Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Learn more
Executive View
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Learn more
Webinar Recording
Webinar Recording
Navigating the Future of API Security: Trends, Challenges, and Innovations
Join KuppingerCole’s Lead Analyst Alexei Balaganski talking about the need for robust security strategies, the increasing complexity of API ecosystems, and the importance of holistic...
Learn more
Interoperability Between Global Identity Networks
Event Recording
Interoperability Between Global Identity Networks
Human-Centric Identity
Event Recording
Human-Centric Identity
Security vs experience. Platform vs best of breed. Fast vs thorough. The identity technology world forces us to make trade-offs. These difficult decisions are an endless exercise in technical and...
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
Event Recording
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as...
The Balance Between Decentralization and Efficiency
Event Recording
The Balance Between Decentralization and Efficiency
Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to...
Designing an European Identity Wallet: An overview of UI and UX aspects
Event Recording
Designing an European Identity Wallet: An overview of UI and UX aspects
The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview...
IGA in the Financial Industry - Implementing IAM
Event Recording
IGA in the Financial Industry - Implementing IAM
Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.
Drivers for Identity & Access Management in the Financial Industries
Event Recording
Drivers for Identity & Access Management in the Financial Industries
Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the...
Bridging Traditional IGA with Cloud Native Authorization
Event Recording
Bridging Traditional IGA with Cloud Native Authorization
IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context...
Latest Developments in CIAM
Event Recording
Latest Developments in CIAM
Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way...
Protocol Independent Data Standards for Interoperability
Event Recording
Protocol Independent Data Standards for Interoperability
Panel | CIAM and Customer Data Platforms
Event Recording
Panel | CIAM and Customer Data Platforms
Cyber Security Architectures in a Hybrid World
Event Recording
Cyber Security Architectures in a Hybrid World
A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after...
Previous
9 10 11 12 13 14 15 Next