Information Protection

Webcast

Katryna Dow - Privacy by Design & the API-of-Me

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Webcast

Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Thanks to the maturity and highly standardized nature of public key infrastructures (and a large number of legacy business applications tied into them), enterprise IT departments continue to rely on the proven technology, but they are feeling an increasing pressure from businesses to…

Executive View

Executive View: Indeed AirKey Enterprise - 71256

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure.

Webcast

Securing and Proving your Digital Self

No matter what, in the online world, reliable identities are a must for legally valid transactions. There are several technologies available on the market that enable next to unfailing authentication. To be accepted by users, they need to show ease of use, mobile capabilities and cost…

Webinar

Nov 03, 2016: Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Smart cards have been a key part of any IT department’s security and identity management toolkit for over two decades. They are widely used for such operations like two-factor authentication, digital signatures, data encryption or single sign-on. Smart cards are an integral part of every…

Webinar

Oct 27, 2016: Securing and Proving your Digital Self

We are all living in the era of digitalization, where nearly all processes, business and private, accelerate at an enormous speed. For example, employees are today located in different places on the globe, they use different devices, and do so at any time they need to. For access to…

Webcast

You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Conference

Nov 22 - 23, 2016: Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access…

Advisory Note

Advisory Note: The Blockchain and Life Management Platforms - 71606

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data…

Blog

Strong Online Identities and Identity Sovereignty

What is a strong online identity? A strong online identity can be defined as a combination of identification, authentication technologies along with personal identity data store capabilities which enables a strong and resilient correlation of digital identities to a physical person, entity…

Blog

Know and Serve Your Customer: Why KYC is not enough

Know and Serve Your Customer: Why KYC is not enough Today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s more flexible than ever before. Knowing and, based on that knowledge, optimally serving the customer is key to…

Webinar

Sep 01, 2016: You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Webcast

Data Loss Prevention Best Practice

The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance.

Blog

Security & Privacy by Design is Agility by Design – time to rethink Banking IT

81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed quickly in other banks. SWIFT reacted by announcing security improvements, including two-factor…

Blog

The Impact of the new EU Data Protection Regulation on the Finance Industry

After several negotiations und multiple drafts of the General Data Protection Regulation (GDPR), its final text was adopted in April 2016. The GDPR updates the current EU Data Protection Directive according to the technological developments that have taking place during the last 20 years.…

Blog

IoT (or IoEE): Product Security Is Becoming a Strategic Risk

For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of cyber-security risks. With the move to the IoT (Internet of Things) or, better, the IoEE…

Webcast

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things,…

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Webcast

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Executive View

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Webinar

Jun 07, 2016: Data Loss Prevention Best Practice - Applying User-driven Data Classification

The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance.

Executive View

Executive View: AirWatch Content Locker - 71505

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with…

Webcast

Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Webinar

May 03, 2016: Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Webcast

The Blockchain and Information Security

KuppingerCole Webinar recording

Webcast

Digitale Transformation: Risiken kontrollieren und Compliance-Anforderungen erfüllen

KuppingerCole Webinar recording

Webcast

How Digital Transformation Meets Risk Governance and Compliance Demands

KuppingerCole Webinar recording

Blog

Be careful not to DROWN

On March 1st OpenSSL published a security advisory CVE-2016-0800, known as “DROWN”. This is described as a cross-protocol attack on TLS using SSLv2 and is classified with a High Severity. The advice given by OpenSSL is: “We strongly advise against the use of SSLv2 due not…

Webcast

Lifecycle Journey: How Digital Documents Optimize Contract Processes

This webinar follows the lifecycle of a document: Digital contracts go through many phases throughout their existence. From the production of the document, through presentation, revisions, and then being signed by the involved parties. But the journey doesn't end there. If the contract is…

Executive View

Executive View: YubiKey by Yubico - 70842

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed…

Executive View

Executive View: Intralinks VIA® - 71263

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when accessed and modified externally. The Intralinks VIA product provides a powerful solution that balances the user…

Webinar

Apr 14, 2016: Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Webinar

Mar 22, 2016: Digitale Transformation: Risiken kontrollieren und Compliance-Anforderungen erfüllen

Informations- und Entscheidungsprozesse von Kunden haben sich dramatisch verändert. Dies hat in Unternehmen zu einem gesteigerten Interesse an digitaler Transformation von Geschäftsprozessen geführt. Beziehungen und Vernetzung sind heute Kern jedes Geschäftsmodells. Sie fließen in zentrale…

Leadership Brief

Leadership Brief: Information Rights Management – Ready for Prime Time? - 72013

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of…

Analysts' View

KuppingerCole Analysts' View on Information Classification & Secure Information Sharing

With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay…

Blog

Information Rights Management explained

With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay…

Blog

Stack creep - from the network layer to the application layer

Last year saw an unprecedented interest in protection of corporate data. With several high-profile losses of intellectual property organisations have started looking for a better way. For the past 30 years the bastion against data loss has been network devices. We have relied on routers,…

Seminar

Mar 09, 2016: How Blockchain Will Influence Your Business

CXP Group and KuppingerCole are pleased to invite you to the first Blockchain Seminar in Paris. The working language of the seminar will be english.

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which gives them an opportunity in the enterprise market it is now targeting. In short, OVHCloud believes there is a small, but discernible shift back to the private cloud - for security and compliance imperatives. That [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00