Access Management

Webcast

Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Leadership Compass

Leadership Compass: Privilege Management - 71100

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management…

Webinar

Jan 28, 2016: Identitätsmanagement im Mittelpunkt der digitalen Transformation

Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich…

Webinar

Jan 19, 2016: How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged…

Webcast

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to…

Webcast

Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Leadership Brief

Leadership Brief: Privileged Account Management Considerations - 72016

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

Webinar

Jan 12, 2016: Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company.…

Executive View

Executive View: WSO2 App Manager - 71296

WSO2 App Manager is an Open Source solution for unified management of enterprise applications providing identity and access management, as well as complete lifecycle governance for mobile and web apps.

Webcast

Intelligente Protokollierung von Aktivitäten

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten…

Webcast

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Webinar

Dec 15, 2015: Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats

Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.

Executive View

Executive View: AWS Directory Service and Identity and Access Management - 71450

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

Webinar

Nov 12, 2015: Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected…

Webcast

Universal SSO: Strategies & Standards for Single Sign-On Across Web and Native Applications

Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall…

Blog

Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses

With its recent announcement of Microsoft Azure Active Directory B2B (Business-to-Business) and B2C (Business-to-Customer/consumer/client), which are in Public Preview now, Microsoft has extended the capabilities of Azure AD (Active Directory). Detailed information is available in the Active…

Executive View

Executive View: Evidian Identity & Access Manager - 70871

Evidian Identity & Access Manager is an integrated solution for Identity Provisioning and Access Governance. It provides strong capabilities in these areas and excellent integration into the Evidian products such as Enterprise Single Sign-On.

Executive View

Executive View: VMware Identity Manager - 71454

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications.

Webcast

7 Common Symptoms of IAM & IAG Diseases

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webinar

Nov 17, 2015: The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to…

Executive View

Executive View: BalaBit Blindspotter - 71202

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

Webcast

Effiziente Administration von Benutzerberechtigungen - Wenn Rollenvergaben alleine nicht ausreichen

Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig…

Webcast

Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Webinar

Oct 27, 2015: Intelligente Protokollierung von Aktivitäten

Einen Einblick in die Administration von kritischen Systemen zu haben ist notwendig, um die Einhaltung von Vorschriften kontrollieren und den Schutz des Systems, als Kernstück des Unternehmens, sicherstellen zu können. Durch die Protokollierung und Analyse der Aktivitäten von privilegierten…

Webcast

From Static Roles to Dynamic Attribute-Based Authorisation

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than…

Blog

Adaptive Policy-based Access Management (APAM)

Attribute-based Access Control (ABAC ) has been with us for many years; it embodies a wide range of systems that control access to protected resources based on attributes of the requesting party. As the field has developed there are three characteristics that are most desirable in an ABAC…

Executive View

Executive View: Axiomatics – Beyond Database Security - 71270

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

Leadership Brief

Leadership Brief: Prevent, Detect, Respond: the Changing Face of IAM - 71305

As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.

Leadership Brief

Leadership Brief: How to Justify your IAM Investments - 71410

IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   

Advisory Note

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Webinar

Oct 22, 2015: One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Executive View

Executive View: BalaBit syslog-ng - 71201

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

Webinar

Oct 08, 2015: 7 common symptoms of IAM & IAG diseases - the causes and how to heal them

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Executive View

Executive View: Unify Identity Broker V5.0 - 71300

In today’s environment, with so many demands on identity information, an advanced identity provider service is required that can integrate disparate technology and bridge mature identity management environments to the new requirements of Cloud services, mobile device management and…

Advisory Note

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Webinar

Sep 15, 2015: Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Webinar

Oct 15, 2015: Universal SSO: Strategies & Standards for Single Sign-on Across Web and Native Applications

Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall…

Webinar

Sep 17, 2015: Effiziente Administration von Benutzerberechtigungen - Wenn Rollenvergaben alleine nicht ausreichen

Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig…

Webcast

Controlling and Monitoring Administrative Access to Enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Webcast

Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Webcast

How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Webcast

Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Webcast

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Executive View

Executive View: Axiomatics Policy Management Suite - 70895

An enterprise-grade policy administration tool for managing access control policies in the Axiomatics product suite.

Executive View

Executive View: Oracle Privileged Account Manager - 71057

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Executive View

Executive View: ObserveIT User Activity Monitoring - 71258

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von…

Webinar

Sep 08, 2015: From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure compliance

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than…

Webinar

Jun 17, 2015: How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Webcast

Bedrohungen für privilegierte Zugänge erkennen und abwenden

Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um…

Webcast

The Future of Federation

Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.

Leadership Brief

Leadership Brief: Facing the Future: Identity Opportunities for Telcos - 71287

Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising…

Webcast

Louis-Marie Fouchard - Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM

Identity and Access Management is one of the core building blocks to address IT/OT challenges. The specific situation of OT solutions and critical infrastructures, however, entails a set of functional and non-functional requirements which cannot be fulfilled by off-the-shelf IAM products…

Webcast

Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems

In the last years we see that privileged accounts in Operational Technology (OT) environments (e.g. critical infrastructure) have an even higher importance and criticality than in the traditional IT. OT networks and the Internet of Things (IoT) implementations are taking shape and are being…

Webcast

Nick Tuffs - The Good, the Bad and the Ugly of IAM: An Enterprise View

Vodafone’s Workforce Identity and Access Management (WIAM) platform treads the line between Security - being a guardian of the Vodafone brand – and a Business Enabler – providing an agile, cost-effective, simple method of allowing 350,000 users to access IS and telecom…

Webcast

Ravi Srinivasan - Digital Identities = Security Threats. Is your IAM Program Ready?

Digital Identities are transforming the way companies architect their IT environment. They adapt and optimize by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering…

Webinar

Jun 16, 2015: Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Executive View

Executive View: GlobalSign - 71051

GlobalSign, one of the world’s biggest certificate authorities, and a leading provider of identity services, recently acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management (IAM) solutions. Ubisecure’s leading…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Executive View

Executive View: Identity Automation RapidIdentity - 71203

Identity Automation’s RapidIdentity is a streamlined solution covering key functions of Identity and Access Management & Governance in an integrated offering. A particular strength is the strong out-of-the-box support for common requirements in that area.

Executive View

Executive View: ObserveIT User Activity Monitoring - 71258

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

Webinar

Jun 23, 2015: Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access…

Executive View

Executive View: iWelcome Identity & Access Management as a Service - 71205

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

Executive View

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

Webinar

May 19, 2015: The Future of Federation

Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.

Webcast

Lean, Intelligent IAM Processes for the ABC - Agile, Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Webinar

Jun 02, 2015: Ground Control to Major CRO: Is Identity Governance a risky experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Executive View

Executive View: Avencis SSOX - 71065

Avencis SSOX is an Enterprise Single Sign-On solution with a focus on flexible strong authentication and mobile device support. Combined with Avencis’ own IAM platform, it provides a foundation for a long-term Identity and Access Management strategy for any organization.

Webcast

External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Webinar

Jun 25, 2015: Controlling and monitoring administrative access to enterprise IT

Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.

Blog

Redesigning access controls for IAM deployments?

A few weeks ago I read an article in Network World, entitled “A common theme in identity and access management failure: lack of Active Directory optimization”. Essentially, it is about the fact that Microsoft Active Directory (AD) commonly needs some redesign when starting an IAM…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® est une solution de gestion d'authentification et d'accès intégrée fortement axée sur le secteur de la santé. Elle offre un accès rapide et sécurisé aux postes de travail, aux bureaux virtuels et aux…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® ist eine integrierte Authentifizierungs- und Zugriffsmanagementlösung mit einem klaren Fokus auf das Gesundheitswesen. Sie bietet schnellen und sicheren Zugriff auf Workstations, Virtual Desktops und Anwendungen, indem sie die Vorteile der starken…

Webcast

Monitor Your Cloud Administrators and Managed Service Operators – Avoid Privilege Abuse and Fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged…

Webinar

May 19, 2015: Bedrohungen für privilegierte Zugänge erkennen und abwenden

Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um…

Advisory Note

Advisory Note: Top Cyber Threats - 71032

Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand…

Executive View

Executive View: Imprivata OneSign - 70915

Imprivata OneSign® is an integrated authentication and access management solution with a strong focus on the healthcare industry. It provides fast and secure access to workstations, virtual desktops and applications by combining strong authentication with enterprise single sign-on.

Executive View

Executive View: Wallix AdminBastion - 71266

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing…

Executive View

Executive View: CA Privileged Identity Manager - 71059

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

Webcast

Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Webinar

Apr 21, 2015: External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

Webinar

Apr 23, 2015: Lean, Intelligent IAM processes for the ABC - Agile Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Advisory Note

Advisory Note: ABAC done right - 71134

There is an increasing number of documents purporting to advise on how to migrate to an Attribute-Based Access Control environment. The real requirement is for Adaptive Policy-based Access Management. Here are some tips...

Webcast

Managing the Password Chaos

More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.

Executive View

Executive View: ARCOS Privileged Identity Management Suite - 71028

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products…

Blog

Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization

It’s not RBAC vs. ABAC – it’s APAM. Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access Control), Dynamic Authorization Management (DAM) and standards such as XACML. Other terms such as RiskBAC…

Webinar

Apr 14, 2015: Monitor your cloud administrators and managed service operators – avoid privilege abuse and fraud

Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged…

Seminar

Mar 02, 2015: Executive Luncheon & Seminar: A "Krash" course on Identity & Access Management

This Executive Luncheon & Afternoon seminar will provide an overall view on Identity & Access Management and Identity & Access Governance IAM/IAG and the various subtopics to allow you to - define your own "big picture" for your future IAM infrastructure.

Advisory Note

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and…

Executive View

Executive View: NetIQ Access Manager - 71054

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid…

Executive View

Executive View: i-Sprint AccessMatrix Universal Sign-On - 71064

i-Sprint Innovations is a vendor of Identity, Credentials and Access Management solutions based in Singapore. Established in 2000, i-Sprint is focusing on providing solutions for financial industry and other high security environments. Since 2011, the company is a wholly owned subsidiary of…

Webcast

Mastering the Digitalization of Business: Digital Identities and the Cloud

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their…

Executive View

Executive View: BalaBit Shell Control Box - 71123

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in…

Webinar

Mar 10, 2015: Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Webinar

Feb 12, 2015: Managing the Password Chaos

More than 10 years ago, Bill Gates predicted the death of the password. A decade later, reality shows that passwords are still the most common authentication method. Security and costs of passwords are critical factors for enterprises and organizations.

Executive View

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

There are three major trends driving the adoption of Gateway solutions: Proliferation of inter-connected devices, The need for “bring-your-own-device” (BYOD) support and Migration to Cloud services. The economic imperative to move our databases and applications to the Cloud is…

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Leading IDaaS Supplier OneLogin Aiming for the Top

OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management, but is aiming to move even further up the ranks. In a media and analyst briefing, OneLogin representatives talked through key and recent product features and capabilities in an ongoing effort improve the completeness of products. Innovation is a key capability in IT market segments, and unsurprisingly this [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00