Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Using Standards to Manage Access to SOA and Cloud Services
Dec 18, 2010
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O’Neill (Vordel) will give their view on standards-based policies for SOA and Cloud.
Webinar Recording
Managing the Change - Getting on the Road to the Cloud through Small and Manageable Steps
Dec 14, 2010
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.
Webinar Recording
Building Operational Governance for SharePoint 2010
Dec 10, 2010
During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.
Webinar Recording
How Does Cloud Governance Relate to IT and SOA Governance and What Should Be Done Differently?
Dec 04, 2010
When applications and information move beyond the perimeter, they become more vulnerable and cause privacy related issues. How can we make sure that cloud services live in a controlled environment? Do we need to reinvent the governance whell or is Cloud governance just an extension of your existing SOA governance? Join us in this webinar session to discuss this exciting topic.
Webinar Recording
Designing a Cloud-ready Holistic IT Security Concept - the Business View
Dec 04, 2010
IT security is in a challenging transition period. On the one hand, threats are real and they are growing more and more sophisticated. On the other hand, the promise of cloud computing is trying to transform computing into an ubiquitous utility. The IT services world is going through a revolutionary change, making traditional, perimeter based security models obsolete. And it will not stop, it will be going even worse. If there ever has been a time to totally rethink your overall security strategy, it´s good that it is now. Join us in this session, to discuss the new holistic enterprise security concept.
Webinar Recording
Cloud Computing Risk Areas
Dec 04, 2010
Before jumping into the cloud, you should know about the risks, so that you can ask the right questions to your provider. In this webinar session, we will discuss the main risk areas of cloud computing, such as data location, transparency, privileged user access, Recovery and data segregation, and how to keep them under control.
Webinar Recording
5 Key Challenges for Cloud Computing Governance
Dec 04, 2010
Cloud Computing is adding a number of challenges to IT governance. In this opening session to the 2010 Kuppinger Cole Cloud Computing Virtual Conference, Martin Kuppinger will talk about the 5 key challenges to be aware of, if you want to extend your IT governance to cloud computing.
Webinar Recording
Privileged Cloud Identity Management
Dec 02, 2010
In diesem Webinar wird zunächst Martin Kuppinger von KuppingerCole eine grundlegende Einführung in das Management privilegierter Benutzer im Unternehmen, innerhalb von Outsourcing-Verhältnissen und in der Public Cloud geben. Der Schwerpunkt wird hier insbesondere auf der Frage liegen, welche Anforderungen an einen Public Cloud oder Outsourcing Dienstleister zu stellen sind, damit Ihr internes (PUM) durch die Hinzunahme von Cloud Services nicht kompromittiert wird. Jochen Koehler vom Privileged Identity Management Spezialisten Cyber-Ark wird daran anschliessend einen überaus interessanten Einblick in die Praxis geben und die Strategie seines Unternehmens zur Absicherung Ihrer Cloud-Strategie erläutern.
Webinar Recording
Virtualization Security Trends & Insights: Results from KuppingerCole's Recent Survey
Nov 30, 2010
Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.
Webinar Recording
Kontextbasierte Authentifizierung im Active Directory Umfeld
Nov 28, 2010
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.
Webinar Recording
How to Let Your Access Management Scale - and Save Costs
Nov 24, 2010
In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.
Webinar Recording
Integrating Enterprise GRC and IT-GRC Programs on a Single Framework
Nov 21, 2010
This webinar will highlight how organizations can manage risk better across their IT and business processes, thus enabling them to determine potential impact considering both IT and business controls.
Webinar Recording
Authentifizierung in der Cloud - richtig gemacht
Nov 19, 2010
Wenn sich interne und externe Benutzer an Diensten anmelden müssen, die mal in der privaten und mal in der öffentlichen (public) Cloud laufen, wird es auf den ersten Blick viel komplexer, eine verlässliche Authentifizierung durchzuführen. Doch ist das wirklich so? Oder bieten nicht die heute etablierten Technologien wie Identity Federation oder Enterprise Single Sign-On in Verbindung mit neuen Ansätzen wie der kontextbasierenden, flexiblen Authentifizierung nicht Optionen, eine stringente Authentifizierungsstrategie umzusetzen? Martin Kuppinger und Sebastian Rohr von KuppingerCole werden den Status und die Trends für die Authentifizierung in der Cloud analysieren und auf sinnvolle Strategien und ihre Umsetzung eingehen.
Webinar Recording
Identitäts- und Datenschutz im Cloud Computing
Nov 19, 2010
Unternehmensweit gelten dieselben Sicherheitsrichtlinien, egal von wo aus die Anwender arbeiten und wo die von ihnen genutzten Dienste zur Verfügung gestellt werden. Nahtlose Integration von Cloud Services in das Sicherheitskonzept Ihres Unternehmens und eine Identität für alles, deren Sicherheit dem jeweiligen Kontext angepasst ist. So oder so ähnlich lässt sich eine funktionierende Basis für ein sicheres Cloud Computing mit wenigen Worten beschreiben. In diesem Webinar beschreibt Sebastian Rohr, Senior Analyst bei Kuppinger Cole, wie Sie Ihre bestehende Infrastruktur Schritt für Schritt "Cloud-ready" machen können.
Webinar Recording
Governance, Risk Management & Compliance in der Cloud
Nov 19, 2010
Zwischenzeitlich haben sich sehr viele Unternehmen dafür entschieden, Dienste aus der Cloud zu nutzen. Teilweise auch schon seit Jahren, bevor der Begriff des Cloud Computing überhaupt entstanden war. Wenn es aber um die Verteilung unternehmenskritischer Informationen geht, dann ist die Zurückhaltung sehr viel größer und der Zielkonflikt zwischen einer "Hochverfügbarkeit" von Informationen und deren Sicherheit wird mit dem fortschreitenden Siegeszug des Cloud Computing immer stärker. Für interne Systeme ist ein funktionierender GRC-Ansatz die Regel. Wie aber sieht es in der Cloud aus? In diesem Webinar spricht Martin Kuppinger darüber, wie Sie Ihren GRC-Ansatz erfolgreich in die Cloud bringen.
Webinar Recording
Cloud Computing in der praktischen Umsetzung
Nov 18, 2010
So stark die Resonanz zum Thema Cloud Computing auch sein mag - so klafft doch häufig noch eine starke Lücke zwischen dem Anspruch, die interne IT durch Zugabe von Cloud Services flexibler und kostengünstiger zu gestalten, und der praktischen Umsetzung. Dafür gibt es mehrere Gründe. Einerseits fehlt der Konsens über vertrauensbildende Richtlinien, die das Geschäft zwischen Cloud-Anbietern und den "Konsumenten" von Cloud Services regeln. Andererseits herrscht verbreitet Unsicherheit darüber, wie sich das Cloud Computing auf bestehende Risiken auswirkt und welche neuen Risiken man sich mit der Cloud "ins Haus" holt. In dieser Session beschreibt Martin Kuppinger einen Leitfaden für die pratische Umsetzung Ihrer Cloud Strategie und wird anschliessend Christoph Stoica von Novell in einem Interview zu dessen Erfahrungen befragen.
Webinar Recording
One Authentication Strategy for All - from Internals to the Customer
Nov 17, 2010
Martin Kuppinger of KuppingerCole will discuss the trends around authentication strategies, the breadth of options available today, and the future evolution towards a centralized layer for context-based authentication and authorization - for all types of users and for all types of services and use cases. Dirk Losse of ActivIdentity will then describe some Best Practices and talk about his experiences with authentication projects.
Webinar Recording
SharePoint Governance: Vom Site-Chaos zur vertrauenswürdigen Plattform
Nov 14, 2010
SharePoint-Umgebungen tendieren dazu, sich den GRC-Anforderungen Ihres Unternehmens widersetzen zu wollen. In diesem Webinar beschreibt Martin Kuppinger einen holistischen Ansatz zur Einbung Ihrer SharePoint-Umgebung in ein unternehmensweites GRC und Identity Management. Dr. martin Kuhlmann von Omada wird daraufhin detailliert darstellen, wie sich dieser Ansatz effektiv umsetzen lässt.
Webinar Recording
XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
Nov 12, 2010
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.
Webinar Recording
Zugriffe im Griff: Von der Übersicht zur Risikominimierung
Nov 03, 2010
Martin Kuppinger von KuppingerCole geht in diesem Webinar auf die Trends im Bereich der Access Governance und die Rolle, die Access Governance in GRC-Strategien spielen kann und muss ein. Er definiert Anforderungen an Access Governance-Lösungen und liefert eine Checkliste für die Auswahl solcher Lösungen. Klaus Hild von Novell spricht anschließend über Best Practices für die schrittweise Entwicklung und Umsetzung von Access Governance-Lösungen.
Webinar Recording
How to Deploy Identity Management When You're Not a Top Fortune 500 Company
Nov 02, 2010
Medium-to-large enterprises face specific challenges in implementing identity management. Quite often, solutions are tailored for very large companies, making deployments an uneasy fit. In this Webinar, Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can accumulate quick wins and reach identity workflow and compliance safely. Followed by Martin, Stéphane Vinsot from Evidian will lead you through some Best Practices and will talk about Evidian´s experiences with identity management deployments in medium-to-large enterprises.
Webinar Recording
Policy Based Access Control with XACML 3.0
Oct 26, 2010
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.
Webinar Recording
Identity Federation: Essential Building Block for a Winning Cloud Strategy in your SAP Environment
Oct 15, 2010
In this webinar, Martin Kuppinger will give an overview on the current and future role of identity federation in hybrid cloud infrastructures with a focus on SAP environments. He will be followed by Keith Grayson from SAP, who will be talking on SAP user management optimization through SAML 2.0.
Webinar Recording
Zurück zur Kernkompetenz: Cloud Computing als Strategie
Oct 15, 2010
In diesem Webinar führt Martin Kuppinger in die Thematik des Cloud Computing ein und stellt eine Checkliste für den optimalen und vor allem sicheren Einstieg in die Public Cloud vor. Mit Mani Pirouz wird dann ein Vertreter des erfolgreichen Cloud Computing Pioniers salesforce.com eine Reihe von Praxisbeispielen beschreiben und sich einer Diskussion über die Chancen und Risiken des Cloud Computing stellen.
Webinar Recording
Privileged User Management: Wer kontrolliert die Admins?
Oct 12, 2010
Zeitgemäße Lösungsansätze für das Management privilegierter Identitäten stehen deshalb im Fokus dieses Webinars. Zunächst wird Martin Kuppinger einen Einblick in die unterschiedlichen Methoden des Privileged User Management und einen Überblick über den Lösungsmarkt geben. Danach wird Klaus Hild von Novell aus seinen reichhaltigen Projekterfahrungen an Hand einiger prägnanter Beispiele aus unterschiedlichen Branchen den aktuellen Stand in der Praxis beschreiben und Handlungsempfehlungen geben.
Webinar Recording
Best Practices for Enterprise Log Management
Oct 03, 2010
Not only since cloud computing has become a hype, traditional perimeters have been more and more disappearing. Managing risks and securing compliance in such "cloudy" environments has become a critical priority. At the same time, an ever increasing number of different systems and devices create floods of IT events and monitoring those events and find out those in real time, which indicate a threat. Managing logs therefore has become a complex task. Join us in this webinar to discuss best practices for log management.
Webinar Recording
Machen Sie mehr aus dem Active Directory - Identity-Dienste für die heterogene IT
Sep 30, 2010
Die meisten Unternehmen verfügen über eine zentrale Active Directory-Infrastruktur. Deshalb spricht viel dafür, darauf aufzubauen, um beispielsweise auch andere Systemumgebungen zu verwalten. So kann man bei geringem Integrationsaufwand noch mehr aus der ohnehin vorhandenen Infrastruktur machen und die heterogene IT in den Griff bekommen.
Webinar Recording
Die Microsoft-Plattform optimal nutzen: Mit wenig Aufwand zur umfassenden Identity Management Lösung
Sep 24, 2010
In diesem Webinar umreißt Martin Kuppinger ein Szenario, wie sich unter Verwendung der Microsoft Security Lösungen eine ganzheitliche Identity Management Infrastruktur erstellen lässt. Anschliessend geht Dr. Martin Kuhlmann (Omada) darauf ein, wie eine solche Lösung in der Praxis umgesetzt wird.
Webinar Recording
Managing Identities in Hybrid Cloud Environments
Sep 23, 2010
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT - how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments.
Webinar Recording
Virtualization Security Trends & Insights
Sep 15, 2010
In this webinar, Martin Kuppinger will talk about security in virtualized environments and the developments happening in this space. How does state-of-the-art security in virtual environments look like? And what should be a future roadmap that works?
Webinar Recording
Hidden Gems - Vendors you Should Have a Look at
Jul 03, 2010
In this webinar, Kuppinger Cole´s founder and chief analyst will talk about his research findings for a recent report on vendors, which are, from the KuppingerCole perspective, Hidden Gems in the markets which we are analyzing. “Hidden Gems” are vendors which are (still) relatively small, less known then "the big ones", and which offer innovative solutions worth to consider. Even though there are currently a lot of other interesting innovations out there, released by established vendors, like for example Microsoft’s U-Prove. However, this webinar will cover only those vendors which are not (yet) stars in the worldwide IAM, GRC, and Cloud markets. Be surprised, join us in this interesting webinar.
Webinar Recording
How to Keep Entitlement Management Lean - in any Environment
Jun 29, 2010
How to gain more flexibility and efficiency in an environment where requirements change very fast, and where users and services cannot be classified any more as easy as being "internal" or "external". This Webinar is about key decision criteria for lean entitlement management and provisioning solutions.
Event Recording
Migros Identity Management & SSO - Implementation and Perspectives
May 25, 2010
Best practices session at the European Identity Conference 2010 by Rudolf Gisler, Migros Dr. Peter Schill, SafeNet
Event Recording
Online Services and Identity Management – Driving Innovations through a Cross Sector Vision
May 25, 2010
Best practices session at the European Identity Conference 2010 by Olivier Maas, Atos Worldline and Vincent Etchebarne, Orange Labs / France Telecom
Event Recording
Integration of SAP in a Comprehensive Identity Management Solution for Access and Authorization Control with Enterprise Roles
May 25, 2010
Best practices session at the European Identity Conference 2010 by Dr. Uwe Vehlies, Hannover Re and Rüdiger Berndt, Oxford Computer Group Deutschland
Event Recording
Best Practices for Identity Management from the Annals of Private Banking
May 25, 2010
Best practices session at the European Identity Conference 2010 by Kumar Sarvesh, Deutsche Bank (Suisse) S.A
Event Recording
Login for the Mobile Internet - What new Challenges arise from Mobile Internet Usage?
May 25, 2010
Best practices session at the European Identity Conference 2010 by Michael Gärtner, Deutsche Telekom AG
Event Recording
From Plastic to Secured Bits - a Wallet for Virtual Cards on the Mobile Phone
May 25, 2010
Best practices session at the European Identity Conference 2010 by Jörg Heuer, Deutsche Telekom Laboratories
Event Recording
Business Oriented Entitlement Life-Cycle Management
May 25, 2010
Best practices session at the European Identity Conference 2010 by Henrik Siiskonen, If P&C Insurance Company Ltd and Pekka Hagström, RM5 Software
Event Recording
Venn and the Art of Data-Sharing
May 25, 2010
Best practices session at the European Identity Conference 2010 by Eve Maler, PayPal Inc.
Event Recording
Bringing BMW’s New Central Identity and Access Management System into Life
May 25, 2010

Best practices session at the European Identity Conference 2010 by Jürgen Skerhut, BMW and Dr. Andreas Neumann, Logica Deutschland

Event Recording
From Creative Chaos to Modern Service Provisioning
May 25, 2010
Best practices session at the European Identity Conference 2010 by Dr. Nicola Stein, German Aerospace Center
Event Recording
SPOCS - Crossborder Access to eGovernment Services
May 25, 2010
Best practices session at the European Identity Conference 2010 by Martin Spitzenberger, Austrian Federal Chancellery
Event Recording
The EC STORK Project - Approaches, Challenges, Results
May 25, 2010
Best practices session at the European Identity Conference 2010 by Marc Sel, PwC Belgium
Event Recording
German National ID – Privacy by Design
May 25, 2010
Best practices session at the European Identity Conference 2010 by Andreas Reisen, Federal Ministry of the Interior, Germany
Event Recording
Integrating Physical Access Control into Active Directory at King ICT, Croatia
May 25, 2010
Best practices session at the European Identity Conference 2010 by Adrian Castillo, HID Global and Kristian Koljatic and Nino Talian, KING ICT d.o.o.
Event Recording
Managed IAM Service Project at Piaggio
May 25, 2010
Best practices session at the European Identity Conference 2010 by Lorenzo Mastropietro, Piaggio
Event Recording
Identity Management & Cloud Computing in the Automotive Industry
May 25, 2010
Best practices session at the European Identity Conference 2010 by Dr. Barbara Mandl, Daimler AG
Event Recording
Orange France Telecom Identity Management Strategy
May 25, 2010
Best practices session at the European Identity Conference 2010 by Philippe Clément, Orange/France Telecom
Event Recording
Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity
May 25, 2010
Best practices session at the European Identity Conference 2010 by Jonas Hogberg, Ericsson
Event Recording
Identity and Access Management at Munich University Hospital
May 25, 2010
Best practices session at the European Identity Conference 2010 by Dr. Walter Swoboda and Simon Leutner, University Hospital of Munich
Event Recording
The Most Valid Wins of IAM
May 16, 2010
Keynote at the European Identity Conference 2010 by Jackson Shaw, Active Directory, Identity Management Expert, Quest Software
Event Recording
IAM into the Cloud: Improving Security with Cloud and Collaboration Technology
May 15, 2010
Keynote at the European Identity Conference 2010 by Tim Dunn, Vice President - Security Business Unit, CA
Event Recording
Security, Automatization and Management Essentials for the Cloud
May 15, 2010
Keynote at the European Identity Conference 2010 by Richard Sharp, Director of Software Production, XenServer Group, Citrix Systems
Event Recording
Extending the Principles of Service-Oriented Security to Cloud Computing
May 13, 2010
Keynote at the European Identity Conference 2010 by John Aisien, Vice President of Product Management, Oracle Corporation
Event Recording
On Cloud 9 or Lost In (that) Space
May 13, 2010
Keynote at the European Identity Conference 2010 by Prof. Dr. Eberhard von Faber, Security Strategy and Executive Consulting, T-Systems
Event Recording
Identity in the Cloud – Finding Calm in the Storm
May 13, 2010
Keynote at the European Identity Conference 2010 by André Durand, Founder & CEO, Ping Identity
Event Recording
Follow the Money: How Cloud Providers' Business Needs Drive Enterprise Identity & Security
May 13, 2010
Keynote at the European Identity Conference 2010 by Dale Olds, Distinguished Engineer, Novell
Event Recording
An Information Society Perspective on Electronic Identity Management
May 13, 2010
Keynote at the European Identity Conference 2010 by Dr. Dirk van Rooy, Head of Sector, Trust and Security, European Commission, DG Information Society and Media
Event Recording
The Role as a Role Model
May 12, 2010
Keynote at the European Identity Conference 2010 by Niels von der Hude, Senior Manager, Beta Systems Software
Event Recording
Trust in the Cloud
May 12, 2010
Keynote at the European Identity Conference 2010 by John Hermans, Associate Partner, KPMG
Event Recording
Next-Generation Provisioning: A Governance-based Approach
May 12, 2010
Keynote at the European Identity Conference 2010 by Darran Rolls, Chief Technology Officer, Sailpoint
Event Recording
National ID Documents Driving eApplications / eBusiness
May 12, 2010
Keynote at the European Identity Conference 2010 by Sabine Erlinghagen, Vice President & General Manager Identity Management & Biometrics, Siemens IT Solutions and Services
Event Recording
The Need of Preconfigured Business Processes for Identity Management and IT Compliance
May 12, 2010
Keynote at the European Identity Conference 2010 by Peter Weierich, Völcker Informatik
Event Recording
Interview with Nishant Kaushik, Oracle
May 11, 2010
Felix Gaehtgens interviews Nishant Kaushik at the European Identity Conference 2010
Event Recording
Interview with Dr. Dirk van Rooy, European Commission
May 11, 2010
Felix Gaehtgens interviews Dr. Dirk van Rooy at the European Identity Conference 2010
Event Recording
Six Sigma For the Secure Cloud-Equip the Enterprise for Success
May 11, 2010
Keynote at the European Identity Conference 2010 by Gerry Gebel, President, Axiomatics Americas
Event Recording
Interview with Fernando García, Symlabs
May 11, 2010
Felix Gaehtgens interviews Fernando García at the European Identity Conference 2010
Event Recording
Convergence: Better Control, Lower Cost
May 11, 2010
Keynote at the European Identity Conference 2010 by Dave Kearns, Identity Expert & Writer, Network World
Event Recording
Federated Directory meets Minimal Disclosure: Mortal Enemies or Soul Mates?
May 11, 2010
Keynote at the European Identity Conference 2010 by Kim Cameron, Chief Architect of Identity in the Security Division, Microsoft
Event Recording
Interview with Nick Nikols, Novell
May 10, 2010
Felix Gaehtgens interviews Nick Nikols at the European Identity Conference 2010
Event Recording
Interview with Peter Weierich, Völcker Informatik
May 10, 2010
Martin Kuppinger interviews Peter Weierich at the European Identity Conference 2010
Event Recording
Interview with Jackson Shaw, Quest Software
May 10, 2010
Martin Kuppinger interviews Jackson Shaw at the European Identity Conference 2010
Event Recording
Interview with Prof. Dr. Eberhard von Faber and Dr. Michael Pauly, T-Systems
May 10, 2010
Felix Gaehtgens interviews Prof. Dr. Eberhard von Faber and Dr. Michael Pauly at the European Identity Conference 2010
Event Recording
Interview with Kim Cameron, Microsoft
May 10, 2010
Felix Gaehtgens interviews Kim Cameron at the European Identity Conference 2010
Event Recording
Interview with Lorenzo Mastropietro, Piaggio
May 10, 2010
Felix Gaehtgens interviews Lorenzo Mastropietro at the European Identity Conference 2010
Event Recording
Interview with Matthew Gardiner, CA
May 10, 2010
Felix Gaehtgens interviews Matthew Gardiner at the European Identity Conference 2010
Event Recording
Interview with Sabine Erlinghagen, Siemens
May 10, 2010
Tim Cole interviews Sabine Erlinghagen at the European Identity Conference 2010
Event Recording
Interview with Priska Altorfer, wikima4 AG
May 10, 2010
Martin Kuppinger interviews Priska Altorfer at the European Identity Conference 2010
Event Recording
Interview with Gerry Gebel, Axiomatics
May 10, 2010
Felix Gaehtgens interviews Gerry Gebel at the European Identity Conference 2010
Event Recording
European Identity Awards 2010
May 08, 2010
European Identity Awards ceremony during the European Identity Conference 2010. May 5, 2010 in Munich, Germany.
Event Recording
European Identity Conference 2010 Opening keynote
May 07, 2010
Opening keynote at the European Identity Conference 2010 by Tim Cole and Martin Kuppinger, Kuppinger Cole
Webinar Recording
Information Security and Governance for Microsoft SharePoint Environments
Apr 26, 2010
In this webinar, we will look at the SharePoint Security and the SharePoint Security Add-On market, with specific focus on what you need to fulfill the GRC requirements in SharePoint environments and how to do that integrated with other information systems.
Webinar Recording
One Entitlement Management For All - How to Manage All Users, Services, and Service Providers
Apr 22, 2010
As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications.
Webinar Recording
Access Governance: Implement Processes, Reduce Business Risks
Apr 17, 2010
As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements.
Webinar Recording
Managing Cloud Security and Cloud Risk
Mar 30, 2010
Martin Kuppinger will discuss in this presentation risk-based approaches to manage cloud security. The issue, from his perspective, isn’t that the cloud is inherently insecure. The real issue is to deal in appropriate way with the specifics of the cloud – which includes not only security but as well related issues like availability. In this presentation, Martin Kuppinger will talk about aspects like authentication and authorization in cloud environments, cross-cloud governance approaches and the specific issues around changing providers. He will also highlight his view that risk and services are the two fundamental elements for IT management – even more in these cloudy times.
Webinar Recording
Identity, Security, Governance for the Cloud - Who is Who? A Market Overview
Mar 30, 2010
There is an increasing number of offerings around Identity Management, Cloud Security, and Cloud Governance in the market. Some of these are well-known and established, others are new. Martin Kuppinger will provide an overview of the different elements of cloud security (for private, hybrid, and public clouds) and a structuring of that emerging market(s). This presentation provides insight into what is there and what is missing from a KuppingerCole perspective.
Webinar Recording
Cloud Management - Sufficient to Mitigate Security Risks?
Mar 30, 2010
There is an increasing number of tools to manage cloud environments. Some are, in fact, more tools to manage virtualized environments, whilst others focus more on service management issues. More and more of these tools promise to support hybrid environments as well. However the question arises whether security is covered sufficiently by these tools. The panel will discuss the state of cloud management with respect to the security requirements.
Webinar Recording
Cloud Computing - is it Really a Risk?
Mar 27, 2010
Cloud Computing frequently is discussed mainly as a security risk. However, there is as well the view that the cloud is or might be more secure than on-premise IT solutions. Martin Kuppinger will look at risks of cloud computing, the status and outline the points which you should look at when considering a move to the cloud or moving additional services to the cloud. In contrast to most other information on that topic available today, the presentation will also look at solutions for these issues – some will be discussed in detail her, some in the closing keynote.
Webinar Recording
The Internal Cloud - What Are the Risks Involved And How to Avoid Them?
Mar 27, 2010
Many companies are telling that they tend to start with a “private” cloud instead of going to the “public” cloud. Besides the question whether hybrid IT environments aren’t reality today, this panel will discuss the specific security risks of internal clouds, especially around the changes from physical to virtual environments, but as well with respect to more loosely coupled IT environments and their new threats – which are in fact not that new, given that we have some experience on loosely coupled environments from SOA.
Webinar Recording
Cloud Computing Standards - Which Ones Are Already There And Which Ones Are Missing?
Mar 27, 2010
There are many standards out there for the cloud. SAML (Security Assertion Markup Language) for federation, SPML (Service Provisioning Markup Language), and many others. But there are as well many standards missing, either directly related to security or in some relation to security – like service management standards, given that SLAs (Service Level Agreements) and service descriptions are a key for measuring service fulfillment and thus managing risk and security issues. Obvious shortcomings are in the field of governance and auditing. In this panel, several experts will discuss the state and the lacks of standards as well as their expectations regarding the adoption of existing and new standards by vendors.
Webinar Recording
Beyond Simple Attestation - How to Really Keep Your Access Under Control
Mar 25, 2010
Attestation should not be a point solution, but an element within a larger information security architecture. In this Webinar, we will talk about where access certification is today and what is changing – and what has to change. We will describe maturity levels with respect to access certification and will focus on the relationship to risk management and to overall IT governance.
Webinar Recording
Making Security Stronger Yey Easier to Use
Mar 19, 2010
While companies are moving toward growth in 2010, IT budgets are still under intense scrutiny. IT departments are being asked to keep their networks and applications secure while still allowing end users to not be weighed down by policies and time consuming procedures with often a reduction in funds. In this webinar we will discuss about frequently unseen and very significant saving potentials through connecting enterprise-SSO and strong authentication with your existing infrastructure.
Webinar Recording
Expanding the Reach - Identity as a Key Enabler of Customer Satisfaction through Context-aware Personalization
Feb 10, 2010
Once having an identity management infrastructure in place, maximising this significant investment through expanding the infrastructure´s reach would be a good idea. In this webinar, we look into the possibilities on how to integrate the customer into your identity management strategy.
Webinar Recording
From E-SSO to a Holistic Authentication- and Authorization Strategy
Feb 10, 2010
Expert panel showcasing best practices migrating to a holistic auth(z) and auth(n) strategy.
Webinar Recording
Access Management Tools - can they Integrate with what you have in a Lean Way?
Feb 10, 2010
Controlling access to information and to target applications, is the key element of a security policy. Access management includes multiple elements, such as access control, access delegation, access policy definition and access reporting. In this virtual panel, we will look into how access management tools can integrate into your infrastructure in a lean and flexible way.
Webinar Recording
Versatile Authentication - One Layer of (Strong) Authentication
Feb 10, 2010
Versatile authentication flexibly integrates a variety of open and proprietary authentication methods into one security layer, and strongly simplifies the implementation of multiple authentication methods in complex environments. In this panel, Dave Kearns will discuss with several authentication vendors about current trends in versatile authentication.
Webinar Recording
5 Quick Win Approaches to Achieve the Next Level of your IAM Infrastructure
Feb 10, 2010
IT organisations are facing an increasing pressure to reduce costs, while at the same time compliance requirements increase and management is asking for more flexible solutions to faster react on new business requirements. In this Webinar, Martin Kuppinger, Principal Analyst at Kuppinger Cole, will describe 5 quick win approaches how to get your IAM infrastucture to the next level.
Webinar Recording
Provisioning and Access Governance Trends
Feb 10, 2010
Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of identity information have to be used in an increasing number of new processes and applications, with some of them running in the cloud. How to move on from centralized provisioning and access management infrastructures to a new, more decentralized way of doing identity management?
Webinar Recording
How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need
Jan 21, 2010
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
Webinar Recording
Harnessing Sun's OpenSSO Authentication and Authorization Mechanisms
Jan 14, 2010
It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. As part of a whole series of webinars focusing on practical issues and implementation details, this webinar will deeply dive into the implementation of Sun Microsystems OpenSSO.