Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
A Foundational Data Layer: The Key to Value in Identity
The world’s largest tech companies have been born under a simple notion: “content is king.” Google, Apple, Netflix, Oracle, and many others have labored under this primary notation to capture as...
Learn more
Blog
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
Learn more
Executive View
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based...
Learn more
Event Recording
Event Recording
Identity Management and its key role in the Zero Trust strategy
Since any resource access is subjected to a “Zero Trust enabled” step-by-step process, where  policy engines define and enforce the appropriated access level, apart from device,...
Learn more
Legacy Enterprise IAM/IAG Transformation
Event Recording
Legacy Enterprise IAM/IAG Transformation
Enterprise IDM/IAG and gardening do have much in common. Usually, if the general architecture and setup of the garden is done and completed, only minor changes and adjustments will be done over...
Hybrid IAM: Interoperable Verifiable Credentials for Workforce Identity
Event Recording
Hybrid IAM: Interoperable Verifiable Credentials for Workforce Identity
The past few years have seen a startling increase in decentralized technologies for Digital Identities. So far, much of their adoption has been limited to academic or proof-of-concept integrations...
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
Event Recording
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
How Self-Sovereign Identity (SSI) enables decentralized Identity and Access management for Things The Challenges of IoT and Identity  SSI key elements in a nutshell ...
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Event Recording
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem...
Machine Learning in IAM & IGA
Event Recording
Machine Learning in IAM & IGA
This presentation will provide an overview of the terminology and basics of AI and ML in the context of Identity and Access Management (IAM) and Identity Governance and Administration (IGA). It...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
Passwordless by Design (
Event Recording
Passwordless by Design ("~pbD"?) - Real-Life Experiences, Constraints, and Implications
Passwordless Primer
Event Recording
Passwordless Primer
Passwordless authentication counts amongst the hot topics in IAM. In this session, the variants of passwordless authentication will be explained. Phishing resistance, device binding, secure...
Modern Authorization: The Next IAM Frontier
Event Recording
Modern Authorization: The Next IAM Frontier
Identity and access have always been joined at the hip. In the age of LDAP, authenticated users were granted permissions based on group membership. But this mechanism hasn’t transferred into...
SAP Transformation and IGA
Event Recording
SAP Transformation and IGA
Various large organizations typically have invested heavily in SAP as well as IGA. There comes a point where the two systems start overlapping functionalities. This session will provide a...
Previous
1 2 3 4 5 6 7 Next