Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The Role of Identity in Business Continuity Planning
When it’s “business as usual”, it seems strange to think about disruptions and disasters. With competing priorities and the pressure of everyday demands, planning for worst-case...
Learn more
Whitepaper
Whitepaper
IAM: Globalization & Large-Scale Enterprise
Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true for...
Learn more
Event Recording
Event Recording
Panel | IGA for Successfully Managed Identities
Learn more
Redesigning access controls for IAM deployments?
Blog
Redesigning access controls for IAM deployments?
A few weeks ago I read an article in Network World, entitled “ A common theme in identity and access management failure: lack of Active Directory optimization ”. Essentially, it is...
Seven Fundamentals for Future Identity and Access Management
Blog
Seven Fundamentals for Future Identity and Access Management
Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source...
SAP enters the Cloud IAM market – the competition becomes even tougher
Blog
SAP enters the Cloud IAM market – the competition becomes even tougher
The market for Cloud IAM and in particular Cloud User and Access Management – extending the reach of IAM to business partners, consumers, and Cloud applications through a Cloud service – is...
From preventive to detective and corrective IAM
Blog
From preventive to detective and corrective IAM
Controls in security and GRC (Governance, Risk Management, and Compliance) systems are commonly structured in preventive, detective, and reactive controls. When we look at IAM/IAG (Identity and...
IBM to acquire CrossIdeas - further expanding its IAM/IAG portfolio
Blog
IBM to acquire CrossIdeas - further expanding its IAM/IAG portfolio
A while ago I blogged about IBM being back as a leader in the IAM/IAG (Identity Access Management/Governance) market. Today the news that IBM is to acquire CrossIdeas, an Italian vendor in the...
More questions IAM buyers should ask
Blog
More questions IAM buyers should ask
Earlier this year, I published the Buyer’s Guide: Access Governance and Provisioning . That document provides condensed information about key selection criteria for Identity Provisioning and...
Step back and review your IAM program: Why you need to review your IAM/IAG Strategic Planning now
Blog
Step back and review your IAM program: Why you need to review your IAM/IAG Strategic Planning now
IAM/IAG (Identity Access Management/Governance) is changing. The Computing Troika of Cloud, Mobile, and Social Computing creates new challenges. Different deployment models, new devices and mobile...
Top Risks of IAM Programmes
Blog
Top Risks of IAM Programmes
IAM risks fit into 4 programme areas, Executive Support, Business Involvement, Strategy and Technology; and one area of the organisation, People. Each of these areas holds a number of risks which...
Entitlement & Access Governance – the next generation of core IAM
Blog
Entitlement & Access Governance – the next generation of core IAM
In my new report “ Entitlement & Access Governance ”, published yesterday, I introduce a new term and abbreviation: EAG for Entitlement & Access Governance. Thanks to Dave Kearns for...
IAM@IBM: Finally back to leadership
Blog
IAM@IBM: Finally back to leadership
It has been somewhat quiet around IBM’s IAM offering for the past few years. Having been one of the first large vendors entering that market, other vendors had overhauled IBM, being more...
RSA acquires Aveksa: Will they redefine the IAM/IAG market?
Blog
RSA acquires Aveksa: Will they redefine the IAM/IAG market?
Today RSA Security, a part of EMC [officially it’s “RSA, The Security Division of EMC”], has officially announced the acquisition of Aveksa, a company based in Waltham, MA. The deal closed on July...
How to license Identity and Access Management software?
Blog
How to license Identity and Access Management software?
Recently I had some conversations with both vendors and customers about licensing models for IAM (Identity and Access Management) software. Historically, most licensing models were (and still are)...
Previous
4 5 6 7 8 9 10 Next