Next Generation IAM

  • TYPE: Combined Session DATE: Thursday, May 07, 2015 TIME: 17:00-18:00 LOCATION: ALPSEE


In January, Anthem Healthcare, the US’s second-largest health insurer, reported that the personal records of as many as 80 million individuals were compromised. Many so-called "security gurus" quickly called out the company for two flaws that were felt to be the major causes of the breach. The gurus were wrong. Kuppinger-Cole analyst Dave Kearns will guide you through the most likely vector for the attack, why the gurus’ recommendations wouldn’t have stopped the attack and also tell you the two things that could have prevented this breach


Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Real Time Security Intelligence is one of the red hot topics in Information Security these days. There are a growing number of solutions that allow analysis of security-related incidents in real time, but can also detect anomalies in what is happening in the network.

We also observe strong innovation in the field of IAM (Identity and Access Management) and IAG (Identity and Access Governance), moving from preventive-mode to detective-mode incorporating responsive solutions as well as moving from scheduled recertifications to real-time analysis of user behavior. While some of the new offerings focus particularly on high-risk users such as privileged users, others have a broader scope covering all types of users.

What we are facing is the next generation of IAM solutions. While the first generation has seen meta directory services and identity provisioning, focusing on the preventive aspect, the second generation has been about detection – but far from real time, only occasionally, months after something might have gone wrong. Access Intelligence solutions, which have been available for some two or three years now, were the initial step into this new generation of IAM. However, today with anomaly detection, user activity monitoring, and user behavior analytics, we are entering the next level of IAM.

Combining this with other areas of risk-based, adaptive access, you can move your IAM to the next level. Integrating these approaches with adaptive authentication and authorization, real time security intelligence, or even software defined infrastructures opens the door for achieving a significantly higher level in information security and risk mitigation.

Martin Kuppinger in this session will unveil the new potential of the next generation of IAM solutions in the context of real time security intelligence, and will also discuss how this will affect common IAM deployment approaches.

Don’t miss this groundbreaking session.


Log in to download presentations:  


Session Links


European Identity & Cloud Conference 2015

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 05 - 08, 2015 Munich, Germany