Multispeed IT & Application Architecture

Webcast

Identity Assurance - the Art of Knowing Your Customers

To conduct online business, users need to be able to identify themselves remotely and reliably. In most cases, however, it is not sufficient for the user to simply assert "I am who I say I am - believe me." When doing digital business, you will never meet your customers face-to-face, and…

Blog

Consumer Identity Summit 2016 - Summary

KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well attended, and featured excellent expert speakers from all across the globe.  The popularity of…

Webcast

Martin Kuppinger - Who "Owns" Responsibility for the Consumer Identity?

When organizations start looking at managing consumer identities in a more consistent, integrated way, they quickly observe the challenge that many parties are involved. Sales owns the CRM, marketing might own the consumer-facing web-sites and apps, while the Information Security or a…

Webcast

Kim Cameron - Cloud Based Customer Identity for Enterprises

Potential advantages of cloud services over on-premise solutions, like cost savings and higher resilience, are even more significant when it comes to large scale use cases like managing your customers´ identities. In this talk, Kim Cameron guides you…

Webcast

John Tolbert - CIAM Solutions Market Overview

Results from a recenty published KuppingerCole Leadership Compass on Consumer Identity and Access Management Platforms

Advisory Note

Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect,…

Advisory Note

Advisory Note: KYC as an Enabler in the Financial Services Business Transformation - 72523

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change.  FSIs need to transform their business models to respond to today’s challenges and to position the business with the flexibility required to adapt to opportunities as the…

Webinar

Dec 15, 2016: Identity Assurance - the Art of Knowing Your Customers

To conduct online business, users need to be able to identify themselves remotely and reliably. In most cases, however, it is not sufficient for the user to simply assert "I am who I say I am - believe me." When doing digital business, you will never meet your customers face-to-face, and…

Webcast

Cloud-Risiken jederzeit rundum mit zentralen Dashboards kontrollieren

Ein neuer Service vereint Web, Email und Cloud Application Control auf einer Sicherheitsplattform. Dies ermöglicht Organisationen Sicherheitsmaßnahmen flexibel umzusetzen und die Nutzung von Web-, Email- und Cloudanwendungen von einem einzigen Management-Dashboard aus zu…

Blog

Comment: Know and Serve Your Customer

‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’ processes to ensure that all bank accounts could be traced back to the entities that owned them.…

Blog

KYC is a must, not only for compliance reasons, but what about KYE?

Providing a corporate IT infrastructure is a strategic challenge. Delivering all services needed and fulfilling all requirements raised by all stakeholders for sure is one side of the medal. Understanding which services customers and all users in general are using and what they are doing…

Webinar

Oct 21, 2016: Cloud-Risiken jederzeit rundum mit zentralen Dashboards kontrollieren

Organisationen weltweit stehen vor den gleichen Sicherheitsherausforderungen. Sie müssen Mitarbeitern ermöglichen, mit einer Vielzahl von Endgeräten über die Cloud auf Dienste zuzugreifen, um auch außerhalb der Unternehmensmauern überall und jederzeit produktiv ihren Aufgaben nachgehen zu…

Blog

Blockchains go mainstream – IBM and Crédit Mutuel Arkéa blockchain implementation for KYC

IBM and the French Crédit Mutuel Arkéa recently launched the completion of a blockchain project that helps the bank verifying customer identities and remain compliant with KYC (Know Your Customer) requirements. In contrast to common, transaction-focused use cases for…

Blog

Managing the customer journey

Every one of us, whether a security professional or not, is also a part-time online customer or a subscriber of digital services. Providing personal information to a service organisation, to a social media platform or a retailer is a deliberate act. This will be even more the case with the…

Blog

Know and Serve Your Customer: Why KYC is not enough

Know and Serve Your Customer: Why KYC is not enough Today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s more flexible than ever before. Knowing and, based on that knowledge, optimally serving the customer is key to…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Executive View

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Webcast

Transforming Governance, Security and Compliance

The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central…

Webcast

Jason Rose - Balancing Personalization and Trust in the Age of the Customer

In this session, find out how customer-obsessed businesses are increasing their audiences and creating trusted, customized experiences across devices and platforms in exchange for first-party data. We provide case studies of how leading brands are leveraging customer identity and access…

Executive View

Executive View: SAP Enterprise Threat Detection - 71181

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to…

Webcast

Customer-centric Identity Management

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk…

Webinar

Apr 26, 2016: EIC 2016 Webinar about Customer-Centric Identity Management

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Webcast

Whitelisting und darüber hinaus

KuppingerCole Webinar recording

Webinar

May 24, 2016: Transforming Governance, Security and Compliance

The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central…

Webinar

Mar 15, 2016: Whitelisting und darüber hinaus

Nicht Server und Cloud, sondern die Arbeitsplatzrechner von Unternehmensmitarbeitern stellen die große Masse der Unternehmens-IT dar. Damit steht jeder Arbeitsplatzrechner im Fokus potentieller Angreifer und muss nachhaltig vor einer Vielzahl von internen wie externen Angriffen und…

Executive View

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise…

Leadership Brief

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Cross-Border Verification with LIGHTest

Cross-Border Verification with LIGHTest

LIGHTest leverages on existing infrastructures to verify electronic transactions. This ability is especially useful for transactions that are not created in the same trust scheme or country as the entity validating the transaction. This is mainly because creating new infrastructure takes time, money and possibly other unforeseen costs. This post shows an example of how to use LIGHTest in practice. Let us assume there are two businesses that are working together for the first time, one from [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00