...
Mike Small�s Keynote at EIC 200821.05.2008Joerg Resch
If you put together 40 years of experience in computer industry, an extra portion of extra-dry British humor and excellent thought leadership, you�ll get the right mix to really understand, wether Security, Privacy and Trust are a mission impossible. Thank you Mike Small (CA) for this great keynote. Read the article
Marne Gordan�s Keynote at EIC 200821.05.2008Joerg Resch
Marne�s brilliant keynote on the 32 Billion $ (2008) GRC Market. Talking about some famous examples in finance and health industries, she reminds us, that it is all about human behavior, when it gets down to the question, why GRC is so important. Read the article
SmartCards28.09.2007Martin Kuppinger
Undoubtedly, one of the underhand winners in the IT market for the past 18 months have been vendors of card- and USB-token-based authentication mechanisms, including the software involved. Even if the sales figures do not in all cases reflect this development, there are several important trends which make it evident. Read the article
Identity-Driven Security05.07.2007Martin Kuppinger
We may look at the relationship between IT security and Identity Management as a hen-and-egg problem: What was first? And what prevails? Is security a subset of Identity Management, or vice versa? Or is there just one major interface between the two? Read the article
Siemens TISA07.03.2007Tim Cole
Germany may not cut much academic ice amoung the authors of the PISA study, but at least with TISA Siemens has proven to be quite a bright sudent of human nature. Read the article
HP Mission Critical Partnership16.04.2007Tim Cole
Read the article
Congress: European Identity Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Solving the Million Record Challenge with XACML 10.11.2011 , 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in “big data” scenarios. Information
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Managing Identities in Hybrid Cloud Environments 17.09.2010 , 15:00 CEST, 1pm UTC, 2pm BST
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight – that�s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT – how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments. Information
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype. Information
Congress: Identity Management & GRC Conference Istanbul 24.06. – 26.06.2009 , Istanbul/Turkey
ID-Conf Istanbul is the place to meet with enterprise technologists, thought leaders and experts to learn about, discuss and shape the market in most significant IT-Security related topics such as Identity Management, Governance, Risk Management and Compliance (GRC) and Service Oriented Architecture (SOA). With it�s world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, ID-Conf Istanbul is an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Workshop: OASIS Roundtable: From 30,000 Feet – The Landscape of Identity Management Standards from the Public and Private Perspectives 05.05.2009 , 09:00 , Munich
Co-located with the European Identity Conference (EIC) 2009, EIC association sponsor OASIS invites you to this free full-day, interactive roundtable, which will provide you the opportunity to explore the current security landscape, as well as learn about the future of security services, to include global data privacy policies. Information
Webinar: Kuppinger Cole Trend Report IAM and GRC 2009-2019 02.10.2008 , 15:00 – 16:00
During this webinar, Martin Kuppinger will present the key results of the Kuppinger Cole Trend Report IAM and GRC 2009-2019. Information
Identities as a Baseline for Cloud & SOA Security07.05.2009 14:00-15:00Stuart Boardman, CGI
Identities are the foundation for Cloud and SOA Security. Service-orientied approaches to Identity Management, Authorization Management, and Governance are mandatory to support the security and governance requirements in loosely-coupled, service-oriented IT environments. Stuart Boardman will give an overview about the requirements and solutions for as well cloud as SOA security. View details
Why Security and Compliance need Identity08.05.2007 09:45-10:30Alberto Y�pez, Oracle Corporation
Alberto is responsible for security, compliance and identity management strategies. He joined Oracle with its acquisition of Thor Technologies where he served as a Chairman and CEO. Alberto brings significant experience building successful global businesses in enterprise security and infrastructure software. He has held senior management positions in many successful software businesses, information security solutions providers, access management vendors, and other Silicon Valley startups. He is currently in the Board of Directors of Vitria Technology and the Securities Industry Middleware Council. View details
From Enterprise IT Management to Business Driven Security Management07.05.2007 18:15-19:00Bilhar Mann, CA
In an increasingly complex and interconnected world, users of Information Technology encounter a proliferating array of risks and opportunities. Bilhar “Bill” Mann, General Manager for CA International, Inc.’s Security Business Unit, will lead an exploration of the ways in which IT Management is evolving to help users protect their data and assets and realize the full benefits of technology. He will demonstrate how and why business drives security management and how Identity & Access Management and other critical management solutions can help users meet current and emerging security challenges. Join Bill to discover how the ongoing transformation of IT Management as a discipline will revolutionize the way we work and live in an IT-enabled world. View details
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.