Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
A Foundational Data Layer: The Key to Value in Identity
The world’s largest tech companies have been born under a simple notion: “content is king.” Google, Apple, Netflix, Oracle, and many others have labored under this primary notation to capture as...
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Whitepaper
Whitepaper
IAM Convergence: Integrated Perspective Beyond Just IAM
IAM is not a single solution, but covers a range of areas, from managing users and their access to authentication and control of privileged accounts. This makes it complex for organizations to...
Learn more
Event Recording
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a...
Learn more
IGA Everywhere - Creating your Future Security Ecosystem
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
Tilting at White Towers: Making Your Identity Architecture Actionable
Event Recording
Tilting at White Towers: Making Your Identity Architecture Actionable
As an identity professional, you're constantly studying and reviewing new technologies, new protocols, and new products within the space but you struggle for the best way to extract...
IAM Across Hybrid On-Premises and Cloud Resources
Event Recording
IAM Across Hybrid On-Premises and Cloud Resources
We will be discussing an identity fabric model that allow for growth, ease of integration, and a way to future proof your organization.
Entitlements - Claim vs. Reality
Event Recording
Entitlements - Claim vs. Reality
The claim or desire for authorizations, permissions and the rights set in practice often have a wide divergence. Typically, more rights are assigned unconsciously than were actually required....
Passwordless For the Masses
Event Recording
Passwordless For the Masses
Opening Session
Event Recording
Opening Session
Building the Roadmap for Your Future IAM | Workshop
Event Recording
Building the Roadmap for Your Future IAM | Workshop
From Local to Global: ABB's New Platform-First IGA Program
Event Recording
From Local to Global: ABB's New Platform-First IGA Program
Identity governance and administration (IGA) is a mission-critical part of every business as it relates to security, compliance, and operations. For large, global enterprises like ABB, finding the...
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
All the IAMs - Modern Convergence of Digital Identity for Different Populations
Event Recording
All the IAMs - Modern Convergence of Digital Identity for Different Populations
Previous
1 2 3 4 5 6 7 Next