Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
by Martin Kuppinger
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and enlightening presentations. My #1 topic is the emergence of integration between decentralized identity (DID) - also referred to Self-Sovereign Identity (SSI) or as verifiable credentials - and traditional, centralized IAM (Identity & Access Management) and CIAM (Consumer IAM). DID has been a hot topic at EIC for many years, but more as an innovation that is somewhat separate from traditional IAM....
Blog
The Changing Market for Access Control & Risk Management for Business Applications
by Martin Kuppinger
Pathlock’s acquisition tour is changing the market dynamics A few days ago, Pathlock, one of the leading providers in the market for Access Control & Risk Management for Business Applications , has announced a merger with Appsian and Security Weaver, and the acquisition of CSI Tools and SAST Solutions. With that, five of the vendors in this market segment, become one. In our recent Leadership Compass on Access Control Solutions for SAP and other LoB (Line of Business) Applications , we had covered overall 23 vendors. With five of these merging into one, it becomes apparent...
Blog
The European Identity & Cloud Conference Celebrates Its 15th Edition – Time for Looking Back
by Martin Kuppinger
As one of the founders of KuppingerCole Analysts, I’m also an EIC (European Identity & Cloud Conference) veteran. Looking back to the start in 2007, a lot has changed since then, but the core of EIC is what it has been from the very beginning: A conference that provides both thought leadership and best practices from the field. A conference that brings together end users, vendors, analysts, and other experts, for close interaction and exchange. A conference that, I dare to say (and I’m proud of), is the most relevant gathering on identity topics globally. Time to make a...
Blog
Software Supply Chain Risks: How to re-assess when there is a ban?
by Martin Kuppinger
Over the past 16 months, Software Supply Chain Risks have risen to a top concern of CISOs, caused by several software supply chain attacks as well as major risks induced by vulnerabilities in extensively used standard software components, specifically Log4j/Log4shell. Understanding and mitigating software (supply chain) risks as well as protecting the own DevOps pipeline is a must for organizations. This is not a one-time exercise but requires continuous re-evaluation based on standardized methodology. Risks are continuously changing, be it by newly detected vulnerabilities or by external...
Blog
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
by Martin Kuppinger
Anyone who has attended our European Identity & Cloud Conference (EIC) in the past 15 years will know that this is the leading event when it comes to current and future trends in  IAM and privacy (not to mention cloud security or cybersecurity). EIC is about the union of analyst thought leadership, the expertise of industry leaders, and best practices from the field. This year’s EIC continues and strengthens this proud tradition with more than 200 speakers, covering a huge range of topics, which an increased focus on cybersecurity. Some of the highlights in the...
Blog
Accelerating Your Digital Journey
by Martin Kuppinger
With increasing security standards, companies are struggling to stay up to date. Efficiency is required but integrating new standards into an existing system is time-consuming. Tatsuo Kudo, from Authlete, and Martin Kuppinger discussed how an excellent time-to-value is possible. Watch the interview now to find out more.
Blog
No Security Without Confirmation
by Martin Kuppinger
Today's organizations require a tool for authenticating, encrypting data, or signing documents to ensure security and trust. Konstantin Krasovsky, from Indeed Identity, and Martin Kuppinger discussed what challenges lay ahead for organizations. Watch the interview now to find out more.
Blog
Identity Fabrics: Developing your IAM Program from Vision to Strategy
by Martin Kuppinger
Are you bothered by the ubiquitous dichotomy between delivering to urgent demand and delivering to a strategy for your organization’s IAM (Identity & Access Management)? The one good news on that is that you are not alone. But there is more good news: You can get both, without unreasonable extra effort and without endlessly delaying any delivery. It is work and it will require some investment in time and maybe in money. But it works and it is an already proven approach. Not every practice qualifies for “best” practice The magic word in that is “best...
Blog
Modernization of IGA
by Martin Kuppinger
Arun Binaykia from Sath and Martin Kuppinger talked about the roadblocks customers have with the integration of access management systems. Implementing identity management and governance is a long and cumbersome journey. Customizing the system to suit your organization is a must. This process takes a lot of time.
Blog
Every Organization Swiftly Secured
by Martin Kuppinger
In the world of access management, many organizations around the world are not ready to do access certification. To stay secure, organizations need to consider filling the security blanks with SAAS quickly to mitigate risks. Martin Kuppinger had a great interview with Austin Baker from SecurEnds about the importance of access governance.
Previous
1 2 3 4 5 6 7 Next