Lead Analyst

Anmol Singh

We're sorry, but this person is no longer with KuppingerCole.

Latest publications

Webinar Recording
Privileged Access Management Needs a New Approach
July 17, 2019
As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for…
Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
July 12, 2019
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial IoT continue to be developed and designed to perform specific functions and security is often a…
Webinar Recording
Leverage Enterprise Architecture to Achieve GDPR Compliance
June 06, 2019
Several measures have been undertaken by Organizations at various levels to comply with GDPR, most of which remain reactive, fragmented and largely ad-hoc. These controls are also not continuous in nature and therefore fail to satisfy ongoing compliance requirements. Organizational leaders…
Webinar Recording
Next-Gen Identity Analytics and Access Governance Approach
May 10, 2019
Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity…
Blog
Data Security and Governance (DSG) for Big Data and BI
April 12, 2019
Today, organizations are capturing trillions of bytes of data every day on their employees, consumers, services and operations through multiple sources and data streams. As organizations explore new ways to collect more data, the increased use of a variety of consumer devices and embedded…
Webinar Recording
Privileged Access Management - the Focal Point for Your IAM Today
March 28, 2019
PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.
Event Recording
Panel: CIAM Strategy Best Practice
October 02, 2018
When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a…
Blog
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
July 13, 2018
Broadcom, after having denied the acquisition of Qualcomm earlier this year by Trump administration based on national security concerns, has decided to acquire CA Technologies showing one of the greatest shifts in an acquisition strategy from a semiconductor business to  an …
Blog
BOMGAR acquires Avecto to expand its PAM portfolio
July 10, 2018
BOMGAR , owned by PE firm Francisco Partners has recently announced that it has acquired Avecto , a UK based Endpoint Privilege Management (EPM) company. The move coming within 6 months of Lieberman Software’s acquisition by BOMGAR clearly depicts the quest to strengthen its…
Webinar Recording
Patients, People and Things - Managing Identities in Healthcare
July 05, 2018
Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all…
Webinar Recording
Securing your Hybrid IT Environment with Privileged Access Management
July 02, 2018
As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications in addition to existing ones. The conventional approaches of managing privileged access using…
Webinar Recording
Best Practices of Privileged Identity Management
June 21, 2018
Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.
Webinar Recording
Cloud IGA: Built for Hybrid Reality
June 12, 2018
Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the…
Webinar Recording
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM
June 07, 2018
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing…
Webinar Recording
Access Management Leading the Cloud Transformation Drive
April 27, 2018
To survive the fierce market competition in the era of Digital Transformation, businesses strive to be as agile as possible, to quickly adjust to constantly changing customer demands, industry regulations and modern technologies. Driven by cloud transformation and digitalization, modern…
Blog
CyberArk Acquires Vaultive to Strengthen Its Privilege Management Capabilities in Cloud
March 13, 2018
CyberArk, an overall leader in privilege management according to KuppingerCole Leadership Compass on Privilege Management , announced yesterday that it has acquired certain assets in a privately held America-based Israeli cloud security provider, Vaultive. Data encryption…