Access Management

Executive View

Snapshot: Ilex Meibo and Meibo People Pack – IAM for the “big and not so big ones” - 70356

Ilex is a French company founded back in 1989. The company, which started with security consulting services, has been offering IAM products for many years, focusing mainly on France and other French speaking countries, but now expanding to other regions. Ilex offers, besides a solution for…

Blog

SAML, SCIM - and what about authorization?

Cloud Computing is just another delivery model for IT services. However, due to the specifics of cloud services like multi-tenancy and many others, requirements sometimes are even higher than for on-premise services. One of these requirements in well-architected IT environments and for…

Webcast

Solving the Million Record Challenge with XACML

KuppingerCole Webinar recording

Webinar

Nov 10, 2011: Solving the Million Record Challenge with XACML

This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.

Webcast

XACML Made Easy: Modeling High Level Policies in XACML

KuppingerCole Webinar recording

Blog

Understanding Identity and Access Management

In the second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation “IAM”, along with…

Advisory Note

Scenario: Understanding Identity and Access Management - 70129

In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation…

Webcast

Thriving in Change - Using Federation and the Cloud to Minimize IT Costs

KuppingerCole Webinar recording

Webcast

Why Managing Privileged Users Benefits your Business

KuppingerCole Webinar recording

Webinar

Oct 06, 2011: XACML Made Easy: Modeling High Level Policies in XACML

In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens…

Webinar

Sep 28, 2011: Thriving in Change - Using Federation and the Cloud to Minimize IT Costs

Overcoming the inherent security and identity management challenges is key to a successful move into the cloud. In this webinar, KuppingerCole's Senior Analyst, Sebastian Rohr, will give suggestions for successful adoption of cloud computing that overcome the inherent security and identity…

Webinar

Sep 27, 2011: Why Managing Privileged Users Benefits your Business

In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management…

Blog

Moving forward in IAM at your own pace

During the last years, there has been a lot of change in the Identity Provisioning market. Sun became part of Oracle, Novell is now NetIQ, BMC Control-SA is now at SailPoint, Völcker has been acquired by Quest, Siemens DirX ended up at Atos. These changes as well as other influencing factors…

Blog

Critical success factors for IAM projects

This is sort of a "back to the roots" post, but for some good reason. I've done several advisories and customer calls recently, and in some of them it became obviuos that companies tend to miss some of the critical success factors for IAM (Identity and Access Management). Some of the…

Advisory Note

Advisory Note: IAM and GRC Market Evolution 2011/2012 - 70180

IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market…

Congress

Apr 17 - 20, 2012: European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Advisory Note

Advisory Note: IAM and GRC Market - the Evolution in 2011/2012 - 70180

IAM and GRC are two of today's most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market…

Webcast

Business-Centric, Cloud-Aware Identity and Access Management

Kuppinger Cole Webinar recording

Webcast

Access Management: Simplify Access to Web- and Cloud-based Applications without Compromising Security

Kuppinger Cole Webinar recording

Webinar

Apr 14, 2011: Business-Centric, Cloud-Aware Identity and Access Management

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce you into the key elements of a future-proof and cloud-ready Identity and Access Management strategy and how to deal with hybrid cloud environments. Following Martin, Ralf Knöringer and Rudolf Wildgruber from…

Webcast

Externalize Authorization - XACML and Beyond

Kuppinger Cole Webinar recording

Webinar

Mar 31, 2011: Access Management: Simplify Access to Web- and Cloud-based Applications without Compromising Security

The role of web access management has changed and nowadays serves as a central layer of protection for many different services, enabling federations and allowing versatility for users. Join us in this webinar to learn, how to transform your traditional web access management into such a…

Blog

SAP focuses on SAML and SAP NW IdM instead of CUA

These days I've met with some of the executives of SAP to talk about their roadmap. Overall, SAP is moving forward with its Identity and Access Management products. e.g. SAP NetWeaver Identity Management (NW IDM). And the integration of the recently acquired SECUDE products and technology…

Blog

Quest further extends its IAM portfolio – e-DMZ adds PxM capabilities

Quest today announced that they will acquire e-DMZ Security, a PxM (Privileged Access, Account, Identity, User Management) vendor. That comes to no surprise given that PxM has been one of the last (relatively) white spots at the IAM map of Quest Software. Quest is further completing its…

Blog

From technology to business - the shift in Identity and Access Management

Being involved in a lot of advisory projects at end user organizations for some years now, I'd like to share some of the fundamental changes I observe. There is always a gap between what analysts like us, KuppingerCole, predict and what is done in reality. Thus it is always great to observe…

Webinar

Mar 03, 2011: Externalize Authorization - XACML and Beyond

Externalizing and centralizing authorization from applications has recently gained momentum, as related standards like XACML have matured and experiences shared by early adopters have been positive. Obviously, potential benefits from a standardized method for authorization are tremendous.…

Product Report

Product Report: Cyber-Ark Privileged Identity Management Suite (PIM) - 70257

Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00