Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Clearing up a Cloudy Standard: Simple Cloud Identity Management
Dec 15, 2011
"Simple Cloud Identity Management (SCIM) appears to be our best chance for any sort of public provisioning standard, something we desperately need and have needed for years", says Dave Kearns. Join him, Ping Identity CTO Patrick Harding and SailPoint CTO Darran Rolls for this webinar on the newest provisioning specification which both Harding and Rolls have been involved with from the beginning.
Webinar Recording
The Open API Economy - Opportunities and Risks
Dec 13, 2011
Three main (business) trends are driving technology in all areas: Social Computing, Mobile Computing and Cloud Computing. Looking behind the curtain, we see that these three trends with strong impact on everything around us are based on yet another trend, which is enabling companies to build their business models on top of services and features available through Open APIs (standardised application programming interfaces through which applications can connect to other applications). The impact of Open APIs on the way we do business is growing so fast, that we have to label it not just as a...
Webinar Recording
Risk. The New Compliance
Dec 01, 2011
For many years complying with government standards and industry regulations has been seen as a check box in the lengthy list of IT security tasks. However, most recent changes in the ecosystem (e.g., increased cyber security threats) have led to a rethinking of this approach. More and more organizations realize that instead of looking at Governance, Risk, and Compliance from a centralized perspective, it is more efficient to let business operations drive these efforts as that's where the organization's risk knowledge resides. Join this webcast where we reveal how to tackle risk and its...
Webinar Recording
Access Governance: Identity Management aus dem Business für das Business
Nov 22, 2011
Verantwortung kann nicht delegiert werden. Es sind die Mitarbeiter der Fachabteilungen, die gegenüber Aufsichtsorganen, Prüfern und Justiz in der Verantwortung stehen und letztlich auch in die Haftung genommen werden. Alleine schon deshalb (aber natürlich auch, weil sie näher am Prozess sind und es deshalb besser können) muß ein modernes Identity Management fachabteilungstauglich sein. Identity & Access Governance. In diesem Webinar beschreibt zunächst Martin Kuppinger, worauf es ankommt, wenn man seine Identity Infrastruktur den Fachabteilungen als Service zur Verfügung stellt. Danach...
Webinar Recording
Why Access Governance Moves the Risk and Reward Balance in your Favour
Nov 15, 2011
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
Webinar Recording
Solving the Million Record Challenge with XACML
Nov 11, 2011
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.
Webinar Recording
The Clock is Ticking: Rethink PCI 2.0 Compliance
Nov 03, 2011
The time when you will ultimatively have to demonstrate PCI DSS 2.0 compliance is getting closer now. We therefore would like to invite you to join us in this webinar to have a look at how you can certify fast and at reasonable cost. Don´t miss this webinar and its great speaker lineup: KuppingerCole´s Senior Analyst Dave Kearns, Tom Arnold from Payment Software Company, who is one of the leading Qualified Security Assessors in the world, and Dr. Torsten George from Agiliance.
Webinar Recording
IdM in der Praxis: Urlaubs- und Krankheitsvertretungen einfach und sicher gemacht
Oct 25, 2011
Sie sind hoffentlich gut erholt und wohl behalten zurück aus Ihrem Urlaub? Dann wünschen wir Ihnen, dass Ihre Vertretung gute Arbeit geleistet hat und Ihr Erholungseffekt nicht alsbald durch liegen gebliebene Arbeit aufgezehrt wird. Gute Arbeit kann eine Vertretung allerdings nur dann wirklich leisten, wenn sie dieselben Zugriffsrechte und Systemberechtigungen hat wie Sie. Wie man dies auf einfache und nachvollziehbare Art und Weise erreichen kann, ohne dass Sie Ihre Passworte weitergeben müssen, das erfahren Sie in diesem Webinar.
Webinar Recording
Surviving the Cyber Security Attack Wave
Oct 14, 2011
In this webinar, KuppingerCole's co-founder and Principle Analyst Martin Kuppinger will talk about the key elements of a pro-active security risk management strategy. Then, Dr. Torsten George from Security and Operational Risk Management pioneer Agiliance will describe the elements of a properly planned and implemented security risk management program that enables organizations to reduce risk by making threats and vulnerabilities visible and actionable, enabling them to prioritize and address high risk security exposures before breaches occur.
Webinar Recording
XACML Made Easy: Modeling High Level Policies in XACML
Oct 07, 2011
In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls.
Webinar Recording
Thriving in Change - Using Federation and the Cloud to Minimize IT Costs
Sep 29, 2011
Overcoming the inherent security and identity management challenges is key to a successful move into the cloud. In this webinar, KuppingerCole's Senior Analyst, Sebastian Rohr, will give suggestions for successful adoption of cloud computing that overcome the inherent security and identity management challenges. Sebastian will be joined by Travis Spencer, a Sr. Technical Architect in Ping Identity’s CTO office, who will elaborate on these options, drawing on the lessons learned from the hundreds of Ping Identity customers that have overcome these difficulties.
Webinar Recording
Why Managing Privileged Users Benefits your Business
Sep 28, 2011
In this webinar, KuppingerCole's co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don'ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software's Director Identity Management EMEA, will talk about Quest Software's solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.
Webinar Recording
Integrating Access Governance and Entitlement Management
Sep 22, 2011
Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example, the new US Dodd-Frank Act is 6 times the size of its predecessor, the 2002 Sarbanes Oxley Act. Responding to these new set of laws forces enterprises and organizations to improve the transparency and flexibility of their access governance procedures. In this webinar, we will explore the diverse...
Webinar Recording
Game On: Managing Multi-Regulatory Compliance
Sep 17, 2011
In this webinar, KuppingerCole's co-founder and Principle Analyst Martin Kuppinger will give you an overview on how to stay compliant in a multi-regulatory environment. Followed by Martin, Cognosec CEO Oliver Eckel will reveal best practices of managing compliance in today's multi-regulatory world.
Webinar Recording
How to Prepare for BYOD (Bring Your Own Device)
Jul 01, 2011
In a recent blog entry , KuppingerCole´s principal analyst Martin Kuppinger wrote, that the acronym BYOD stands for IT departments accepting that they’ve lost against their users. Now we have to see, how we can make the best out of it and minimize the risks involved with private mobile devices logging into corporate networks. In this webinar, Tim Cole will moderate a discussion between Craig Burton and Martin Kuppinger on how to prepare your enterprise for BYOD by providing a risk-based selection of secure paths to access corporate information and to protect that information.
Event Recording
Interview with Jörg Heuer, Deutsche Telekom Laboratories
May 12, 2011
Day three of the European Identity Conference 2011
Event Recording
Interview with Fulup Ar Foll, Oracle
May 12, 2011
Day three of the European Identity Conference 2011
Event Recording
Interview mit Tim Cole, KuppingerCole
May 12, 2011
Event Recording
Interview with Kim Cameron
May 12, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Michael Schwarz, Gluu
May 12, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Martin Kuppinger, KuppingerCole
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Dave Kearns, Network World
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Nishant Kaushik, Oracle
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Felix Gaehtgens, Axiomatics
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Tim Cole about the European Identity Conference
May 11, 2011
Event Recording
Interview with Drummond Reed, connect.me
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Don Thibeau, OpenID Foundation
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Dr. Barbara Mandl, Daimler
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Prof. Dr. Eberhard von Faber, T-Systems
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Prof. Dr. Sachar Paulus, KuppingerCole
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Laurent Liscia, OASIS
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Nelson Cicchitto, Avatier
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Jackson Shaw, Quest Software
May 11, 2011
Day two of the European Identity Conference 2011
Event Recording
Interview with Rolf von Roessing, ISACA
May 11, 2011
Day two of the European Identity Conference 2011
Webinar Recording
Database Firewall - Build the First Line of Protection
May 03, 2011
Database Security is one of the key elements within any IT security strategy, given that several of the most severe incidents in IT are related to attacks against databases and that most of the critical and sensitive information in organizations is stored in databases. Database firewalls implement a first line of defense, blocking in real time any suspicious data manipulation without forcing production environment redesign. Thus, companies should consider the value that these tools can add to their security strategy.
Webinar Recording
Identity Management - in the Cloud and for the Cloud
Apr 21, 2011
How to best deploy Identity and Access Management today? There is an increasing number of opportunities, including hosted and cloud-based options. And there is an increasing number of services in the cloud which have to become integrated into the IAM ecosystem. Thus the question is: How to best deploy IAM to serve all requirements?
Webinar Recording
Business-Centric, Cloud-Aware Identity and Access Management
Apr 15, 2011
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce you into the key elements of a future-proof and cloud-ready Identity and Access Management strategy and how to deal with hybrid cloud environments. Following Martin, Ralf Knöringer and Rudolf Wildgruber from Siemens IT Solutions and Services will present case studies and product features of Siemens DirX Identity and DirX Audit and show how to realize an Identity Governance solution that creates business value.
Webinar Recording
Reliable Protection for Information in Databases
Apr 13, 2011
How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mechanisms within databases and in the surrounding system environment. In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database...
Webinar Recording
Access Management: Simplify Access to Web- and Cloud-based Applications without Compromising Security
Apr 01, 2011
The role of web access management has changed and nowadays serves as a central layer of protection for many different services, enabling federations and allowing versatility for users. Join us in this webinar to learn, how to transform your traditional web access management into such a central multi-purpose layer.
Webinar Recording
Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
Mar 30, 2011
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.
Webinar Recording
Identity Management, Access Governance und Datenschutz: Sind Sie auf der sicheren Seite?
Mar 24, 2011
Datenschutz - ein notwendiges Übel? In zahlreichen Unternehmen ist dieses Thema auch heute in der Tat noch eine Randerscheinung, obwohl mit der gesteigerten öffentlichen Wahrnehmung und damit einher gehenden Sensibilisierung jeder bekannt werdende Verstoß zu einer fundamentalen Schädigung der Substanz Ihres Unternehmens führen kann. Dieses Webinar hilft Ihnen dabei, den Datenschutz wirksam und effizient in Ihrem Unternehmen zu verankern.
Webinar Recording
Database Governance - How to Put the Right Controls in Place to Protect Your Data
Mar 16, 2011
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and technical approaches will be required. Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.
Webinar Recording
Recent Trends and Best Practices in Internal Audit Management for Better Business Performance
Mar 11, 2011
Internal Audit (IA), traditionally a vehicle preserving assets and ensuring compliance, has been expanding it´s scope into a means for business process improvement and operational excellence, while at the same time it has to cope with an increasing number of high-impact risks. The challenge is, to shift course from IA´s asset preserving role to a new, value creation focused role. In this webinar, Martin Kuppinger will talk about this paradigm shift in IA, how it can be aligned more closely to your company´s strategies, and how an up-to-date Enterprise GRC strategy will help you to create...
Webinar Recording
Externalize Authorization - XACML and Beyond
Mar 04, 2011
Externalizing and centralizing authorization from applications has recently gained momentum, as related standards like XACML have matured and experiences shared by early adopters have been positive. Obviously, potential benefits from a standardized method for authorization are tremendous. KuppingerCole Research therefore has defined a clear focus in the area of centralized authorization, monitoring the market and analyzing best practices. In this webinar, Martin Kuppinger will give an update on his recent findings and he will discuss with Doron Grinstein, CEO at authorization and XACML...
Webinar Recording
Sicherheit in der Cloud: Die 5 wichtigsten Regeln für eine funktionierende Sicherheitsstrategie
Feb 23, 2011
Cloud Computing findet jenseits der traditionellen physischen Grenzen, dem sogenannten Perimeter" statt, der den Mittelpunkt traditioneller Sicherheitsansätze bildete. In dem Maße, in dem sensitive Unternehmensdaten und Anwendungen zunehmend in die Cloud abwandern, steigt die Unsicherheit darüber, wie denn Informationssicherheit in der Cloud überhaupt gewährleistet werden kann. In diesem Webinar beschreibt Martin Kuppinger die 5 wichtigsten Regeln für eine funktionierende Cloud-Sicherheitsstrategie. Klaus Hild, Senior Technology Specialist Identity and Security bei Novell, wird...
Webinar Recording
Mehr Informationssicherheit durch effizientes Berechtigungsmanagement
Feb 19, 2011
Es gibt eine ganze Reihe von Gründen, warum das Thema Berechtigungsmanagement aktuell in der Unternehmenspraxis eine große Rolle spielt. Einerseits, weil es die Basis bildet für den Umgang mit Informationsrisiken (Stichwort Wikileaks), andererseits aber natürlich auch, weil es bei vielen Unternehmen Nachholbedarf gibt, um einen besseren Überblick über Berechtigungen zu bekommen und aus einem bisher eher mühseligen Geschäft mit Hilfe zeitgemäßer Werkzeuge Einsparpotenziale zu erschließen. Mit diesem Webinar bieten wir Ihnen die Möglichkeit, sich zu aktuellen Trends und Entwicklungen im...
Webinar Recording
The Business Value of Log Management Best Practices
Jan 26, 2011
Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.