Analyst/Advisor details

Richard Hill Senior Analyst

Seattle / USA

Email   

Background & Education:

Richard Hill is an Analyst at KuppingerCole.  He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He is internationally known for his work on standards committees and programs such as OASIS XACML Technical Committee, Trusted Computing Group (TCG) Metadata Access Point (MAP) Working Group, and the Transglobal Secure Collaboration Program (TSCP). Richard has co-authored several technical publications, given webinars and spoken at security events. He holds a Master's degree in Computer Science and a Bachelor's degree in Engineering.

    

Areas of coverage:

  • Identity & Access Management

  • Multi-factor authentication

  • Attribute Based Access Controls

  • Identity Registration, Proofing, and Issuance

  • Identity Governance and Administration

  • Unified Endpoint Management

  • IoT, IIoT

Recent blog posts


Recent research documents

Executive View

Kapstone Autonomous IGA

Due to the quickly changing landscape of IT environments, the complexity of compliance requirements, and the need to shorten application onboarding time, IGA solutions adapt through identity and access intelligence, automation, and flexibility. Kapstone addresses these challenges with its…

Leadership Compass

Identity Governance & Administration 2021

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the…

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. NRI Secure's Uni-ID Libra, with a focus on the Japanese market, continues to provide innovative features within its…

Executive View

Saviynt Enterprise Identity Cloud

Enterprise IT organizations need Identity solutions to protect data, applications, and third-party access to critical IT infrastructure and services. The Saviynt Enterprise Identity Cloud (EIC) takes an all-encompassing approach to these different aspects of identity, delivering an…

Executive View

Cloudentity Authorization Control Plane

IT organizations often contend with information from multi-security services located on-premises, cloud, and even multi-cloud environments that can be inconsistent, increasing attack risks if not adequately addressed. Cloudentity Authorization Control Plane offers a contextual dynamic…


Recent videos

Video

Digital Trust: Critical to Digital Business Success

2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. It also forced many organisations to overcome long-standing reservations about trusting their employees to work from…

Video

Richard Hill: Identity Governance and Administration - Where Does IGA Fit In

Video

Identity for All – Not for the Few

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and…

Video

The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Video

Gain a Unified Business View With Enterprise Identity Management

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as…