Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability...
Learn more
Blog
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Learn more
Advisory Note
Advisory Note
Maturity Level Matrix for IAM
KuppingerCole Maturity Level Matrices for the major market segments within IAM (Identity, and Access Management), IGA (Identity Governance and Administration) and CIAM (Consumer Identity and Access...
Learn more
Event Recording
Event Recording
Enterprise Identity: A case study of the EU Gaia-X project
Gaia-X Federation Services is a European project that promotes innovation through data sharing and represents the next generation of the data infrastructure ecosystem. To see how we bring about an...
Learn more
Enterprise Domain Annotation based Segregation of Duties strategies
Event Recording
Enterprise Domain Annotation based Segregation of Duties strategies
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Creating a Seamless Access Experience with the Digital Double
Event Recording
Creating a Seamless Access Experience with the Digital Double
Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated...
Connecting 10.000+ mobility companies and multi million customers
Event Recording
Connecting 10.000+ mobility companies and multi million customers
How to innovate your Identity Governance and Administration program
Event Recording
How to innovate your Identity Governance and Administration program
The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.
Privacy Enhancing Mobile Credentials
Event Recording
Privacy Enhancing Mobile Credentials
The Kantara Initiative is developing a standard and requirements so that organizations can demonstrate to their stakeholders that their commitments to privacy and data protection go beyond...
Panel | B2B IAM
Event Recording
Panel | B2B IAM
Best Practice: CIAM as Business Enabler for Digital Transformation
Event Recording
Best Practice: CIAM as Business Enabler for Digital Transformation
Panel | How to improve customer IAM and CIAM
Event Recording
Panel | How to improve customer IAM and CIAM
Signing in the Rain: HTTP Message Signatures and Web Security
Event Recording
Signing in the Rain: HTTP Message Signatures and Web Security
HTTP is an amazingly powerful protocol, and it's the lifeblood of the internet today. On the surface, it seems to be a simple protocol: send a request to a server and get back a response, and...
Previous
4 5 6 7 8 9 10 Next