Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best...
Learn more
Blog
Blog
EIC Speaker Spotlight: Peter Busch on Trust as the Key Concept
Peter Busch, Product Owner Distributed Ledger Technologies Mobility at Robert Bosch Group, is to deliver a presentation entitled Trust as the Key Concept in Future Mobility on Tuesday, September...
Learn more
Whitepaper
Whitepaper
Serving the Customer in the Digital Age
In an era of digital services, business will require a new approach to serving customers. Identities, particularly customer identities, are a key enabler of the transformation that is necessary to...
Learn more
Event Recording
Event Recording
Tobias Urban: The Balance Between User Experience and Security
Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the...
Learn more
Effective Application Access Controls in the Modern Business IT Landscape
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Multi-Organization Access Governance
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Analyst Chat #179: Introducing the KuppingerCole Strategy Navigator
Analyst Chat
Analyst Chat #179: Introducing the KuppingerCole Strategy Navigator
In this podcast episode, Christopher Schütze and Matthias explore the Strategy Navigator by KuppingerCole Analysts, a lean and efficient advisory service designed to tackle common challenges...
IAM Convergence: Integrated Perspective Beyond Just IAM
Whitepaper
IAM Convergence: Integrated Perspective Beyond Just IAM
IAM is not a single solution, but covers a range of areas, from managing users and their access to authentication and control of privileged accounts. This makes it complex for organizations to...
Delivering True B2B Identity Management in the Modern Era
Webinar Recording
Delivering True B2B Identity Management in the Modern Era
Join Identity Management experts from KuppingerCole Analysts and Thales as they discuss how best to tackle the complexities of an increasingly interconnected B2B digital ecosystem, and overcome...
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric....
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Delivering Business Value through Orchestration
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
The Future of IAM & Cybersecurity is Policy-Based
Event Recording
The Future of IAM & Cybersecurity is Policy-Based
There are several sessions at this year’s EIC looking at the roles of policies in IAM, for modernizing and efficiency gains in IGA, for authentication and fraud detection, and for...
Closing Keynote
Event Recording
Closing Keynote
Covering Your Customer Identity Needs - The Way Forward
Event Recording
Covering Your Customer Identity Needs - The Way Forward
The Art of CIAM is to converge user Experience (UX) , security and privacy in a way  that is seamless and unobtrusive for the user. In this panel session we will discuss the role of...
B2B IAM: A Gap Between Modern Demands and Current Practices
Event Recording
B2B IAM: A Gap Between Modern Demands and Current Practices
Most enterprises nowadays need to grant access to multiple business partners daily as they heavily rely on online interactions (online relationships) with one another.  Thus, an...
Previous
1 2 3 4 5 6 7 Next