Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Sadrick Widmann on the Truth About Identity
Sadrick Widmann, Chief Product Officer at Cidaas is to deliver a presentation entitled Give Me 10 Minutes, I'll Give You The Truth About Identity on Monday, September 13 starting at 20:00 pm at...
Learn more
Executive View
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identity Manager and...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #10: Making IAM Projects Succeed - The Importance of Project Management
Matthias Reinwarth and Graham Williamson are talking about managing IAM projects properly.
Learn more
M&A Activity in Cybersecurity and IAM
Blog
M&A Activity in Cybersecurity and IAM
It seems almost every week in cybersecurity and IAM we read of a large company buying a smaller one. Many times, it is a big stack vendor adding something that may be missing to their catalog, or...
Oops, Google Did It Again!
Blog
Oops, Google Did It Again!
Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
CIAM as a Key Factor in the Digital Transformation
Blog
CIAM as a Key Factor in the Digital Transformation
Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors,...
The Perfect Shot!
Blog
The Perfect Shot!
Shooting from the hip is easy, because it is fast and sound like you’re making an impact. But do you hit the mark? When you study the ‘art of shooting’ a bit there is a whole lot...
There Is a Price to Pay for Using the Shiny, Bright Cloud Service
Blog
There Is a Price to Pay for Using the Shiny, Bright Cloud Service
One of the slides I use most frequently these days is about Identity Brokers or Identity Fabrics, that manage the access of everyone to every service. This slide is based on recent experience from...
Martin Kuppinger's Top 5 IAM Topics for 2019
Blog
Martin Kuppinger's Top 5 IAM Topics for 2019
Where to put your focus on in 2019
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
Blog
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
Broadcom, after having denied the acquisition of Qualcomm earlier this year by Trump administration based on national security concerns, has decided to acquire CA Technologies showing one of...
FIAM – Fake Identity and Access Management
Blog
FIAM – Fake Identity and Access Management
Just when you thought we had enough variations of IAM, along comes FIAM. Fake digital identities are not new, but they are getting a lot of attention in the press these days. Some fake accounts...
Successful IAM Projects Are Not a Rocket Science – if You Do It Right
Blog
Successful IAM Projects Are Not a Rocket Science – if You Do It Right
While we still regularly see and hear about IAM (Identity & Access Management) projects that don’t deliver to the expectations or are in trouble, we all see and hear about many projects...
The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry
Blog
The Need for Speed: Why the 72-hour breach notification rule in GDPR is good for industry
The EU’s General Data Protection Regulation (GDPR) will force many changes in technology and processes when it comes into effect in May 2018.  We have heard extensively about how...
Recapping CIW Seattle 2017
Blog
Recapping CIW Seattle 2017
Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that...
Previous
3 4 5 6 7 8 9 Next