Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Event Recording
Event Recording
Panel | Identity Fabrics: The Mesh and the Factory for Identity Services
Identity Fabrics as a concept has established itself as a common paradigm for defining and implementing the identity services needed by organizations to provide seamless, yet secure and controlled...
Learn more
The Role of Managed Security Service Providers (MSSPs) In Your Future IAM Application Landscape
Event Recording
The Role of Managed Security Service Providers (MSSPs) In Your Future IAM Application Landscape
Trying to “do identity” as a conventional IAM or Security workload with in-house resources and vendor platform deployments may not satisfy identity and access today’s...
The IAM Fabric and How It Integrates With Your Cybersecurity Program
Event Recording
The IAM Fabric and How It Integrates With Your Cybersecurity Program
Architecture, operating model and governance are key viewpoints for every business as a whole and its subdomains as well. Depending of size of the organization, information security may be...
Identity Management and its key role in the Zero Trust strategy
Event Recording
Identity Management and its key role in the Zero Trust strategy
Since any resource access is subjected to a “Zero Trust enabled” step-by-step process, where  policy engines define and enforce the appropriated access level, apart from device,...
Expert Chat: Interview with Neeme Vool
Event Recording
Expert Chat: Interview with Neeme Vool
KuppingerCole CISO Christopher Schuetze engages in a fun discussion with Swedbank's Neeme Vool on what the future holds for Identity and Access Management.
Panel | What does the future hold for Identity and Access Management?
Event Recording
Panel | What does the future hold for Identity and Access Management?
Digital identities of customers, devices and services are at the core of the digital enterprise today. However, traditional IAM is riddled with complexity and siloes. Building a modern Identity...
Dealing Effectively with Modern, Industrialized Cyber Threats
Webinar Recording
Dealing Effectively with Modern, Industrialized Cyber Threats
The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers,...
IAM Projects Done Right
Webinar Recording
IAM Projects Done Right
Delivering effective IAM is not always easy, and around half of IAM projects run into difficulties and stall. While opting for IAM that is delivered as a service is a potential solution, not all...
Effective Identity Access Governance in Hybrid SAP Environments
Webinar Recording
Effective Identity Access Governance in Hybrid SAP Environments
Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever,...
Impressions from the European Identity and Cloud Conference 2022
Event Recording
Impressions from the European Identity and Cloud Conference 2022
Attendees at the European Identity and Cloud Conference 2022
Event Recording
Attendees at the European Identity and Cloud Conference 2022
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a...
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect...
Previous
3 4 5 6 7 8 9 Next