Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management
Eric Newcomer, Chief Technology Officer at WSO2 is to deliver a presentation entitled The Rise of the Developer in IAM on Monday, September 13 starting at 6:40 pm at EIC 2021 . To give...
Learn more
Executive View
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Learn more
Event Recording
Event Recording
Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink
Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM. IAM (Identity and Access Management) is no...
Learn more
Tilting at White Towers: Making Your Identity Architecture Actionable
Event Recording
Tilting at White Towers: Making Your Identity Architecture Actionable
As an identity professional, you're constantly studying and reviewing new technologies, new protocols, and new products within the space but you struggle for the best way to extract...
IGA Everywhere - Creating your Future Security Ecosystem
Event Recording
IGA Everywhere - Creating your Future Security Ecosystem
Identity Governance and Administration (IGA)is a core component of Identity and Access Management (IAM) infrastructure and refers to integrated solutions that combine Identity Lifecycle Management...
SAP Transformation and IGA
Event Recording
SAP Transformation and IGA
Various large organizations typically have invested heavily in SAP as well as IGA. There comes a point where the two systems start overlapping functionalities. This session will provide a...
Modern Authorization: The Next IAM Frontier
Event Recording
Modern Authorization: The Next IAM Frontier
Identity and access have always been joined at the hip. In the age of LDAP, authenticated users were granted permissions based on group membership. But this mechanism hasn’t transferred into...
Passwordless Primer
Event Recording
Passwordless Primer
Passwordless authentication counts amongst the hot topics in IAM. In this session, the variants of passwordless authentication will be explained. Phishing resistance, device binding, secure...
Passwordless by Design (
Event Recording
Passwordless by Design ("~pbD"?) - Real-Life Experiences, Constraints, and Implications
Passwordless For the Masses
Event Recording
Passwordless For the Masses
Entitlements - Claim vs. Reality
Event Recording
Entitlements - Claim vs. Reality
The claim or desire for authorizations, permissions and the rights set in practice often have a wide divergence. Typically, more rights are assigned unconsciously than were actually required....
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
Building the Roadmap for Your Future IAM | Workshop
Event Recording
Building the Roadmap for Your Future IAM | Workshop
Opening Session
Event Recording
Opening Session
Identity Inclusion – Why it Matters
Event Recording
Identity Inclusion – Why it Matters
The cornerstone of the digital world is trust and key to that experience is a secure and verifiable digital identity. More than one billion people worldwide lack a basic verifiable identity....
Previous
2 3 4 5 6 7 8 Next