Advisor

Shikha Porwal

Starting from a technical background in SSO testing, Shikha shifted to the planning design and analysis part of the IAM development life cycle. She joined KuppingerCole in 2021 after completing her master’s in business administration at HHL Leipzig. Using her technical background and business acumen, she continues to support in multiple projects, both in Cybersecurity and IAM space such as Vulnerability management and IAM assessments.

Roles & Responsibilities at KuppingerCole Analysts

Shikha is an Advisor and Analyst at KuppingerCole since January 2021. She consults clients on all areas of KuppingerCole expertise, and occasionally contributes to research.

Background & Education

Shikha holds a Bachelor of Engineering degree from National Institute of Technology Bhopal, India, and a Master of Business Administration degree from HHL Leipzig Graduate School of Management, Germany. She has experience in SSO testing, email protocols and other areas of IdP.

Areas of coverage

Professional experience

In the last 2 years, Shikha has assisted in several projects around IAM tool onboarding and performed cloud risk assessments for clients in finance, healthcare, technology, and other industries. She has also analyzed existing processes and structures of enterprise IAM and vulnerability management as well as helps client devise new ones. She has been helping to establish benchmarks and recommend best practices to our customers in the areas mentioned.

Latest publications

Whitepaper
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
August 31, 2023
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause…
Analyst Chat
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
April 26, 2021
Shikha Porwal and Matthias Reinwarth have a coffee conversation over the security risks of working remotely. They talk through the vulnerabilities of a home network, and touch base with the pandemic related end point security threats, employee behavior and finally, Zero trust.