Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus...
Learn more
Executive View
Executive View
Hitachi ID Bravura Security Fabric
Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governance capabilities....
Learn more
Webinar Recording
Webinar Recording
Working From Home Is Not Secure Without an Effective IAM
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many...
Learn more
EIC Speaker Spotlight: Chris Owen on Identity Management
Blog
EIC Speaker Spotlight: Chris Owen on Identity Management
Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC...
EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management
Blog
EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management
Eric Newcomer, Chief Technology Officer at WSO2 is to deliver a presentation entitled The Rise of the Developer in IAM on Monday, September 13 starting at 6:40 pm at EIC 2021 . To give...
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Blog
EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue
Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at...
EIC Speaker Spotlight: Peter Busch on Trust as the Key Concept
Blog
EIC Speaker Spotlight: Peter Busch on Trust as the Key Concept
Peter Busch, Product Owner Distributed Ledger Technologies Mobility at Robert Bosch Group, is to deliver a presentation entitled Trust as the Key Concept in Future Mobility on Tuesday, September...
EIC Speaker Spotlight: Dr. Barbara Mandl & Dr. Angelika Steinacker on the Women in Identity Workshop
Blog
EIC Speaker Spotlight: Dr. Barbara Mandl & Dr. Angelika Steinacker on the Women in Identity Workshop
Women in Identity exists to foster new relationships and mentorship between women in technical fields and beyond. At EIC 2021 , Dr. Angelika Steinacker and Dr. Barbara Mandl will hold a...
EIC Speaker Spotlight: Patrick Parker on Complexity in IT
Blog
EIC Speaker Spotlight: Patrick Parker on Complexity in IT
Patrick Parker, innovation-driven entrepreneur as well as founder and CEO at Identity Management and Cloud Security firm EmpowerID, will deliver a keynote presentation entitled Complexity Has...
Where Workflows, Service Management, Digital Identities, and Work From Home Meet
Blog
Where Workflows, Service Management, Digital Identities, and Work From Home Meet
Simplifying access to IT services by building on platforms for IT workflows and beyond ServiceNow, over the past few years, has emerged as one of the leaders in the ITSM (IT Service...
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
Blog
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are...
Ivanti’s Zero Trust Journey
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
A Look at NIST’s Zero Trust Architecture
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
The Role of Identity in Business Continuity Planning
Blog
The Role of Identity in Business Continuity Planning
When it’s “business as usual”, it seems strange to think about disruptions and disasters. With competing priorities and the pressure of everyday demands, planning for worst-case...
Microsoft Adding New Capabilities to Azure Active Directory
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Previous
1 2 3 4 5 6 7 Next