Martin Kuppinger: How can IT keep a grip on mobile devices?08.07.2011Martin Kuppinger
Bring Your Own Device (or �BYOD� for short) is another IT hype word making the rounds nowadays, but it isn�t really all that new. Many employees have been bringing their smartphones or iPads to work for quite some time now, with the company�s explicit or implicit consent � at least as long as access with such devices hasn�t be fully blocked. IT departments worry increasingly about how to control the proliferation of privately owned mobile devices, but they�re missing the real point. Read the article
Felix Gaehtgens: Quick Wins in Identity Management18.08.2009Felix Gaehtgens
In times of economic downturn, the pressure is on to save costs and increase efficiency. Everybody working in the IT sector will be familiar with projects being put on hold, spending frozen, colleagues being laid off. Unsurprisingly, most of those left working in IT departments see their workload and working hours increased, as they are being asked to deliver more with less resources. These are the typical signs of a dire economy, that may or may not be starting to turn around slowly: but those particular problems are not going away any time soon. Read the article
Marne Gordan�s Keynote at EIC 200821.05.2008Joerg Resch
Marne�s brilliant keynote on the 32 Billion $ (2008) GRC Market. Talking about some famous examples in finance and health industries, she reminds us, that it is all about human behavior, when it gets down to the question, why GRC is so important. Read the article
Information Rights Management23.07.2007Martin Kuppinger
In each of the Webinars held on the results of our market study 2006 I got stuck with something which is also the subject of lively discussions within KPC: Why is it that Information Rights Management as one of the ?future issues? is not believed to be as important as other topics? I myself, though, am convinced that it not less relevant as for example Identity Federation. Read the article
Role management – where is it heading?15.07.2007Martin Kuppinger
I am working on a comprehensive report on standard tools for Role Management and their vendors. This has long been an item on my to-do list, but only now it has gained top priority. The reason is of course that Role Management was a cutting-edge issue on KPC`s European Identity Conference. Read the article
Why Directory Services are after all strategically relevant15.07.2007Martin Kuppinger
In one of the latest issues of this newsletter I had tried to explain why the lively discussion about Directory Services has flagged. They have become a commodity, the most important strategical decisions usually having been made before. What�s more, the enterprises have realized that one Directory Service is rarely enough. The result is in many cases a bunch of Application Directories besides some strategical directories. Read the article
Trends in Provisioning05.07.2007Martin Kuppinger
What will be ?the next big thing? of Identity Management? I think there will be two development steps both deserving to be described like this. Read the article
Identity Management and Business05.07.2007Martin Kuppinger
I always appreciate feedback on my newsletter articles ? especially positive feedback, of course. Recently I was able to do so twice: The first positive feedback concerned my article about Roles Management in one of our latest newsletters, the second referred to the text on Data Quality some time before. In both cases, I would like to add some important thoughts to the discussion. Read the article
The future of role management29.06.2007Martin Kuppinger
In connection with Identity Federation, a discussion repeatedly circulating about Role Management is being renewed. A closer look at the discussion, however, reveals as a main focus the question how to best model roles ? suggesting that no big change is in sight! Read the article
More flexibility for identity29.06.2007Martin Kuppinger
Comparing the latest development of Identity Management with other IT areas, you will realize that the end is still out of sight. Identity Management is on the way towards developing into a service infrastructure. In the new scenario, the products will no longer be in the focus ? they will be replaceable. Read the article
Congress: European Identity Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Access Governance: Identity Management aus dem Business f�r das Business 22.11.2011 , 16:00 Uhr
Verantwortung kann nicht delegiert werden. Es sind die Mitarbeiter der Fachabteilungen, die gegen�ber Aufsichtsorganen, Pr�fern und Justiz in der Verantwortung stehen und letztlich auch in die Haftung genommen werden. Alleine schon deshalb (aber nat�rlich auch, weil sie n�her am Prozess sind und es deshalb besser k�nnen) mu� ein modernes Identity Management fachabteilungstauglich sein. Identity & Access Governance. In diesem Webinar beschreibt zun�chst Martin Kuppinger, worauf es ankommt, wenn man seine Identity Infrastruktur den Fachabteilungen als Service zur Verf�gung stellt. Danach beschreiben Detlef Sturm von Beta Systems und Christian Himmer von Finanz Informatik Technologie Service gemeinsam ein erfolgreiches Projekt aus der Finanzbranche. Information
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Recent Trends and Best Practices in Internal Audit Management for Better Business Performance 10.03.2011 , 11:00am CET
Internal Audit (IA), traditionally a vehicle preserving assets and ensuring compliance, has been expanding it�s scope into a means for business process improvement and operational excellence, while at the same time it has to cope with an increasing number of high-impact risks. The challenge is, to shift course from IA�s asset preserving role to a new, value creation focused role. In this webinar, Martin Kuppinger will talk about this paradigm shift in IA, how it can be aligned more closely to your company�s strategies, and how an up-to-date Enterprise GRC strategy will help you to create value through IA. Followed by Martin, Dominic Pereira from MetricStream will present some recent Best Practices. Information
Seminar: Durchg�ngiger Schutz statt St�ckwerk – Informationen richtig sch�tzen 30.06.2010 , 14:00 – 14:30
Wie kann man Informationen in allen Nutzungssituationen (“at rest, in move, in use”) optimal und zuverl�ssig sch�tzen? Information Rights Management ist hier einer der strategisch wichtigsten Ans�tze und ein Kernelement in Strategien f�r die Informationssicherheit. Information
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Conference: Governance, Risk Management & Compliance (GRC) Forum 2008 18.11. – 19.11.2008 , Frankfurt am Main
Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto h�her die Aufw�nde (und Kosten) f�r Compliance. F�r die erfolgreiche Einf�hrung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten Identity Management Strategie darauf auszulegen, aussagekr�ftige Informationen zur Verf�gung zu stellen, und andererseits durch einen Risk-orientierten Compliance-Ansatz die Kunst der Beschr�nkung auf das Wesentliche zu �ben. Die Kuppinger Cole Governance, Risk Management & Compliance (GRC) Jahresveranstaltung 2008 fokussiert Strategien und Vorgehensweisen, Technologien und Werkzeuge, die Ihre Unternehmensf�hrung in die Lage versetzen, wettbewerbs- und kostenrelevante Entscheidungen in Kenntnis aller wesentlichen Informationen und Risiken zu treffen – ohne dass Ihre Compliancekosten ausufern. Information
Maximizing the Value of Identity Management06.05.2009 15:00-16:00Kari-Pekka Lifl�nder, Nokia
Presentation first suggests as the basis for Identity management value model the usage of Identity transactions. Identity transactions is defined as sum of rights requests + sum of amounts of rights delivered. Additionally, each transaction is given a euro sum value which results into tangible value delivered by IDM. The presentation next discusses the relevant parts of the role based access management model implementation that bring most value as based on the IDM value model. Discussed elements are e.g. different kind of approval flows, inherited membership approvals, privileges inheritance, delegated management of privilege and role structures, traceability of current permissions/permissions under approval or delivery/historical permissions, inheritance of the membership constraints in the role hierarchy, possibility to reconcile memberships with the target systems in case manual provisioning is used. View details
Identity Enabled Information Management within the Max Planck Society24.04.2008 10:30-11:30Dr. Thomas Soddemann, Max Planck Society
As service providers for the scientific communities in the Max Planck we are faced with a growing demand for access to distributed resources. Among these we find computing resources as well as various types of data bases, archives and infrastructure components (e.g. networks, sensor arrays, experiment controls). Providing a scalable infrastructure for accessing information in general is the challenge we are going to meet. It is self-evident that authentication and authorization play a major role in the given scenarios. The status quo shows a mixture of evolutionary grown solutions ranging from IP based authentication for accessing journals online to manually maintaining user databases and firewall rules at the various institutes. Currently, a group of service providers within the Max Planck Society (RZG, Gesellschaft für Wissenschaftliche Datenverbeitung, Göttingen, General Administration, Munich, and Max Planck Digital Library, Munich) and IT departments of several… View details
Business-centric Identity Management22.04.2008 15:00-15:30Keith Grayson, SAP
In the enterprise Identity Management has been seen as the domain of IT Security and IT Operations, whereas most company processes are driven by the business. This keynote looks at the thoughts that SAP has on linking the domains of IT security and operations with the business to create business-centric Identity Management solutions. View details
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.