Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Provisioning Trends: Schlank, voll automatisiert, kostengünstig
Dec 11, 2009
Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning
Webinar Recording
How to Start: Recertification or Active Access Controls First?
Dec 09, 2009
What is the best approach to do access governance? Should you start with attestation to understand where the problems are? Or should you first have a management infrastructure in place which allows to control access across different systems and use access governance approaches then to improve the state of your information security? Or is recertification sufficient? Kuppinger Cole analysts and different vendors discuss the strengths and weaknesses of different approaches?
Webinar Recording
How to Efficiently Implement SoD Controls: Which Level Works?
Dec 09, 2009
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.
Webinar Recording
XACML: The Holy Grail of Access Governance?
Dec 09, 2009
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
Webinar Recording
5 Golden Rules for Efficiently Implementing Access Governance
Dec 08, 2009
How to do Access Governance right? Which are the key success factors you have to focus on for as well quick-wins as long-term success? This session explains how to solve the access governance needs best.
Webinar Recording
Getting the Big Picture: How Access Governance fits into IT Governance and Risk Management
Dec 08, 2009
Access Governance is a key element in every strategy for information and system security as well as IT Governance. However, there are many different approaches from system-level access control management tools for ERP systems with some SoD support up to “Enterprise GRC” solutions which focus on the risk management and governance approaches from a high-level business perspective, sometimes without the interface to IT systems. And access-related controls are only part of that – 4 of 210 controls within COBIT, for example. For sure they are highly relevant, but they are only part of a bigger story. The link from business controls to IT controls and the role and relevance of the access-related IT controls covered by access governance with respect to complete IT Governance frameworks like COBIT is explained in this session. The different elements and approaches to governance are put into context and associated with the GRC roadmap of Kuppinger Cole.
Webinar Recording
The Three Elements of Access Governance: Recertification/Attestation – Access Control – Privileged Access Management
Dec 08, 2009
Access Governance is commonly associated with “recertification” or “attestation” as approaches for a recurring review of existing access controls by the responsible managers in IT and business. But knowing the problems isn’t sufficient – enforcing changes and implementing continuous processes for access controls is a key element. And, beyond that, many approaches mainly focus on standard access and not on the security sensitive privileged accounts. This session explains the elements for a consistent approach – across all areas of access governance and all levels of controls, from system to business.
Webinar Recording
Pass Your Next Compliance Audit With Confidence
Nov 19, 2009
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.
Webinar Recording
Single Sign On for SAP Environments
Nov 11, 2009
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.
Webinar Recording
The Critical Role of XACML in SOA Governance and Perimeter Web Service Security
Oct 27, 2009
SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA security solution.
Webinar Recording
Ein Passwort für alles - Enterprise Single Sign-on
Oct 23, 2009
Es gibt kaum einen Anwender, der nicht schon einmal sein Passwort vergessen hat und das Helpdesk mit einem Passwort Reset beschäftigen musste. Die Arbeit des Helpdesk nimmt exponentiell zu, wenn die Anwender sich mehrere unterschiedliche Passwörter für unterschiedliche Anwendungen merken müssen, die auch noch mit unterschiedlichen Intervallen geändert werden müssen. Projekte, die sich der Vereinfachung der Authentifizierungsprozesse annehmen, sind deshalb im Unternehmen sehr sichtbar, und ein RoI lässt sich in aller Regel bereits durch die verringerten Helpdesk-Lasten schlüssig nachweisen. In diesem Webinar sprechen wir über die Auswahl des optimalen Enterprise-SSO Systems und dessen auf einen schnellen RoI optimierte Einführung
Webinar Recording
The Role of Entitlement Management in Governance, Risk and Compliance Management
Oct 14, 2009
Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency. This webinar is supported by Axiomatics.
Webinar Recording
Sicherheit mit automatisiertem Provisioning
Oct 12, 2009
Nicht nur in grossen Unternehmen ist die Benutzerverwaltung durch ständige Änderungen und Ergänzungen eine ressourcenzehrende Herausforderung. Auch wenn die Prozesse für die Provisionierung von Benutzerkonten in den unterschiedlichen Anwendungen sauber definiert sind - manuelles Arbeiten birgt enorme Sicherheitsrisiken beispielsweise in Form verwaister Benutzerkonten. In diesem Webinar sprechen wir über die Möglichkeiten, diese Sicherheitsrisiken durch automatisiertes Provisioning zu minimieren.
Webinar Recording
Beyond Role Based Access Control - the ABAC approach
Sep 30, 2009
In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics.
Webinar Recording
Identity Services and the Cloud
Sep 22, 2009
The reason companies are considering cloud computing is to avoid the expense involved in building or acquiring the infrastructure, and to some extent managing it. However, without paying attention to the security and governance implications, those cost savings will actually evaporate when they either try to retrofit their existing business policies and controls into the cloud environment, or when they have to deal with the fallout from a breach or issue. In This webinar, Nishant Kaushik (Oracle) and Martin Kuppinger (Kuppinger Cole) will talk about this, and examine how identity services are crucial to making cloud computing viable.
Webinar Recording
Sicherheitsrichtlinien zuverlässig durchsetzen
Sep 21, 2009
Auf dem Papier ist es in der Regel gar nicht so schwierig, durch entsprechende Richtlinien einen zufriedenstellenden Grad an Sicherheit zu erreichen. Jedoch zehren in der Praxis fehlende Ressourcen, enge Budgets und nicht zuletzt die immer komplexer werdende Infrastruktur an einer effizienten Um- und Durchsetzung dieser Richtlinien. In diesem Webinar beschreiben wir Ihnen in Zusammenarbeit mit Novell, welche Ansätze für eine automatisierte Überwachung der Sicherheit von IT-Systemen am Markt existieren und worauf Sie bei der Einführung achten müssen.
Webinar Recording
Minimizing Business Risks through Enterprise SSO
Sep 18, 2009
Receiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies.
Webinar Recording
Vereinfachung der Berechtigungsanalyse und -Verwaltung
Aug 20, 2009
In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.
Webinar Recording
Zugriffsmanagement richtig gemacht
Aug 17, 2009
In diesem kostenlosen Webinar gehen wir darauf ein, wie eine ideale Basis für ein konsistentes Access Management geschaffen werden kann und wie man dieses schrittweise weiterentwickelt.
Webinar Recording
Externalizing Identity to the Cloud
Jul 23, 2009
Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.
Webinar Recording
Get the Big Picture - Managing Access beyond SAP for Cross-Enterprise Identity Governance
Jun 25, 2009
In this free webinar, you’ll learn how an integrated identity governance approach can more effectively improve your risk posture with enterprise-wide policy enforcement, access certifications and role management across all relevant systems. By having a single view into user access rights, you will greatly improve your visibility into risky or non-compliant areas and automate your processes for managing these risks.
Webinar Recording
Messbare Vorteile für Sicherheit und Kosten durch Single Sign-On mit starker Authentifizierung
Jun 17, 2009
In diesem Webinar wird auf den quantitativen und qualitativen Nutzen von Enterprise Single Sign-On-Projekten in Verbindung mit starker Authentifizierung eingegangen.
Event Recording
EIC Impressions
May 19, 2009
A few short interviews from the European Identity Conference 2009
Event Recording
Interview with Marina Walser, Novell
May 19, 2009
Tim Cole interviews Marina Walser at the European Identity Conference 2009
Event Recording
Interview with Kim Cameron, Microsoft
May 19, 2009
Tim Cole interviews Kim Cameron at the European Identity Conference 2009
Event Recording
Interview with Fulup Ar Foll, Sun Microsystems
May 19, 2009
Tim Cole interviews Fulup Ar Foll at the European Identity Conference 2009
Event Recording
Interview with Eve Maler, Sun Microsystems
May 12, 2009
Felix Gaehtgens interviews Eve Maler at the European Identity Conference 2009
Event Recording
Interview with Dr. Prateek Mishra, Oracle
May 12, 2009
Felix Gaehtgens interviews Dr. Prateek Mishra at the European Identity Conference 2009
Event Recording
Interview with Pat Patterson, Sun microsystems
May 12, 2009
Felix Gaehtgens interviews Pat Patterson at the European Identity Conference 2009
Event Recording
Interview with Dr. Babak Sadighi, Axiomatics AB
May 12, 2009
Felix Gaehtgens interviews Dr. Babak Sadighi at the European Identity Conference 2009
Event Recording
Interview with Fulup Ar Foll, Sun Microsystems
May 12, 2009
Felix Gaehtgens interviews Fulup Ar Foll at the European Identity Conference 2009
Event Recording
Interview with Anthony Nadalin, IBM
May 12, 2009
Felix Gaehtgens interviews Anthony Nadalin at the European Identity Conference 2009
Event Recording
Interview with Dale Olds, Novell
May 12, 2009
Felix Gaehtgens interviews Dale Olds at the European Identity Conference 2009
Event Recording
Identity Management Systems as a Risk?
May 12, 2009

Keynote at the European Identity Conference 2009

by Niels von der Hude, Beta Systems Software

Event Recording
Interview with Prof. Dr. Rob Fijneman, KPMG
May 12, 2009
Tim Cole interviews Dr. Rob Fijneman at the European Identity Conference 2009
Event Recording
Interview with Berthold Kerl, Deutsche Bank
May 12, 2009
Tim Cole interviews Berthold Kerl at the European Identity Conference 2009
Event Recording
Identity Management & GRC 2009 - 2019
May 12, 2009

Opening keynote at the European Identity Conference 2009

by Martin Kuppinger, Kuppinger Cole + Partner

Event Recording
Is there a difference between the European way of doing IAM/GRC and „the rest of the world“?
May 12, 2009

Keynote at the European Identity Conference 2009

by Paul Heiden, BHOLD COMPANY BV, Prof. Dr. Audun Josang, Queensland University of Technology, and Oslo University, Darran Rolls, Sailpoint, Chris Harvison, Scotiabank

 

Event Recording
The Road to Claims: From Vision to Reality
May 12, 2009

Keynote at the European Identity Conference 2009

by Kim Cameron, Microsoft

Event Recording
Identity Management in the Focus of eGovernment and Vertical Solutions
May 12, 2009

Keynote at the European Identity Conference 2009

by Sabine Erlinghagen, Siemens IT Solutions and Services

Event Recording
The Care and Feeding of Online Relationships
May 12, 2009

Keynote at the European Identity Conference 2009

by Eve Maler, Sun Microsystems

Webinar Recording
Enterprise Single Sign-On in der Praxis
Apr 23, 2009
Konfrontiert mit einer zunehmenden Flut an Passworten für Benutzerkonten in einer steigenden Zahl an Anwendungen, gewinnt das unternehmensweite Single Sign-on zunehmend an Bedeutung. Einerseits zur Steigerung der Produktivität und zur Reduzierung der Helpdesk-Kosten, andererseits aber auch für ein Mehr an Sicherheit. Lernen Sie in diesem praxisorientierten Webinar anhand konkreter Projektbeispiele, den Nutzen eines E-SSO Systems für Ihr Unternehmen optimal zu erschliessen.
Webinar Recording
Controlling the Impacts of Recession on IT Security
Apr 16, 2009
As the recession is severely hitting most industries, type and quality of security threats are changing quickly. In this webinar, Martin Kuppinger will describe these threats and their impact on Identity and Access Management, GRC, Privileged Account Management, Data Leakage Prevention, and Information Rights Management.
Webinar Recording
Cloud Computing – Opportunities & Risk
Apr 16, 2009
Besides having been around as a buzzword for quite some time now, current economic challenges seem to strongly increase interest in leveraging cloud computing for the enterprise, finding new competitive advantages, and of course reducing investments into internal infrastructures. In this webinar, Martin Kuppinger will discuss with you Kuppinger Cole´s "Roadmap to the Cloud" - a guideline on how to prepare for cloudsourcing initiatives.
Webinar Recording
Wer war Root? Was Sie über Privileged Account Management (PAM) wissen sollten
Mar 20, 2009
Der Umgang mit privilegierten Benutzerkonten, wie beispielsweise "ROOT", birgt hohe Risiken. In diesem Webinar führen wir Sie in die Grundlagen des Privileged Account Management (PAM) ein und geben Ihnen wertvolle Praxistipps, wie Sie Ihr Netzwerk wirksam gegen interne und externe Bedrohung schützen können.
Webinar Recording
Fraud Prevention and Multi-factor Authentication
Mar 11, 2009
In this webinar, Kuppinger Cole´s founder and principal analyst will give you an overview on the market for risk- and context-based, multi-factor authentication and authorization solutions for fraud detection, followed by Stefan Dodel, middleware solutions specialist at Oracle, who will talk about his experiences from numerous projects.
Webinar Recording
Getting Attestation Right - Improving Audit Performance, Lowering Costs
Mar 11, 2009
In this webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole give an overview on an automated and risk-based approach to access certification, followed by a discussion with industry thought leaders on how to significantly improve the operational efficiency and accuracy of the attestation process, ensuring the goals of corporate accountability and compliance are met.
Webinar Recording
Risk Management Trends
Mar 02, 2009
The webinar will discuss risk management trends as well as the evolution of the market for risk management tools.
Webinar Recording
Zehn Gründe, warum Sie gerade jetzt in IAM und GRC investieren sollten
Feb 13, 2009
Martin Kuppinger nennt und erläutert zehn Gründe dafür, warum man gerade jetzt in IAM und GRC investieren sollte, um die IT besser und Unternehmen leistungs- und wettbewerbsfähiger zu machen und Risiken zu reduzieren.
Webinar Recording
Reducing Compliance Costs through Risk-Based Segregation of Duties Management
Feb 13, 2009
In this Webinar, Kuppinger Cole´s Principal Analyst Martin Kuppinger will highlight the challenges of risk based segregation of duties management, and will discusses technology solutions for continuous monitoring that deliver affordable and effective compliance.
Webinar Recording
Key Risk Indicators (KRIs) als Frühwarnsystem zur Verringerung operationeller Risiken
Feb 13, 2009
Martin Kuppinger stellt in diesem Webinar den aktuellen Kuppinger Cole Report zu diesem Thema vor und beschreibt die Verwendung dieser KRIs für einen risikobasierten Management-Ansatz. Im Anschluß daran wird Thomas Reeb, Vorstand econet AG, über seinen Ansatz einer Key Performance Indicator (KPI)-Matrix an Hand eines Beispiels (Sicherheit in Dateisystemen) sprechen, mit deren Hilfe sich aus den KRIs Strategien sowie Reifegradmodelle ableiten lassen.
Webinar Recording
Cutting Costs through Lean Role Management
Jan 30, 2009
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.
Webinar Recording
Service Oriented Security (SOS)
Jan 23, 2009
Service-Oriented Security aligns with the overall Application-Centric approach of Identity and Access Management solutions - with the goal of providing a comprehensive, standards-based, developer-friendly platform. By leveraging and sharing many of the common Identity "Services", Service-Oriented Security allows developers to spend the effort on where it counts the most - the application logic itself. Security will be just a service that can be invoked over a well defined hetrogenous interface based on open Standards. Furthermore application developers building identity-enabled applications must look to the benefits of these services and understand when and how to use these services in their application design.
Webinar Recording
Entitlement Management - Business and Technical Perspectives
Jan 20, 2009
The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services.