Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About
Shifting IAM to Modern Architecture and Deployment Models There is a lot of talk about IDaaS (Identity as a Service) these days, as the way to do IAM (Identity and Access Management). There...
Learn more
Executive View
Executive View
Keeper Enterprise
Die Verwaltung von Passwörtern ist und bleibt eine wichtige Anforderung für Benutzer und Unternehmen, da Passwörter immer noch allgegenwärtig sind und damit weiterhin ein großes Sicherheitsrisiko...
Learn more
Event Recording
Event Recording
Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect
 
Learn more
Customer authentication with zero-friction passwordless authentication
Whitepaper
Customer authentication with zero-friction passwordless authentication
To increase security and convenience, businesses and organizations need to adopt and implement a modern authentication system that does not rely on customers remembering usernames and passwords....
IAM Projects Done Right
Webinar Recording
IAM Projects Done Right
Delivering effective IAM is not always easy, and around half of IAM projects run into difficulties and stall. While opting for IAM that is delivered as a service is a potential solution, not all...
Beyond Identity Secure Customers
Executive View
Beyond Identity Secure Customers
Password authentication is not only insecure, but it leads to poor consumer experiences and is costly for organizations to maintain. As far as customer authentication is concerned, there are three...
Secure Collaboration
Blog
Secure Collaboration
The world of working is changing – we are increasingly working collaboratively in teams, but members of those teams are no longer necessarily in the same office, location, or even the same...
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Blog
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing &...
Trending at EIC 2022: The Return of Policy-Based IAM
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My...
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and...
Effective Identity Access Governance in Hybrid SAP Environments
Webinar Recording
Effective Identity Access Governance in Hybrid SAP Environments
Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever,...
Impressions from the European Identity and Cloud Conference 2022
Event Recording
Impressions from the European Identity and Cloud Conference 2022
Attendees at the European Identity and Cloud Conference 2022
Event Recording
Attendees at the European Identity and Cloud Conference 2022
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a...
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect...
Previous
6 7 8 9 10 11 12 Next