Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Road to EIC: eIDAS 2.0 – The Way to "Trusted, Voluntary, and User-Controlled" Digital Identity
The regulation on electronic identification and trust services (eIDAS) is designed to increase trust and security in electronic transactions within the EU's internal market. One of eIDAS’ aims is...
Learn more
Blog
Blog
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the...
Learn more
Whitepaper
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement...
Learn more
Event Recording
Event Recording
A Story About Convenient Security
Learn more
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus...
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Road to EIC: What’s Next in Digital Identity Standards?
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital...
Cybersecurity & IAM:​ 2023 in Numbers
Survey
Cybersecurity & IAM:​ 2023 in Numbers
Significant advancements happened in identity and access management (IAM) and cybersecurity in 2023. For most organizations, it has become more and more important to strengthen cybersecurity and...
IAM and Cybersecurity Insights and Trends in 2024
Video
IAM and Cybersecurity Insights and Trends in 2024
Martin Kuppinger was a virtual guest at SailPoint's SAILforward24 and was invited to have a chat with Matthew Mills about the industry and market, trends and his perspectives. Delve into the...
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
Analyst Chat
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
What a milestone! 200 episodes of the Analyst Chat. Matthias and Martin celebrate the journey of the three years of the podcast. Dive into the evolution of cybersecurity and identity management,...
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Webinar Recording
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Join us for a compelling webinar on "Mastering Identity Security in the Age of Evolving Attack Surfaces." This session will address how to minimize human error, eliminate gaps, and overlaps within...
Digital ID, Web3, and Metaverses
Blog
Digital ID, Web3, and Metaverses
Yes, I said “Metaverses,” not “Metaverse.” Many already exist — such as in manufacturing — and there will be many more, of many different types. We have a lot to expect here, particularly with the...
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to...
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
Blog
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
In today's increasingly interconnected world, digital identity has emerged as a critical component of our daily lives. From accessing online services to conducting financial transactions, our...
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into...
Elevate Your Digital ID Game with This EIC 2023 Workshop
Blog
Elevate Your Digital ID Game with This EIC 2023 Workshop
At the 2023 European Identity and Cloud Conference, KuppingerCole held a workshop entitled “Building the Roadmap for Your Future IAM”. You can now watch this workshop for free.
1 2 3 4 5 6 7 Next