|
Business Information Management
Articles
-
Felix Gaehtgens: Quick Wins in Identity Management
18.08.2009
Felix Gaehtgens
-
In times of economic downturn, the pressure is on to save costs and increase efficiency. Everybody working in the IT sector will be familiar with projects being put on hold, spending frozen, colleagues being laid off. Unsurprisingly, most of those left working in IT departments see their workload and working hours increased, as they are being asked to deliver more with less resources. These are the typical signs of a dire economy, that may or may not be starting to turn around slowly: but those particular problems are not going away any time soon.
Read the article
-
Marne Gordan�s Keynote at EIC 2008
21.05.2008
Joerg Resch
-
Marne�s brilliant keynote on the 32 Billion $ (2008) GRC Market. Talking about some famous examples in finance and health industries, she reminds us, that it is all about human behavior, when it gets down to the question, why GRC is so important.
Read the article
-
Information Rights Management
23.07.2007
Martin Kuppinger
-
In each of the Webinars held on the results of our market study 2006 I got stuck with something which is also the subject of lively discussions within KPC: Why is it that Information Rights Management as one of the ?future issues? is not believed to be as important as other topics? I myself, though, am convinced that it not less relevant as for example Identity Federation.
Read the article
-
Role management - where is it heading?
15.07.2007
Martin Kuppinger
-
I am working on a comprehensive report on standard tools for Role Management and their vendors. This has long been an item on my to-do list, but only now it has gained top priority. The reason is of course that Role Management was a cutting-edge issue on KPC`s European Identity Conference.
Read the article
-
Why Directory Services are after all strategically relevant
15.07.2007
Martin Kuppinger
-
In one of the latest issues of this newsletter I had tried to explain why the lively discussion about Directory Services has flagged. They have become a commodity, the most important strategical decisions usually having been made before. What�s more, the enterprises have realized that one Directory Service is rarely enough. The result is in many cases a bunch of Application Directories besides some strategical directories.
Read the article
-
Trends in Provisioning
05.07.2007
Martin Kuppinger
-
What will be ?the next big thing? of Identity Management? I think there will be two development steps both deserving to be described like this.
Read the article
-
Identity Management and Business
05.07.2007
Martin Kuppinger
-
I always appreciate feedback on my newsletter articles ? especially positive feedback, of course. Recently I was able to do so twice: The first positive feedback concerned my article about Roles Management in one of our latest newsletters, the second referred to the text on Data Quality some time before. In both cases, I would like to add some important thoughts to the discussion.
Read the article
-
The future of role management
29.06.2007
Martin Kuppinger
-
In connection with Identity Federation, a discussion repeatedly circulating about Role Management is being renewed. A closer look at the discussion, however, reveals as a main focus the question how to best model roles ? suggesting that no big change is in sight!
Read the article
-
More flexibility for identity
29.06.2007
Martin Kuppinger
-
Comparing the latest development of Identity Management with other IT areas, you will realize that the end is still out of sight. Identity Management is on the way towards developing into a service infrastructure. In the new scenario, the products will no longer be in the focus ? they will be replaceable.
Read the article
Events
-
Congress: European Identity Conference 2011
10.05. - 13.05.2011
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Seminar: Durchg�ngiger Schutz statt St�ckwerk - Informationen richtig sch�tzen
30.06.2010
, 14:00 - 14:30
-
Wie kann man Informationen in allen Nutzungssituationen ("at rest, in move, in use") optimal und zuverl�ssig sch�tzen? Information Rights Management ist hier einer der strategisch wichtigsten Ans�tze und ein Kernelement in Strategien f�r die Informationssicherheit.
Information
-
Congress: European Identity Conference 2010
04.05. - 07.05.2010
, Munich
-
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Congress: European Identity Conference 2009
05.05. - 08.05.2009
, Munich
-
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Information
-
Conference: Governance, Risk Management & Compliance (GRC) Forum 2008
18.11. - 19.11.2008
, Frankfurt am Main
-
Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto h�her die Aufw�nde (und Kosten) f�r Compliance. F�r die erfolgreiche Einf�hrung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten Identity Management Strategie darauf auszulegen, aussagekr�ftige Informationen zur Verf�gung zu stellen, und andererseits durch einen Risk-orientierten Compliance-Ansatz die Kunst der Beschr�nkung auf das Wesentliche zu �ben. Die Kuppinger Cole Governance, Risk Management & Compliance (GRC) Jahresveranstaltung 2008 fokussiert Strategien und Vorgehensweisen, Technologien und Werkzeuge, die Ihre Unternehmensf�hrung in die Lage versetzen, wettbewerbs- und kostenrelevante Entscheidungen in Kenntnis aller wesentlichen Informationen und Risiken zu treffen - ohne dass Ihre Compliancekosten ausufern.
Information
Past Conference Sessions
-
Maximizing the Value of Identity Management
06.05.2009 15:00-16:00
Kari-Pekka Lifl�nder, Nokia
-
Presentation first suggests as the basis for Identity management value model the usage of Identity transactions. Identity transactions is defined as sum of rights requests + sum of amounts of rights delivered. Additionally, each transaction is given a euro sum value which results into tangible value delivered by IDM. The presentation next discusses the relevant parts of the role based access management model implementation that bring most value as based on the IDM value model. Discussed elements are e.g. different kind of approval flows, inherited membership approvals, privileges inheritance, delegated management of privilege and role structures, traceability of current permissions/permissions under approval or delivery/historical permissions, inheritance of the membership constraints in the role hierarchy, possibility to reconcile memberships with the target systems in case manual provisioning is used.
View details
-
Identity Enabled Information Management within the Max Planck Society
24.04.2008 10:30-11:30
Dr. Thomas Soddemann, Max Planck Society
-
As service providers for the scientific communities in the Max Planck we are faced with a growing demand for access to distributed resources. Among these we find computing resources as well as various types of data bases, archives and infrastructure components (e.g. networks, sensor arrays, experiment controls). Providing a scalable infrastructure for accessing information in general is the challenge we are going to meet. It is self-evident that authentication and authorization play a major role in the given scenarios. The status quo shows a mixture of evolutionary grown solutions ranging from IP based authentication for accessing journals online to manually maintaining user databases and firewall rules at the various institutes. Currently, a group of service providers within the Max Planck Society (RZG, Gesellschaft für Wissenschaftliche Datenverbeitung, Göttingen, General Administration, Munich, and Max Planck Digital Library, Munich) and IT departments of several...
View details
-
Business-centric Identity Management
22.04.2008 15:00-15:30
Keith Grayson, SAP
-
In the enterprise Identity Management has been seen as the domain of IT Security and IT Operations, whereas most company processes are driven by the business. This keynote looks at the thoughts that SAP has on linking the domains of IT security and operations with the business to create business-centric Identity Management solutions.
View details
|