IAM Practice Director / Head of Advisory
Matthias Reinwarth
Having worked for his whole professional life in Identity and Access Management, Matthias joined KuppingerCole in 2014. In his role of the Director of the Practice IAM he works on maintaining the leading role of KuppingerCole in all facets of the topic of digital identities and their access to resources. He is a regular speaker at KuppingerCole events and webinars and hosts the weekly KuppingerCole Analysts video podcast “Analyst chat”.
Roles & Responsibilities at KuppingerCole
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias coordinates communication and exchange within the KuppingerCole team across all business units (Events, Research and Advisory) and beyond.
Background & Education
Based on a combined education in economics and IT, Matthias has been working as a trusted advisor and consultant for customers since 1993.
Areas of coverage
- IAM (Identity & Access Management) and PAM (Privileged Access Management)
- A wide range of additional areas of KuppingerCole expertise
Professional experience
Matthias has acquired profound practical experiences in IT as a consultant and advisor for more than 30 years. He has been successfully working in assignments with a wide range of customers covering many sectors including media, government, financial, telecommunications, logistics, automotive and other industries. Since 1994 he has authored many publications, including articles, research documents, videos, podcasts, webinars and blog posts.
Latest research
Advisory Note
2022 IAM Reference Architecture
April 21, 2022
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse, and sometimes even conflicting. Organizations that…
Advisory Note
Implementing SASE
December 09, 2021
Secure Access Service Edge (SASE) architectures promise to prevent multiple types of cyber-attacks, but deciding whether SASE is right for your organization will require understanding whether SASE is a fit for your use cases in IT. This Advisory Note looks at the definition and promise of…
Executive View
NEXIS 4
September 21, 2021
NEXIS 4 implementiert intelligente Analytik für Rollen und Identitäten und Prozesse zum strategischen Lebenszyklusmanagement von Berechtigungen. Somit bietet NEXIS 4 eine Grundlage für dedizierte und geschäftsorientierte Identity und Access Management (IAM) Self-Services innerhalb einer…
Executive View
NEXIS 4
June 08, 2021
NEXIS 4 implements intelligent role and identity analytics together with strategic entitlement lifecycle management processes. As such, it provides the basis for dedicated, business-oriented Identity and Access Management (IAM) self-services within an organization either as a stand-alone…
Whitepaper
Leveraging Your Organization's Expertise: Departmental IAM Services for the Business
January 19, 2021
To benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and maintenance processes. Dedicated, specialized and lean IAM services are a sustainable and efficient approach to…
Executive View
R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz Cybersecurity
September 25, 2020
Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePoint-Plattformen für Organisationen in verschiedenen Ländern und Regionen unter Gewährleistung der Konformität zu…
Latest blog posts
Blog
Defining Modern Cybersecurity Leadership
September 25, 2022
Today's Leader Spotlight is one of our recent Analyst Chats in which host Matthias Reinwarth and KuppingerCole CEO Berthold Kerl talk about what makes a good cybersecurity leader.
Blog
Catalyzing your Digital Transformation Journey
April 21, 2022
Let us face it, we do not have a choice. The overall context for all our activities and every interaction has been and is being changed without us being asked. Digital Transformation is here, and it impacts everyone, businesses, and governments. It is changing society as a whole and the way…
Blog
A Iot to Venture, More to GAIN
September 20, 2021
As social beings, people interact with their environment, whether as citizens of a state, as employees of a company or as contractual partners (customers, insured persons) with a company in the private sector. Even if a large number of such transactions can take place anonymously (coffee to…
Blog
A First End to the Schrems II Limbo
June 10, 2021
Writing about legal topics is always a challenge. I am not a lawyer, but as an analyst and advisor, however, I almost inevitably encounter the implications of laws and current case law. Thus, this text describes only a personal assessment and is not intended to be, and should not be used…
Blog
Putting Your First-Line Worker at the Center of Attention
December 10, 2020
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected by them are now much more common. For example, every informed and responsible citizen is now…
Blog
We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance
November 19, 2020
If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is…
Latest videos
Analyst Chat
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
March 20, 2023
Get ready to hear a new take on generative pre-trained transformers! This week, Matthias sat down with Jörg Resch, Co-founder of KuppingerCole Analysts, to discuss the exciting possibilities of ChatGPT. Unlike Alexei, Jörg is an avid user and firm believer in the positive impact…
Analyst Chat
Analyst Chat #164: Trends and Predictions for 2023 - Passwordless Authentication
March 13, 2023
Matthias and Martin continue their sub-series of the Analyst Chat about Trends and Predictions in 2023 and beyond. This time, it’s about Passwordless Authentication. Martin elaborates on the importance of Passwordless Authentication for the whole Access Management process. Companies…
Analyst Chat
Analyst Chat #163: Zero Trust in Artificial Intelligence
March 06, 2023
In this podcast episode, Alexei Balaganski and Matthias discuss the increasing use of ChatGPT and other machine learning-based technologies in research and the potential risks associated with their use. Alexei offers a strong opinion on the topic, describing the risks of plagiarism and lack…
Analyst Chat
Analyst Chat #162: Trends and Predictions for 2023 - Integration of IGA and Data Governance
February 27, 2023
In this podcast episode, Martin Kuppinger and Matthias explore the upcoming trend of IGA (Identity Governance and Administration) solutions to have an increasing level of integration with Data Governance and Software Security products.
The integration of these solutions will…
Analyst Chat
Analyst Chat #161: Managing Network Connectivity and Security with SASE Solutions
February 20, 2023
With the rapid expansion of IT environments, adoption of the cloud, and the ongoing Digital Transformation, the need to provide secure access to organizational resources has become paramount. Secure Access Service Edge (SASE) solutions are designed to consolidate network and security…
Analyst Chat
Analyst Chat #160: Upgrade Your Security Management Game
February 13, 2023
Cyberattacks have been intensifying over the past few years as cybercriminals continue to devise new strategies to launch sophisticated attacks and gain unauthorized access. The tactics, techniques, and procedures (TTPs) that were once only used by well-funded state actors are being…