Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My...
Learn more
Whitepaper
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Learn more
Event Recording
Event Recording
Interoperability Between Global Identity Networks
Learn more
Trending at EIC 2022: The Return of Policy-Based IAM
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My...
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and...
In the Midst of Change, Somethings Remain the Same
Blog
In the Midst of Change, Somethings Remain the Same
Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. This will be a significant change and will impact the digital transformation of a manufacturing company....
No Information Security without Identity
Blog
No Information Security without Identity
Identity and information security are inextricably linked because is impossible to secure information without knowing who or what is allowed to access it, or without knowing who or what is...
Human-Centric Identity - When Customers No Longer Tolerate a Bad UX
Blog
Human-Centric Identity - When Customers No Longer Tolerate a Bad UX
Today's purchasing decisions are increasingly based on user experience. Businesses need to adapt to stay competitive in the market, but is this possible without neglecting security?
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
Blog
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
In the past 15 years, EIC is known as the leading event for current and future trends in IAM and privacy (not to mention cloud security or cybersecurity). Check out the highlights of EIC's...
Siemens' Challenging IAM Success Story
Blog
Siemens' Challenging IAM Success Story
Leonardo Morales from Siemens gives insights into his IAM journey and shares his experiences. Learn how to start your IAM journey right and avoid common mistakes and pitfalls.
Global Identity Networks: How to Leverage Them for Business Benefit
Blog
Global Identity Networks: How to Leverage Them for Business Benefit
Global identity networks propose a different way of identity management, one that operates on shared standards so that organizations don’t need to repeat onboarding and verification with the same...
How to Grant Access Right
Blog
How to Grant Access Right
Find out about the importance of context for Identity Risk Management.  Watch the insightful interview Martin Kuppinger had with David Pignolet from SecZetta on the EIC 2021.
Rest in Peace, Kim Cameron
Blog
Rest in Peace, Kim Cameron
Digital identity thought leader Kim Cameron´s passion for fundamentally influencing the way we think about, and deal with privacy and digital identity, has brought us where we are today...
IAM Projects
Blog
IAM Projects
As we said at the start of this KC Navigator series on IAM, it has never been more important for organizations to have absolute control over who and what can access business critical data and...
Identity & Access Management
Blog
Identity & Access Management
Controlling who or what can access critical business systems and data may seem like an obvious thing to do, but the continual cyber-attacks and breaches indicate that this is not being done very...
Previous
1 2 3 4 5 6 7 Next