Analyst/Advisor details

Richard Hill Lead Analyst

Seattle / USA

Email   

Background & Education:

Richard Hill is an Analyst at KuppingerCole.  He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He is internationally known for his work on standards committees and programs such as OASIS XACML Technical Committee, Trusted Computing Group (TCG) Metadata Access Point (MAP) Working Group, and the Transglobal Secure Collaboration Program (TSCP). Richard has co-authored several technical publications, given webinars and spoken at security events. He holds a Master's degree in Computer Science and a Bachelor's degree in Engineering.

    

Areas of coverage:

  • Identity & Access Management

  • Multi-factor authentication

  • Attribute Based Access Controls

  • Identity Registration, Proofing, and Issuance

  • Identity Governance and Administration

  • Unified Endpoint Management

  • IoT, IIoT

Recent blog posts

Blog

In the Midst of Change, Somethings Remain the Same

Industry 4.0 is the fourth revolution in manufacturing. I won't bore you with the details of the prior iteration or versions and how we got where we are today, only that Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. Smart or intelligent…

Blog

IT Security Transformation Can Come from Unexpected Places

The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the unforeseen tsunami waves of network traffic and flexible enough to address cyber-attacks in areas least…

Blog

IGA in a World of Zero Trust

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always verifies .” This traditionally meant verifying Who has access to What resource. In the…

Blog

When Cyber "Defense" is no Longer Enough

The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments, the number of cyber-attacks is growing. The types and sophistication of these attacks are…

Blog

Web Access & Federation

An organization’s need to support communication and collaboration with external parties such as business partners and customers is just as an essential technical foundation today as it has been in the past. Web Access Management and Identity Federation are two vital and inseparable…


Recent videos

Video

Analyst Chat #125: Leadership Compass Access Management

Access Management refers to the group of capabilities targeted at supporting an organization's access management requirements traditionally found within Web Access Management & Identity Federation solutions, such as Authentication, Authorization, Single Sign-On, Identity Federation.…

Video

Understanding the Unified Endpoint Management (UEM) Market

Business IT environments continue to undergo rapid and continual change as businesses seek to improve productivity and efficiency by adopting cloud-based services and enabling employees to work on a wide range of mobile devices. But this has in turn created opportunities for attackers.

Video

Digital Trust: Critical to Digital Business Success

2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. It also forced many organisations to overcome long-standing reservations about trusting their employees to work from…

Video

Richard Hill: Identity Governance and Administration - Where Does IGA Fit In

Video

Identity for All – Not for the Few

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and…