Access Management

Executive View

Snapshot: Oracle Mobile and Social Access Management - 70724

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding…

Webcast

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

KuppingerCole Webinar recording

Product Report

Product Report: Oracle ESSO - 70581

With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase. KuppingerCole offers a model designed to help IT organizations manage this dichotomy by changing the…

Webcast

Reach the Next Maturity Level in your IAM Deployment - Beyond Classical Provisioning

KuppingerCole Webinar recording

Webinar

Dec 04, 2012: Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

Webinar

Nov 29, 2012: Reach the Next Maturity Level in your IAM Deployment – Beyond Classical Provisioning

Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest…

Webcast

Best Practices for Business-Driven Identity & Access Management

KuppingerCole Webinar recording

Webinar

Nov 06, 2012: Best Practices for Business-Driven Identity & Access Management

Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access…

Blog

SAML is Dead! Long Live SAML!

Answers to the unanswered questions from the webinar Introduction Last Friday on Sept. 14, Pamela Dingle—Sr. Technical Architect from Ping Identity Corp.—and I conducted a free webinar about the much ballyhooed demise of SAML. You can view the webinar in its entirety on the KuppingerCole…

Webcast

SAML is Dead. Long Live SAML!

KuppingerCole Webinar recording

Webinar

Sep 14, 2012: SAML is dead. Long Live SAML!

Is SAML a dead protocol or just a walking Zombie ready to consume all enterprise brains? Or is it yet alive and well both in legacy and the future? Attend this webinar to join the discussion KuppingerCole´s Distinguished Analyst Craig Burton about health and well being of the Federated…

Blog

Open Source IAM – is it right for you?

Open Source projects usually get short shrift from pundits and journalists. Open source Identity projects get even less shrift. (“Shrift”, by the way, has an interesting etymology, at least to those who wonder about where the words we use come from). Commercial vendors have whole staffs of…

Webcast

XACML and the Externalization of Authorization: How to do it Right

KuppingerCole Webinar recording

Executive View

Snapshot: SAML Vulnerabilities - 70723

On August 10th, 2012, the University of Bochum (German Ruhr-Universität Bochum) published a research paper titled On breaking SAML: Be whoever you want to be . In that paper the authors provide an analysis of potential security weaknesses in SAML. They analyzed 11 out of 14 major SAML…

Executive View

Snapshot: OAuth 2.0 - 70725

Recently Eran Hammer, one of the – until then – co-authors and editors of the OAuth 2.0 standard which is currently finalized by an IETF (Internet Engineering Task Force) working group, declared that he will withdraw his name from the specification of OAuth 2.0. He posted about…

Webcast

Intelligent Access Management - Vorsprung vor dem Auditor

KuppingerCole Webinar recording

Blog

User views on Privilege Management

Last December (“Quo Vadis?”) I advocated using Privilege Management solutions for all users. As Martin Kuppinger defined it in his advisory note last April: “Privilege Management, which in the KuppingerCole nomenclature is called PxM, is the term used for technologies which help to audit…

Survey

Survey Report: Identity Access Management und Governance in der Finanzindustrie - 70584

Studie zum aktuellen Status der Umsetzung von Identity und Access Management sowie Identity und Access Governance in der Finanzindustrie in Deutschland und der Schweiz. Studie beauftragt von Beta Systems. Studie durchgeführt von KuppingerCole.

Webinar

Jul 03, 2012: Intelligent Access Management – Vorsprung vor dem Auditor

Nie war es wichtiger als heute, genau darüber Bescheid zu wissen, wer wozu berechtigt ist und wer was getan hat. In diesem Webinar geht es um das intelligente Management von Zugriffsrechten. Um Risiken zu reduzieren, Compliance sicherzustellen und um den Anwendern selbst die Möglichkeit zu…

Training

Aug 14, 2012: XACML and the Externalization of Authorization: How to do it Right

This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in…

Webcast

EIC 2012 Session: Exchanging Metadata through Different Federations on a Global Scale

Nicole Harris, Head of Identity Management, JISC Advance April 19, 2012 15:40

Webcast

EIC 2012 Session: Federation or Synchronization – the Future of the Cloud

Andrew Nash, Google Darran Rolls, SailPoint Travis Spencer, Ping Identity April 19, 2012 15:20

Webcast

EIC 2012 Session: What Federation is About – in Theory and in Practice

Dave Kearns, KuppingerCole April 19, 2012 15:00

Webcast

EIC 2012 Session: Security for Virtualized Environments, Privileged Users and PCI Compliance

Guy Balzam, CA Technologies Stephan Bohnengel, VMware Giovanni Ciminari, Telecom Italia April 19, 2012 14:30

Webcast

EIC 2012 Session: Identity & Access Management as a Key Element for a Value focused Security Strategy

Ralf Knöringer, Atos IT Solutions and Services GmbH Hassan Maad, Evidian Shirief Nosseir, CA Technologies Christian Patrascu, Oracle Peter Weierich, iC Consult GmbH April 18, 2012 17:00

Webcast

EIC 2012 Session: How to successfully get business to participate in IAM and Access Governance

Dr. Martin Kuhlmann, Omada Edwin van der Wal, Everett April 18, 2012 15:30

Webcast

EIC 2012 Session: Munich Re’s Identity & Access Management - Experience Report and Best Practices

Wolfgang Zwerch, MunichRe April 18, 2012 14:30

Webcast

EIC 2012 Session: IAM Governance in the New Commerzbank

Dirk Venzke, Director, Commerzbank AG April 18, 2012 14:00

Blog

Dynamic Authorization Management Best Practices

Due to a last minute speaker change I had to prepare a short presentation on „Dynamic Authorization Management – Best Practices from our Advisory“ for EIC 2012. When we found a replacement for the speaker, I didn’t give that presentation. However I will do a webinar on that soon and I want…

Advisory Note

Business Report: Key Risk/Performance Indicators IAM and GRC - 70204

The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to…

Webcast

EIC 2012 Keynote: How do Today’s Technology Challenges make Real IAM Possible?

Jonathan Sander, Director of IAM Business Development, Quest Software April 17, 2012 17:50

Webcast

EIC 2012 Keynote: Ripped from the Headlines – The ‘Privileged’ Connection – Solved!

Roy Adar, Vice President of Product Management, Cyber-Ark April 17, 2012 16:30

Blog

The Identity Explosion – one reason to re-engineer not only our IAM

During my Opening Keynote at this year’s EIC (European Identity & Cloud Conference, www.id-conf.com), when talking about the Top Trends in IAM, Mobile Security, GRC, and Cloud Computing I used the term “Identity Explosion” to describe the trend that organizations will continue (or start)…

Executive View

Advisory Note: European Identity Award 2012: OpenID Connect - 70706

Best New Standard 2012 in Category „Best Innovation/New Standard in Information Security”: Providing the Consumerization of SAML. Driving the adoption of federation and making this much simpler.

Advisory Note

Best Practice: European Identity Award 2012: Sanofi S.A. - 70704

Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications.

Advisory Note

Best Practice: European Identity Award 2012: Europol - 70703

Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including…

Advisory Note

Best Practice: European Identity Award 2012: Siemens AG - 70701

Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment.

Advisory Note

Advisory Note: IAM and GRC Market – the Evolution in 2012/2013 - 70580

IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to…

Advisory Note

Advisory Note: Privilege Management - 70177

Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have…

Webcast

Identity & Access Management in the Cloud: Real or a Mirage?

KupingerCole Webinar recording

Webcast

Conducting an Orchestra - The New Role of IAM

KuppingerCole Webinar recording

Webcast

Returning (or finally bringing?) Identity and Access Management (IAM) to the User

KuppingerCole Webinar recording

Webinar

Mar 22, 2012: Conducting an Orchestra – The New Role of IAM

With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security…

Webcast

Best Practice Driven Identity & Access Management

KuppingerCole Webinar Recording

Webinar

Mar 29, 2012: Identity & Access Management in the Cloud: Real or a Mirage?

Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.

Blog

IAM legacies – bad for your business

It’s been almost 15 years since Business Layers and Oblix ushered in the new age of Identity and Access Management Systems (IAM systems) with what I called at the time the “killer app” for Directory Services – electronic provisioning. Even more incredible is that it’s almost 20 years since I…

Webinar

Mar 21, 2012: Returning (or finally bringing?) Identity and Access Management (IAM) to the User

IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.

Webinar

Feb 21, 2012: Best Practice Driven Identity & Access Management

Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on…

Executive View

Snapshot: ClusterSeven Enterprise Spreadsheet Manager - 70852

ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Passwordless for the Masses

Passwordless for the Masses

What an interesting coincidence: I’m writing this just after finishing a webinar where we talked about the latest trends in strong authentication and the ways to eliminate passwords within an enterprise. Well, this could not have been a better time for the latest announcement from Microsoft, introducing Azure Active Directory support for passwordless sign-in using FIDO2 authentication devices. Although most people agree that passwords are no longer an even remotely adequate [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00