KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Airlock - Security Innovation by Ergon Informatik AG
The Airlock Secure Access Hub combines the important application security issues of filtering and authentication into a well-coordinated overall solution that sets standards in terms of usability and services. The Secure Access Hub covers all important functions of modern IT security in this field: from a web application and API protection (WAAP) awarded by journalists to API and Microservice security in Kubernetes environments, and a customer identity management (cIAM) system with integrated strong customer authentication trusted by Swiss banks. The Airlock IT security solution protects more than 40 million active digital identities and 50,000 back-ends from over 750 customers around the world. The outstanding Net Promoter Score of +53 underscores the high level of customer satisfaction with Airlock Secure Access Hub. For more information, visit www.airlock.com. Airlock is a security innovation of Ergon Informatik AG.
The Swiss Ergon Informatik AG, founded in 1984, is a leader in the development of individual software solutions and software products. The basis for its success are 450 highly qualified IT specialists who, thanks to their outstanding specialist knowledge, can quickly anticipate new technology trends and ensure decisive competitive advantages with innovative solutions. Ergon Informatik mainly implements large-scale projects in the B2B sector.
When PSD2 takes effect, banks across the European Union will be required to expose their core banking functions to these TPPs via APIs. It is imperative that banks begin now to build and lock down APIs in preparation for PSD2. We will take a look at the Open Banking APIs as well as some other competing API offerings, and discuss API security methods.
Strong Customer Authentication (SCA) is a 2nd primary technical requirement of PSD2. Banks and TPPs both must provide mechanisms to do at least 2-Factor Authentication for their customers. Risk adaptive authentication is preferred. Additionally, PSD2 states that financial transaction processors must employ User Behavioral Analytics for higher assurance outside of the SCA requirements.
Ohne Zweifel ist der 25. Mai 2018 im Kalender jedes IT-Spezialisten rot angestrichen. Denn an diesem Tag tritt die neue Datenschutz-Grundverordnung (General Data Protection Regulation, GDPR) in Kraft, welche die Art und Weise, in der personenbezogene Daten von in der EU ansässigen Unternehmen oder anderen Unternehmen, die in der Europäischen Union geschäftlich tätig sein möchten, behandelt werden, grundsätzlich verändert. Nachhaltig beeindruckt von den strengen Strafen, die im Rahmen der neuen Verordnung vorgesehen sind, sind Unternehmen eilig bemüht, sich auf die neuen rechtlichen, betrieblichen und technischen Herausforderungen vorzubereiten.
Da die Erfassung von personenbezogenen Daten nicht in einem Vakuum stattfindet, sondern konkrete Anwendungen, Services, Kommunikationskanäle und Speicher-Backends miteinbezieht, spielt IAM (Identity and Access Management) offensichtlich eine kritische Rolle bei der Implementierung des Datenschutzprinzips „Privacy by Design”, d.h. einer Reihe von Vorgehensweisen in Bezug auf den kontrollierten, autorisierten Zugriff auf personenbezogene Daten. Das Ziel des Prinzips „Security by Design”, das ebenfalls in der GDPR festgelegt ist, besteht darin, den unautorisierten Zugriff auf personenbezogene Daten zu verhindern, und für die Mehrzahl der modernen digitalen Unternehmen bedeutet dies, dass sie Webanwendungen und APIs vor Hackerangriffen sowie anderen externen und internen Bedrohungen schützen müssen.