Research

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
Modular Decentralized Identity Architecture
Whitepaper
Modular Decentralized Identity Architecture
A trend compelling IGA modernization is the need for an Identity driven security model; due to identity silos created by rapid cloud adoption. As organizations rethink their IAM/IGA systems, they...
Verifiable Credentials for Secure Digital Identity
Whitepaper
Verifiable Credentials for Secure Digital Identity
Verified, digital identity is a key foundation to digital transformation. Verifiable Credentials is an up-and-coming method to establish digital, verified identity in a highly secure way....
A New Era for Digital Identity in Germany
Whitepaper
A New Era for Digital Identity in Germany
The journey towards digital identity in Germany has been fraught with optimism, failure, and continued persistence. It is currently at a crossroads – consumer and private sector behavior indicate a...
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Whitepaper
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from users. Many...
Securing Non-Human Identities
Whitepaper
Securing Non-Human Identities
This KuppingerCole Whitepaper looks at issues IT managers and security strategists face trying to manage identity and access in complex multi-cloud IT infrastructures. It focuses on the challenges...
Identity for the Business: Identity Fabrics supporting the Digital Transformation
Whitepaper
Identity for the Business: Identity Fabrics supporting the Digital Transformation
Business is changing fundamentally. Digital Services are the new normal, both as autonomous business models and accompanying physical goods. The connected vehicle and the changes in transportation...
Success in Digital Finance: Doing Digital Identities Right for a Positive Digital Experience
Whitepaper
Success in Digital Finance: Doing Digital Identities Right for a Positive Digital Experience
Success in Digital Finance is not a miracle, but a combination of having the right offerings and services, and delivering a seamless and modern digital experience to the customers. Digital...
Radiant Logic and the Identity Integration Imperative
Whitepaper
Radiant Logic and the Identity Integration Imperative
Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now...
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
Whitepaper
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
In the digital age, the “C identities” of customers, consumers, citizens, and all the other types of external identities, such as tourists, are at the forefront of every digital business and...
Making IAM agile and working to the business
Whitepaper
Making IAM agile and working to the business
IAM is changing. It is no longer about workforce IAM anymore, but about managing all types of digital identities, across a wide variety of use cases. Digital identities are at the core of digital...
A Passwordless Future Begins with Credential Management
Whitepaper
A Passwordless Future Begins with Credential Management
Although it enables a Zero Trust security approach, the journey to passwordless is often challenging and may require an organization to use multiple authentication methods to meet their varied use...
Zero Trust Network Access for OT Environments
Whitepaper
Zero Trust Network Access for OT Environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security...
1 2 Next