Identity Management

Blog

EU Privacy Direction

Last week I had the privilege of attending a seminar at which Peter Hustinx, the EU Privacy Commissioner outlined the future approach on personal data protection in the European Union.   This approach includes “a right to be forgotten” as well as mandatory data breach reporting.   Given…

Webcast

Kontextbasierte Authentifizierung im Active Directory Umfeld

Kuppinger Cole Webinar recording

Webinar

Nov 26, 2010: Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen…

Blog

Security questions for authentication - a ticking privacy time bomb?

We all are familiar with external (and sometimes also internal) websites which require us to pick or define security questions and to provide answer to these questions. What is your mother's maiden name? Which is your favourite sports team? Which is the color you like most? And so on...…

Webcast

Machen Sie mehr aus dem Active Directory - Identity-Dienste für die heterogene IT

Kuppinger Cole Webinar recording

Webinar

Sep 29, 2010: Machen Sie mehr aus dem Active Directory - Identity-Dienste für die heterogene IT

Die meisten Unternehmen verfügen über eine zentrale Active Directory-Infrastruktur. Deshalb spricht viel dafür, darauf aufzubauen, um beispielsweise auch andere Systemumgebungen zu verwalten. So kann man bei geringem Integrationsaufwand noch mehr aus der ohnehin vorhandenen Infrastruktur…

Blog

Do we still have to care about directory services?

It became pretty quiet around directory services during the last years. When I remember the discussions back some 10, 15 or 20 years around NDS versus LAN Manager (and the underlying domain approach) or Active Directory when it came to market, and even the discussions which came up in the…

Webcast

How to Keep Entitlement Management Lean - in any Environment

Kuppinger Cole Webinar recording

Webinar

Jun 29, 2010: How to Keep Entitlement Management Lean - in any Environment

How to gain more flexibility and efficiency in an environment where requirements change very fast, and where users and services cannot be classified any more as easy as being "internal" or "external". This Webinar is about key decision criteria for lean entitlement management and…

Blog

Beyond LDAP - have a look at system.identity

LDAP (Lightweight Directory Access Protocol) is well established. It is the foundation for today's Directory Services, which support LDAP as a protocol and which usually build their data structure on the associated LDAP schema. There are many interfaces for developers to use LDAP, from the…

Webcast

Integrating Physical Access Control into Active Directory at King ICT, Croatia

Best practices session at the European Identity Conference 2010 by Adrian Castillo, HID Global and Kristian Koljatic and Nino Talian, KING ICT d.o.o.

Webcast

German National ID – Privacy by Design

Best practices session at the European Identity Conference 2010 by Andreas Reisen, Federal Ministry of the Interior, Germany

Webcast

From Creative Chaos to Modern Service Provisioning

Best practices session at the European Identity Conference 2010 by Dr. Nicola Stein, German Aerospace Center

Webcast

Business Oriented Entitlement Life-Cycle Management

Best practices session at the European Identity Conference 2010 by Henrik Siiskonen, If P&C Insurance Company Ltd and Pekka Hagström, RM5 Software

Webcast

Next-Generation Provisioning: A Governance-based Approach

Keynote at the European Identity Conference 2010 by Darran Rolls, Chief Technology Officer, Sailpoint

Product Report

Product Report: Aveksa Enterprise Access Governance Platform

The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without…

Webcast

One Entitlement Management For All - How to Manage All Users, Services, and Service Providers

Kuppinger Cole Webinar recording

Webinar

Apr 21, 2010: One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently

As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications.

Webcast

Access Governance: Implement Processes, Reduce Business Risks

Kuppinger Cole Webinar recording

Advisory Note

Technology Report: Access Governance Architectures

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions,…

Webinar

Apr 15, 2010: Access Governance: Implement Processes, Reduce Business Risks

As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while…

Blog

Why IPv6 might benefit from European and German privacy regulations

Yesterday, the German Federal Constitutional Court declared the German law on "Vorratsdatenspeicherung" for illegal. That wasn't a real surprise, given that this is overall well aligned to other decisions of the Federal Constitutional Court. Two interesting annotations: There where some…

Blog

Microsoft releases its privacy-enabling U-Prove technology

Microsoft has just announced the availability of U-Prove - an innovative privacy-enabling technology that it acquired almost exactly two years ago. This is a significant announcement, because of two reasons: first of all, the technology is in our opinion a gigantic enabler for many…

Webcast

Provisioning and Access Governance Trends

Kuppinger Cole Webinar recording

Webinar

Feb 09, 2010: Provisioning and Access Governance Trends

Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00