Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
EIC Speaker Spotlight: Dr. Barbara Mandl & Dr. Angelika Steinacker on the Women in Identity Workshop
Women in Identity exists to foster new relationships and mentorship between women in technical fields and beyond. At EIC 2021 , Dr. Angelika Steinacker and Dr. Barbara Mandl will hold a...
Learn more
Leadership Compass
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Learn more
Event Recording
Event Recording
Kubernetes and Crossplane at Deutsche Bahn
This session will be about the journey of Kubernetes and Crossplane at Deutsche Bahn, to provide platform consumers with access to a unified API for deployments, infrastructure provisioning and...
Learn more
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...
When Cyber
Blog
When Cyber "Defense" is no Longer Enough
The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments,...
Coming soon: The KuppingerCole Leadership Compass IDaaS AM
Blog
Coming soon: The KuppingerCole Leadership Compass IDaaS AM
We are about to release the update of the first of two KuppingerCole Leadership Compass documents on IDaaS (Identity as a Service). We have segmented this market into two categories: Access...
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Blog
Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures
Requirements for - and context of - the future Identity Fabric.  We call it Digital Transformation for lack of a better term, but it consists of much more than this buzzword is able to...
The changing role of Azure AD in Enterprise IAM Architectures
Blog
The changing role of Azure AD in Enterprise IAM Architectures
For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the...
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Blog
Benefits of IAM in Healthcare: Compliance, Security, Profits and More
Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital...
M&A Activity in Cybersecurity and IAM
Blog
M&A Activity in Cybersecurity and IAM
It seems almost every week in cybersecurity and IAM we read of a large company buying a smaller one. Many times, it is a big stack vendor adding something that may be missing to their catalog, or...
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
CIAM as a Key Factor in the Digital Transformation
Blog
CIAM as a Key Factor in the Digital Transformation
Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors,...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
The Perfect Shot!
Blog
The Perfect Shot!
Shooting from the hip is easy, because it is fast and sound like you’re making an impact. But do you hit the mark? When you study the ‘art of shooting’ a bit there is a whole lot...
There Is a Price to Pay for Using the Shiny, Bright Cloud Service
Blog
There Is a Price to Pay for Using the Shiny, Bright Cloud Service
One of the slides I use most frequently these days is about Identity Brokers or Identity Fabrics, that manage the access of everyone to every service. This slide is based on recent experience from...
Previous
2 3 4 5 6 7 8 Next