Identity Management

Blog

Managing Privacy and Data Protection – moving from “optional” to “mandatory”

My colleague Jörg Resch just gave us a summary on the current status of new EU Privacy Regulation that is “in the works” in Brussels. If only a portion of this becomes “EU Law” – meaning that it will not be a Directive which needs to be translated into local national law but supersedes any…

Webcast

Access Governance: Identity Management aus dem Business für das Business

KuppingerCole Webinar recording

Blog

SAML, SCIM - and what about authorization?

Cloud Computing is just another delivery model for IT services. However, due to the specifics of cloud services like multi-tenancy and many others, requirements sometimes are even higher than for on-premise services. One of these requirements in well-architected IT environments and for…

Webcast

Why Access Governance Moves the Risk and Reward Balance in your Favour

KuppingerCole Webinar recording

Webinar

Nov 22, 2011: Access Governance: Identity Management aus dem Business für das Business

Verantwortung kann nicht delegiert werden. Es sind die Mitarbeiter der Fachabteilungen, die gegenüber Aufsichtsorganen, Prüfern und Justiz in der Verantwortung stehen und letztlich auch in die Haftung genommen werden. Alleine schon deshalb (aber natürlich auch, weil sie näher am Prozess sind…

Webinar

Nov 15, 2011: Why Access Governance Moves the Risk and Reward Balance in your Favour

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need…

Webcast

Integrating Access Governance and Entitlement Management

KuppingerCole Webinar recording

Advisory Note

Advisory Note: From Identity and Access Solutions to Access Governance - 70318

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations…

Webinar

Sep 22, 2011: Integrating Access Governance and Entitlement Management

Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For…

Blog

PAP – Privacy, Anonymity and Pseudonymity

Privacy and anonymity have been associated with the internet at least since Peter Steiner’s famous cartoon on page 61 of the July 5, 1993, issue of The New Yorker  which originated the meme “On the internet, nobody knows you’re a dog.” Yet today most people are no clearer about the…

Blog

SCIM - will SPML shortcomings be reinvented?

There is a new initiative driven by Google, salesforce.com, and Ping Identity called SCIM (Simple Cloud Identity Management). It claims to overcome the shortcomings of SPML (Simple Provisioning Markup Language), a standard being around for some 10 years. SPML has the target of being a…

Webcast

Overcoming Enterprise Entitlement Barriers by Externalizing Authorization

Kuppinger Cole Webinar recording

Webcast

Identity Management, Access Governance und Datenschutz: Sind Sie auf der sicheren Seite?

Kuppinger Cole Webinar recording

Webinar

Mar 24, 2011: Identity Management, Access Governance und Datenschutz: Sind Sie auf der sicheren Seite?

Datenschutz - ein notwendiges Übel? In zahlreichen Unternehmen ist dieses Thema auch heute in der Tat noch eine Randerscheinung, obwohl mit der gesteigerten öffentlichen Wahrnehmung und damit einher gehenden Sensibilisierung jeder bekannt werdende Verstoß zu einer fundamentalen Schädigung…

Webinar

Mar 29, 2011: Overcoming Enterprise Entitlement Barriers by Externalizing Authorization

Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In…

Blog

Access Governance Sets the Stage for Information Security and Compliance

Rights Management may not exactly be something new, but the rising demands from internal and external auditors are putting it back in center stage. Organizations are being forced to adopt systematic, open and replicable processes for creating, assigning, and monitoring rights within their…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00