Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity
Maarten Stultjens, VP Corporate Development at OneWelcome is to partake in a panel discussion entitled Identity, Privacy, Security - The European Perspective on Monday, September 13 starting at...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Event Recording
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
Learn more
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus...
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Digital ID, Web3, and Metaverses
Blog
Digital ID, Web3, and Metaverses
Yes, I said “Metaverses,” not “Metaverse.” Many already exist — such as in manufacturing — and there will be many more, of many different types. We have a lot to expect here, particularly with the...
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
Blog
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
In today's increasingly interconnected world, digital identity has emerged as a critical component of our daily lives. From accessing online services to conducting financial transactions, our...
Elevate Your Digital ID Game with This EIC 2023 Workshop
Blog
Elevate Your Digital ID Game with This EIC 2023 Workshop
At the 2023 European Identity and Cloud Conference, KuppingerCole held a workshop entitled “Building the Roadmap for Your Future IAM”. You can now watch this workshop for free.
The Power of Identity Management in Revolutionizing Financial Services
Blog
The Power of Identity Management in Revolutionizing Financial Services
The participation of financial services has always been a crucial aspect of the European Identity and Cloud Conference (EIC). In its 17-year history, EIC has seen many representatives of large...
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Identity as the Most Critical Element of Security
Blog
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the...
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access...
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is...
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management)...
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
1 2 3 4 5 6 7 Next