Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
Siemens' Challenging IAM Success Story
Leonardo Morales from Siemens gives insights into his IAM journey and shares his experiences. Learn how to start your IAM journey right and avoid common mistakes and pitfalls.
Learn more
Executive View
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based...
Learn more
Event Recording
Event Recording
Building a robust CIAM foundation, fit for the dynamic financial market
As organizations are recovering from the pandemic, many of them embark on a digital transformation at high-speed. Investments to drive online business, powered by customer...
Learn more
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
Blog
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
Broadcom, after having denied the acquisition of Qualcomm earlier this year by Trump administration based on national security concerns, has decided to acquire CA Technologies showing one of...
FIAM – Fake Identity and Access Management
Blog
FIAM – Fake Identity and Access Management
Just when you thought we had enough variations of IAM, along comes FIAM. Fake digital identities are not new, but they are getting a lot of attention in the press these days. Some fake accounts...
Successful IAM Projects Are Not a Rocket Science – if You Do It Right
Blog
Successful IAM Projects Are Not a Rocket Science – if You Do It Right
While we still regularly see and hear about IAM (Identity & Access Management) projects that don’t deliver to the expectations or are in trouble, we all see and hear about many projects...
The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry
Blog
The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry
The EU’s General Data Protection Regulation (GDPR) will force many changes in technology and processes when it comes into effect in May 2018.  We have heard extensively about how...
Recapping CIW Seattle 2017
Blog
Recapping CIW Seattle 2017
Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that...
Changes in the Scope of Investors for IAM
Blog
Changes in the Scope of Investors for IAM
As a long-term observer of the IAM market, KuppingerCole finds it interesting to see the change in both the size of investments and the type of investors in this market. Just recently, ForgeRock...
A Short History of EIC - Europe's Leading Event on Digital ID & Transformation
Blog
A Short History of EIC - Europe's Leading Event on Digital ID & Transformation
More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors,...
At the Intersection of Identity and Marketing
Blog
At the Intersection of Identity and Marketing
Digital Transformation is driving a diverse set of business initiatives today, including advanced marketing techniques, creating new consumer services, acquiring better customer information, and...
The New Role of Privilege Management
Blog
The New Role of Privilege Management
Privilege Management or PxM, also referred to by some vendors as Privileged Account Management, Privileged User Management, Privileged Identity Management, or a number of other terms, is changing...
Do You Need a Better IAM System to Meet the GDPR Requirements?
Blog
Do You Need a Better IAM System to Meet the GDPR Requirements?
GDPR, the EU General Data Protection Regulation, is increasingly becoming a hot topic. That does not come as a surprise, given that the EU GDPR has a very broad scope, affecting every data...
Accenture to acquire French IAM System Integrator Arismore
Blog
Accenture to acquire French IAM System Integrator Arismore
Just before Christmas Accenture Security announced the acquisition of French IAM system integrator Arismore, a company with about 270 employees and an estimated turnover of €40M. This makes...
Previous
3 4 5 6 7 8 9 Next