Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Sadrick Widmann on the Truth About Identity
Sadrick Widmann, Chief Product Officer at Cidaas is to deliver a presentation entitled Give Me 10 Minutes, I'll Give You The Truth About Identity on Monday, September 13 starting at 20:00 pm at...
Learn more
Leadership Compass
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Learn more
Event Recording
Event Recording
Plan A: Reduce Complexity in your Cloud Native Environment (there is no Plan B)
Organizations with an advanced cloud migration program have hit a roadblock. TO successfully navigate the adoption of compartmentalized code, in order to reap the benefits of improved agility and...
Learn more
Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
Knowing differences between Cyber Resistance and Cyber Resilience
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this...
The impact of decentralized identity solutions in the marketplace, insights and lessons
Event Recording
The impact of decentralized identity solutions in the marketplace, insights and lessons
Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s...
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Navigating the OT World – Selecting a Solution to Suit
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Event Recording
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and...
Creating a Seamless Access Experience with the Digital Double
Event Recording
Creating a Seamless Access Experience with the Digital Double
Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated...
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Digital Identity in Travel (and beyond): a public-private affair
Event Recording
Digital Identity in Travel (and beyond): a public-private affair
Interoperability Between Global Identity Networks
Event Recording
Interoperability Between Global Identity Networks
Previous
8 9 10 11 12 13 14 Next