English   Deutsch   Русский   中文    
European Identity Conference 2011

Workshop Track I


Business Model for Information Security (BMIS)
13.05.2011 09:00-12:00

Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA


Business Model for Information Security (BMIS)
13.05.2011 13:30-16:00

Business Model for Information Security (BMIS)
Rolf von Roessing, ISACA

top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Adaptive Authentication & Authorization
It’s called “adaptive” because it adapts to the circumstances at the time of the authentication ceremony and dynamically adjusts both the authentication factors as well as the facet(s) of the factors chosen. This is all done as part of the risk analysis of what we call the Adaptive Policy-based Access Management (APAM) system.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole