Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
How to Grant Access Right
Find out about the importance of context for Identity Risk Management.  Watch the insightful interview Martin Kuppinger had with David Pignolet from SecZetta on the EIC 2021.
Learn more
Executive View
Executive View
NRI SecureTechnologies Uni-ID Libra 2.6
Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese...
Learn more
Event Recording
Event Recording
The Evolution of CIAM and What’s in Store for the Future of Identities
With digital transformation continuing to change the way customers interact with businesses, organizations need to provide a personalized, seamless and friction free experience to their customers...
Learn more
Human-Centric Identity
Event Recording
Human-Centric Identity
Security vs experience. Platform vs best of breed. Fast vs thorough. The identity technology world forces us to make trade-offs. These difficult decisions are an endless exercise in technical and...
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
Event Recording
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as...
The Balance Between Decentralization and Efficiency
Event Recording
The Balance Between Decentralization and Efficiency
Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to...
Designing an European Identity Wallet: An overview of UI and UX aspects
Event Recording
Designing an European Identity Wallet: An overview of UI and UX aspects
The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview...
IGA in the Financial Industry - Implementing IAM
Event Recording
IGA in the Financial Industry - Implementing IAM
Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.
Drivers for Identity & Access Management in the Financial Industries
Event Recording
Drivers for Identity & Access Management in the Financial Industries
Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the...
Bridging Traditional IGA with Cloud Native Authorization
Event Recording
Bridging Traditional IGA with Cloud Native Authorization
IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context...
Latest Developments in CIAM
Event Recording
Latest Developments in CIAM
Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way...
Protocol Independent Data Standards for Interoperability
Event Recording
Protocol Independent Data Standards for Interoperability
Panel | CIAM and Customer Data Platforms
Event Recording
Panel | CIAM and Customer Data Platforms
Cyber Security Architectures in a Hybrid World
Event Recording
Cyber Security Architectures in a Hybrid World
A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after...
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Event Recording
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We...
Previous
9 10 11 12 13 14 15 Next