Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
A Foundational Data Layer: The Key to Value in Identity
The world’s largest tech companies have been born under a simple notion: “content is king.” Google, Apple, Netflix, Oracle, and many others have labored under this primary notation to capture as...
Learn more
Blog
Blog
EIC Speaker Spotlight: Patrick Parker on Complexity in IT
Patrick Parker, innovation-driven entrepreneur as well as founder and CEO at Identity Management and Cloud Security firm EmpowerID, will deliver a keynote presentation entitled Complexity Has...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Event Recording
Event Recording
The Digital Identity Shake-up we’ve been waiting for: How to Survive, and how to Thrive
 
Learn more
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Delivering Business Value through Orchestration
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
Closing Keynote
Event Recording
Closing Keynote
Covering Your Customer Identity Needs - The Way Forward
Event Recording
Covering Your Customer Identity Needs - The Way Forward
The Art of CIAM is to converge user Experience (UX) , security and privacy in a way  that is seamless and unobtrusive for the user. In this panel session we will discuss the role of...
B2B IAM: A Gap Between Modern Demands and Current Practices
Event Recording
B2B IAM: A Gap Between Modern Demands and Current Practices
Most enterprises nowadays need to grant access to multiple business partners daily as they heavily rely on online interactions (online relationships) with one another.  Thus, an...
The Future of IAM & Cybersecurity is Policy-Based
Event Recording
The Future of IAM & Cybersecurity is Policy-Based
There are several sessions at this year’s EIC looking at the roles of policies in IAM, for modernizing and efficiency gains in IGA, for authentication and fraud detection, and for...
Lessons Learned from IAM Transformation in Banking
Event Recording
Lessons Learned from IAM Transformation in Banking
Legacy IAM cannot be just "improved". It needs a "Transformation". But how an IAM transformation could be successful in the financial sector, especially banking? In this presentation I would like...
Securing the Future of Digital Identity
Event Recording
Securing the Future of Digital Identity
Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with...
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Event Recording
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Graph is having its moment and rightfully so. Regulatory challenges, overly complex authorization scenarios and retrofitting legacy programs to meet new business needs are squeezing businesses....
The Evolution of CIAM and What’s in Store for the Future of Identities
Event Recording
The Evolution of CIAM and What’s in Store for the Future of Identities
With digital transformation continuing to change the way customers interact with businesses, organizations need to provide a personalized, seamless and friction free experience to their customers...
Previous
1 2 3 4 5 6 7 Next