Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Learn more
Executive View
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Learn more
Event Recording
Event Recording
Siemens AG: Real-World Enterprise IAM at Scale
In today´s unpredictable business environment where change is the normal, it has become critical to have a manageable and scalable Identity & Access Management program in place. In this...
Learn more
Siemens' Challenging IAM Success Story
Blog
Siemens' Challenging IAM Success Story
Leonardo Morales from Siemens gives insights into his IAM journey and shares his experiences. Learn how to start your IAM journey right and avoid common mistakes and pitfalls.
Global Identity Networks: How to Leverage Them for Business Benefit
Blog
Global Identity Networks: How to Leverage Them for Business Benefit
Global identity networks propose a different way of identity management, one that operates on shared standards so that organizations don’t need to repeat onboarding and verification with the same...
How to Grant Access Right
Blog
How to Grant Access Right
Find out about the importance of context for Identity Risk Management.  Watch the insightful interview Martin Kuppinger had with David Pignolet from SecZetta on the EIC 2021.
Rest in Peace, Kim Cameron
Blog
Rest in Peace, Kim Cameron
Digital identity thought leader Kim Cameron´s passion for fundamentally influencing the way we think about, and deal with privacy and digital identity, has brought us where we are today...
IAM Projects
Blog
IAM Projects
As we said at the start of this KC Navigator series on IAM, it has never been more important for organizations to have absolute control over who and what can access business critical data and...
Identity & Access Management
Blog
Identity & Access Management
Controlling who or what can access critical business systems and data may seem like an obvious thing to do, but the continual cyber-attacks and breaches indicate that this is not being done very...
Managing Access and Entitlements in Multi-Cloud Multi-Hybrid IT
Blog
Managing Access and Entitlements in Multi-Cloud Multi-Hybrid IT
Introducing DREAM (Dynamic Resource Entitlement and Access Management) Paradigm for managing all access of everyone and everything to all resources consistently in a multi-cloud multi-hybrid...
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
Blog
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
A paradigm for unified delivery of IT services to the business demand, based on automated, policy-based management, and supported by the unification of heterogeneous multi-cloud multi-hybrid IT...
EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity
Blog
EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity
Maarten Stultjens, VP Corporate Development at OneWelcome is to partake in a panel discussion entitled Identity, Privacy, Security - The European Perspective on Monday, September 13 starting at...
EIC Speaker Spotlight: Vadim Lander on the Dawn of Digital IAM
Blog
EIC Speaker Spotlight: Vadim Lander on the Dawn of Digital IAM
Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, Broadcom is to give a presentation entitled The Dawn of Digital IAM on Monday, September 13 starting at 17:40 pm at...
EIC Speaker Spotlight: Joni Brennan on the Growing Public Demand for Digital Identity During the Pandemic
Blog
EIC Speaker Spotlight: Joni Brennan on the Growing Public Demand for Digital Identity During the Pandemic
Joni Brennan, President of the Digital ID & Authentication Council of Canada is to deliver a presentation entitled COVID Has Accelerated Public Demand for Digital ID on Monday, September 13...
EIC Speaker Spotlight: Sadrick Widmann on the Truth About Identity
Blog
EIC Speaker Spotlight: Sadrick Widmann on the Truth About Identity
Sadrick Widmann, Chief Product Officer at Cidaas is to deliver a presentation entitled Give Me 10 Minutes, I'll Give You The Truth About Identity on Monday, September 13 starting at 20:00 pm at...
Previous
1 2 3 4 5 6 7 Next