...

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 


 Sponsored Events

Date Title
12.01.2016 Webinar

Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, IAM must integrate well into the existing landscape. Depending on their current infrastructure and requirements, organizations therefore might want to start at different points with IAM. Successful implementations demand a holistic, unified view.

05.05. – 08.05.2015 Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

13.05. – 16.05.2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

17.04. – 20.04.2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

15.11.2011 Webinar

Why Access Governance Moves the Risk and Reward Balance in your Favour

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

27.09.2011 Webinar

Why Managing Privileged Users Benefits your Business

In this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA, will talk about Quest Software’s solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security.

10.05. – 13.05.2011 Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

13.12.2010 Webinar

Managing the Change – Getting on the Road to the Cloud through Small and Manageable Steps

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.

09.12.2010 Webinar

Building Operational Governance for SharePoint 2010

During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices.

26.11.2010 Webinar

Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.

04.05. – 07.05.2010 Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.

04.05. – 07.05.2010 Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

04.05. – 07.05.2010 Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.

21.01.2010 Webinar

How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need

Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?

10.12.2009 Webinar

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

19.11.2009 Webinar

Pass Your Next Compliance Audit With Confidence

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

11.11.2009 Webinar

Single Sign-on for SAP Environments

The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.

20.08.2009 Webinar

Vereinfachung der Berechtigungsanalyse und -Verwaltung

In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt.

05.05. – 08.05.2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

22.04. – 25.04.2008 Congress

European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.

 Reports

Date Title Price
22.04.15

Executive View: Dell One Identity Cloud Access Manager – 71250

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and…

€190.00
06.05.14

Vendor Report: Dell IAM – 70812

While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and…

€495.00
17.10.12

Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager – 71000

This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle…

€295.00
22.08.12

Snapshot: Quest One Identity Manager Data Governance Edition – 70722

Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It…

€190.00
01.12.11

Product Report: Quest One Identity Manager 5 – 70133

In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically…

€195.00
20.09.10

Product Report: Quest Defender

Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong…

€95.00
16.08.10

Product Report: Quest Defender

Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine…

€95.00
09.11.09

Product Report: Quest Single Sign-On solutions for SAP

The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between…

€95.00
07.10.09

Product Report: Quest Single Sign-On solutions for SAP

Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen…

€95.00
16.07.09

Product Report: Quest ActiveRoles Server

Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for…

€95.00
01.05.09

Product Report: Quest ActiveRoles Server

Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für…

€95.00

 Webcasts

Date Language Title
20.01.16 en

How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015’s high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged acces…

13.01.16 en

Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, …

13.05.15 en

Jackson Shaw – The Convergence of IT, Operational Technology and the Internet of Things

Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw discusses the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.

15.11.11 en

Why Access Governance Moves the Risk and Reward Balance in your Favour

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these p…

28.09.11 en

Why Managing Privileged Users Benefits your Business

In this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA…

14.12.10 en

Managing the Change – Getting on the Road to the Cloud through Small and Manageable Steps

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking.

10.12.10 en

Building Operational Governance for SharePoint 2010

During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best…

28.11.10 de

Kontextbasierte Authentifizierung im Active Directory Umfeld

Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansä…

11.12.09 de

Provisioning Trends: Schlank, voll automatisiert, kostengünstig

Martin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning

19.11.09 en

Pass Your Next Compliance Audit With Confidence

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with y…

11.11.09 en

Single Sign On for SAP Environments

The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Marti…

20.08.09 de

Vereinfachung der Berechtigungsanalyse und -Verwaltung

In diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punkt…

Quick Links

EIC Logo

Register now!

And get your early bird discount

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00 Uhr

.hide_price { display: none; }.show_price { display: inline; }$(document).ready(function(){ $(“button”).click(function() { $(“p”).removeClass(“intro”); }); //$(“#price_eur”).click(function (e) $(“[id^=’price_’]”).click(function (e) { var thisID = this.id; //$(this).text(thisID); $(“span[id^='” + thisID + “‘]”).removeClass(“hide_price”).addClass(“show_price”).siblings().removeClass(“show_price”).addClass(“hide_price”); });});

Information

Congress

European Identity & Cloud Conference 2016

Language:
English
Registration fee:
€1980.00
€1490.00 till 10.04.2016
$2376.00
$1788.00 till 10.04.2016

Contact person:
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10 – 13, 2016 Munich, Germany

Register Now

Key Topics

  • From Digital Transformation to Perpetual Disruption

  • Talking about ways to successfully secure Business Transformation

  • Preparing for tomorrow’s Risk Mitigation demands today

  • Focussing on your customer’s Identity with Cloud IAM

  • Securing the Internet of Everyone and Everything – Everywhere

How can we help you

Send an inquiry

Call Sales-Team +49 211 2370770

Mo – Fr 8:00 – 17:00

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.