Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Learn more
Whitepaper
Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement...
Learn more
Event Recording
Event Recording
The Digital Identity Shake-up we’ve been waiting for: How to Survive, and how to Thrive
 
Learn more
All the IAMs - Modern Convergence of Digital Identity for Different Populations
Event Recording
All the IAMs - Modern Convergence of Digital Identity for Different Populations
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
From Local to Global: ABB's New Platform-First IGA Program
Event Recording
From Local to Global: ABB's New Platform-First IGA Program
Identity governance and administration (IGA) is a mission-critical part of every business as it relates to security, compliance, and operations. For large, global enterprises like ABB, finding the...
Ceremonies
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Access Governance
Leadership Compass
Access Governance
The Access Governance (AG) market is continuing to evolve through more intelligent solutions. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass...
Identity as the Most Critical Element of Security
Blog
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the...
Maximizing Cyber Security Investments in Economically Turbulent Times
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look...
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access...
2023 Trends and Predictions - Passwordless Authentication
Blog
2023 Trends and Predictions - Passwordless Authentication
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is...
Identity Fabrics: Where Do You Stand? Where Should You Go?
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management)...
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Previous
3 4 5 6 7 8 9 Next