But before starting with the different awards categories, I would like to call on stage the head of the jury Martin up
Martin
Martin. Could you explain us a little bit? What are the criteria for selecting award winners?
Yes.
What, what are the criteria? The criteria. So usually you will not find a project which never happened in any respect. So there's something which has been there before. So what would do we look for? We look for unique ideas, dealing with great complexity in a very efficient way, finding new approaches to solve some of the challenges organizations are facing. So doing something different, doing something smooth or leaner faster, better than we have seen in other projects over time. So this is basically what we look at.
And clearly it shouldn't be something which already had in the world, so which
Should be, should be you.
Right. And you know, some cases it's also quite easy. So if you look at some areas such as standards, yeah. There are not that many new standards. Okay. And even them, on the other hand, they are usually, we always find something which is exceptional. Okay. And so it's really, you know, finding the, this, what is really new, innovative, creative, and bringing things
Forward. Okay.
How long, how long, how much time would you need for actually identifying the winners? Once they have been proposed?
How long do we need?
So we, we get a number of proposals. We read them, we discuss them.
It takes, you know, checking back. And first it's a process of some weeks we, we already go through. Okay. So not that we take several weeks for a single decision, but it's really a process where we have a lot of people in check back and first. And
So you put some brain at some time in this process.
So it's, it's really something brilliant.
It really takes some significant part of my time.
Okay. Thank you very much.
Thank you, Martin. The first category is the award for the best innovation new standard and is presented by Graham Williamson. Raham what are you working for in covering a call? What topics area are you covering?
Yeah, I'm a senior Analyst in the area of dynamic authorization management now called a adaptive policy based access management. And also I've just completed a leadership compass on the secure information sharing space for, for Martin.
Okay. Very good.
Thanks so much. I would just like to say that I couldn't be happier than being here tonight to make this, this presentation. And I'd like to tell you why there's three reasons. The first is the time that internet of things became real. To me. My daughter had a 30th birthday and for her birthday, she got a Fitbit.
Now for the older folk in the audience, the Fitbit is a device. You hang around your, your wrist and it's really a fancy speedometer. It measures how many steps you take and a number of other things, but it also communicates with an app on your phone. So your phone has an API that takes that information and puts it into a usable format. And it also compares you to other people on a worldwide basis. My daughter confessed to me that she got up at 1131 night to jump on the trampoline in order to beat Anita in Vermont.
Second thing I wanted to tell you about is a book I read last Christmas by Peter de Munes on abundance. The actual title is abundance. The future is better than you think. He mentions lots of things. I'm just going to talk about a couple. One is within our lifetime folks within our lifetime, you are gonna be able to go from Hamburg to Frankfurt without in a car, without a driver.
You might say so what well does that mean? You want to BMW? Probably not, but it does mean that you need to decide what you are going to do about that.
Another, another item he points out is we will go to space. You're saying, no, aren't you, you will go to space. It might just be on an Intercontinental flight, but you will be able to look down at planet earth. You will see the horizon that's gonna happen within our lifetime. We're also gonna have medical devices. You within your life. I would say probably within five years will have a device that you can put a blood sample into a, a saliva sample into it'll probably have a blood pressure measurement, and it will give you a better diagnosis than your doctor does today.
We've gotta get used to these things folks, but within five nanoseconds, you should break into a cold sweat because each of these devices as an API, and if you were in LA Jackson's, Jack Jackson's assures presentation yesterday, where he talked about a device that had to be recalled because the certificate that had been placed in it was only expired within one year. This is the sort of thing we are dealing with with programmers.
Fortunately, there is a company that has done the heavy lifting for us, not a company and organization.
That means that each of us and we responsible folks, it's our companies that are gonna make the mistakes. Unless we tell 'em about this. But fortunately you don't have to learn about HTTP methods. You don't have to learn about sign Sam messages for APIs. You just have to rely on this organization. I am very pleased to tell you that the winner of the best innovation new standard award is the all scene Alliance. Do we have somebody from the all scene Alliance here to come and tell us about that?
Good evening, everyone. My name is Sue.
I am from very sign about certificates, but today, tonight I speak as a representative of the old scene Alliance. The, the old scene Alliance is the largest collaborative project to create an open source software framework for the internet of everything.
We, our role is to enable hardware manufacturers and software developers to create interoperable products that can discover, connect, and communicate directly with products and services. Regardless of brand today, we are about 150 member companies that work together to create real code, real code that you integrate in real products available already today in the market. And from my side, I have a strong focus on bringing security and trust in the internet of everything. And tomorrow we have a panel about this topic. So I invite, I invite you to, to join us tomorrow around this topic. Thank you.
Thank you.
Okay.
You go, you
Go all the pictures. The next award category is best innovation in e-government Tizen and is presented by Martin.
So a lot of people rode on set over the last few years, passwords are dead and we all know they are quite alive. And I think there are good reasons for that. Because when we think about that passwords, we also think about what would be the alternative.
So imagine a country where you have some certain million devices, which could be used of one type, which could be used as a authenticator available, maybe not all activated, but available and even more of a different type, more from the healthcare area available, where you have other types of authentics, where you have authenticators from other countries where some projects try to, to map all these EU stuff or some projects, try to map all these EU stuff.
So in fact simply said, I think we have alternatives to passwords, but usually we have some inhibitors making things quite complex to make them usable.
So how should I support that single a indicator, or should I find better ways? And I think we, we, we really need better ways to become better in authentication based on what we already have. That would be the ideal solution. If it's already there, why shouldn't we make it usable?
And this is what really is this word about a project that helps making use of what all we already have to get better in authentication and at least become closer to getting rid of passwords. And in fact, coming closer to single on and for removing these inhibitors, we grant this award and the winner in this category is the sky density project. Please welcome Dr.
Date lion who develop something, which allows you using bankers national ID cards, cuz student tides cut and all that other stuff on one end, a cloud service in the middle and standard Federation protocols on the other end to get better in authenticating without standard password. Congratulations. Thank
You.
Okay.
Yeah. Thank you for this award. It's a great pleasure to be here. And I think it was about five years ago that the German E I D card received this award in a similar setting six years ago.
And yeah, it's the most sophisticated, the most secure solution. And in Europe we have about 15 ERD projects, which have a huge yeah. Rolled out volume in Europe, but the usage is still yeah, has a lot of room for improvement. And so about four years ago, we started to build the bridge between the E I D cards and the cloud. And this is identity. And I would like to invite you to take this bridge and yeah. Secure your business processes based on trustworthy identities. Okay. Thank you. Thank you.
The next category is the best B2B identity project and is presented by David Goodman.
David, what are you standing for at co a cold?
There are many ways to answer that question, Sasha, but I'll, I'll take the sensible professional one with the background that I have. I'm specializing at the moment on directories telco and connected cars, big data and whatever comes next.
Thank you
Very much. So thank you. It's a real pleasure to be up here and to present this award over the last couple of years, the world has become increasingly aware that the, the world of bees is, is under threat.
If bees are not able to talk to each other, if they're not able to identify each other under the, the, the threats of global warming and the, the encroachments of cities into their natural habitats, bees will not survive. They need to identify themselves in order to do their dance. They need to know who their queen is. So it is in the business world. This conference has, has, has focused a lot on user-centricity quite rightly so. We've heard so much about Uma and we've heard so much about putting power into the hands of the individual privacy by design.
However, businesses also need to talk to businesses and we can't lose sight of that fact. And without businesses knowing who they identifying, who they're working with, they just like the other bees will not be able to survive. So with great pleasure. I I'd like to announce the winner of this year's B2B identity project, and it is momentary pause for reflection DNA limited.
Hello? Congratulations. Well done. Thank you. Congratulations. Do you want to speak?
Yeah.
So actually I don't really know what to say because this was quite a surprise, but yeah, I would really like to thank you about this opportunity. And then if you want to hear more about our solution and our business, what we have gained in our business, you can come to hear me tomorrow. Was it three 30? I don't remember. What room was it? Was it number two, maybe. So I will tell you a little bit more what we have done in DNA. Finland. Thank you.
You can also thank your parents.
Okay. Thank you. Mom
Photos taken there.
The next category is the award for the best approach on improving governance and mitigating risks and is presented by armor sing. What are your areas of expertise you're covering at Ko Cole?
Speaker 10 00:17:52 Everyone here remembers me when I last year stood here and said open source is bad. So everyone, I think still remembers that I, I love open source. It is a presentation on trust, but with KJA Cole, I'm an information security specialist. I offers IM insights.
I've been asked by Martin to take all the privileged managed privileged management vendors to task and to look at the L leadership compass. It's just about finished.
Okay.
Speaker 10 00:18:24 Thank you. Thank you.
So, one thing too much of a time. I love this category. I don't see many successful implementations of this governance and mitigating risk. One of the things I really like about this is the self-service, believe it or not, despite all the technology improvements, many organizations don't really put the self-service element as the priority and these folks, this organization, comprehensive solution, but focusing on their very large organization, they have a huge turnover, but they're focused on self-service and automated workflows. So can have a bit of music right before I tell you who it is.
Best approach on improving governance and mitigating risks goes to university hospital of one minute.
Speaker 12 00:19:47 Hi, everybody. It's a bit astonished me to be here today. Not hospital, not university hospital as deployed the, I am solution of ad. It is according to me, the biggest deployment in front, in a, in a university in university hospital. Wow. And it's a very, very interesting and long project. If everybody wants to share about this project with me, I'm all after the, after the meal. And thank you very much.
Speaker 10 00:20:23 What's your name?
Speaker 12 00:20:24 Sorry. My name is Cedric Carto
Speaker 10 00:20:26 Cedric. Definitely. Thank you. Thank you very much. Congratulations. Thank you. Excellent. We'll go on there.
Yeah, take
The next award category is for the best access governance access intelligence project and is presented by Matthias rein Matthias, your areas of expertise at
Speaker 14 00:21:05 Quite surprisingly access governance, access management, identity management, and access intelligence.
Speaker 14 00:21:16 Good evening. It's my pleasure to be here.
I, I have, I have some notes in, in 1978, the American author, Phillip K, Dick prepared a speech about being a sci-fi writer. You might know him as the author behind blade runner and total recall this stuff. This title of the speech was how to build a universe that doesn't fall apart two days later. And for some strange reason, this title is always somewhere in the back of my mind when it comes to large scale state of the art IAM project.
I don't know why we usually do not have to build a whole universe, but doing everything right for being nominated as best access governance, access intelligence project at EIC 2015 is a task quite close to that. Designing a modern workflow and role based access management and access governance system means designing and implementing appropriate processes and concepts.
Speaker 14 00:22:14 And they have to support the actual core business with efficiency and flexibility.
We all know that and they have to comply with all the necessary policies and regulatory requirements and all this kind of stuff that we all know, especially when you are a major national and global player in the financial industry, the challenge gets even bigger when you decide to achieve even more. For example, by applying modern concepts of, to the approach, how tasks are being divided between customer and supplier of the solution.
The of official jury statement says this project is a strong example of well thought out, architectures segregating between the business and the underlying it environments while supporting complex governance requirements. And I couldn't put that better and it is rolled out and it is in production, which means apparently it did not fall apart two days later. So let's look it up. The winner is not lb.
Speaker 16 00:23:40 Hi, good evening. My name is ER from the north London in short north. And thank you to OA for this award. It's a great pleasure here to be here.
And it's a great award for the last five, four or five years to work that we do in the Northey. So also I want to thank my team in Hanover and also our it provider, which do a lot of work with us in the last five years. So thank you very much for this award.
The next category is the category for the best identity and access management project and is presented by Dave KES. I don't need to introduce you, right?
Speaker 17 00:24:43 Whatever you feel comfortable with,
Please
Speaker 17 00:24:45 Go forward. Thank you. Thank you all very much.
I will keep my remarks short because I think like many of you, I wanted to be there to see the kickoff.
Speaker 17 00:25:00 I'm very pleased and happy to be re presenting the best I am. Project award for two reasons. One is that for 20 years now, I've been involved with IAM it's near and dear in my heart. And as identity has grown over those 20 years, I've tried to stay true to my roots. The second reason is that before I did that, I spent 20 years in the retail industry with various retailers and their problems.
Again, have always been very close to me. So I'm very pleased presenting this for a project implemented by one of Europe's most popular retailers while the project itself was for I am and I a G within the company headquarters and control services. It also supports roughly 3000 branch offices and 90,000 user accounts in them, as well as controlling the access of external suppliers, which has another 3000 non-employee non-contract users to the mix.
This is a strong example of an IAM solution supporting not only the employees of the company, but also one that's ready for the extended enterprise as such. It's a prime example of what we at KuppingerCole call the ABC, the agile business connected. Now let's open the envelope and let's, you know, that the winner for best I am project is Germany zone, DM drug remarked.
Speaker 18 00:26:42 Congratulations, congratulations. You like to say a few words.
Speaker 19 00:26:49 Hello. My name is pat Raj from the, I was only the project manager of this project.
So I'm the guy who has no idea what we done. And this is the reason why
Speaker 19 00:27:10 Stephen is here also. So he's our technical architect of this identity solution. And I don't want to say too much details why we use this solution, but if you're interested to see something or you have questions, I'm there the whole evening. And if you want to get some details to our project, I'm here for questions and special. Thanks to of course, to the team who makes it possible that we can celebrate this success and was, it was a lot of work, this identity management project.
And for me, it's a pleasure to see that it works really and special. Thanks to Ste.
The next category is the best cloud security award category and is presented by Mike Small. Mike you've been working in a number of areas in the past. I know which areas are you working continuously on for coping accord?
Speaker 20 00:28:45 So what I'm working on today is the cloud and the internet of things. Thank that is my area of interest. And it has been for five years. And throughout the time that I've worked with the cloud, it has been a contentious area.
It's been an area of great concern, especially to people in the it department. The cloud is expected to provide agility, to provide cost reduction and increased flexibility. However concerns still remain around security. And the key to a cloud and deployment is in fact to ensure security. Some organizations will not consider the cloud, whatever the reason or whatever the cost or whatever the benefits other organizations are careful to choose specific applications for the cloud. And some actually embrace the cloud wholeheartedly and use it for everything.
The, the organization that wins the prize tonight is one of the latter category. And what they realized was that that the kind of organization they had could not survive in today's fast changing environment with their own internal it systems.
Speaker 20 00:30:12 They could not adapt or expand or be able to be flexible enough. And they needed also to connect to all of their customers through all of the different ways that customers now connect through social and mobile applications or the systems of engagement.
And they also needed to provide secure access to all of these applications for their employees, and to be able to evolve their products, to deal with the ever changing market. The cornerstone of security in today's world is identity management identity and access management used to connect all of these different categories of employees and customers and so forth. And to do this in a way which is based on standards and also to ensure that you conform with best practices. So the prize for the best cloud security project tonight goes to past NL. Congratulations.
And perhaps you'd like to say a few words
Speaker 21 00:31:39 Now I'm sta on stage. I should super use.
I, I, again, thank you. Thank you very much for this opportunity to be here. I also have to warn you a bit because an engineer like me, it's almost too much excitement to be here on stage.
I have, I haven't that much excitement in the year to be honest. And when I did my, my talk earlier today on the project we do at Postel postal services of the Netherlands, I finalized with the takeaway that's that said there will be no applause at the end of the day. And actually what I mean is that if you are working in cloud and security and identity management, nobody will pass by pass by your room at the end of the day, thanking you for a nice secure experience of single sign on of that day. So you are pretty much alone.
And for that, I think this opportunity to be here and to get some applause from colleagues is also much appreciated.
Thank you. Thank
Speaker 21 00:32:41 You. It's
Speaker 21 00:32:43 It's the second applause of the day.
Anyway, I, I want to, to state some words of respect, first of all, to my senior management team, actually I think I should say senior leadership team that two years ago took a bold decision in the market of personnel, where we see post delivery, declining, parcel increasing, but a very turbulent market that they knew. And they, they thought that continuous cost cutting of it would not bring them and would not lead them into the future. And they took the decision for on the it part to go fully cloud 100% to the cloud two years ago, two and a half years ago. That was pretty bold statement again.
And for that, I respect them very much. And also they gave me the opportunity to work in that area.
So again, much respect for my leadership team. They're still there and they're still leading the change and it is just a part of it.
Speaker 21 00:33:39 Secondly, I, I have to think and have to pay respect to my team of engineers who work two years, day and night, and probably will work the holidays as well, coming summer. Because by the end of the year, we intend to decommission our data centers and have everything we have. And that's a lot with 60,000 employees.
We, we transformed into cloud applications. And for that, you, you need actually 100% believers in your team, engineers that believe in the goal you have to, you are aiming for. And I have to tell you that you, that, that we also experience non-believers, they are easy to, to recognize, and you don't want to have them in the team, but you also have half believers and half believers are actually useful. They point you at at much pitfalls along the road. So you can, you can go around them.
Speaker 21 00:34:28 But if you have too much half believers, there are so many pitfalls that nobody's deciding or taking any decision anymore. And so your projects will stop. So absolutely you have to have 100% believers and respect to my team for that. And as the last thing last but not least, I will also want to pay respect to my partner because maybe a bit bit strains in the world of clouds, not knowing where your applications are not knowing who it does that going that route.
It's nice to have to know the companies and the people behind these software as a services that, that you can pass by them at the end of the road or around the corner, and that they help you along that route. And for that, I want to pay respect and think I welcome for that, that helped us implement in the identity and excess management system, which is operational now for a year. Thank you.
Thank you very much. Thank you. The next award category is a special award in the presentate and the presenter is Joni Brennan.
Hello, Jon. Hello. You're obviously not working for co a call. Yes. So can you just shortly explain your role and your organization?
Speaker 22 00:36:06 Yes.
Well, it's the special award and I'm the special non Kuppinger presenter tonight. I've worked for over 10 years in development of identity, access management innovations and standards developments, particularly around trust and user-centric solutions.
And you're the executive director of the Canara initiative,
Speaker 22 00:36:28 The Canara initiative. Yes. So we were delighted to have this stage last year with Uma and share with so many great innovative community members.
Thank
Speaker 22 00:36:41 You. Thank you.
Speaker 22 00:36:47 So, as I mentioned, I was honored to be asked to deliver this award tonight. I'm the one non Analyst. And I think the reason that we had been approached to, to provide this award was because of our work in the space of user-centric innovations and solutions development. We believe in Canara strongly in the user-centric approach, that users should be empowered in this new connected life and connected world that we live in. Another award in the recent EIC past was the privacy by design.
And we believe in the concepts around privacy, by design and the ambassadors of privacy by design the concepts that privacy should be built into systems from the beginning that users should have a right to privacy anonymity to be free of surveillance and from tracking. But we also believe that privacy when done right from a user centric approach can actually transform the conversation from one of protection to that of customer engagement and business development.
Speaker 22 00:38:13 And in this sense, part of the challenges around privacy are, as someone had said today earlier, getting the economics right. And if we get the economics right for privacy, we enable business and we really move forward at a much faster pace take great leaps. So this year's recognized organization takes part in the life management platform, puts the user at the center of the connected world.
This organization is part of a wave of user-centric access, the user-centric access revolution, and they allow a user to control management and sharing of their resources and to control their personal data. And they can do this through a variety of channels. This organization is, is part of the leading edge of implementations in this new forum of privacy awareness systems that really can deliver massive benefits from the business perspective as well without violating the privacy of the users and the demands of, of individuals in terms of privacy. So without further ado, the winner is Miko.
Speaker 23 00:39:57 I'm very moved and this was quite a surprise. I'm actually in awe of the people that I've met over the last few days, because what I see is decades behind us, of people that I've been working away at standards and security and ways to make life secure and open and free. And at the same time, we're at this shift in society as citizens and as customers, where there are these great opportunities in collaborating and sharing. If we can find this balance between us being able to come to the table as partners in the way we transact as citizens as customers.
And I see that in the not too distant future, we will wake up and we will browse life. We will need to be able to control our devices, our digital lives and our identity. And I think if we can find a way to do that, that is convenient and seamless and bring the work of past decades into this connected user-centric space, then the opportunities for new models and the way of empowering the emerging generation and the connected life and the opportunities that will present are significant. But I think it starts with each of us. And I think it starts with making that easy and seamless and beautiful.
And that's what Meko is about. So thank you.
The last category is also a special category, a special award number two for 2015, and is presented by host vault. So let have you here host, what are the areas of expertise you're covering within copy a call?
Speaker 24 00:42:07 Well, copy a call might be best known as an Analyst company, an Analyst Analyst firm, but I'm more working on the advisory side where business hits technology. So when it comes to processes, roles, rules, and policies. So this is my
Job. Thank
Speaker 24 00:42:31 You.
Yes, I'm the last speaker today, but we have plenty of time. Some of you might know that, oh, I hope most of you will know that in some parts of this word with a less developed fixed line, telecommunications infrastructure, people have to rely very much on mobile mobile services in general. So not mobile phones alone, and sometimes they come up with amazing results. So you might know that in vast batches of Africa, the nonexisting banking system is replaced by some mobile transactions.
And today not surprisingly, we will award a project which is similar and comes up with some astonishing results as well. So let me open this magic red envelope. And the winner is dialogue Aieta and three, three Lanka, tele mobile tele mobile for the project project mobile connect.
So
Speaker 24 00:44:27 I think it's excusable that none of these two providers made this way to Munich this night, but we have the were known Prab prat C city van with us, whom you know, already. And he in fact is from w S O tool who was the implementer of this project.
And well, this project involves these two telecommunication providers plus three service providers. And it provides a seamless, single sign on user experience while ensuring at the same time, a banking grade security, which is great.
And you, you don't have to remember any passwords. It's a single click environment and it even supports multifactor authentication. But what is most surprising is that the full launch was December last year.
I, if I recall it, right, and from that time until now in a breakneck, next speed, the adoption rate searched, and now we have about 14 million subscribers and taking this into relation of 21, sorry, 14 million subscribers, and setting this in relation to the whole population of 21 million people. So this is nearly, or this is about two thirds of the population, which in this four month took advantage of these services.
And sometimes I have the impression that, yeah, those companies, they, that had a disadvantage or those countries, which had a disadvantage at first may in the area of mobile services, finally overtake us here in the developed world. So may I ask two short questions to you as most projects have their ups and downs, what were your major obstacles to overcome and what are the achievements you are most proud of?
Speaker 25 00:47:14 Yeah. So first of all, it's my pleasure to be here and except I wouldn't be behalf of dial GSMA and S Lanka telecom. So yeah.
So when we met GSMA guys dial GSMA guys in July last year, so they had a requirement to build a secure login system for mobile authentication that could let end users access their applications in a single click. And also they wanted to expand this solution to multiple operators. Dialogue is the largest mobile operation Sri Lanka, which has more than 1 million subscribers. So one once again, like, so Sri Lanka having like 20 million plus population and the population won't have like one to one mapping between subscribers, like one person could have more than one subscriptions.
So, so, so it was the perfect timing to meet those guys because we just released, I didn't serve I, which had like, almost all the features they required, but there are some missing stuff too. And we implemented the GS EOP connect profile for opener connect and also SSD authenticator. So once those implementations were completed, we deployed it against all the subscribers of dialogue. Once that is done, the second largest operator mobile operator in Sri Lanka is Sri Lanka telecom. Then we deploy the solution over those subscribers too.
So as you mentioned, yes, so we right now have like few few service providers and as you go on, we hope to onboard more and more service providers. Yeah. Thank you very much. Okay. Thank
You.
So ladies and gentlemen, this was the award ceremony 20,015. Thank you very much for attending two informations. I would like to give to you for tonight. First ping identity is sponsoring the award reception just out outside of the doors. So pick a drink and second information. The soccer game is going to be displayed in the exposition area, starting at 2045. Thank you very much.
Have a nice evening and see you tomorrow morning at eight 30.