|
Context Based Authentication
Articles
-
Martin Kuppinger: Authorization Strategy
22.01.2009
Martin Kuppinger
-
Even while some expert�s in the industry understand authorization management still as sort of �rocket science�, the year 2008 has shown significant evolution in that field. New vendors like Rohati have entered the market, others like Bitkoo appeared a little earlier, and some of the big vendors like Oracle and CA are as well actively pushing their technologies.
Read the article
-
Cardspace B2B
29.06.2007
Martin Kuppinger
-
CardSpace is a solution for end users ? at least according to general opinion. In other words: It is an important element in business environments. According to KCP CardSpace will be in a position to play an essential part also in B2B scenarios.
Read the article
-
Siemens TISA
07.03.2007
Tim Cole
-
Germany may not cut much academic ice amoung the authors of the PISA study, but at least with TISA Siemens has proven to be quite a bright sudent of human nature.
Read the article
Reports
-
Market Overview Strong Authentication
08.03.2010
Sebastian Rohr €695.00
-
For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly...
Order the report
Events
-
Congress: European Identity Conference 2011
10.05. - 13.05.2011
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Webinar: Kontextbasierte Authentifizierung im Active Directory Umfeld
26.11.2010
, 11:00 Uhr
-
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, �ber die unterschiedlichen Ans�tze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege f�r unterschiedliche Risiken angewendet werden k�nnen, und gibt eine �bersicht �ber L�sungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben.
Information
-
Congress: European Identity Conference 2010
04.05. - 07.05.2010
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Congress: European Identity Conference 2009
05.05. - 08.05.2009
, Munich
-
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Webinar: Die richtige Single Sign-on Strategie f�r mehr Sicherheit und IT-Compliance
26.10.2007
, 11:00 - 12:00
-
Die Einf�hrung von Single Sign-On Systemen wird in zunehmendem Ma�e von Compliance-Anforderungen beeinflusst. Bringt ein SSO-System zus�tzliche Risiken oder l��t sich damit eine Compliance-Strategie sogar vereinfachen? In diesem Webinar lernen Sie die unterschiedlichen SSO-Ans�tze innerhalb des Unternehmens, �ber die Unternehmensgrenzen hinweg und im Web kennen und deren Einflu� auf Ihre Compliance-Strategie.
Information
Past Conference Sessions
-
Virtual Directories and Beyond
24.04.2008 11:30-12:30
Martin Kuppinger, Kuppinger Cole Dale Olds, Novell Sampo Kellom�ki, Symlabs Michel Prompt, Radiant Logic Dave Kearns, Network World Jackson Shaw, Quest Software
-
Dale Olds recently wrote in his blog about the need for an Identity Bus, describing it as "[...] a system that allows for loose coupling between identity data publishers and consumers in sequence where there is no single point of administrative control. It’s a way of passing identity data between a number of control points. It is explicitly about moving beyond hub tools like meta/virtual/directories." Sampo Kellomäki added: "In removing political single point of control, concern arises regarding the privacy consequences and mitigation needed to make such a bus approach tenable. The panel will debate the tradeoff of loss of control versus benefits of the larger ecosystem and what can be done to minimize the collateral damage."
View details
-
Physical-Logical Convergence
23.04.2008 11:30-12:30
Satel J. Naik, City College Coventry Ralph Seinsche, HID Global
-
View details
-
Putting Context in Identity: Authentication, Authorization and Risk Management
23.04.2008 14:00-15:00
Michel Prompt, Radiant Logic John Aisien, Oracle Corporation Steve Neville, Entrust
-
Gathering context data at the point of authorization helps to minimize risk while allowing fine-grained authorization to occur. Maintaining context state data, and viewing it from different “angles” allows further refinement of the authentication ceremony including steps towards self-service provisioning and authorizations.
View details
-
Putting Context in Identity: Governance, Compliance, Entitlement and Roles
23.04.2008 15:00-16:00
Paul Heiden, BHOLD COMPANY BV Deepak Taneja, Aveksa Kevin Cunningham, SailPoint Chris Sullivan, Courion
-
Governance facilitates Compliance just as Role management facilitates Entitlement. But context eases the management of both Governance and Roles. Context is key to more automated, less expensive, GRC solutions.
View details
-
Putting Context in Identity: User-Centric Context
23.04.2008 16:30-17:30
Dale Olds, Novell Johannes Ernst, NetMesh Robin Wilton, Sun Microsystems
-
While the context of authentication is also important in the User-centric identity sphere, the added use of context by the user - the choosing of the right persona as evidenced by the multiplicity of user-centric identity devices any one user might have – is an area just beginning to be explored by not only technologists but also sociologists, privacy advocates and legal scholars.
View details
|