Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Reducing Risk Through Effective Access Management
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it...
Learn more
Executive View
Executive View
NRI SecureTechnologies Uni-ID Libra 2.6
Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese...
Learn more
Event Recording
Event Recording
Panel | Assessing the Cybersecurity Impact of Russia’s Invasion of Ukraine
Russia’s invasion of Ukraine has tectonic consequences for citizens and businesses across the world. An expectation of normalcy post the pandemic has been replaced with fears of increased...
Learn more
Reducing Risk Through Effective Access Management
Blog
Reducing Risk Through Effective Access Management
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it...
Digital Transformation
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
CIAM a Way of Managing and Getting Value from Consumer Data
Blog
CIAM a Way of Managing and Getting Value from Consumer Data
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Secure Collaboration
Blog
Secure Collaboration
The world of working is changing – we are increasingly working collaboratively in teams, but members of those teams are no longer necessarily in the same office, location, or even the same...
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Blog
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing &...
Trending at EIC 2022: The Return of Policy-Based IAM
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My...
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and...
In the Midst of Change, Somethings Remain the Same
Blog
In the Midst of Change, Somethings Remain the Same
Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. This will be a significant change and will impact the digital transformation of a manufacturing company....
No Information Security without Identity
Blog
No Information Security without Identity
Identity and information security are inextricably linked because is impossible to secure information without knowing who or what is allowed to access it, or without knowing who or what is...
Human-Centric Identity - When Customers No Longer Tolerate a Bad UX
Blog
Human-Centric Identity - When Customers No Longer Tolerate a Bad UX
Today's purchasing decisions are increasingly based on user experience. Businesses need to adapt to stay competitive in the market, but is this possible without neglecting security?
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
Blog
Where IAM trends are set: Everything around Identity & Privacy at EIC 2022
In the past 15 years, EIC is known as the leading event for current and future trends in IAM and privacy (not to mention cloud security or cybersecurity). Check out the highlights of EIC's...
Previous
1 2 3 4 5 6 7 Next