Director IAM Research

Richard Hill

Richard is the Director of IAM Research and Lead Analyst at KuppingerCole, supervising research initiatives and researching emerging cybersecurity and IAM technology and market trends. Richard has over 25 years of experience in technology, with an educational background in Computer Science and Engineering, and has contributed work on several technology standards committees.

Roles & Responsibilities at KuppingerCole

As the Director of IAM Research at KuppingerCole, Richard oversees research and provides thought leadership regarding products, technologies, and industry trends, published on the KuppingerCole website. As a Lead Analyst, he researches established and leading-edge IAM and cybersecurity solutions.

Professional Experience and Education

Richard has over 25 years of experience as an IAM Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He holds a Master's degree in Computer Science and a Bachelor's degree in Engineering and is internationally known for his work on several standards committees.

Areas of Coverage

IAM Identity & Access Management (IAM)


Latest research

Executive View
IndyKite Knowledge-Based Access Control (KBAC)
September 13, 2022
Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity of interactions between them to determine access decisions. Using the identity data, context,…
Leadership Compass
Web Application Firewalls 2022
July 12, 2022
This report provides an overview of the Web Application Firewall (WAF) market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to…
Leadership Compass
Access Management 2022
April 26, 2022
This Leadership Compass provides up to date insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market.
Executive View
NRI SecureTechnologies Uni-ID Libra 2.6
March 24, 2022
Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. Focusing on the Japanese market, the updated NRI Secure's Uni-ID Libra v2.6 continues to provide innovative features…
Executive View
HCL BigFix
January 19, 2022
Due to the sheer number of endpoint devices (billions) worldwide and their potential risk and impact to the organization through endpoint vulnerabilities, Endpoint Management has become imperative to IT Security. HCL BigFix offers a unified platform to discover, manage, and bring those…
Leadership Compass
Unified Endpoint Management (UEM) 2021
December 09, 2021
This report provides an updated overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative…

Latest blog posts

SBOM - A First Step in Software Supply Chain Security (SSCS)
July 21, 2022
Software Bill of Material (SBOM) tools have come sharply into focus as a foundational component of any Software Supply Chain Security (SSCS) strategy, spurred on by the U.S. Executive Order to improve the security of the software supply chain. This was in response to a number of highly…
In the Midst of Change, Somethings Remain the Same
May 10, 2022
Industry 4.0 is the fourth revolution in manufacturing. I won't bore you with the details of the prior iteration or versions and how we got where we are today, only that Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. Smart or intelligent…
IT Security Transformation Can Come from Unexpected Places
June 02, 2021
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the unforeseen tsunami waves of network traffic and flexible enough to address cyber-attacks in areas least…
IGA in a World of Zero Trust
May 06, 2021
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always verifies .” This traditionally meant verifying Who has access to What resource. In the…
When Cyber "Defense" is no Longer Enough
October 04, 2019
The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments, the number of cyber-attacks is growing. The types and sophistication of these attacks are…
Web Access & Federation
February 15, 2019
An organization’s need to support communication and collaboration with external parties such as business partners and customers is just as an essential technical foundation today as it has been in the past. Web Access Management and Identity Federation are two vital and inseparable…

Latest videos

Webinar Recording
Protecting Web Applications Amid Severe Staff Shortages
November 03, 2022
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical. But many companies are facing severe skills shortages exacerbated by the “Great Resignation”,…
Webinar Recording
Advanced Authorization in a Web 3.0 World
October 26, 2022
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who and what has access to what in what context, is extremely challenging. Business success depends…
Webinar Recording
A Comprehensive Approach to Solving SaaS Complexity
September 23, 2022
As businesses adopt cloud-based services as part of digital transformation programs to enable flexible working, boost productivity, and increase business agility to remain competitive, many IT and security teams are finding it challenging to gain oversight and control over the multitude of…
Analyst Chat
Analyst Chat #133: Leadership Compass Web Application Firewalls
July 18, 2022
Web Application Firewalls (WAF) have been around for quite some time to protect web applications through the inspection of HTTP traffic. But with a changing nature of web applications and the ever changing threats landscape they nee to evolve constantly. Richard Hill sits down with…
Analyst Chat
Analyst Chat #125: Leadership Compass Access Management
May 23, 2022
Access Management refers to the group of capabilities targeted at supporting an organization's access management requirements traditionally found within Web Access Management & Identity Federation solutions, such as Authentication, Authorization, Single Sign-On, Identity Federation.…
Webinar Recording
Understanding the Unified Endpoint Management (UEM) Market
March 31, 2022
Business IT environments continue to undergo rapid and continual change as businesses seek to improve productivity and efficiency by adopting cloud-based services and enabling employees to work on a wide range of mobile devices. But this has in turn created opportunities for attackers.