Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
In the Midst of Change, Somethings Remain the Same
Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. This will be a significant change and will impact the digital transformation of a manufacturing company....
Learn more
Leadership Compass
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
Learn more
Event Recording
Event Recording
The New Digital Identity Wallet for all Europeans: Latest Amendments
An impactful 73 pages proposal for amending the 2014 e-IDAS regulation was made in June last year, a.o. providing EU wide wallets for national e-ID’s. Market consultations and impact...
Learn more
Covering Your Customer Identity Needs - The Way Forward
Event Recording
Covering Your Customer Identity Needs - The Way Forward
The Art of CIAM is to converge user Experience (UX) , security and privacy in a way  that is seamless and unobtrusive for the user. In this panel session we will discuss the role of...
B2B IAM: A Gap Between Modern Demands and Current Practices
Event Recording
B2B IAM: A Gap Between Modern Demands and Current Practices
Most enterprises nowadays need to grant access to multiple business partners daily as they heavily rely on online interactions (online relationships) with one another.  Thus, an...
The Evolution of CIAM and What’s in Store for the Future of Identities
Event Recording
The Evolution of CIAM and What’s in Store for the Future of Identities
With digital transformation continuing to change the way customers interact with businesses, organizations need to provide a personalized, seamless and friction free experience to their customers...
Securing the Future of Digital Identity
Event Recording
Securing the Future of Digital Identity
Today’s identity systems are a centralized collection of user data, and have become the #1 target for attackers. According to the Verizon DBIR, more than 80% of breaches start with...
Hybrid IAM: Interoperable Verifiable Credentials for Workforce Identity
Event Recording
Hybrid IAM: Interoperable Verifiable Credentials for Workforce Identity
The past few years have seen a startling increase in decentralized technologies for Digital Identities. So far, much of their adoption has been limited to academic or proof-of-concept integrations...
Lessons Learned from IAM Transformation in Banking
Event Recording
Lessons Learned from IAM Transformation in Banking
Legacy IAM cannot be just "improved". It needs a "Transformation". But how an IAM transformation could be successful in the financial sector, especially banking? In this presentation I would like...
Legacy Enterprise IAM/IAG Transformation
Event Recording
Legacy Enterprise IAM/IAG Transformation
Enterprise IDM/IAG and gardening do have much in common. Usually, if the general architecture and setup of the garden is done and completed, only minor changes and adjustments will be done over...
Machine Learning in IAM & IGA
Event Recording
Machine Learning in IAM & IGA
This presentation will provide an overview of the terminology and basics of AI and ML in the context of Identity and Access Management (IAM) and Identity Governance and Administration (IGA). It...
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Event Recording
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem...
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
Event Recording
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
How Self-Sovereign Identity (SSI) enables decentralized Identity and Access management for Things The Challenges of IoT and Identity  SSI key elements in a nutshell ...
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Event Recording
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Graph is having its moment and rightfully so. Regulatory challenges, overly complex authorization scenarios and retrofitting legacy programs to meet new business needs are squeezing businesses....
IAM Across Hybrid On-Premises and Cloud Resources
Event Recording
IAM Across Hybrid On-Premises and Cloud Resources
We will be discussing an identity fabric model that allow for growth, ease of integration, and a way to future proof your organization.
Previous
1 2 3 4 5 6 7 Next