Cloud Security Services, Brokers & Tools

Congress

European Identity & Cloud Conference 2018

Get to the place where the Digital Transformation is alive. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture out of best practice discussion, visionary presentations and networking with a future orientated community. More than 800 participants consisting…

Webcast

Security Benefits of Cloud Solutions

While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services…

Webinar

Sep 04, 2017: Security Benefits of Cloud Solutions

While organizations are becoming increasingly eager to embrace the cloud for multiple business benefits, for CISOs and CIOs these efforts bring new challenges to understand and evaluate security and privacy impacts by introducing cloud solutions to their enterprises. Adopting cloud services…

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 72534

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: eperi Encryption Gateway - 70619

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible…

Blog

A Short History of EIC - Europe's Leading Event on Digital ID & Transformation

More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors, domain experts, thought leaders and analysts. I remember Dick Hardt giving an incredibly visionary…

Webcast

How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels. Employees are also bringing consumer digital habits into the workplace and merging their home and…

Webinar

Jun 27, 2017: How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation

The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels.

Press Release

KuppingerCole’s 11th European Identity and Cloud Conference 2017

Wiesbaden, May 08, 2017 – The European Identity & Cloud Conference, taking place May 9 – 12, 2017 at the Infinity Ballhaus Forum Unterschleissheim, Munich/Germany , is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and…

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their…

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Webcast

Making the Cloud a Secure and Easy to Use Environment

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Executive View

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure…

Webinar

Apr 06, 2017: Making the Cloud a Secure and Easy to Use Environment

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data…

Executive View

Executive View: CensorNet Cloud Security Platform - 72529

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: Watchful Software RightsWatch - 70848

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and…

Executive View

Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more.  

Advisory Note

Advisory Note: Plant Automation Security - 71560

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are…

Blog

What Value Certification?

In the past weeks, there have been several press releases from CSPs (Cloud Service Providers) announcing new certifications for their services.  In November, BSI announced that Microsoft Azure had achieved Cloud Security Alliance (CSA) STAR Certification. On December 15th, Amazon Web…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Recapping CIW Seattle 2017

Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that they do.  Kantara is an international standards organization which develops technical specifications [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00