Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability...
Learn more
Blog
Blog
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
In the past 15 years, EIC is known as the leading event for current and future trends in IAM and privacy (not to mention cloud security or cybersecurity). Check out the highlights of EIC's...
Learn more
Executive View
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Learn more
Event Recording
Event Recording
Your Journey to the Cloud: Can you Finally Replace Active Directory?
In this session, we will answer a question that everyone is asking: "Can we really get rid of Active Directory in the cloud era?". In the conversations with many CISOs and CTOs, the future of...
Learn more
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Evolving Identity and Access Management for the Digital Era
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and...
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
Analyst Chat #152: How to Measure a Market
Analyst Chat
Analyst Chat #152: How to Measure a Market
Research Analyst Marina Iantorno works on determining market sizing data as a service for vendors, service providers, but especially for investors. She joins Matthias to explain key terms and...
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Event Recording
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an...
Cyber Hygiene Is the Backbone of an IAM Strategy
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security...
Advanced Authorization in a Web 3.0 World
Webinar Recording
Advanced Authorization in a Web 3.0 World
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who...
Erfolgreiche IAM-Projekte: Von Best Practices Lernen
Webinar Recording
Erfolgreiche IAM-Projekte: Von Best Practices Lernen
Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter...
Panel | What does the future hold for Identity and Access Management?
Event Recording
Panel | What does the future hold for Identity and Access Management?
Digital identities of customers, devices and services are at the core of the digital enterprise today. However, traditional IAM is riddled with complexity and siloes. Building a modern Identity...
Expert Chat: Interview with Neeme Vool
Event Recording
Expert Chat: Interview with Neeme Vool
KuppingerCole CISO Christopher Schuetze engages in a fun discussion with Swedbank's Neeme Vool on what the future holds for Identity and Access Management.
1 2 3 4 5 6 7 Next