...
Martin Kuppinger: Authorization Strategy22.01.2009Martin Kuppinger
Even while some expert�s in the industry understand authorization management still as sort of �rocket science�, the year 2008 has shown significant evolution in that field. New vendors like Rohati have entered the market, others like Bitkoo appeared a little earlier, and some of the big vendors like Oracle and CA are as well actively pushing their technologies. Read the article
Cardspace B2B29.06.2007Martin Kuppinger
CardSpace is a solution for end users ? at least according to general opinion. In other words: It is an important element in business environments. According to KCP CardSpace will be in a position to play an essential part also in B2B scenarios. Read the article
Siemens TISA07.03.2007Tim Cole
Germany may not cut much academic ice amoung the authors of the PISA study, but at least with TISA Siemens has proven to be quite a bright sudent of human nature. Read the article
Market Overview Strong Authentication08.03.2010Sebastian Rohr €695.00
For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly…

Order the report

Congress: European Identity Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Kontextbasierte Authentifizierung im Active Directory Umfeld 26.11.2010 , 11:00 Uhr
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, �ber die unterschiedlichen Ans�tze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege f�r unterschiedliche Risiken angewendet werden k�nnen, und gibt eine �bersicht �ber L�sungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben. Information
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Die richtige Single Sign-on Strategie f�r mehr Sicherheit und IT-Compliance 26.10.2007 , 11:00 – 12:00
Die Einf�hrung von Single Sign-On Systemen wird in zunehmendem Ma�e von Compliance-Anforderungen beeinflusst. Bringt ein SSO-System zus�tzliche Risiken oder l��t sich damit eine Compliance-Strategie sogar vereinfachen? In diesem Webinar lernen Sie die unterschiedlichen SSO-Ans�tze innerhalb des Unternehmens, �ber die Unternehmensgrenzen hinweg und im Web kennen und deren Einflu� auf Ihre Compliance-Strategie. Information
Virtual Directories and Beyond24.04.2008 11:30-12:30Martin Kuppinger, KuppingerCole Dale Olds, Novell Sampo Kellom�ki, Symlabs Michel Prompt, Radiant Logic Dave Kearns, KuppingerCole Jackson Shaw, Quest Software
Dale Olds recently wrote in his blog about the need for an Identity Bus, describing it as “[…] a system that allows for loose coupling between identity data publishers and consumers in sequence where there is no single point of administrative control. It’s a way of passing identity data between a number of control points. It is explicitly about moving beyond hub tools like meta/virtual/directories.” Sampo Kellomäki added: “In removing political single point of control, concern arises regarding the privacy consequences and mitigation needed to make such a bus approach tenable. The panel will debate the tradeoff of loss of control versus benefits of the larger ecosystem and what can be done to minimize the collateral damage.” View details
Physical-Logical Convergence23.04.2008 11:30-12:30Satel J. Naik, City College Coventry Ralph Seinsche, HID Global
View details
Putting Context in Identity: Authentication, Authorization and Risk Management23.04.2008 14:00-15:00Michel Prompt, Radiant Logic John Aisien, Oracle Corporation Steve Neville, Entrust
Gathering context data at the point of authorization helps to minimize risk while allowing fine-grained authorization to occur. Maintaining context state data, and viewing it from different “angles” allows further refinement of the authentication ceremony including steps towards self-service provisioning and authorizations. View details
Putting Context in Identity: Governance, Compliance, Entitlement and Roles23.04.2008 15:00-16:00Paul Heiden, BHOLD COMPANY BV Deepak Taneja, Aveksa Kevin Cunningham, SailPoint Chris Sullivan, Courion
Governance facilitates Compliance just as Role management facilitates Entitlement. But context eases the management of both Governance and Roles. Context is key to more automated, less expensive, GRC solutions. View details
Putting Context in Identity: User-Centric Context23.04.2008 16:30-17:30Dale Olds, Novell Johannes Ernst, NetMesh Robin Wilton, Sun Microsystems
While the context of authentication is also important in the User-centric identity sphere, the added use of context by the user – the choosing of the right persona as evidenced by the multiplicity of user-centric identity devices any one user might have – is an area just beginning to be explored by not only technologists but also sociologists, privacy advocates and legal scholars. View details
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.