Identity Management

Webcast

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Kuppinger Cole Webinar recording

Webcast

XACML: The Holy Grail of Access Governance?

Kuppinger Cole Webinar Recording

Webcast

5 Golden Rules for Efficiently Implementing Access Governance

Kuppinger Cole Webinar Recording

Webcast

Getting the Big Picture: How Access Governance fits into IT Governance and Risk Management

Kuppinger Cole Webinar Recording

Webcast

The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

Kuppinger Cole Webinar Recording

Webinar

Dec 08, 2009: 5 Golden Rules for Efficiently Implementing Access Governance

How to do Access Governance right? Which are the key success factors you have to focus on for as well quick-wins as long-term success? This session explains how to solve the access governance needs best.

Webinar

Dec 09, 2009: XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed…

Webinar

Dec 08, 2009: Getting the Big Picture: How Access Governance fits into IT Governance and Risk Management

Access Governance is a key element in every strategy for information and system security as well as IT Governance. However, there are many different approaches from system-level access control management tools for ERP systems with some SoD support up to “Enterprise GRC” solutions which focus…

Webinar

Dec 08, 2009: The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management

Access Governance is commonly associated with “recertification” or “attestation” as approaches for a recurring review of existing access controls by the responsible managers in IT and business. But knowing the problems isn’t sufficient – enforcing changes and implementing continuous…

Webinar

Dec 10, 2009: Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

Webcast

The Role of Entitlement Management in Governance, Risk and Compliance Management

Kuppinger Cole Webinar recording

Webcast

Sicherheit mit automatisiertem Provisioning

Kuppinger Cole Webinar recording

Webinar

Oct 13, 2009: The Role of Entitlement Management in Governance, Risk and Compliance Management

Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive,…

Webinar

Oct 09, 2009: Sicherheit mit automatisiertem Provisioning

Nicht nur in grossen Unternehmen ist die Benutzerverwaltung durch ständige Änderungen und Ergänzungen eine ressourcenzehrende Herausforderung. Auch wenn die Prozesse für die Provisionierung von Benutzerkonten in den unterschiedlichen Anwendungen sauber definiert sind - manuelles Arbeiten…

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for Privileged Account Management (PAM). That’s interesting. I’ve blogged some time ago about the…

Blog

Is PAM (or PIM or PUM) moving into Provisioning?

These days I have been talking with Siemens on enhancements for their DirX Identity product, a provisioning tool (and, by the way, a pretty good one). Amongst the new features is some support for Privileged Account Management (PAM). That's interesting. I've blogged some time ago about the…

Blog

Virtual Directory Innovations

As someone actively covering directory services and virtual directories, several innovations have caught my attention. The players within the virtual directory space are (in alphabetical order) Optimal IDM, Oracle, SAP, Radiant Logic, Red Hat, and Symlabs. When it comes to product…

Blog

Hooray, LDAPcon 2009 is coming up!

I was delighted when I saw that LDAPcon is happening again this year. I went to the first event in Cologne, Germany 2007, and was very impressed. When you have the "creme de la creme" from the LDAP community talking about their favourite topic, you're guaranteed an interesting and…

Product Report

Produktbericht: Radiant Logic Virtual Directory Server

Mit dem Release 5.0 des Virtual Directory Server hat Radiant Logic seine Produktlinie in die VDS Proxy Edition und die VDS Context Edition aufgespaltet, um den spezifischen Anforderungen der Verzeichnisvirtualisierung besser entsprechen zu können. Viele der Anforderungen an Virtual…

Blog

Innovations in the world of LDAP

I've recently been to Sun's directory labs in the the beautiful city of Grenoble, France to talk about what Sun has in store with their two directory servers: DSEE and OpenDS. I've used many predecessors of DSEE (starting with the good old Netscape Directory Server) on several projects over…

Blog

Is there a bright future for directory services?

Last week I've been talking with Andrew Ferguson and Steven Legg of eB2Bcom. Probably you've never heard of them, at least as long as you are neither from the APAC region nor working in the government and defense business where they have most of their customers outside the APAC region.…

Product Report

Product Report: Radiant Logic Virtual Directory Server

With release 5.0 of Virtual Directory Server, Radiant Logic has split up its product line into VDS proxy edition and VDS context edition to cater better to the specific demands for directory virtualisation. Many virtual directory requirements arise out of specific deployment problems that…

Blog

Identity as a Service

Some days ago, I had a very interesting discussion with John de Santis and some of his colleagues from TriCipher, one of the vendors which provide IaaS (Identity as a Service) solutions, in that case particularly with their MyOneLogin service. That discussion is one in a row of others I had…

Webcast

Entitlement Management - Business and Technical Perspectives

Kuppinger Cole Webinar recording

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00