Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Modernizing IAM Solutions Leveraging New Operating Models With the KuppingerCole Identity Fabric
Learn more
Whitepaper
Whitepaper
Success in the Digital Age: Put Identity & Access at the Forefront
Success in the Digital Age depends on many factors. Bringing the right digital services to the market on time is the foundation for differentiating in today’s volatile competitive landscape....
Learn more
Event Recording
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Learn more
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
From Local to Global: ABB's New Platform-First IGA Program
Event Recording
From Local to Global: ABB's New Platform-First IGA Program
Identity governance and administration (IGA) is a mission-critical part of every business as it relates to security, compliance, and operations. For large, global enterprises like ABB, finding the...
Ceremonies
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Maximizing Cyber Security Investments in Economically Turbulent Times
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look...
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Evolving Identity and Access Management for the Digital Era
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and...
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
Analyst Chat #152: How to Measure a Market
Analyst Chat
Analyst Chat #152: How to Measure a Market
Research Analyst Marina Iantorno works on determining market sizing data as a service for vendors, service providers, but especially for investors. She joins Matthias to explain key terms and...
Cyber Hygiene Is the Backbone of an IAM Strategy
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security...
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Event Recording
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an...
Advanced Authorization in a Web 3.0 World
Webinar Recording
Advanced Authorization in a Web 3.0 World
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who...
Erfolgreiche IAM-Projekte: Von Best Practices Lernen
Webinar Recording
Erfolgreiche IAM-Projekte: Von Best Practices Lernen
Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter...
Previous
2 3 4 5 6 7 8 Next