Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is...
Learn more
Executive View
Executive View
Hitachi ID Bravura Security Fabric
Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governance capabilities....
Learn more
Event Recording
Event Recording
It's the Relationship, Stupid
Learn more
Where Workflows, Service Management, Digital Identities, and Work From Home Meet
Blog
Where Workflows, Service Management, Digital Identities, and Work From Home Meet
Simplifying access to IT services by building on platforms for IT workflows and beyond ServiceNow, over the past few years, has emerged as one of the leaders in the ITSM (IT Service...
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
Blog
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are...
Ivanti’s Zero Trust Journey
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
A Look at NIST’s Zero Trust Architecture
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
The Role of Identity in Business Continuity Planning
Blog
The Role of Identity in Business Continuity Planning
When it’s “business as usual”, it seems strange to think about disruptions and disasters. With competing priorities and the pressure of everyday demands, planning for worst-case...
Microsoft Adding New Capabilities to Azure Active Directory
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
KuppingerCole Analyst Chat - Our New Regular Podcast
Blog
KuppingerCole Analyst Chat - Our New Regular Podcast
Today we're officially launching KuppingerCole Analyst Chat - our new soon-to-be-regular audio podcast. In the pilot episode Martin Kuppinger and I are discussing Identity & Access...
5G and Identity
Blog
5G and Identity
5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the...
Modernizing IAM Solutions Leveraging New Operating Models With the KuppingerCole Identity Fabric
Blog
Modernizing IAM Solutions Leveraging New Operating Models With the KuppingerCole Identity Fabric
Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About
Blog
Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About
Shifting IAM to Modern Architecture and Deployment Models There is a lot of talk about IDaaS (Identity as a Service) these days, as the way to do IAM (Identity and Access Management). There...
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Renovate Your IAM-House While You Continue to Live in It
Blog
Renovate Your IAM-House While You Continue to Live in It
Do you belong to the group of people who would like to completely retire all obsolete solutions and replace existing solutions with new ones in a Big Bang? Do you do the same with company...
Previous
1 2 3 4 5 6 7 Next