Focus Area: The Future of Identity & Access Management

What is The Future of Identity & Access Management

Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally.

Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access permissions is therefore no longer enough. IAM has to become more agile and fine grained. It has to allow for decisions about the access of customers/consumers, employees, partners and billions of things/devices dynamically and in real time. In addition, plenty of users will use different identities (or personas) and switch between them several times a day or even hour, often by deploying different authentication mechanisms.

Latest Research, Upcoming Webinars and Events From
The Future of Identity & Access Management

Webinar

Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?

Advisory Note

Buyer’s Guide: Identity-as-a-Service (IDaaS)

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation and modify it as necessary to meet specific business requirements.

Webcast

The Future of Identity Management at Border Controls: Gateless and Multiple Biometric and Beyond

Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications.  Gateless border control and multiple biometrics, coupled with self-managed crypto-identity will be the future.  This may seem travel-specific, but the same identity that will get you into a country will also open a fully authorized bank account - with KYC/AML and the relevant National FinCrime agency...

Conference

Blockchain Enterprise Days 2019

Blockchain Enterprise Days (#BeDays19) will take place February 19-20, 2019 in Frankfurt, Germany. Blockchain is still on everyone's lips and is no longer reserved for the financial sector. For this reason, the Blockchain Enterprise Days will focus on further enterprise application areas of interest: Identity Access Management (IAM), Enterprise Resource Planning (ERP) and cybersecurity.

Latest News From The Future of Identity & Access Management

Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought…

Conference

Blockchain Enterprise Days 2019

Blockchain Enterprise Days (#BeDays19) will take place February 19-20, 2019 in Frankfurt, Germany. Blockchain is still on everyone's lips and is no longer reserved for the financial sector. For this reason, the Blockchain Enterprise Days will focus on further enterprise application areas of…

Webcast

The Future of Identity Management at Border Controls: Gateless and Multiple Biometric and Beyond

Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications.  Gateless…

Webcast

Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but…

Webcast

Transform Your Customer Experience: Customer Identity Today and Tomorrow

Customers are increasingly expecting more from the businesses they interact with, especially as security and privacy breaches dominate headlines. Customer Identity and Access Management can help businesses transform their customer experiences. Join this session to learn about key use…

Webcast

5 months of GDPR – status quo on implementation of the most extensive digital law in the world

How are companies, consumers and authorities taking the new regulation?

Webcast

How Policy Based CIAM can Improve the Customer Journey

In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such as mobile, internet of things, social media, and big data, the approach towards customers is…

Webcast

CX as the core of any CIAM

Customer Experience (CX) is the central starting point when it comes to the strategic definition of your CIAM. The management of millions of identities and the handling of several millions of interactions per day is a technical challenge that changes every day. However, ease of use,…

Webcast

Data Privacy — Who Actually Cares and Why?

Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for…

Webcast

Panel: How to Defend your Customer from Current and Future Threats

This  panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.  Learn best practices from data protection & privacy experts on how to use the latest defenses to secure your organization against the latest…

About KuppingerCole Analysts

Our Capabilities

KuppingerCole’s values are expertise, thought leadership, neutrality and outstanding practical relevance.

Our People

KuppingerCole’s highly qualified and globally recognized analysts continuously research and update KuppingerCole online research library, and perform manufacturer-independent advisory services.

Our Methodologies

Proven approach of KuppingerCole focuses on lean, efficient projects, with a structured methodology based on ongoing research, publications, and thought-leading deep knowledge of our analysts.

Our Experience

A large number of KuppingerCole’s existing reports and a significant number of new reports published every year ensures that you can always access up-to-date information you need for your decisions.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Sign Up now

Blog

Blog

IBM Acquires Red Hat: The AI potential

On October 28th IBM announced its intention to acquire Red Hat. At $34 Billion, this is the largest software acquisition ever.  So why would IBM pay such a large amount of money for an Open Source software company? I believe that this acquisition needs to be seen beyond looking just at DevOps and Hybrid Cloud, rather in the context of IBM’s view of the future where the business value from IT services will come from in future. This acquisition provides near-term tactical benefits from [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00