Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity
Maarten Stultjens, VP Corporate Development at OneWelcome is to partake in a panel discussion entitled Identity, Privacy, Security - The European Perspective on Monday, September 13 starting at...
Learn more
Executive View
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Learn more
Webinar Recording
Webinar Recording
Identity and Access Management Strategies That Grow With Your Business
For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality...
Learn more
Consumer Identity Summit 2016 - Summary
Blog
Consumer Identity Summit 2016 - Summary
KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well...
GlobalPlatform Conference Review
Blog
GlobalPlatform Conference Review
GlobalPlatform recently held their annual conference in Santa Clara, California. GlobalPlatform is an international standards organization that defines specifications for the Trusted Execution...
Vista Equity Partners to Acquire Ping Identity
Blog
Vista Equity Partners to Acquire Ping Identity
Yesterday, Ping Identity announced the intent of Vista Equity Partners to acquire it. Ping Identity is a privately held company backed by venture capital, and will become acquired by a private...
Winners of the European Identity & Cloud Awards 2016
Blog
Winners of the European Identity & Cloud Awards 2016
KuppingerCole presented The European Identity & Cloud Awards 2016 last night at the 10th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and...
Challenges of large-scale IAM environments
Blog
Challenges of large-scale IAM environments
Long before analysts, vendors or journalists were coining terms like Digitalization, Identity Relationship Management or Customer IAM, several industries were already confronted with large-scale...
Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses
Blog
Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses
With its recent announcement of Microsoft Azure Active Directory B2B (Business-to-Business) and B2C (Business-to-Customer/consumer/client), which are in Public Preview now, Microsoft has extended...
Redesigning access controls for IAM deployments?
Blog
Redesigning access controls for IAM deployments?
A few weeks ago I read an article in Network World, entitled “ A common theme in identity and access management failure: lack of Active Directory optimization ”. Essentially, it is...
Seven Fundamentals for Future Identity and Access Management
Blog
Seven Fundamentals for Future Identity and Access Management
Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source...
SAP enters the Cloud IAM market – the competition becomes even tougher
Blog
SAP enters the Cloud IAM market – the competition becomes even tougher
The market for Cloud IAM and in particular Cloud User and Access Management – extending the reach of IAM to business partners, consumers, and Cloud applications through a Cloud service – is...
From preventive to detective and corrective IAM
Blog
From preventive to detective and corrective IAM
Controls in security and GRC (Governance, Risk Management, and Compliance) systems are commonly structured in preventive, detective, and reactive controls. When we look at IAM/IAG (Identity and...
IBM to acquire CrossIdeas - further expanding its IAM/IAG portfolio
Blog
IBM to acquire CrossIdeas - further expanding its IAM/IAG portfolio
A while ago I blogged about IBM being back as a leader in the IAM/IAG (Identity Access Management/Governance) market. Today the news that IBM is to acquire CrossIdeas, an Italian vendor in the...
More questions IAM buyers should ask
Blog
More questions IAM buyers should ask
Earlier this year, I published the Buyer’s Guide: Access Governance and Provisioning . That document provides condensed information about key selection criteria for Identity Provisioning and...
Previous
4 5 6 7 8 9 10 Next