Context Based Authentication

Articles

Martin Kuppinger: Authorization Strategy 22.01.2009 Martin Kuppinger
Even while some expert�s in the industry understand authorization management still as sort of �rocket science�, the year 2008 has shown significant evolution in that field. New vendors like Rohati have entered the market, others like Bitkoo appeared a little earlier, and some of the big vendors like Oracle and CA are as well actively pushing their technologies. Read the article
Cardspace B2B 29.06.2007 Martin Kuppinger
CardSpace is a solution for end users ? at least according to general opinion. In other words: It is an important element in business environments. According to KCP CardSpace will be in a position to play an essential part also in B2B scenarios. Read the article
Siemens TISA 07.03.2007 Tim Cole
Germany may not cut much academic ice amoung the authors of the PISA study, but at least with TISA Siemens has proven to be quite a bright sudent of human nature. Read the article

Reports

Market Overview Strong Authentication 08.03.2010 Sebastian Rohr €695.00
For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought this mode of authentication to a point where users and administrators are no longer able to cope with it. Be it the increased level of security, a.k.a. authenticity, required by the service provider, or compliance requirements: other means of authentication are necessary to keep up with future system designs and customer experience expectations. Still, we all suffer from having to remember a multitude of these credentials and now companies are looking for ways out of this password-trap. But what to choose from an ever growing market of clever and appealing authentication solutions? A question not lightly answered in general, as requirements for different applications and services might greatly...

Order the report

Events

Congress: European Identity Conference 2011 10.05. - 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Kontextbasierte Authentifizierung im Active Directory Umfeld 26.11.2010 , 11:00 Uhr
Die (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, �ber die unterschiedlichen Ans�tze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege f�r unterschiedliche Risiken angewendet werden k�nnen, und gibt eine �bersicht �ber L�sungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben. Information
Congress: European Identity Conference 2010 04.05. - 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Congress: European Identity Conference 2009 05.05. - 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. Information
Webinar: Die richtige Single Sign-on Strategie f�r mehr Sicherheit und IT-Compliance 26.10.2007 , 11:00 - 12:00
Die Einf�hrung von Single Sign-On Systemen wird in zunehmendem Ma�e von Compliance-Anforderungen beeinflusst. Bringt ein SSO-System zus�tzliche Risiken oder l��t sich damit eine Compliance-Strategie sogar vereinfachen? In diesem Webinar lernen Sie die unterschiedlichen SSO-Ans�tze innerhalb des Unternehmens, �ber die Unternehmensgrenzen hinweg und im Web kennen und deren Einflu� auf Ihre Compliance-Strategie. Information

Past Conference Sessions

Virtual Directories and Beyond 24.04.2008 11:30-12:30 Martin Kuppinger, Kuppinger Cole Dale Olds, Novell Sampo Kellom�ki, Symlabs Michel Prompt, Radiant Logic Dave Kearns, Network World Jackson Shaw, Quest Software
Dale Olds recently wrote in his blog about the need for an Identity Bus, describing it as "[...] a system that allows for loose coupling between identity data publishers and consumers in sequence where there is no single point of administrative control. It’s a way of passing identity data between a number of control points. It is explicitly about moving beyond hub tools like meta/virtual/directories." Sampo Kellomäki added: "In removing political single point of control, concern arises regarding the privacy consequences and mitigation needed to make such a bus approach tenable. The panel will debate the tradeoff of loss of control versus benefits of the larger ecosystem and what can be done to minimize the collateral damage." View details
Physical-Logical Convergence 23.04.2008 11:30-12:30 Satel J. Naik, City College Coventry Ralph Seinsche, HID Global
View details
Putting Context in Identity: Authentication, Authorization and Risk Management 23.04.2008 14:00-15:00 Michel Prompt, Radiant Logic John Aisien, Oracle Corporation Steve Neville, Entrust
Gathering context data at the point of authorization helps to minimize risk while allowing fine-grained authorization to occur. Maintaining context state data, and viewing it from different “angles” allows further refinement of the authentication ceremony including steps towards self-service provisioning and authorizations. View details
Putting Context in Identity: Governance, Compliance, Entitlement and Roles 23.04.2008 15:00-16:00 Paul Heiden, BHOLD COMPANY BV Deepak Taneja, Aveksa Kevin Cunningham, SailPoint Chris Sullivan, Courion
Governance facilitates Compliance just as Role management facilitates Entitlement. But context eases the management of both Governance and Roles. Context is key to more automated, less expensive, GRC solutions. View details
Putting Context in Identity: User-Centric Context 23.04.2008 16:30-17:30 Dale Olds, Novell Johannes Ernst, NetMesh Robin Wilton, Sun Microsystems
While the context of authentication is also important in the User-centric identity sphere, the added use of context by the user - the choosing of the right persona as evidenced by the multiplicity of user-centric identity devices any one user might have – is an area just beginning to be explored by not only technologists but also sociologists, privacy advocates and legal scholars. View details

© 2011 Kuppinger Cole Ltd.