Go to Market with KuppingerCole
Insights
Research
Advisory
Events
KC Open Select
Company
Become a Client
Login
Search
Become a Client
Insights
Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust
Research
Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog Videos
Advisory
Advisory Services Meet our Advisors
Events
cyberevolution EIC 2024 Webinars
KC Open Select
Fraud Reduction Intelligence Platforms Identity Governance & Administration Customer Identity and Access Management Privileged Access Management Passwordless Authentication
Company
About us People Jobs Newsroom Contact us
Go to Market with KuppingerCole
Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
See all insights
Most recent in Customer Identity & Access Management
Customer Identity and Access Management
Open Select
Customer Identity and Access Management
Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But
Thales OneWelcome Identity Platform
Executive View
Thales OneWelcome Identity Platform
This KuppingerCole Whitepaper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is included.
Most recent in Decentralized Identity
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But
EIC 2023 Recap
Video
EIC 2023 Recap
Reusable Verified Identity
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital identity that has been verified to represent a real-world entity to be reused by the issuing
Most recent in Fraud Prevention
Fraud Reduction Intelligence Platforms
Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the
Making Cybersecurity ‘Lagom’
Blog
Making Cybersecurity ‘Lagom’
Join Swedbank’s Patrick Shirazi when he discusses the human role in cybersecurity and what cybersecurity experts can learn from the Swedish concept of Lagom.
Most recent in Identity & Access Management
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that
A Shift Toward MSP Delivery: How MSPs Are Mitigating  Enterprise IAM Delivery Challenges
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial
Identity as the Most Critical Element of Security
Blog
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing iden
Most recent in Identity Governance and Administration
Identity Governance & Administration
Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that
Eviden DirX Identity
Executive View
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is included.
Most recent in Passwordless Authentication
Passwordless Authentication
Open Select
Passwordless Authentication
Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Analyst Chat #191: The Second Law of AuthN Dynamics
Analyst Chat
Analyst Chat #191: The Second Law of AuthN Dynamics
Mike Neuenschwander, Vice President at KuppingerCole in the U.S. and Global Head of Research Strategy, recently had some thoughts about passwordless authentication and wrote a blog about it. Today, he joined Matthias for further discussion about that topic, delving deeper into entropy and how it
The Second Law of AuthN Dynamics
Blog
The Second Law of AuthN Dynamics
Passwordless authentication is kind of hot right now, even though “passwordless” predates the password—much like horse-drawn carriages predated cars (which were first known as “horseless carriages”). But after witnessing a groundswell of support for new passwordless methods, I resolved to determine
Most recent in Privileged Access Management
Privileged Access Management
Open Select
Privileged Access Management
Create a shortlist of solutions tailored to privileged access management your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly.
Perfecting Privileged Access Management (PAM)
Webinar Recording
Perfecting Privileged Access Management (PAM)
Join security experts from KuppingerCole Analysts and Keeper Security as they look at user-friendly ways of increasing visibility, security, and control over employee passwords, credentials, and secrets. They will also discuss Privileged Account and Session Management (PASM), Secrets Management
NRI Secure Uni-ID Libra 2.7
Executive View
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative
Most recent in Zero Trust
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But
Shut the Door to Cyber Attackers Permanently
Webinar Recording
Shut the Door to Cyber Attackers Permanently
Join security experts from KuppingerCole Analysts and Beyond Identity as they discuss the challenges of first-generation MFA and how to reduce friction while increasing security and improving the user experience by implementing passwordless authentication within a Zero Trust security framework.
Zero Trust Network Access for OT environments
Whitepaper
Zero Trust Network Access for OT environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security measures such as strong and risk-adaptive authentication and policy-based access controls. Some tools
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
See all research
Most recent in Leadership Compass
Attack Surface Management
Sep 18, 2023
Attack Surface Management
This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Attack
Access Management
Aug 16, 2023
Access Management
This report provides an overview of the market for Access Management products and services and presents you with a compass to help you to find the product or service that best meets your organization’s needs. We examine the market segment, vendor product and service functionality, relative market
Software Supply Chain Security
Aug 02, 2023
Software Supply Chain Security
This Leadership Compass evaluates and gives insight into the emerging end-to-end Software Supply Chain Security (SSCS) market. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SSCS solutions to help you find the solution that
Most recent in Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating  Enterprise IAM Delivery Challenges
Aug 31, 2023
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial
Speeding up Zero Trust Delivery using Managed Services
Jul 19, 2023
Speeding up Zero Trust Delivery using Managed Services
Zero Trust is important as a fundamental and essential paradigm for a stronger cybersecurity posture. Zero Trust, on the other hand, is complex to put in practice. For succeeding with the Zero Trust journey, leadership and an organization that is working hand in hand are essential, but also the
Zero Trust Network Access for OT environments
Jul 19, 2023
Zero Trust Network Access for OT environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security measures such as strong and risk-adaptive authentication and policy-based access controls. Some tools
Most recent in Executive View
SailPoint Non-Employee Risk Management
Aug 16, 2023
SailPoint Non-Employee Risk Management
This KuppingerCole Executive View looks at some of the options available to IT leaders and senior security strategists to manage non-employee and other third-party identities. A technical review of SailPoint’s Non-Employee Risk Management solution is included.
Tanium XEM Platform
Aug 03, 2023
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Eviden DirX Identity
Aug 02, 2023
Eviden DirX Identity
This KuppingerCole Executive View looks at the newest updates from Eviden for its IAM tool, DirX Identity. Product description and some of the strengths and challenges of the DirX Identity is included.
Most recent in Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Sep 22, 2023
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber threats. A modern SOC enables proactive threat detection, rapid incident response, and cyber resilience by
EU Digital Operational Resilience Act (DORA)
Sep 04, 2023
EU Digital Operational Resilience Act (DORA)
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption, including cyberattacks. The European Union has put together a framework of requirements in the Digital
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
Sep 04, 2023
Cyber Risks from China: How Contract Negotiations Can Mitigate IT Risks
China is an important economic partner for most enterprises, but doing business in and with China introduces its own set of risks. This report provides an overview of the major cyber related risks related to doing business with China and outlines the steps to manage and mitigate these risks.
Most recent in Leadership Brief
Why Vulnerability Management Is a Strategic Investment
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a
Managing RDP Security Risks to Block Ransomware Attacks
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks
Advanced IT security solutions for OT environments
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such
Most recent in Blog
Making Cybersecurity ‘Lagom’
Sep 26, 2023
Making Cybersecurity ‘Lagom’
Join Swedbank’s Patrick Shirazi when he discusses the human role in cybersecurity and what cybersecurity experts can learn from the Swedish concept of Lagom.
Enhancing AI Cybersecurity: A Two-Fold Approach
Sep 20, 2023
Enhancing AI Cybersecurity: A Two-Fold Approach
Tune in to Sray Agarwal, Senior Director at Fractal AI discussing ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models.
A Secure Supply Chain is Impossible. Here is why.
Sep 19, 2023
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But the nature of supply chains means they can never be 100% secure, but we can do better if we stick
Most recent in Videos
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Sep 29, 2023
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of the
Analyst Chat #191: The Second Law of AuthN Dynamics
Sep 25, 2023
Analyst Chat #191: The Second Law of AuthN Dynamics
Mike Neuenschwander, Vice President at KuppingerCole in the U.S. and Global Head of Research Strategy, recently had some thoughts about passwordless authentication and wrote a blog about it. Today, he joined Matthias for further discussion about that topic, delving deeper into entropy and how it
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Sep 22, 2023
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance and Administration (IGA) and Governance, Risk, and Compliance (GRC) can deliver a solution that
Events
cyberevolution
EIC 2024
Webinars
See past events
cyberevolution
cyberevolution
Attend cyberevolution in Germany and meet 500 security experts. Participate in interactive sessions to explore cybersecurity in an AI powered digital world. Network with an international community and learn about societal, technological, and environmental megatrends.
To the Event Agenda Overview
European Identity and Cloud Conference 2024
European Identity and Cloud Conference 2024
Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR!
To the Event Call for Speakers
Most recent in Webinars
The Evolution of Secure Access in Critical Infrastructure
Oct 10, 2023
The Evolution of Secure Access in Critical Infrastructure
Cyberattacks are putting increased pressure on all organizations, especially those running operational technology (OT), industrial control systems (ICS), and critical infrastructure systems (CIS) with high availability requirements. Secure remote access (SRA) for the maintenance of such systems is
Choose the Right DLP Solution to Minimize Data Loss
Oct 18, 2023
Choose the Right DLP Solution to Minimize Data Loss
Increased reliance on IT and the expansion of the attack surface due to the adoption of cloud-based and mobile computing, means that never before has it been as important for organizations to ensure that sensitive data is not lost, misused, mistakenly deleted, or accessed in an unauthorized way.
Cloud Security Early Warning Systems: From CSPM to CNAPP
Oct 19, 2023
Cloud Security Early Warning Systems: From CSPM to CNAPP
Cloud computing delivers the benefits of accelerated development without the hardware costs. But the dynamic nature of cloud services and the proprietary security features offered by different cloud service providers make it challenging for customers to manage the risks and to be sure they are
Advisory
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.

See Advisory Services
Contact our advisors

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Meet our Advisors
KC Open Select
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Discover and compare cybersecurity solutions

Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.

Visit KC Open Select
Contact KuppingerCole

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Contact Us
Company
About us People Jobs Newsroom Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.​
Read more about our philosophy
Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.

Business Team

Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.

Meet the Team
Career Opportunities
Auszubildende/r zum Veranstaltungskaufmann/-frau (m/w/d)
Events
 Wiesbaden
Auszubildende/r zum Veranstaltungskaufmann/-frau (m/w/d)
Die KuppingerCole Analysts AG ist ein IT-Analystenunternehmen mit Hauptsitz in Wiesbaden und weiteren Standorten rund um die Welt. Insgesamt beschäftigen wir aktuell rund 50 Mitarbeiter. KuppingerCole unterstützt seine Kunden mit Leistungen in den Bereichen Events, Advisory und Research.
Advisor (m/w/d) – Cybersecurity, IAM, Digital Transformation
Advisory
 flexible
Advisor (m/w/d) – Cybersecurity, IAM, Digital Transformation
We are looking for an energetic Advisor to complement our advisory team. Young, talented people - either directly from university or with the university degree and up to 5 years of professional experience in industry or consulting in the field of Cybersecurity,  IAM, Digital Transformation -
View all Job Offers
Latest Press Releases
Mike Neuenschwander Joins KuppingerCole Analysts, Inc. as Vice President
Mike Neuenschwander Joins KuppingerCole Analysts, Inc. as Vice President
KuppingerCole Analysts AG, a leading global analyst firm providing expertise in Identity & Access Management (IAM) and Cybersecurity, is delighted to announce the appointment of Mike Neuenschwander as Global Head of Research Strategy and Vice President of the company’s US business arm.
KuppingerCole Analysts AG Achieves TISAX Assurance Level 3 and ISO 27001 Certifications
KuppingerCole Analysts AG Achieves TISAX Assurance Level 3 and ISO 27001 Certifications
KuppingerCole Analysts AG, a leading IT analyst company, is delighted to announce that it has achieved two critical milestones in the field of information security: TISAX Assessment Level 3 (AL3) and ISO 27001 certifications.
KuppingerCole Honors Outstanding Projects with 2023 European Identity and Cloud Awards
KuppingerCole Honors Outstanding Projects with 2023 European Identity and Cloud Awards
Global IT analyst firm KuppingerCole Analysts celebrated the winners of the prestigious 2023 European Identity Awards at this week’s 16th annual European Identity and Cloud Conference in Berlin, attended by some of Europe’s most eminent industry representatives.
Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Contact us
See all locations, phone numbers, e-mail addresses
Blog

Modernizing IAM Solutions Leveraging New Operating Models With the...

Mar 12, 2020
Matthias Reinwarth
Latest posts by Matthias Reinwarth
Defining Modern Cybersecurity Leadership
Catalyzing your Digital Transformation Journey
A Iot to Venture, More to GAIN
A First End to the Schrems II Limbo
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
Advisory
Advisory Services
Meet our Advisors
Events
cyberevolution
EIC 2024
Webinars
KC Open Select
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Company
About us
People
Jobs
Newsroom
Contact us
Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Blog
Videos
Advisory
Advisory Services
Meet our Advisors
Events
cyberevolution
EIC 2024
Webinars
KC Open Select
Fraud Reduction Intelligence Platforms
Identity Governance & Administration
Customer Identity and Access Management
Privileged Access Management
Passwordless Authentication
Company
About us
People
Jobs
Newsroom
Contact us
Switch to dark theme
Switch to light theme
Imprint Terms & Conditions Terms of Use Privacy Policy © Copyright KuppingerCole Analysts AG
© Copyright KuppingerCole Analysts AG
Go to Market with KuppingerCole