...
CrossIdeas     CrossIdeas
Viale Luigi Schiavonetti 278 • 00173 Rome
E-Mail: info@crossideas.com
Internet: http://www.crossideas.com

Founded in 2011, CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives. Fortune 500 companies run IDEAS, CrossIdeas’ Identity Governance platform,  to harmoniously manage people, applications and access entitlements. CrossIdeas is headquartered in Rome and can be reached at www.crossideas.com

Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected? 04.12.2013 , 4:00pm CET, 10:00am EST, 7:00am PST
Many organizations have started their journey into the world of IAM several years ago.
Congress: European Identity & Cloud Conference 2013 14.05. – 17.05.2013 , Munich/Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Bridging (the gap between) Access Governance and Privileged User Management � and they lived happily ever after! 23.04.2013 , 4:00pm CEST, 10:00am EDT, 7:00am PDT
Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Identity Management lectures, but ultimately treated as different technologies and implementation projects.
Webinar: Expand your GRC Controls to Cover all Systems � how to Make SAP GRC Work in a Heterogeneous World 12.12.2012 , 4pm CET, 10am EST, 7am PST
SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the core business environment, auditors have started looking at other environments as well � for example the Microsoft Windows and SharePoint infrastructure which holds most of the unstructured data. In addition, there are several industries and many organizations which have a series of other core business applications in place which they need to integrate in the GRC approach as well.
Webinar: Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit f�r die Zukunft 30.11.2012 , 11:00 Uhr
Herk�mmliche Konzepte f�r die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den gro�en Trends Cloud Computing, Mobile Computing und Social Computing wirksam begegnen zu k�nnen. In diesem Webinar lernen Sie, wie sich Access Governance weiterentwickeln muss und welche Rolle die dynamische Zugriffssteuerung in Zukunft spielen wird.
Webinar: Quantifying Access Risk: How to Sell the Access Governance Project to your CFO 26.04.2012 , 16:00 – 17:00 CEST, 10:00am ET, 7:00am PT
How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money.
Congress: European Identity & Cloud Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Access Risks – from SAP to the Outer Space: an Identity & Access Governance Journey 13.03.2012 , 16:00 CET, 11:00am ET
Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the benefits of an Enterprise wide Identity & Access Governance implementation.
Webinar: Integrating Access Governance and Entitlement Management 22.09.2011 , 16:00 CEST / 7:00am PT / 10:00am ET
Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example, the new US Dodd-Frank Act is 6 times the size of its predecessor, the 2002 Sarbanes Oxley Act. Responding to these new set of laws forces enterprises and organizations to improve the transparency and flexibility of their access governance procedures. In this webinar, we will explore the diverse drivers and new that are shaping the evolution of access governance strategies, as well as discussing how they can be implemented within a dynamic authorization management environment.
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , M�nchen
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Cutting Costs through Lean Role Management 29.01.2009 , 17:00 CET, 4pm UTC
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.
Product Report: CrossIdeas IDEAS – 7089724.02.2014Martin Kuppinger €495.00
A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining Access Governance and Dynamic Authorization Management. Providing connectivity to target systems based on direct connectors and through legacy Identity Provisioning systems…

Order the report

Leadership Compass: Access Governance – 7073508.03.2013Martin Kuppinger €1295.00
Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few vendors try to establish this as a new market segment, we understand enhanced analytical capabilities just as an important feature within Access Governance. Few years ago, there have been only a handful of vendors in the Access Governance market. The large players acquired some vendors, others entered the market, and some of the Identity Provisioning vendors developed Access Governance capabilities by themselves. Thus, there are close to 20 vendors in this market segment as of now. This Leadership Compass provides an overview and analysis of the Access Governance market segment. Access Governance nowadays goes well beyond access recertification, role management and analytics. Strong…

Order the report

Leadership Compass: Identity Provisioning – 7015115.10.2012Martin Kuppinger €1295.00
Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity Provisioning market segments. It shows that there are several established vendors with mature solutions, but also some very interesting smaller or regional vendors with a good potential for growth and for delivering what customers require. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit. However, this Leadership Compass will help identifying those vendors customers should have a closer look at.

Order the report

Product Report: CrossIdeas IDEAS – 7062011.07.2012Martin Kuppinger €295.00
CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM (Identity and Access Management). Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent software vendor in their core market segments. Concerns which have been voiced along the transition regarding maintaining existing Engiweb customers have shown that they were negligible. The markets CrossIdeas deals in, especially Access Governance continue to support a number of comparatively small specialist vendors. Besides, CrossIdeas can expect a strong and significant revenue stream from ongoing service contracts from the former Engiweb installed customer base which has allowed the new management enough breathing room to get over the initial reorientation phase, with success in both winning new customers also outside of Italy and with building a considerable partner ecosystem across Europe.

Order the report

Product Report: CrossIdeas IDEAS – 7027114.09.2011Martin Kuppinger €195.00
CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM. Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent software vendor in their core market segments. Like its predecessor, CrossIdeas is a one-product company, focusing entirely on their “IDEAS” platform which is built around role management, authorization management, and other core identity-related features. KuppingerCole feels that the product is well positioned as an accepted solution in the market for Access Governance platforms. It also provides support for   Dynamic Authorization Management (also sometime referred to as Entitlement Management), which we see as a strength and unique value proposition.

Order the report

Product Report: Engiweb IDEAS29.04.2010Martin Kuppinger €95.00
Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their platform IDEAS which is built around role management, authorization management, and other features. The product is, in the Kuppinger Cole notion, best positioned as part of the market segment of Access governance platforms but with additional support for Entitlement Management. Engiweb is, from our perspective, one of the European vendors of IAM and GRC solutions with a strong conceptual foundation, in line with leading-edge vendors. IDEAS is amongst the leading-edge products in the market from a conceptual point-of-view. It provides strong capabilities for Access Governance, exceptional integrated capabilities for role management, and a very strong business view. Besides this, Engiweb IDEAS is…

Order the report

Product Report: Engiweb IDEAS27.03.2009Martin Kuppinger €95.00
Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their platform IDEAS which is focused around role management, authorization management, and other features. The product is, in the Kuppinger Cole notion, best positioned as part of the market segment of Identity/Access-oriented GRC platforms. Engiweb is, from our perspective, one of the European vendors of IAM and GRC solutions with a strong conceptual foundation, in line with leading-edge vendors like BHOLD and Völcker Informatik. IDEAS is amongst the leading-edge products in the market from a conceptual point-of-view. It provides strong capabilities for IAM-GRC, exceptional integrated capabilities for role management, and a very strong business view. Besides this, Engiweb IDEAS is somewhat…

Order the report

Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?04.12.2013
Many organizations have started their journey into the world of IAM several years ago. Watch
Bridging (the gap between) Access Governance and Privileged User Management� and they lived happily ever after!25.04.2013
Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Identity Management lectures, but ultimately treated as different technologies and implementation projects. Watch
Expand your GRC Controls to Cover all Systems – How to Make SAP GRC Work in a Heterogeneous World13.12.2012
SAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the core business environment, auditors have started looking at other environments as well � for example the Microsoft Windows and SharePoint infrastructure which holds most of the unstructured data. In addition, there are several industries and many organizations which have a series of other core business applications in place which they need to integrate in the GRC approach as well. Watch
Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit f�r die Zukunft03.12.2012
Herk�mmliche Konzepte f�r die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den gro�en Trends Cloud Computing, Mobile Computing und Social Computing wirksam begegnen zu k�nnen. In diesem Webinar lernen Sie, wie sich Access Governance weiterentwickeln muss und welche Rolle die dynamische Zugriffssteuerung in Zukunft spielen wird. Watch
Quantifying Access Risk: How to Sell the Access Governance Project to your CFO26.04.2012
How can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money. Watch
Access Risks – from SAP to the Outer Space: an Identity & Access Governance Journey14.03.2012
Access Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the benefits of an Enterprise wide Identity & Access Governance implementation. Watch
Integrating Access Governance and Entitlement Management22.09.2011
Under the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example, the new US Dodd-Frank Act is 6 times the size of its predecessor, the 2002 Sarbanes Oxley Act. Responding to these new set of laws forces enterprises and organizations to improve the transparency and flexibility of their access governance procedures. In this webinar, we will explore the diverse drivers and new that are shaping the evolution of access governance strategies, as well as discussing how they can be implemented within a dynamic authorization management environment. Watch
Cutting Costs through Lean Role Management30.01.2009
In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.