Dell Software
1 Dell Way • TX 78664 Round Rock
E-Mail: [email protected]
Internet: http://software.dell.com
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
Sponsored Events
| Date | Title |
|---|---|
| 12.01.2016 | Webinar Dell Identity Manager 7.0: Why Things Have ChangedIAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, IAM must integrate well into the existing landscape. Depending on their current infrastructure and requirements, organizations therefore might want to start at different points with IAM. Successful implementations demand a holistic, unified view. |
| 05.05. – 08.05.2015 | Congress European Identity & Cloud Conference 2015European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
| 13.05. – 16.05.2014 | Congress European Identity & Cloud Conference 2014European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. |
| 17.04. – 20.04.2012 | Congress European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
| 15.11.2011 | Webinar Why Access Governance Moves the Risk and Reward Balance in your FavourIn this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. |
| 27.09.2011 | Webinar Why Managing Privileged Users Benefits your BusinessIn this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA, will talk about Quest Software’s solution focus within the privileged user management sphere, which recently received a strong boost through the acquisition of e-DMZ Security. |
| 10.05. – 13.05.2011 | Congress European Identity Conference 2011With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
| 13.12.2010 | Webinar Managing the Change – Getting on the Road to the Cloud through Small and Manageable StepsIn this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking. |
| 09.12.2010 | Webinar Building Operational Governance for SharePoint 2010During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best practices. |
| 26.11.2010 | Webinar Kontextbasierte Authentifizierung im Active Directory UmfeldDie (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansätze adaptiver Authentifizierungsverfahren, bei denen unterschiedlich starke Authentifizierungswege für unterschiedliche Risiken angewendet werden können, und gibt eine Übersicht über Lösungen im Active Directory Umfeld. Reto Bachmann von Quest Software wird danach den Einsatz des Quest Defender in Kundenprojekten beschreiben. |
| 04.05. – 07.05.2010 | Congress Mittelstandsdialog InformationssicherheitDie Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden. |
| 04.05. – 07.05.2010 | Congress European Identity Conference 2010With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
| 04.05. – 07.05.2010 | Congress CLOUD 2010Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype. |
| 21.01.2010 | Webinar How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) NeedApproaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach? |
| 10.12.2009 | Webinar Provisioning Trends: Schlank, voll automatisiert, kostengünstigMartin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning |
| 19.11.2009 | Webinar Pass Your Next Compliance Audit With ConfidenceBottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views. |
| 11.11.2009 | Webinar Single Sign-on for SAP EnvironmentsThe identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP. |
| 20.08.2009 | Webinar Vereinfachung der Berechtigungsanalyse und -VerwaltungIn diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punktlösungen verzettelt. Reto Bachmann von Quest Software wird daran anschliessend anhand von Praxisbeispielen beschreiben, wie sich das Berechtigungsmanagement unter Einsatz des Quest Access Managers einfach und transparent gestalten lässt. |
| 05.05. – 08.05.2009 | Congress European Identity Conference 2009With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
| 22.04. – 25.04.2008 | Congress European Identity Conference 2008For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event. |
Reports
| Date | Title | Price |
|---|---|---|
| 22.04.15 | Executive View: Dell One Identity Cloud Access Manager – 71250Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and… | €190.00 |
| 06.05.14 | Vendor Report: Dell IAM – 70812While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and… | €495.00 |
| 17.10.12 | Whitepaper: Migrating Sun Identity Manager to Quest One Identity Manager – 71000This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle… | €295.00 |
| 22.08.12 | Snapshot: Quest One Identity Manager Data Governance Edition – 70722Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It… | €190.00 |
| 01.12.11 | Product Report: Quest One Identity Manager 5 – 70133In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically… | €195.00 |
| 20.09.10 | Product Report: Quest DefenderQuest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong… | €95.00 |
| 16.08.10 | Product Report: Quest DefenderDer Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine… | €95.00 |
| 09.11.09 | Product Report: Quest Single Sign-On solutions for SAPThe two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between… | €95.00 |
| 07.10.09 | Product Report: Quest Single Sign-On solutions for SAPMit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen… | €95.00 |
| 16.07.09 | Product Report: Quest ActiveRoles ServerQuest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for… | €95.00 |
| 01.05.09 | Product Report: Quest ActiveRoles ServerDer Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für… | €95.00 |
Webcasts
| Date | Language | Title |
|---|---|---|
| 20.01.16 | ![]() | How to Ensure the Success of Your Privileged Access Management ProjectsThe majority of 2015’s high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged acces… |
| 13.01.16 | ![]() | Dell Identity Manager 7.0: Why Things Have ChangedIAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, … |
| 13.05.15 | ![]() | Jackson Shaw – The Convergence of IT, Operational Technology and the Internet of ThingsDid you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw discusses the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals. |
| 15.11.11 | ![]() | Why Access Governance Moves the Risk and Reward Balance in your FavourIn this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these p… |
| 28.09.11 | ![]() | Why Managing Privileged Users Benefits your BusinessIn this webinar, KuppingerCole’s co-founder and principal analyst Martin Kuppinger will give you an overview on the dos and don’ts of privileged user management, with a special emphasis on hybrid cloud environment. Followed by Martin, Phil Allen, Quest Software’s Director Identity Management EMEA… |
| 14.12.10 | ![]() | Managing the Change – Getting on the Road to the Cloud through Small and Manageable StepsIn this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will discuss with Joe Baguley, Quest Software´s CTO Europe, about how to transition from a reactive, siloed IT to a more agile, cloud computing aware infrastructure through small, manageable steps and subtle changes in thinking. |
| 10.12.10 | ![]() | Building Operational Governance for SharePoint 2010During this free webinar, Martin Kuppinger will give an overview on SharePoint Governance, followed by SharePoint expert Joel Oleson who will show you how to simplify SharePoint 2010 management with operations plans that include governance and change management policies as well as governance best… |
| 28.11.10 | ![]() | Kontextbasierte Authentifizierung im Active Directory UmfeldDie (automatische) Anpassung der Sicherheitsstufe eines Authentifizierungsvorgangs an den jeweiligen Kontext leistet einen erheblichen Beitrag zur operativen Effizienz und spart Geld. In diesem Webinar spricht Martin Kuppinger, Principal Analyst bei Kuppinger Cole, über die unterschiedlichen Ansä… |
| 11.12.09 | ![]() | Provisioning Trends: Schlank, voll automatisiert, kostengünstigMartin Kuppinger (Kuppinger Cole) und Reto Bachmann (Quest) bringen Sie in diesem Webinar auf den neuesten Stand im Bereich des automatisierten Provisioning |
| 19.11.09 | ![]() | Pass Your Next Compliance Audit With ConfidenceBottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with y… |
| 11.11.09 | ![]() | Single Sign On for SAP EnvironmentsThe identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Marti… |
| 20.08.09 | ![]() | Vereinfachung der Berechtigungsanalyse und -VerwaltungIn diesem Webinar geht Martin Kuppinger zunächst auf die Notwendigkeit ein, konsistente Autorisierungsstrategien zu entwickeln, die bei minimiertem administrativen Aufwand einen durchgängigen Schutz von Informationen bieten – indem man sich auf das Wesentliche konzentriert und sich nicht in Punkt… |
Quick Links

Become a Sponsor
.hide_price { display: none; }.show_price { display: inline; }$(document).ready(function(){ $(“button”).click(function() { $(“p”).removeClass(“intro”); }); //$(“#price_eur”).click(function (e) $(“[id^=’price_’]”).click(function (e) { var thisID = this.id; //$(this).text(thisID); $(“span[id^='” + thisID + “‘]”).removeClass(“hide_price”).addClass(“show_price”).siblings().removeClass(“show_price”).addClass(“hide_price”); });});
Information
European Identity & Cloud Conference 2016
- Language:
- English
- Registration fee:
€1980.00
€1490.00 till 10.04.2016$2376.00
$1788.00 till 10.04.2016
- Contact person:
- Mr. Levent Kara
+49 211 23707710
[email protected]
- May 10 – 13, 2016 Munich, Germany


