2
[email protected] www.kuppingercole.com www.id-conf.com Am Schloßpark 129 65203 Wiesbaden Germany T +49 21 1 2370 77 – 0 F +49 21 1 2370 77 – 1 1 Kuppinger Cole Ltd. KC EXTEND Making the EXTENDed Enterprise work in Practice The Future of Information Security – Today. www.kuppingercole.com KC EXTENDed Enterprise - KC EXTEND 1 day on-site workshop (evaluation of as-is situation and requirements) Assessment review and rating Elaboration of analysis and strategy recommendation Presentation of analysis results and recommendation Ask for your individual KC EXTEND offer! KC EXTEND for KC Clients for 19,990 € KC EXTEND for Non-Clients for 22,500 € An investment that will pay off for you! www.kuppingercole.com For further information please contact [email protected] Business Agility and Information Security for your Extended Enterprise KC EXTEND

KC EXTEND - KuppingerCole · KC EXTEND Making the EXTENDed Enterprise work in Practice The Future of Information Security – Today. KC EXTENDed Enterprise - KC EXTEND • 1 day on-site

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: KC EXTEND - KuppingerCole · KC EXTEND Making the EXTENDed Enterprise work in Practice The Future of Information Security – Today. KC EXTENDed Enterprise - KC EXTEND • 1 day on-site

[email protected]

Am Schloßpark 12965203 WiesbadenGermany

T +49 21 1 2370 77 – 0F +49 21 1 2370 77 – 1 1Kuppinger Cole Ltd.

KC EXTENDMaking the EXTENDed Enterprise work in Practice

The Future of Information Security – Today.

www.kuppingercole.com

KC EXTENDed Enterprise - KC EXTEND

• 1 day on-site workshop (evaluation of as-is situation and requirements)

• Assessment review and rating

• Elaboration of analysis and strategy recommendation

• Presentation of analysis results and recommendation

Ask for your individual KC EXTEND offer!

KC EXTEND for KC Clients for 19,990 €

KC EXTEND for Non-Clients for 22,500 €

An investment that will pay off for you!

www.kuppingercole.com

For further information please contact [email protected]

Business Agility and Information Security for your Extended Enterprise

KC EXTEND

Page 2: KC EXTEND - KuppingerCole · KC EXTEND Making the EXTENDed Enterprise work in Practice The Future of Information Security – Today. KC EXTENDed Enterprise - KC EXTEND • 1 day on-site

Business Agility and Information Securityfor your Extended Enterprise

• You need external users, business partners and customers to be securely integrated into your Identity and Access Management architecture

• You need internal users to have access to systems of external partners

• You want to know what kind of external directory service and what forms of Identity Management as a Service (IdMaaS) are needed

• You are uncertain whether new standards such as OAuth 2.0 and OpenID.connect are important for you

• You are wondering how you can solve current problems with today‘s standards and products future-proofed

In project with KuppingerColeKC EXTENDed Enterprise - KC EXTEND

KC EXTEND - the benefits What you can always expect from KuppingerCole

• The expertise of a global Analyst Company specializing in Identity & Access Manage- ment headquartered in Europe

• Vendor neutral answers to your individual questions

• A tailored approach to your specific needs

• Access to a wide “best practice” knowledge- base from numerous projects with vendor and user companies

• Exclusive collaboration with senior analysts and the stated goal of knowledge transfer at the end of the project

What you can expect from KC EXTEND

• KC EXTEND includes an in depth analysis of requirements and use cases for the Exten- ded Enterprise in your company

• An analysis and evaluation of standards and important technology components

• An action plan derived from the analysis of your organisation

• A recommendation for your IAM strategy with regard to external partners and the use of external systems

KC EXTEND

• KC EXTEND includes a detailed analysis of the existing applications for the handling and the involvement of third parties in on- premise and cloud services

• KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured

• KC EXTEND describes how you can achieve quick wins with existing resources and simulta- neously work on strategic solutions

• KC EXTEND provides an action plan descri- bing how you can extend your Access Manage- ment today while considering the long term strategy (external partners, external systems)

Analysis of require-ments and use cases

for the Extended Enterprise

Analysis and evalu-ation of existing and

new standards

Analysis and eva-luation of the most

important technology components

Creating recommen-dations for action

and action plan

Evaluation of technology components -Comparison with Customers‘ priority

Area of Operation IAM/IAG Operation

Gen

eral

prio

rity

Reason

Cus

tom

ers‘

pr

iori

ty

Web Access Management & Federation

Core area of IAM (precise Access Control). Web Access Management is functioning as a gateway in front of web applications, Identity Federation is relying on standards to separate authentication and authorization from application logic. Both approaches enable Single Sign-On for users.

These technologies are of increa-sing importance through growing demand for the integration of external user groups (partners, customers), for access to external systems as well as for integration in the cloud.

Risk and context-basedAuthentication and

Authorization

Risk-and context-based access control to applications where factors such as location, authentication strength and others are included.

Is becoming more and more important due to the growing demands in the field of mobile security (specific authentication methods) as well as by the integ-ration of other user groups.

Versatile Authentication

Flexible support, interchangeability, and combination of diffferent authen-tication mechanisms. •

Is becoming more and more important due to the growing demands in the field of mobile security (specific authentication methods) as well as by the integ-ration of other user groups.

...

Of top priority

Medium-priority

Low-priority