Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Navigating Security Silos: Identity as a New Security Perimeter
Companies are grappling with countless challenges in the realm of identity security. These challenges range from dealing with the dynamic nature of identities, the rise of insider threats, the...
Learn more
Blog
Blog
EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management
Eric Newcomer, Chief Technology Officer at WSO2 is to deliver a presentation entitled The Rise of the Developer in IAM on Monday, September 13 starting at 6:40 pm at EIC 2021 . To give...
Learn more
Leadership Compass
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
Learn more
Event Recording
Event Recording
Qualified electronic signatures in times of the eIDAS2-wallet - a Nordic-Baltic perspective
When dealing with digital identity, emphasis is often put on the identification and authentication part. An equally important aspect is digital signing (or more broadly: electronic signing)....
Learn more
A Shift Toward MSP Delivery: How MSPs Are Mitigating  Enterprise IAM Delivery Challenges
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement...
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
Webinar Recording
IGA Essentials: Embracing Trends and Amplifying Core Capabilities
The market for Identity Governance and Administration (IGA) is undergoing further development with the incorporation of more integrated solutions for Identity Lifecycle Management and Access...
Effective Application Access Controls in the Modern Business IT Landscape
Webinar Recording
Effective Application Access Controls in the Modern Business IT Landscape
Join security experts from KuppingerCole Analysts and Pathlock as they discuss why modern applications need more granular and context-based access controls, why it is important that these controls...
Multi-Organization Access Governance
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Analyst Chat #179: Introducing the KuppingerCole Strategy Navigator
Analyst Chat
Analyst Chat #179: Introducing the KuppingerCole Strategy Navigator
In this podcast episode, Christopher Schütze and Matthias explore the Strategy Navigator by KuppingerCole Analysts, a lean and efficient advisory service designed to tackle common challenges...
IAM Convergence: Integrated Perspective Beyond Just IAM
Whitepaper
IAM Convergence: Integrated Perspective Beyond Just IAM
IAM is not a single solution, but covers a range of areas, from managing users and their access to authentication and control of privileged accounts. This makes it complex for organizations to...
Delivering True B2B Identity Management in the Modern Era
Webinar Recording
Delivering True B2B Identity Management in the Modern Era
Join Identity Management experts from KuppingerCole Analysts and Thales as they discuss how best to tackle the complexities of an increasingly interconnected B2B digital ecosystem, and overcome...
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric....
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Delivering Business Value through Orchestration
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
The Future of IAM & Cybersecurity is Policy-Based
Event Recording
The Future of IAM & Cybersecurity is Policy-Based
There are several sessions at this year’s EIC looking at the roles of policies in IAM, for modernizing and efficiency gains in IGA, for authentication and fraud detection, and for...
Closing Keynote
Event Recording
Closing Keynote
Previous
1 2 3 4 5 6 7 Next