Analyst details

Richard Hill Senior Analyst

Seattle / USA

Email   

Background & Education:

Richard Hill is an Analyst at KuppingerCole.  He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He is internationally known for his work on standards committees and programs such as OASIS XACML Technical Committee, Trusted Computing Group (TCG) Metadata Access Point (MAP) Working Group, and the Transglobal Secure Collaboration Program (TSCP). Richard has co-authored several technical publications, given webinars and spoken at security events. He holds a Master's degree in Computer Science and a Bachelor's degree in Engineering.

    

Areas of coverage:

  • Identity & Access Management

  • Multi-factor authentication

  • Attribute Based Access Controls

  • Identity Registration, Proofing, and Issuance

Recent blog posts


Recent research documents

Buyer's Compass

Buyer’s Compass: Unified Endpoint Management

Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This…

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market.

Buyer's Compass

Identity Governance & Administration (IGA)

Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intelligent features. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors,…

Executive View

SecurEnds Credential Entitlement Management

Due to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. SecurEnds Credential Entitlement Management (CEM) simplifies user entitlement activities through automation and…

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables organizations to take action on that data to meet privacy, security, and governance requirements by…


Recent videos

Webcast

Identity for All – Not for the Few

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and…

Webcast

The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Webcast

Gain a Unified Business View With Enterprise Identity Management

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as…

Webcast

KuppingerCole’s Evaluation of Leading Vendors in the Identity API Platforms Market

Many different factors are driving Digital Transformation in the market today. One factor is the change in how businesses interact with their customers. Another factor is more on the technical side that addresses the implementation of new Digital Services that have become more complex due…

Webcast

Security in the Age of the Hybrid Multi Cloud Environment

The way is clear for the hybrid multi-cloud environment! With an increase in cloud services, the mitigation of cyber risks within such environments becomes paramount. The value of traditional security tools for cloud applications is very limited and the misconfiguration of cloud platforms…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News