Identity Management

Advisory Note

Advisory Note: Enterprise Role Management - 70285

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the…

Webcast

Cloud IAM – Get the Full Picture to Make a Real Win out of a Quick Win!

Cloud IAM (Identity and Access Management) is on the rise, and it is more than just Single Sign-On. Managing user journeys, directory functionality, access control, and governance is mandatory. Identity and access governance is a key topic in most organizations and, just as with identity…

Webcast

Katryna Dow - Privacy by Design & the API-of-Me

Webcast

Kim Cameron - Cloud Based Customer Identity for Enterprises

Potential advantages of cloud services over on-premise solutions, like cost savings and higher resilience, are even more significant when it comes to large scale use cases like managing your customers´ identities. In this talk, Kim Cameron guides you…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Webcast

Securing and Proving your Digital Self

No matter what, in the online world, reliable identities are a must for legally valid transactions. There are several technologies available on the market that enable next to unfailing authentication. To be accepted by users, they need to show ease of use, mobile capabilities and cost…

Webcast

How to easily expand Identity & Access Management to the Cloud

Many large enterprises operate with a glut of access security platforms and tools that each service a specific silo of applications and resources. Most are proprietary, and many have expensive and time-consuming agent-based architectures. In addition, because they are usually very tightly…

Webinar

Dec 13, 2016: Cloud IAM – Get the Full Picture to Make a Real Win out of a Quick Win!

Cloud IAM, or IDaaS, is a rapidly growing market segment. This growth is driven by a variety of business cases, ranging from operational advantages and better support for employees accessing cloud services to the flexible integration of business partners and consumers in the age of digital…

Advisory Note

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling…

Webcast

Rising to the Security Challenge of Heavy Cloud Adoption

A good IT Cloud Strategy must not only specify a cloud direction but also the expected interactions between business units, customers, suppliers and competitors. It has to be well-aligned with the organization’s business drivers, principles and strategies. In a rapidly changing…

Executive View

Executive View: VMware Identity Manager - 71455

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications and provides contextual experience to VMware WorkspaceOne.

Webinar

Oct 27, 2016: Securing and Proving your Digital Self

We are all living in the era of digitalization, where nearly all processes, business and private, accelerate at an enormous speed. For example, employees are today located in different places on the globe, they use different devices, and do so at any time they need to. For access to…

Webinar

Oct 25, 2016: How to easily expand Identity & Access Management to the Cloud

Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.

Webinar

Oct 11, 2016: Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. In the course of this development, security teams face difficult challenges…

Executive View

Executive View: Microsoft Advanced Threat Analytics - 71554

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious user and device activity within corporate networks.

Conference

Nov 22 - 23, 2016: Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access…

Executive View

Executive View: Microsoft Azure Blockchain Services - 71332

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of preconfigured Virtual Machines, developer templates and artefacts, Microsoft Azure’s BaaS…

Leadership Brief

Leadership Brief: Transforming IAM – not Panicking - 71411

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Executive View

Executive View: Beta Systems Garancy Recertification Center - 71315

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive…

Blog

Not So Dead Yet: Why Passwords Will Survive All of Us

There is probably no single thing in Information Security that has been claimed being dead as frequent as the password. Unfortunately, it isn’t yet dead and far from dying. Far from it! The password will survive all of us. That thesis seems standing in stark contrast to the rise of…

Blog

Strong Online Identities and Identity Sovereignty

What is a strong online identity? A strong online identity can be defined as a combination of identification, authentication technologies along with personal identity data store capabilities which enables a strong and resilient correlation of digital identities to a physical person, entity…

Executive View

Executive View: Deep Identity - 71453

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open…

Blog

Cloud IAM is more than CSSO

Martin Kuppinger talks about Cloud IAM and that it is more than CSSO

Executive View

Executive View: SailPoint IdentityIQ - 71319

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance, and minimizes risk by applying controls across all IAM services geared towards business users. They expand…

Workshop

Dec 07, 2016: Der neue Datenschutz – Crashkurs für IT-Professionals

In weniger als eineinhalb Jahren tritt die neue Datenschutzgrundverordnung der EU (EU-DSGVO), besser bekannt unter der englischen Abkürzung GDPR (General Data Protection Regulation), in Kraft. Höchste Zeit also, sich mit den Veränderungen zu befassen, die dieses EU-weit geltende Gesetz…

Blog

GDPR and the post-Brexit UK

The Brexit-Leave-Vote will have substantial influences on the economy inside and outside of the UK. But the impact will be even higher on UK-based, but also on EU-based and even non-EU based organisations, potentially posing a major threat when it comes to various aspects of business.…

Blog

Managing the customer journey

Every one of us, whether a security professional or not, is also a part-time online customer or a subscriber of digital services. Providing personal information to a service organisation, to a social media platform or a retailer is a deliberate act. This will be even more the case with the…

Executive View

Executive View: Microsoft Azure Active Directory - 71550

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

Executive View

Executive View: Protected Networks 8MAN - 71520

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende…

Blog

GDPR now!

The news is already getting quieter around the GDPR, the general data protection regulation as issued by the European Union. Several weeks ago it has been discussed in detail in many articles, and background information has been provided by many sources, including lawyers and security…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Executive View

Executive View: EmpowerID Office 365 Manager - 71322

EmpowerID Office 365 Manager is an Identity and Access Management solution for Office 365 providing single sign-on, user provisioning and administration, and access governance functions in a single integrated package.

Executive View

Executive View: ForgeRock Identity Gateway - 71318

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

Blog

Security & Privacy by Design is Agility by Design – time to rethink Banking IT

81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed quickly in other banks. SWIFT reacted by announcing security improvements, including two-factor…

Blog

The Impact of the new EU Data Protection Regulation on the Finance Industry

After several negotiations und multiple drafts of the General Data Protection Regulation (GDPR), its final text was adopted in April 2016. The GDPR updates the current EU Data Protection Directive according to the technological developments that have taking place during the last 20 years.…

Executive View

Executive View: One Identity Manager v7.0.1 - 70894

One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the major release (v7), and adds a significant number of new features along with performance…

Blog

IoT (or IoEE): Product Security Is Becoming a Strategic Risk

For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of cyber-security risks. With the move to the IoT (Internet of Things) or, better, the IoEE…

Webcast

Kim Cameron - The Future of On-Premise AD in the days of Azure AD

Azure AD is here. It can act as a domain controller. It helps you managing your partners. It is ready-made for managing your customers. The application proxy builds the bridge back to your on-premise applications. That raises an important question for all organizations running AD…

Webcast

The Need to Destroy in the Era of Populous Data and Cloud

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the…

Webcast

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things,…

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Webcast

Kim Cameron - The Cloud is Rewiring the World: What Does it Mean for Identity?

The Cloud is turning out to have important “emergent properties” – features not previously observed in computing systems, never imagined by cloud architects, and not yet widely discussed or understood.  They will be key to determining which strategies prevail in…

Webcast

Christian Loeffler - From Shadow IT to an IDaaS Solution

In this keynote session, Christian Loeffler talks about: project conduction, architecture definition, IDaaS election and implementation,key challenges for business and IT, lessons learned.

Press Release

Review of the 10th European Identity and Cloud Conference 2016

Wiesbaden, May 18 th 2016 – Last Friday KuppingerCole wrapped up their 10 th European Identity & Cloud Conference , Europe’s leading event for Identity and Access Management (IAM) , Governance , Risk Management and Compliance (GRC) , as well as Cloud Security , in…

Webcast

Dr. Karsten Kinast - Making Sense of the EU General Data Protection Regulation

The cloud is coming to your business, like it or not. With cloud-based systems come inherent challenges. These are further complicated as personal data subject to privacy regulation inevitably moves into the cloud. This combination, putting private information into the cloud, creates risk…

Blog

Winners of the European Identity & Cloud Awards 2016

KuppingerCole presented The European Identity & Cloud Awards 2016 last night at the 10th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as…

Webcast

Eve Maler - The Connected Consumer – Risks and Rewards

Everyone operates on the risk-reward continuum. It's true for CEOs, CMOs, CPOs, CIOs...and consumers. What does this mean for each of them in a digitally connected world, when the lines have blurred not only between organization A and organization Z, but also between cars and clouds,…

Webcast

Mia Harbitz - Identity Management, Governance and Forced Migration

New thinking is required with regards to identity management for forced migrants and the role supranational institutions can play to help solve some of the problems regarding aid distribution and settlement.

Leadership Brief

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

Webcast

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Executive View

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

Executive View

Executive View: Atos DirX Identity V8.5 - 70896

Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for…

Webcast

Customer-centric Identity Management

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk…

Webcast

Alles zu Consumer Identity Management

Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der…

Webcast

Fueling Digital Innovation with Customer Identities

Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining…

Webcast

Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Webinar

Apr 26, 2016: EIC 2016 Webinar about Customer-Centric Identity Management

While most organizations are at least good enough in managing their employee identities, dealing with millions of consumer and customer identities imposes a new challenge. Many new identity types, various authenticators from social logins to device-related authenticators in smartphones, risk…

Webinar

Apr 21, 2016: EIC 2016: Alles zu Consumer Identity Management

Mittlerweile sind die meisten Unternehmen in der Lage, sicher mit den Identitäten ihrer Mitarbeiter umzugehen. Doch die Handhabung von Kundenidentitäten, deren Anzahl oft in die Millionen geht, stellt noch immer eine Herausforderung für die meisten Unternehmen dar. Mehr Identitäten, der…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Webinar

May 03, 2016: Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Executive View

Executive View: Cayosoft Administrator - 72023

Cayosoft Administrator is an integrated solution for simplifying and automating management of Active Directory and Office 365 environments, including hybrid deployments. It replaces multiple native and legacy tools with a unified modern administrative console and a self-service web portal.

Executive View

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

Comprehensive framework for identity administration and governance in today's cloud-based, on-premises and hybrid infrastructures for both enterprise- and internet-scale environments.

Webinar

Apr 19, 2016: Fueling Digital Innovation with Customer Identities

Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining…

Press Release

Save The Date – European Identity & Cloud Conference, 10. bis 13. Mai 2016

Wiesbaden, 08. März 2016  – Bereits zum 10. Mal findet die  European Identity & Cloud Conference (EIC)  statt. Vom  10. bis 13. Mai 2016  lädt KuppingerCole  ins Dolce Ballhaus Forum Unterschleißheim, München  ein. Als…

Press Release

Save The Date – European Identity & Cloud Conference, 10 to 13 May 2016

Wiesbaden, 8th March 2016 – For the 10th time KuppingerCole’s European Identity & Cloud Conference (EIC) takes place from 10th to 13th May 2016 at the Dolce Ballhaus Forum in Unterschleissheim, Munich, Germany . As Europe’s leading event for the Future of…

Webcast

How to Manage Your Azure AD and Office 365

KuppingerCole Webinar Recording

Analysts' View

KuppingerCole Analysts' View on Customer-Centric Identity Management

As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are…

Blog

The role of Adaptive Authentication in Consumer Identity Management

As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also…

Blog

Challenges of large-scale IAM environments

Long before analysts, vendors or journalists were coining terms like Digitalization, Identity Relationship Management or Customer IAM, several industries were already confronted with large-scale Identity and Access management (IAM) environments. Due to the character of their businesses they…

Blog

Microsoft Security Announcements

With RSA kicking off this week, security experts from around the world are getting ready for a flurry of announcements from security vendors. Last Friday, it was Microsoft’s turn, and the company’s CISO Bret Arsenault has publicly announced some interesting news. The motto of the…

Blog

„Disruptive Change“: Right time to think security anew

Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already changing profoundly. Communication with customers no longer happens over traditional websites. It…

Webinar

Apr 14, 2016: Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Executive View

Executive View: Intermedia AppID® Enterprise - 71522

Intermedia AppID® Enterprise is a cloud based identity management platform for web applications. This provides a solution to many of the security and compliance needs of the agile connected business. As well as adding value to the cloud and hosting services provided by Intermedia it is…

Webinar

Mar 08, 2016: How to Manage Your Azure AD and Office 365: Get a Grip on Your Environment Even in the Cloud

Regulatory compliance does not end at your perimeter. Moving to the Cloud will not get you rid of implementing Access Governance and a well thought-out reporting. Furthermore, moving to the Cloud might make administration more complex, not easier. Proven and established tools in your AD…

Blog

Secured by Design: The smart streets of San Francisco

On April 18th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors followed. The danger of another catastrophe can’t be ignored. In a city like San Francisco,…

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which gives them an opportunity in the enterprise market it is now targeting. In short, OVHCloud believes there is a small, but discernible shift back to the private cloud - for security and compliance imperatives. That [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00