Click on the slide!

EMV and Mobile Payment in 2015

Live Webcast!             Join our expert roundtable as we give some top security guidelines for EMV

Click on the slide!

Don't Be Another Headline

On-Demand               Learn how to implement data security best practices and view now!

Click on the slide!

Are You Securing Hadoop?

On-Demand               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Building a Secure, Compliant Cloud.

On-Demand               Play and now learn the key concepts and best practices to build your…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
Martin Kuppinger
KuppingerCole

  • Seven Fundamentals for Future Identity and Access Management
    Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source for identity information, Identity Management has to address a far more complex environment today. Over the past several years, we have already seen […]

  • Read your cloud contract well: Your cloud service might become disruptive to your business
    There is a lot of talk about disruptive technology and disruptive innovation – not only in the context of fundamental technology changes, but also in the context of innovating your business by being disruptive. Cloud Computing has a potential for fostering such innovation in business, for various reasons: It makes IT services available to organizations […]

  • Amazon opens data center in Germany
    Today, AWS (Amazon Web Services) announced the opening of their new region, located in Frankfurt, Germany. The new facilities actually contain two availability zones, i.e. at least two distinct data centers. AWS can now provide a local solution to customers in mainland Europe, located close to one of the most important Internet hubs. While on […]

  • Mobile, Cloud, and Active Directory
    Cloud IAM is moving forward. Even though there is no common understanding of which features are required, we see more and more vendors – both start-ups and vendors from the traditional field of IAM (Identity and Access Management) – entering that market. Aside from providing an alternative to established on-premise IAM/IAG, we also see a […]

  • SAP enters the Cloud IAM market – the competition becomes even tougher
    The market for Cloud IAM and in particular Cloud User and Access Management – extending the reach of IAM to business partners, consumers, and Cloud applications through a Cloud service – is growing, both with respect to market size and service providers. While there were a number of start-ups (such as Ping Identity, Okta and […]

  • From preventive to detective and corrective IAM
    Controls in security and GRC (Governance, Risk Management, and Compliance) systems are commonly structured in preventive, detective, and reactive controls. When we look at IAM/IAG (Identity and Access Management/Governance), we can observe a journey from the initial focus on preventive controls towards increasingly advanced detective and corrective controls. Initially IAM started with a preventive focus. […]

  • Can EU customers rely on US Cloud Providers?
    The recent US court decision has added to the concerns of EU customers (and of other regions such as APAC) regarding the use of Cloud services from US-based providers. The decision orders Microsoft to turn over a customer’s emails stored in Ireland to the US government. The decision required the company to hand over any […]

  • IBM to acquire CrossIdeas – further expanding its IAM/IAG portfolio
    A while ago I blogged about IBM being back as a leader in the IAM/IAG (Identity Access Management/Governance) market. Today the news that IBM is to acquire CrossIdeas, an Italian vendor in the Access Governance market, hit the wire. CrossIdeas is a key player in Access Governance in its home market, but also had some […]

  • More questions IAM buyers should ask
    Earlier this year, I published the Buyer’s Guide: Access Governance and Provisioning. That document provides condensed information about key selection criteria for Identity Provisioning and Access Governance products, while also posing questions that buyers should ask of vendors. I focused on “top 10 non-functional selection criteria” or “top 10 questions to ask the vendors”. As […]

  • Extending your Active Directory to the Cloud
    Most organizations have a Microsoft Active Directory in place. The Active Directory (or, in short, AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange Server, and some network infrastructure services including client configuration management based on Group Policies. AD […]

  • Dynamic Authorization Management and ABAC: The journey is the reward
    Chinese philosopher Confucius is said to be the originator of the saying “the journey is the reward”. What does it mean? In its historic meaning, it says that by moving forward people will benefit, even while they might not reach perfection. Applied to projects, it means that continuous improvements, new understandings and small successes over […]

  • How to identify attacks? Know your enemies – and what they already might do.
    In a panel discussion I had at EIC 2014 with Roy Adar, Vice President of Product Management at CyberArk, Roy brought up an interesting number: according to research, attacks start on average 200 days before they are detected. Taking into account the Gaussian distribution behind this average, some attackers might have been active for years […]

  • The Future of Corporate IT
    When looking at today’s IT, it is driven by some major evolutions. Everything which is done in IT has to take these evolutions into account. One is Social Computing. The second evolution is Mobile Computing. The third evolution is Cloud Computing. All these trends affect IT fundamentally. The consumerization and deperimeterization of IT are logical […]

  • Real world face recognition and where paper beats the smartphone
    A few days ago, I was I was travelling in a local train, together with a business partner, from my office in Germany to an event in another city. We both learned a lot about the real world challenges of face recognition. While I already had a 24-hour ticket for travelling in and around that […]

  • Real-time Security Intelligence – more than just “next generation SIEM”
    Recently  a spotlight has been shed on the need for investing in Information Security solutions. The increase in cyber-attacks, the consistently high level of internal challenges, the appearance of more sophisticated types of long-running attacks (sometimes called Advanced Persistent Threats or APTs), the concerns regarding cyber-security following the Snowden revelations, the permanent challenge of dealing […]