Am Schloßpark 12965203 WiesbadenGermany
T +49 21 1 2370 77 – 0F +49 21 1 2370 77 – 1 1Kuppinger Cole Ltd.
KC EXTENDMaking the EXTENDed Enterprise work in Practice
The Future of Information Security – Today.
www.kuppingercole.com
KC EXTENDed Enterprise - KC EXTEND
• 1 day on-site workshop (evaluation of as-is situation and requirements)
• Assessment review and rating
• Elaboration of analysis and strategy recommendation
• Presentation of analysis results and recommendation
Ask for your individual KC EXTEND offer!
KC EXTEND for KC Clients for 19,990 €
KC EXTEND for Non-Clients for 22,500 €
An investment that will pay off for you!
www.kuppingercole.com
For further information please contact [email protected]
Business Agility and Information Security for your Extended Enterprise
KC EXTEND
Business Agility and Information Securityfor your Extended Enterprise
• You need external users, business partners and customers to be securely integrated into your Identity and Access Management architecture
• You need internal users to have access to systems of external partners
• You want to know what kind of external directory service and what forms of Identity Management as a Service (IdMaaS) are needed
• You are uncertain whether new standards such as OAuth 2.0 and OpenID.connect are important for you
• You are wondering how you can solve current problems with today‘s standards and products future-proofed
In project with KuppingerColeKC EXTENDed Enterprise - KC EXTEND
KC EXTEND - the benefits What you can always expect from KuppingerCole
• The expertise of a global Analyst Company specializing in Identity & Access Manage- ment headquartered in Europe
• Vendor neutral answers to your individual questions
• A tailored approach to your specific needs
• Access to a wide “best practice” knowledge- base from numerous projects with vendor and user companies
• Exclusive collaboration with senior analysts and the stated goal of knowledge transfer at the end of the project
What you can expect from KC EXTEND
• KC EXTEND includes an in depth analysis of requirements and use cases for the Exten- ded Enterprise in your company
• An analysis and evaluation of standards and important technology components
• An action plan derived from the analysis of your organisation
• A recommendation for your IAM strategy with regard to external partners and the use of external systems
KC EXTEND
• KC EXTEND includes a detailed analysis of the existing applications for the handling and the involvement of third parties in on- premise and cloud services
• KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured
• KC EXTEND describes how you can achieve quick wins with existing resources and simulta- neously work on strategic solutions
• KC EXTEND provides an action plan descri- bing how you can extend your Access Manage- ment today while considering the long term strategy (external partners, external systems)
Analysis of require-ments and use cases
for the Extended Enterprise
Analysis and evalu-ation of existing and
new standards
Analysis and eva-luation of the most
important technology components
Creating recommen-dations for action
and action plan
Evaluation of technology components -Comparison with Customers‘ priority
Area of Operation IAM/IAG Operation
Gen
eral
prio
rity
Reason
Cus
tom
ers‘
pr
iori
ty
Web Access Management & Federation
Core area of IAM (precise Access Control). Web Access Management is functioning as a gateway in front of web applications, Identity Federation is relying on standards to separate authentication and authorization from application logic. Both approaches enable Single Sign-On for users.
•
These technologies are of increa-sing importance through growing demand for the integration of external user groups (partners, customers), for access to external systems as well as for integration in the cloud.
•
Risk and context-basedAuthentication and
Authorization
Risk-and context-based access control to applications where factors such as location, authentication strength and others are included.
•
Is becoming more and more important due to the growing demands in the field of mobile security (specific authentication methods) as well as by the integ-ration of other user groups.
•
Versatile Authentication
Flexible support, interchangeability, and combination of diffferent authen-tication mechanisms. •
Is becoming more and more important due to the growing demands in the field of mobile security (specific authentication methods) as well as by the integ-ration of other user groups.
•
...
Of top priority
•
Medium-priority
•
Low-priority
•