Identity Management

Webinar

Jan 28, 2016: Identitätsmanagement im Mittelpunkt der digitalen Transformation

Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich…

Blog

Security and Privacy: An opportunity, not a threat

One of the lessons I have learned over the years is that it is far simpler “selling” things by focusing on the positive aspects, instead of just explaining that risk can be reduced. This is particularly true for Information Security. It also applies to privacy as a concept. A few…

Blog

Approaching the Internet of Things Security

As already discussed in one of our earlier newsletters, Internet of Things as a concept is by no means new – various smart devices capable of communicating with each other and their operators have been used in manufacturing, automotive industry, healthcare and even at home. These…

Executive View

Executive View: Knowledge Vault - 71412

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

Executive View

Executive View: WSO2 App Manager - 71296

WSO2 App Manager is an Open Source solution for unified management of enterprise applications providing identity and access management, as well as complete lifecycle governance for mobile and web apps.

Webcast

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Executive View

Executive View: AWS Directory Service and Identity and Access Management - 71450

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

Blog

Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses

With its recent announcement of Microsoft Azure Active Directory B2B (Business-to-Business) and B2C (Business-to-Customer/consumer/client), which are in Public Preview now, Microsoft has extended the capabilities of Azure AD (Active Directory). Detailed information is available in the Active…

Executive View

Executive View: VMware Identity Manager - 71454

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications.

Webcast

7 Common Symptoms of IAM & IAG Diseases

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webcast

Access Governance in a Cloudy Environment

Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.

Advisory Note

Advisory Note: Identity Information Quality - 70996

Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.

Webcast

Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Advisory Note

Advisory Note: Turning inattention into intention - 71501

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

Analysts' View

KuppingerCole Analysts' View on IAM 3.0/4.0

Identity Management and Access Management are on their way into the first line of defence when it comes to enterprise security. With changing architecture paradigms and with the identity of people, things and services being at the core of upcoming security concepts, maintaining identity and…

Blog

Different, better and compliant – Business-orientated Access Governance

Identity Management and Access Management are on their way into the first line of defence when it comes to enterprise security. With changing architecture paradigms and with the identity of people, things and services being at the core of upcoming security concepts, maintaining identity and…

Webinar

Oct 22, 2015: One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Analysts' View

KuppingerCole Analysts' View on Consumer Identities

When The Digital Transformation is a game changer for many traditional organisations and a business enabler for many new trading companies and service providers in the digital world. When dealing with consumers and customers directly the most important asset for any forward-thinking…

Webinar

Oct 08, 2015: 7 common symptoms of IAM & IAG diseases - the causes and how to heal them

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webinar

Sep 22, 2015: Access Governance in a Cloudy Environment

Organizations are increasingly using the new technologies of smart devices, cloud computing and social media to connect with their customers, improve service and reduce costs. To successfully exploit these new technologies organizations need to understand and manage the risks that these bring.

Webinar

Sep 15, 2015: Im Mittelpunkt steht das Kundenerlebnis: Consumer Focused Identity Management

In den letzten fünf Jahren haben sich die Bedürfnisse von Unternehmen, was den Zugriff auf kritische Anwendungen oder die Sicherheit von Kundenidentitäten betrifft, deutlich geändert. Zunehmend vernetzte Kunden, die auf neue Art und Weise über verschiedene Kanäle aktiv werden, lassen die…

Advisory Note

Best Practice: European Identity Award 2015: NORD/LB - 71401

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern…

Webcast

Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Analysts' View

KuppingerCole Analysts' View on User Empowerment / Life Management

When talking about user empowerment, we are talking about enabling the user to control their data. When looking at the fundamental concept we have outlined initially back in 2012 as Life Management Platforms (there is an updated version available, dating late 2013), this includes the…

Webcast

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Advisory Note

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

Executive View

Executive View: ITMC IDM365 - 71289

ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The product works in a task-centric way with a modern UI, backed by ITMC’s long experience in implementing IAM&IAG in an efficient way.

Blog

Consent – Context – Consequence

Consent and Context: They are about to change the way we do IT. This is not only about security, where context already is of growing relevance. It is about the way we have to construct most applications and services, particularly the ones dealing with consumer-related data and PII in the…

Webcast

Prof. Dr. Rüdiger Grimm - Negotiating the Risk of Privacy, Understanding Privacy and its Risks

In this presentation, the risk of privacy in the modern communication technology, both Internet and mobile networks, is analyzed. It turns out, that users have to negotiate the risk of privacy between refraining from services, trusting services, using self-data-protection methods and…

Webcast

EU Privacy Regulation

The proposed new data protection regulation aims at European data protection standards which are better harmonized than the current legislation and also suit the technical standards in times of transformation. A unified data protection Regulation that is directly applicable as part of the…

Webinar

Jun 16, 2015: Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business

„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen.

Analysts' View

KuppingerCole Analysts' View on Analytics

There is now an enormous quantity of data which is being generated in a wide variety of forms. However this data, in itself, has little meaning or value; it needs interpretation to make it useful. Analytics are the tools, techniques and technologies that can be used to analyze this data…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Webcast

Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access…

Webinar

Jun 02, 2015: Ground Control to Major CRO: Is Identity Governance a risky experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Webcast

Enabling Cloud Governance

While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.

Webinar

Apr 28, 2015: Information Security at Work: Automating End-User Password Reset for Better Efficiency and fewer Headaches

In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk…

Leadership Brief

Leadership Brief: Alternatives to complex role projects and resource-consuming recertification - 72009

Enterprise Role Management and Access Governance are at the core of today's IAM systems to achieve efficient administration processes and compliance with regulatory requirements. Costly processes for the design and maintenance of large role-based projects and for extensive annual…

Leadership Brief

Leadership Brief: Your customer identities: How to do them right - 72006

Digital business strategies require up-to-date and reliable customer identities. They are essential to target your marketing, to adjust the design of your products and services, to increase your earnings and to create long-term relationships with your customers.

Webinar

Apr 22, 2015: Enabling Cloud Governance

While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.

Executive View

Executive View: SecureAuth IdP - 70844

SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to both on-premise and cloud services...

Blog

UMA and Life Management Platforms

Back in 2012, KuppingerCole introduced the concept of Life Management Platforms. This concept aligns well with the VRM (Vendor Relationship Management) efforts of ProjectVRM, however it goes beyond in not solely focusing on the customer to vendor relationships. Some other terms occasionally…

Analysts' View

KuppingerCole Analysts' View on Mobile Enterprise

It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but…

Blog

Privacy Issues in Mobile Security

It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but…

Blog

UMA in the Enterprise: There’s far more potential for UMA

UMA, the upcoming User Managed Access Protocol, is a profile of OAuth 2.0. The specification itself defines the role of UMA as follows: “UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on…

Executive View

Executive View: SAP Cloud Identity Service - 71180

SAP Cloud User and Access Management solution for simple onboarding of external users in B2B and B2C scenarios and for managing access of all types of users to cloud services, run on the SAP HANA platform.

Webcast

Mastering the Digitalization of Business: Digital Identities and the Cloud

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their…

Advisory Note

Advisory Note: Redefining Access Governance - 71185

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think…

Executive View

Executive View: Centrify Identity Service - 71186

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and cloud-based applications, as well as management for Mac and mobile devices and their apps. The company is VC…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Meet the Next-Generation Oracle

Oracle OpenWorld 2019 has just wrapped yesterday, and if there is a single word that can describe my impressions of it, that would be “different”. Immediately noticeable was the absence of the traditional Oracle Red spilling into the streets around the Moscone Center in San Francisco, and the reason behind it is the new corporate design system called Redwood. You can already see its colors and patterns applied to the company’s website, but more importantly, it defines new UI [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00