 years since I…

Webinar

Mar 21, 2012: Returning (or finally bringing?) Identity and Access Management (IAM) to the User

IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.

Webinar

Feb 21, 2012: Best Practice Driven Identity & Access Management

Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on…

Executive View

Snapshot: ClusterSeven Enterprise Spreadsheet Manager - 70852

ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Data-Driven Decision Making for Identity Security

Data-Driven Decision Making for Identity Security

Symantec Enterprise: With more informed decisions comes more automated security. In today’s Zero Trust world, where the principle of least privilege is ubiquitous, enterprises are struggling to balance security while simultaneously enabling a highly agile business environment. There has always been friction with security and making highly specific security decisions quickly and efficiently contributes to this. Moreover, decision-making in enterprises exists on a spectrum from completely [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00