Analyst details

Dave Kearns Senior Analyst

Maryland / USA

Experience:
25 years in IT industry
At KuppingerCole since 2009

Email    Blog    @dak3    Profile   

Roles & Responsibilities at KuppingerCole:

Dave Kearns is a Senior Analyst at KuppingerCole. He publishes a regular newsletter covering the latest trends in the industry. Besides this he focuses especially on the future trends around authentication and authorization and therein on risk-/context-based authentication and authorization.

Background & Education:

Dave Kearns attended Carnegie Institute of Technology (now Carnegie Mellon University), leaving to help found the first on-line banking system in the US, with Pittsburgh‘s Dollar Savings Bank. He gave up computers to spend 15 years in the wine & spirits trade, only to come back to technology with the advent of local area networks in the mid 80‘s. Dave & his wife enjoy travelling and visiting their eight grandchildren.

  

Areas of coverage:

  • IdmaaS, Identity from the Cloud
  • The future of Authentication and Authorization
  • Life Management Platforms
  • Information Stewardship

Professional experience:

Dave Kearns spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq). In 1987, he was a founding SysOp of Novell‘s Novell Support Connection service on Compuserve and served as the first president of the Association of NetWire SysOps. Dave was formerly Technical Editor of Networking Solutions magazine. He‘s written, edited and contributed to a number of books on networking and is a frequent speaker before both trade and business groups.

Recent blog posts

Blog

Authentication: Multi-Factor, Adaptive and Continuous

In the 35 years we’ve had personal computers, tablets and smartphones, authentication has meant a username and password (or Personal Identification Number, PIN) for most people. Yet other methods, and other schemes for using those methods, have been available for at least the past 30…

Blog

Adaptive authentication explained

To understand what this article is about it’s important that we have an agreement on what we mean when we use the term “adaptive authentication”. It isn’t a difficult concept, but it’s best if we’re all on the same page, so to speak. First, the basics:…

Blog

Who will become the Google, Facebook or Apple of Life Management Platforms?

A Life Management Platform (LMP) allows individuals to access all relevant information from their daily life and manage its lifecycle, in particular data that is sensitive and typically paper-bound today, like bank account information, insurance information, health information, or the key…

Blog

The Right BYOx Strategy

For the past few years BYOD – Bring Your Own Device – has been a hot topic, often leading to shouting matches between IT and users who want to use their own mobile devices to access corporate assets. Lately, it’s been a more generic “BYO” (Bring Your Own) them…

Blog

New Newsletter Season to come: KC Analysts' View

It’s a new year, and there are some new changes coming to KuppingerCole, especially in the material that will come into your inbox. First, some background. After the past year or so we’ve been growing by leaps and bounds with new offices in Europe and the Asia-Pacific area as well as new…

Blog

No phishing allowed!

Happy New Year everyone! We’ve just come through what’s probably the biggest gift giving month of the year – most of you, I’m sure, unwrapped more than one present. So let me ask a couple of questions. If there was a pretty package, with no tag identifying the giver – would you open it?…


Recent research documents

Executive View

Executive View: Watchful Software RightsWatch - 70848

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and…

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Leadership Brief

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

Leadership Brief

Leadership Brief: The 5 Biggest IAM Myths - 72001

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

Advisory Note

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.


Recent webcasts


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

News