Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Identity & Access Management
Controlling who or what can access critical business systems and data may seem like an obvious thing to do, but the continual cyber-attacks and breaches indicate that this is not being done very...
Learn more
Executive View
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Learn more
Event Recording
Event Recording
Rakesh Tripathi: Future of Identity Management
Learn more
Road to EIC: What’s Next in Digital Identity Standards?
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital...
IAM and Cybersecurity Insights and Trends in 2024
Video
IAM and Cybersecurity Insights and Trends in 2024
Martin Kuppinger was a virtual guest at SailPoint's SAILforward24 and was invited to have a chat with Matthew Mills about the industry and market, trends and his perspectives. Delve into the...
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
Analyst Chat
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
What a milestone! 200 episodes of the Analyst Chat. Matthias and Martin celebrate the journey of the three years of the podcast. Dive into the evolution of cybersecurity and identity management,...
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Webinar Recording
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Join us for a compelling webinar on "Mastering Identity Security in the Age of Evolving Attack Surfaces." This session will address how to minimize human error, eliminate gaps, and overlaps within...
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to...
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into...
Modernizing IGA: A Guide for IAM Leaders
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Join this webinar to learn more about Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into...
Navigating the Access Control Maze
Webinar Recording
Navigating the Access Control Maze
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration...
The Next Generation of Secure Access with Zero Trust
Event Recording
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.
IAM: The Guardian Angel of Zero Trust
Event Recording
IAM: The Guardian Angel of Zero Trust
In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes...
Panel | It all starts with the Endpoint
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
1 2 3 4 5 6 7 Next