Blog
The changing role of Azure AD in Enterprise IAM Architectures
by Martin Kuppinger
For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the cloud. For others, Azure AD was at the beginning just something that came with Microsoft Office 365 – just another target system when it comes to IAM (Identity and Access Management).  However, we are talking to more and more corporate executives who are considering whether Azure AD's role should become a more strategic element within their IAM infrastructure.   There...
Blog
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
by Martin Kuppinger
Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital Transformation. In this respect, IAM not only serves as a security technology but also as a mechanism that helps responding to new business challenges and drivers. While every industry currently has to deal with the disruptive nature of the Digital Transformation and ever-increasing cyberattacks, some of the developments are endemic to healthcare organizations. For instance, complying with new...
Blog
Robotic Process Automation – an IAM Challenge
by Martin Kuppinger
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform tasks that humans executed before, companies unlock a significant potential for cost savings. AI (Artificial Intelligence) helps in realizing RPA solutions. However, if done wrong, the use of RPA can cause severe security challenges. It starts with the definition of the accounts used by the robots. There appears being a tendency of creating sort of “super-robot” accounts –...
Blog
Smart Manufacturing: Locking the Doors You've Left Open When Connecting Your Factory Floor
by Martin Kuppinger
Smart Manufacturing or, as the Germans tend to say, Industry 4.0, has already become a reality for virtually any business in manufacturing. However, as just recently demonstrated by the attack on Norsk Hydro , this evolution comes at a price: There are doors created and opened for attackers that are not easy to close again. These new challenges are not a surprise when looking at what the quintessence of Smart Manufacturing is from a security perspective . Smart Manufacturing is about connecting business processes to manufacturing processes or, in other words, the (business) value...
Blog
There Is a Price to Pay for Using the Shiny, Bright Cloud Service
by Martin Kuppinger
One of the slides I use most frequently these days is about Identity Brokers or Identity Fabrics, that manage the access of everyone to every service. This slide is based on recent experience from several customer advisories, with these customers needing to connect an ever-increasing number of users to an ever-increasing number (and complexity) of services, applications, and systems. This reflects the complex reality of most businesses. Aside of the few “cloud born” businesses that don’t have factory floors, large businesses commonly have a history in their IT. Calling...
Blog
Blockchain Just a Hype?
by Martin Kuppinger
Blockchain - Just a Hype?
Blog
AI in a Nutshell
by Martin Kuppinger
What AI is and what not
Blog
Top 5 CISO Topics for 2019
by Martin Kuppinger
Where to put your focus on in 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
by Martin Kuppinger
Where to put your focus on in 2019
Blog
IBM & Red Hat – And Now?
by Martin Kuppinger
On October 28 th IBM announced its intention to acquire Red Hat . At $34 Billion, this is the largest software acquisition ever. So why would IBM pay such a large amount of money for Red Hat? Not surprising, there were quite a few negative comments from parts of the Open Source community. However, there is logic behind that intended acquisition. Aside of the potential it holds for some of the strategic fields of IBM such as AI (Artificial Intelligence) and even security (which is amongst the divisions of IBM showing the biggest growth), there is an obvious potential in the field of...
Previous
4 5 6 7 8 9 10 Next