Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
No Information Security without Identity
Identity and information security are inextricably linked because is impossible to secure information without knowing who or what is allowed to access it, or without knowing who or what is...
Learn more
Whitepaper
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
Learn more
Event Recording
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
Learn more
The Unique Challenges of Identity M&A in High-Growth Organizations
Event Recording
The Unique Challenges of Identity M&A in High-Growth Organizations
Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes...
Securely Identifying Mobile Apps
Event Recording
Securely Identifying Mobile Apps
Today's open standards ensure that when a user chooses to login, the user’s authentication is protected and only delivered to the mobile app that initiated the authentication. However, how...
Remote onboarding with Verifiable Credentials
Event Recording
Remote onboarding with Verifiable Credentials
Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with...
Implementing SSI using the existing web infrastructure
Event Recording
Implementing SSI using the existing web infrastructure
SSI and Verifiable Credentials are the latest development in identity management. They offer many benefits over existing federated identity management systems. Unfortunately some proponents of...
Verifiable Credentials on the front line
Event Recording
Verifiable Credentials on the front line
Learn how businesses are using verifiable credentials, decentralized orchestration and blockchain identity to reduce fraud, increase privacy and improve user experience. See real-world examples...
Connecting 10.000+ mobility companies and multi million customers
Event Recording
Connecting 10.000+ mobility companies and multi million customers
How to innovate your Identity Governance and Administration program
Event Recording
How to innovate your Identity Governance and Administration program
The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.
Enterprise Domain Annotation based Segregation of Duties strategies
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
Panel | B2B IAM
Event Recording
Panel | B2B IAM
Best Practice: CIAM as Business Enabler for Digital Transformation
Event Recording
Best Practice: CIAM as Business Enabler for Digital Transformation
Panel | How to improve customer IAM and CIAM
Event Recording
Panel | How to improve customer IAM and CIAM
Signing in the Rain: HTTP Message Signatures and Web Security
Event Recording
Signing in the Rain: HTTP Message Signatures and Web Security
HTTP is an amazingly powerful protocol, and it's the lifeblood of the internet today. On the surface, it seems to be a simple protocol: send a request to a server and get back a response, and...
Previous
10 11 12 13 14 15 16 Next