Go to Market with KuppingerCole
Insights
Research
Advisory
Events
Videos
KC Open Select
Company
Become a Client
Login
Search
Become a Client
Insights
Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust
Research
Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Buyer's Compass Blog
Advisory
Advisory Services Meet our Advisors Strategy Navigator Success Stories
Events
cyberevolution 2024 EIC 2025 Webinars
Videos
All latest videos European Identity and Cloud Conference 2024 cyberevolution 2023 KuppingerCole Webinars KuppingerCole Analyst Chat
KC Open Select
Policy Based Access Management Intelligent SIEM Platforms Data Governance Cloud-Native Application Protection Platforms Zero Trust Network Access Unified Endpoint Management Attack Surface Management API Security & Management
Company
About us People Jobs Newsroom Cybersecurity Council Contact us
Go to Market with KuppingerCole
Insights
Customer Identity & Access Management
Decentralized Identity
Fraud Prevention
Identity & Access Management
Identity Governance and Administration
Passwordless Authentication
Privileged Access Management
Zero Trust
See all insights
Customer Identity and Access Management
Open Select
Customer Identity and Access Management
CIAM solutions are designed to address consumer/customer IAM scenarios that differ from traditional workforce use cases. CIAM systems allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many
EIC 2024: Don’t Miss These Highlight Sessions
Blog
EIC 2024: Don’t Miss These Highlight Sessions
The European Identity and Cloud Conference 2024 is approaching. Only three more months until EIC 2024 launches in Berlin, June 4th to June 7th.
Ping Identity Workforce Identity Governance
Executive View
Ping Identity Workforce Identity Governance
This KuppingerCole Executive View report looks at the Ping Identity (former ForgeRock) Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete identity lifecycle within a single platform.
Road to EIC: Exploring the Power of Decentralized Identity Solutions
Webinar Recording
Road to EIC: Exploring the Power of Decentralized Identity Solutions
Join us for this “Road to EIC” virtual fireside chat, where we will discuss whether decentralized identity will revolutionize the way we deal with identities. Together with our guests, we will give you a taste of the much larger discussions to be held at
EIC 2024: Don’t Miss These Highlight Sessions
Blog
EIC 2024: Don’t Miss These Highlight Sessions
The European Identity and Cloud Conference 2024 is approaching. Only three more months until EIC 2024 launches in Berlin, June 4th to June 7th.
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Advisory Note
How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse
Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this technology will begin rolling out this year (2023) and will be at a consumer price point by the end of
Fraud Reduction Intelligence Platforms
Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus continually shifts to adapt to the latest innovations designed to fortify our defenses.
Proactive Cyber Defense with Intelligent SIEM Platforms
Webinar Recording
Proactive Cyber Defense with Intelligent SIEM Platforms
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security experts, and the rapid pace of change in the business IT and cyber threat environments, traditional SIEMs
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus continually shifts to adapt to the latest innovations designed to fortify our defenses.
Road to EIC: What’s Next in Digital Identity Standards?
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital identity help establish secure authentication methods and protocols to safeguard user information by offering frameworks that
Cybersecurity & IAM:​ 2023 in Numbers
Survey
Cybersecurity & IAM:​ 2023 in Numbers
Significant advancements happened in identity and access management (IAM) and cybersecurity in 2023. For most organizations, it has become more and more important to strengthen cybersecurity and optimize IAM procedures as they continue to traverse the challenges of digital transformation. This
Identity Governance & Administration
Open Select
Identity Governance & Administration
Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets.
SAP IDM End of Life: Die IGA-Migration souverän meistern
Webinar Recording
SAP IDM End of Life: Die IGA-Migration souverän meistern
KuppingerCole Lead Advisor Dr. Phillip Messerschmidt wird die Besonderheiten im SAP-Umfeld und SAP- IdM in einem kurzen Überblick beleuchten. Außerdem wird er aufzeigen, welche Herausforderungen sich bei der Migration einer IGA-Lösung ergeben. Dabei liegt ein besonderes
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced analytics, role mining and self-service support. A technical overview of the overall midPoint’s
Passwordless Authentication
Open Select
Passwordless Authentication
It is essential for organizations to choose the right passwordless solution that meets their unique requirements and needs around security, user experience, and technology stack.
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
The Rise of Identity as a Service (IDaaS) as the Cornerstone of Modern Cybersecurity
Webinar Recording
The Rise of Identity as a Service (IDaaS) as the Cornerstone of Modern Cybersecurity
While organizations can tackle these challenges separately, they can save resources by opting for an Identity-as-a-Service (IDaaS) solution, which gives them everything they need for robust identity management and authentication processes in one solution. Join us as we dive into the nuanced
Privileged Access Management
Open Select
Privileged Access Management
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that address some of the most urgent areas of Cybersecurity today.
Is the future really password-free and is it worth using a PAM solution?
Event Recording
Is the future really password-free and is it worth using a PAM solution?
Comprehensive protection of networks, system infrastructures, hardware and software, applications and data is part of every cyber security strategy. But what does this actually mean for identity and access management? Unloved for many years and repeatedly declared dead: passwords. Large IT
NRI Secure Uni-ID Libra 2.7
Executive View
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative
Zero Trust Network Access
Open Select
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats.
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
Standfirst: Identity Management plays a crucial role in addressing IoT, IIoT, and IoMT challenges. Avoid the pitfalls by following some key security best practices.
Maturity Level for Zero Trust: A Comprehensive Analysis
Advisory Note
Maturity Level for Zero Trust: A Comprehensive Analysis
This Advisory Note explores the fundamental principles of Zero Trust, emphasizing its significance in modern cybersecurity. It discusses the Department of Defense (DoD) Zero Trust Strategy and introduces the 5+2 approach to address implementation challenges. With a focus on bridging the gap between
Research
Leadership Compass
Whitepaper
Executive View
Advisory Note
Leadership Brief
Buyer's Compass
Blog
See all research
Identity Governance and Administration
Aug 06, 2024
Identity Governance and Administration
This Leadership Compass Identity Governance and Administration (IGA) provides an overview of the IGA market and a compass to help you find a solution that best meets your needs. It examines solutions that provide both identity lifecycle management and access governance capabilities. Solutions have
Customer Identity and Access Management (CIAM)
Jun 03, 2024
Customer Identity and Access Management (CIAM)
This report provides an overview of the Customer Identity and Access Management (CIAM) market and a compass to help you find a solution that best meets your organization’s needs. It examines solutions that allow users to register, associate device and other digital identities, authenticate,
IAM System Integrators North America: Go Big or Boutique?
May 28, 2024
IAM System Integrators North America: Go Big or Boutique?
The IAM Systems Integrators North America Leadership Compass provides insight into the capabilities of IAM systems integrators serving customers in the North American region. This report also provides analysis of the top solutions providers in the IAM systems integration space as well as vendors to
The Future of Identity: Beyond Today’s IAM
Jun 05, 2024
The Future of Identity: Beyond Today’s IAM
Identity and Access Management (IAM) has significantly evolved over the past few years, moving beyond its traditional focus. Today, digital identities are integral to digital business, serving as the first touchpoint for customers, consumers, devices, and things. Innovation in Identity Management,
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Nov 13, 2023
How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization
Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the requirements for IAM. Managing identities and access is essential to ensure that only the right people
A Shift Toward MSP Delivery: How MSPs Are Mitigating  Enterprise IAM Delivery Challenges
Aug 31, 2023
A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges
Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial
ARCON drut. Robotics GRC and Process Automation Platform
Aug 13, 2024
ARCON drut. Robotics GRC and Process Automation Platform
This KuppingerCole Executive View report looks at the challenges of achieving effective governance, risk, and compliance (GRC) in the increasingly complex and dynamic digital environment. It examines the benefits of automation and includes a technical review of ARCON’s drut. robotics-based GRC and
Omada Identity Cloud
Aug 01, 2024
Omada Identity Cloud
This KuppingerCole Executive View report looks at Omada’s SaaS solution, Omada Identity Cloud. This report will highlight new features in the latest release and provide an overview of the IGA capabilities of the solution. The report concludes by outlining the strengths and challenges of the
Eviden DirX Directory
Jul 30, 2024
Eviden DirX Directory
This KuppingerCole Executive View report looks at Eviden’s DirX Directory solution from its DirX portfolio. DirX Directory is a directory service supporting integration with LDAP servers. This report will take a look at the features of its latest release with an overview of its strengths and
Securing Tomorrow - Strategic Cybersecurity Recommendations for 2024-2033
Jul 05, 2024
Securing Tomorrow - Strategic Cybersecurity Recommendations for 2024-2033
KuppingerCole Analysts set out to understand the possible futures for digital business and cybersecurity by the year 2033. To accomplish this, we followed a proven futures studies methodology in collaboration with SAMI Consulting, and the resulting outputs were used to derive eight recommendations
Modernizing IAM for Today's  Business Needs
May 10, 2024
Modernizing IAM for Today's Business Needs
This Advisory Note examines the paradigm shift towards modern identity & access management (IAM) frameworks that support digital business initiatives, including zero trust and Secure Access Service Edge (SASE), and the imperative for organizations to modernize their IAM infrastructures. It
Cyber Risk Frameworks in 2024
Apr 09, 2024
Cyber Risk Frameworks in 2024
The landscape of cybersecurity is continually evolving, with new threats and technologies reshaping the way organizations protect their digital assets. In order to understand the significance of these changes, it is crucial to understand the evolving cyber threat landscape, which acts as the
Why Vulnerability Management Is a Strategic Investment
Nov 04, 2022
Why Vulnerability Management Is a Strategic Investment
Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a
Managing RDP Security Risks to Block Ransomware Attacks
Aug 30, 2022
Managing RDP Security Risks to Block Ransomware Attacks
Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks
Advanced IT security solutions for OT environments
Aug 09, 2022
Advanced IT security solutions for OT environments
Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such
Policy Based Access Management
Aug 07, 2024
Policy Based Access Management
Efficient, effective management of access controls from infrastructure to applications remains an aspiration for enterprises. The main drivers of this goal include the need for strengthening the cybersecurity posture, efficiency gains in managing access controls, the need for consistency in access
IAM Systems Integrators North America
Jul 09, 2024
IAM Systems Integrators North America
Identity and Access Management (IAM) systems integrators are companies that provide support in consulting, implementing, and managing services for operations of IAM technologies for businesses. These services can range from planning and designing to implementing and operating various IAM
Customer Identity and Access Management (CIAM)
Jun 24, 2024
Customer Identity and Access Management (CIAM)
CIAM systems allow users to register for an account, associate their device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains. This Buyer's Compass provides insight into how these systems work, what companies should
From Directive to Action: The Value of Draft Documents in Navigating the NIS2 Compliance Challenge
Aug 15, 2024
From Directive to Action: The Value of Draft Documents in Navigating the NIS2 Compliance Challenge
Trust in cybersecurity regulation is shaky – but a new draft regulation could offer the roadmap you've been waiting for. Dive in to see how the NIS2 Directive’s complexities might soon become more navigable.
Where Do Organizations Stand With a Comprehensive IAM Blueprint?
Aug 08, 2024
Where Do Organizations Stand With a Comprehensive IAM Blueprint?
There is still progress to be made for the implementation of widespread comprehensive IAM. A survey conducted by KuppingerCole Analysts revealed insights into the current status of IAM frameworks among survey participants.
Diving Deeper: Recent Insights From the KuppingerCole Analysts’ Cybersecurity Council Meeting
Aug 05, 2024
Diving Deeper: Recent Insights From the KuppingerCole Analysts’ Cybersecurity Council Meeting
The KuppingerCole Analysts’ Cybersecurity Council, a distinguished assembly of over 30 Chief Information Security Officers (CISOs) from diverse industries, convened for its second meeting of 2024 on June 5, 2024, at the European Identity & Cloud Conference (EIC). This meeting furthered the dialogue
Events
cyberevolution 2024
EIC 2025
Webinars
See past events
cyberevolution 2024
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven digital world. Propose a talk today!
To the Event Call for Speakers
Agenda Overview
European Identity and Cloud Conference 2025
European Identity and Cloud Conference 2025
Join Europe's leading event for the future of digital identities and cybersecurity from May 6 - 9, 2025, in Berlin, Germany! EIC 2025 will take place in a hybrid format, bringing together IT professionals - virtually and on site.
To the Event Call for Speakers
Authenticating Identities in the Age of AI: Strategies for Trustworthy Verification
Sep 05, 2024
Authenticating Identities in the Age of AI: Strategies for Trustworthy Verification
In today's digital world, identity authenticity faces constant scrutiny, especially with the emergence of generative AI. However, modern tech provides innovative solutions. Chipped identity documents offer a trusted verification basis, embedding secure chips with verified data. Advancements like
Unlocking Success: Praxisorientiertes Rollenmanagement und Berechtigungskonzeptverwaltung im Fokus
Sep 10, 2024
Unlocking Success: Praxisorientiertes Rollenmanagement und Berechtigungskonzeptverwaltung im Fokus
IT-Fachleute stehen vor der Herausforderung, komplexe Rollenstrukturen und Berechtigungskonzepte effizient zu verwalten. Die Vielzahl von Einzelrechten und Rollenobjekten erschwert nicht nur die Erstellung, sondern auch die kontinuierliche Anpassung an sich wandelnde Anforderungen im Identitäts-
A Glimpse into the 2024 IGA Market Landscape
Sep 11, 2024
A Glimpse into the 2024 IGA Market Landscape
The IGA market continues to grow, and although at a mature technical stage, it continues to evolve in the areas of intelligence and automation. Today, there still are some organizations either looking at replacements of UAP and ILM or IAG, but most are opting for a comprehensive IGA solution that
Videos
All latest videos
European Identity and Cloud Conference 2024
cyberevolution 2023
KuppingerCole Webinars
KuppingerCole Analyst Chat
See all videos
The State of the CIAM Market
Aug 14, 2024
The State of the CIAM Market
The CIAM market continues to grow and change. There have been major acquisitions in this space, and new vendors are launching products and services. Security is always a driver, but deploying organizations want useful data to improve marketing effectiveness and increase revenues. New privacy
Identity Security - the Epicenter of Cybersecurity
Aug 12, 2024
Identity Security - the Epicenter of Cybersecurity
In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to discuss the evolving landscape of identity security. They explore the centrality of Identity and Access Management (IAM) in IT security, the
Lessons Learned from the CrowdStrike Incident
Aug 05, 2024
Lessons Learned from the CrowdStrike Incident
Matthias, Martin, John, Alexei, and Mike discuss the recent CrowdStrike incident and its impact on global players. They highlight the need for better software testing and validation processes to prevent such incidents. The conversation also touches on the importance of diversity in software
Financial Inclusion Is Not Possible Without Identity Inclusion. How Much Revenue Is Your Company Losing From Not Being ID Inclusive?
Jun 07, 2024
Financial Inclusion Is Not Possible Without Identity Inclusion. How Much Revenue Is Your Company Losing From Not Being ID Inclusive?
This keynote session will focus on the fact Financial Inclusion is not possible without Identity inclusion. The speaker(s) will deliver the key findings from Phase 3 of Women in Identity’s International ID Code of Conduct, the Economic Impact of ID Exclusion. The report delivers a
Expert Talk: Identity Management at MIGROS, Switzerland
Jun 07, 2024
Expert Talk: Identity Management at MIGROS, Switzerland
Paul Fisher will sit down with Dr. Lukas Ruf from MIGROS to delve into the complexities and innovations in access management within a global, federated structure. Dr. Ruf will share valuable insights into the key challenges of access management, highlighting the delicate balance between
Bridging Federated and Decentralized Identity Systems
Jun 07, 2024
Bridging Federated and Decentralized Identity Systems
Identity verification is rapidly evolving, blending both federated systems and decentralized models to cater to diverse needs. However, this integration often presents challenges, including balancing ease of use with stringent security requirements. Many identity solutions provide seamless user
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Nov 16, 2023
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
In a world where everything and everyone is interconnected, traditional cybersecurity is outdated. Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the future.This presentation, "Zero Trust in a World of Everything, Everyone, Everywhere, All at Once," explores
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Nov 16, 2023
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
Nov 16, 2023
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
The Elastic InfoSec team is responsible for securing Elastic’s globally distributed, remote-first workforce, and the planet scale, multi-cloud, Elastic Cloud platform. Taking data driven approaches beyond the SIEM and applying them to the full scope of our InfoSec program, the resulting
The State of the CIAM Market
Aug 14, 2024
The State of the CIAM Market
The CIAM market continues to grow and change. There have been major acquisitions in this space, and new vendors are launching products and services. Security is always a driver, but deploying organizations want useful data to improve marketing effectiveness and increase revenues. New privacy
Asking Good Questions About AI Integration in Your Organization – Part II
Jul 31, 2024
Asking Good Questions About AI Integration in Your Organization – Part II
The integration of AI poses both unprecedented opportunities and challenges for organizations. Our webinar, "Asking the Right Questions: Navigating AI Integration in Enterprise Security," addresses the pressing need for CISOs, CIOs, and other information risk management professionals to navigate
Passwordless 360°: A Game-Changing Approach to Authentication within Your Business
Jul 26, 2024
Passwordless 360°: A Game-Changing Approach to Authentication within Your Business
In today's digital landscape, traditional password-based authentication is increasingly challenged by the need for more secure, efficient, and user-friendly methods. The shift towards passwordless authentication is reshaping how users interact with digital services, promising enhanced security and
Identity Security - the Epicenter of Cybersecurity
Aug 12, 2024
Identity Security - the Epicenter of Cybersecurity
In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to discuss the evolving landscape of identity security. They explore the centrality of Identity and Access Management (IAM) in IT security, the
Lessons Learned from the CrowdStrike Incident
Aug 05, 2024
Lessons Learned from the CrowdStrike Incident
Matthias, Martin, John, Alexei, and Mike discuss the recent CrowdStrike incident and its impact on global players. They highlight the need for better software testing and validation processes to prevent such incidents. The conversation also touches on the importance of diversity in software
CIAM Market Update 2024: Key Developments and Trends
Jul 29, 2024
CIAM Market Update 2024: Key Developments and Trends
In this episode, Matthias Reinwarth and John Tolbert discuss the consumer identity and access management (CIAM) market. They cover new entrants in the market, the impact of mergers and acquisitions, new features in CIAM products, deployment models, B2B functionality, decentralized identity, and
Advisory
Advisory Services Success stories
Advisory Services

KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.

See Advisory Services
Contact our advisors

E-mail info@kuppingercole.com
Phone
+49 (211) 2370 77-0

Meet our Advisors
Boehringer Ingelheim, a leading pharmaceutical company, sought to enhance its Identity and Access Management (IAM) capabilities in the digital age. We collaborated to develop a strategic IAM roadmap in just five months, aligning their IT infrastructure with their global leadership position.
View Case Study
IAM Strategy
Global chemical company revamped its Identity and Access Management with KuppingerCole's IAM strategy: guidance, assessment, roadmap. Enhanced security and efficiency.


View Case Study
KC Open Select
Policy Based Access Management
Intelligent SIEM Platforms
Data Governance
Cloud-Native Application Protection Platforms
Zero Trust Network Access
Unified Endpoint Management
Attack Surface Management
API Security & Management
See all topics
Discover and compare cybersecurity solutions

Goodbye guesswork, hello confident decisions

Optimize your decision-making process with the most comprehensive and up-to-date market data available.

Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.

Configure your individual requirements to discover the ideal solution for your business.

Visit KC Open Select
Company
About us People Jobs Newsroom Cybersecurity Council Contact us
Discover Our Passion for Advancing Identity and Security
We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience.​
Read more about our philosophy
Analysts & Advisors

Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.

Business Team

Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.

Meet the Team
Career Opportunities
Senior Cybersecurity Advisor (m/w/d)
Advisory
 Wiesbaden und remote
Senior Cybersecurity Advisor (m/w/d)
Zur Verstärkung unseres Advisory Teams suchen wir einen energischen und motivierten Advisor. Talentierte Menschen mit Universitätsabschluss und bis zu 5 Jahren Berufserfahrung in der Industrie oder Beratung im Bereich Cybersecurity sind herzlich eingeladen, sich bei uns zu bewerben.
Marketing Automation Manager (m/w/d)
Marketing
 Wiesbaden / remote
Marketing Automation Manager (m/w/d)
Sie sind ein kreativer und datengetriebener Marketingprofi? Sie haben eine Leidenschaft für Automatisierung und möchten Ihre Expertise in einem dynamischen Umfeld einbringen? Dann sind Sie bei uns genau richtig! Wir suchen einen engagierten Marketing Automation Manager, der unser Team
Sales Development Representative (m/f/d)
Account Management/Sales
 Remote, hybrid
Sales Development Representative (m/f/d)
Are you passionate about sales activities and enjoy dealing with people and companies from all over the world? Do you speak /read /write English and German fluently and have excellent communication skills? Have you completed a degree in Business or Marketing? Then apply now!  As Sales
View all Job Offers
Latest Press Releases
KuppingerCole Analysts Announces cyberevolution 2024: Cybersecurity in an AI Powered Digital World
Press Release
August 12, 2024
KuppingerCole Analysts Announces cyberevolution 2024: Cybersecurity in an AI Powered Digital World
KuppingerCole Analysts proudly announces the return of cyberevolution, the premier event dedicated to exploring cybersecurity in an "AI-powered digital world." Scheduled for December 3-5, 2024, in Frankfurt, Germany, this exciting event will bring together end users, vendors, consultants, students,
KuppingerCole Honores 2024 European Identity and Cloud Award Winners
Press Release
June 05, 2024
KuppingerCole Honores 2024 European Identity and Cloud Award Winners
Global IT analyst firm KuppingerCole Analysts has announced the recipients of the esteemed 2024 European Identity Awards during the 17th annual European Identity and Cloud Conference in Berlin, attended by leading industry figures from across Europe.
KuppingerCole Identifies Leaders in New Research on Identity Fabrics
Press Release
April 22, 2024
KuppingerCole Identifies Leaders in New Research on Identity Fabrics
KuppingerCole Analysts has published its 2024 Identity Fabrics Leadership Compass, a comprehensive guide to navigating the evolving market for modern Identity and Access Management (IAM) solutions. Principal Analyst, Martin Kuppinger, compares 20 solutions in this market segment, ranking them in
Cybersecurity Council
With the Cybersecurity Council, we bring together world-class information security professionals in leading positions from across many industries and schools of thought to exchange and discuss how to secure the rapidly growing cyber economy. The results of these fruitful discussions will flow into every of our services.
Learn more
Basic contact information
KuppingerCole Analysts AG
Wilhelmstr. 20-22
65185 Wiesbaden
Germany
E-mail Phone info@kuppingercole.com
+49 (211) 2370 77-0
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Contact us
See all locations, phone numbers, e-mail addresses
Yes, I want to try the new AI-powered search
Yes, I want to try the new AI-powered search
All Research
Whitepaper

Like this?

Don't like this?

Log in to make your opinion count! We will also use your feedback to tune your personal recommendations.

Log in to hear your voice heard. We'll also make sure to update your personal recommendations.

Login
Don't have a KC account yet? Join Now
I like this I like this
I like this I like this
0
I don't like this I don't like this
I don't like this I don't like this

Zero Trust Network Access for OT Environments

July 19, 2023
John Tolbert
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security measures such as strong and risk-adaptive authentication and policy-based access controls. Some tools for IT can work well in OT environments. Moreover, some OT environments are subject to regulatory requirements that mandate specific security controls and additional audit compliance capabilities.

1 Introduction / Executive Summary

Operational Technology (OT) encompasses the hardware and software systems that control, automate, and monitor equipment and physical processes in industrial settings such as manufacturing, warehouse and logistics management, power generation and distribution, transportation, and healthcare. These systems include Supervisory Control And Data Acquisition (SCADA) systems, Programmable Logic Controllers (PLCs), Human-to-Machine Interfaces (HMIs) and other devices and software that are designed to monitor and control the operation of machines, processes, and other specialized equipment in real-time. Operational Technology (OT) includes Industrial Controls Systems (ICS), Critical Infrastructure Systems (CIS), and Industrial Internet of Things (IIoT).

Critical Infrastructure Systems include energy, communications, defense industrial base, critical manufacturing, food and agriculture, government, healthcare, and transportation sectors. Some organizations in CIS are public utilities. Organizations that use Industrial Controls Systems (ICS) are generally considered to be a superset of the sectors in CIS, many of which operate as private enterprises. Industrial IoT (IIoT) refers to commoditized, IP communications-enabled devices (often sensors) which are increasingly used within ICS and CIS.

OT environments can have very high availability and security requirements, which, in many cases, necessitate the deployment of specially designed cybersecurity and identity management solutions.

The need to secure OT has increased in prominence for multiple reasons. Regulation to protect the public is being legislated by governments in many jurisdictions worldwide. Governments have intervened in cases of compromise of OT infrastructure, particularly where CIS has been involved. Companies and utilities are investing in IIoT technology to take advantage of expanding functionality and are decreasing costs to improve efficiency. Lastly, some high-profile attacks on ICS and CIS have brought awareness of cybersecurity risks to both the general public and to the boardroom.

Successful cyber-attacks against ICS infrastructure can cause significant downtime, lost productivity, reputation damage, and even threaten for-profit companies’ viability. Successful cyber-attacks against CIS can cause power outages, failures of public utilities, and even jeopardize lives. Organizations that operate OT environments must invest to avoid the downtime and damage that results from cyber-attacks

Companies and utilities that have OT systems typically have extreme uptime requirements and very short and infrequent system maintenance windows. This can exacerbate the problems of upgrading security products and even keeping critical systems up-to-date with security patches.

Securing access to OT assets is a paramount concern. Some attacks against ICS and CIS operators have used improperly secured Virtual Private Networks (VPNs) and other remote access tools as vectors. The Zero Trust Network Access (ZTNA) model is a leading cybersecurity paradigm that is founded upon the principle of least privilege. ZTNA can help reduce the risk of unauthorized access to OT environments.

Organizations that have OT should regularly review their security architectures and make investments to close cybersecurity gaps where discovered.

This whitepaper will review the cybersecurity threat landscape for OT, describe the high-level security architecture and some of the tool types needed for OT, consider some of the key requirements of the German KRITIS regulation, and provide an overview of the Cyolo Zero Trust Access solution.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Register
Get premium access
Choose a package
Top related content
Event Recording
Yariv Lenchner - Securing Privileged Identities in OT (Operational Technology) and Industrial Control Systems
Yariv Lenchner
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
John Tolbert
Webinar Recording
The Evolution of Secure Access in Critical Infrastructure
John Tolbert
Blog
Who is Responsible for Operational Technology Security?
John Tolbert
Blog
OT and IoT Security
Warwick Ashford
Table of Contents
1 Introduction / Executive Summary
2 Highlights
3 The OT Threat Landscape
4 Security Architecture for OT, CIS, and ICS to Aid in Regulatory Compliance
5 The KRITIS and BSI IT Security Act 2.0 Cybersecurity Regulations
6 Cyolo Industrial Secure Remote Access
7 Recommendations
8 Related Research
9 Copyright
Back to top
Table of Contents
Table of contents
Close
1 Introduction / Executive Summary
2 Highlights
3 The OT Threat Landscape
4 Security Architecture for OT, CIS, and ICS to Aid in Regulatory Compliance
5 The KRITIS and BSI IT Security Act 2.0 Cybersecurity Regulations
6 Cyolo Industrial Secure Remote Access
7 Recommendations
8 Related Research
9 Copyright

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
Please provide your email address
I have read and agree to the Privacy Policy
Please accept our Privacy Policy
I have read and agree to the Terms of Use
Please accept our Terms of Use
Linkedin Linkedin
Twitter Twitter
Facebook Facebook
YouTube YouTube
Instagram Instagram
Switch to dark theme
Switch to light theme
Imprint Terms of Use Privacy Policy Privacy Request © Copyright KuppingerCole Analysts AG
© Copyright KuppingerCole Analysts AG