Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Vadim Lander on the Dawn of Digital IAM
Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, Broadcom is to give a presentation entitled The Dawn of Digital IAM on Monday, September 13 starting at 17:40 pm at...
Learn more
Whitepaper
Whitepaper
Multi-Organization Access Governance
This KuppingerCole Whitepaper explores identity access across multi-organizations and parts of their supply chains, from a single point. By using such, organizations can streamline access and...
Learn more
Event Recording
Event Recording
Reinventing the Network with Zero Trust to Stop External Network Attacks
Learn more
Do we need to kill IAM to save it?
Blog
Do we need to kill IAM to save it?
Last week I received a newsletter from Radiant Logic , a vendor of Virtual Directory Services and some other IAM stuff like Federation Services. This newsletter pointed to a video of a...
Open Source IAM – is it right for you?
Blog
Open Source IAM – is it right for you?
Open Source projects usually get short shrift from pundits and journalists. Open source Identity projects get even less shrift. (“Shrift”, by the way, has an interesting etymology , at least...
In zwölf Schritten zu modernem IAM
Blog
In zwölf Schritten zu modernem IAM
Die Umsetzung einer Identitäts- und Access-Management-Infrastruktur erfordert eine sorgfältige Planung. Unternehmen sollten in dieser Phase mehrere wichtige Punkte beachten. Identity und Access...
The Identity Explosion – one reason to re-engineer not only our IAM
Blog
The Identity Explosion – one reason to re-engineer not only our IAM
During my Opening Keynote at this year’s EIC (European Identity & Cloud Conference, www.id-conf.com ), when talking about the Top Trends in IAM, Mobile Security, GRC, and Cloud Computing I...
IAM legacies – bad for your business
Blog
IAM legacies – bad for your business
It’s been almost 15 years since Business Layers and Oblix ushered in the new age of Identity and Access Management Systems (IAM systems) with what I called at the time the “killer app” for...
Understanding Identity and Access Management
Blog
Understanding Identity and Access Management
In the second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the...
Moving forward in IAM at your own pace
Blog
Moving forward in IAM at your own pace
During the last years, there has been a lot of change in the Identity Provisioning market. Sun became part of Oracle, Novell is now NetIQ, BMC Control-SA is now at SailPoint, Völcker has been...
Critical success factors for IAM projects
Blog
Critical success factors for IAM projects
This is sort of a "back to the roots" post, but for some good reason. I've done several advisories and customer calls recently, and in some of them it became obvious that companies tend...
Warum IAM inzwischen ein Thema für die Unternehmensführung ist
Blog
Warum IAM inzwischen ein Thema für die Unternehmensführung ist
Wer sich schon länger mit Identity- und Access-Management (IAM) beschäftigt, hat in den vergangenen drei bis vier Jahren einen grundlegenden Wandel beobachten können. Compliance ist heute einer...
Quest further extends its IAM portfolio – e-DMZ adds PxM capabilities
Blog
Quest further extends its IAM portfolio – e-DMZ adds PxM capabilities
Quest today announced that they will acquire e-DMZ Security, a PxM (Privileged Access, Account, Identity, User Management) vendor. That comes to no surprise given that PxM has been one of the last...
From technology to business - the shift in Identity and Access Management
Blog
From technology to business - the shift in Identity and Access Management
Being involved in a lot of advisory projects at end user organizations for some years now, I'd like to share some of the fundamental changes I observe. There is always a gap between what analysts...
Active Directory als Teil der IAM-Strategie – wichtig, aber nicht ausreichend
Blog
Active Directory als Teil der IAM-Strategie – wichtig, aber nicht ausreichend
Das Active Directory ist heute in den allermeisten Unternehmen zu finden. Mit ihm kann man nicht nur Benutzer und Gruppen oder Computer und Server verwalten, sondern auch Freigaben und...
Previous
4 5 6 7 8 9 10 Next