Analyst details

Martin Kuppinger Member of the Board

Stuttgart / Germany

Experience:
25 years in IT industry

Email    Blog    @MartinKuppinger    Profile   

Roles & Responsibilities at KuppingerCole:

As Founder and Principal Analyst, Martin Kuppinger oversees the KuppingerCole research, provides own research, engages in Customer Advisories in his role as Trusted Advisor, and acts as a Member of the Board.

Background & Education:

Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is a renowned global leader in Identity Mangement and Digital Identity and is among the top 10 experts in this field globally. He is also a well-established speaker and moderator at seminars and congresses. Martin holds a Bachelor in Economics.

  

Areas of coverage:

Martin Kuppinger oversees all areas of KuppingerCole research and has outstanding expertise in areas such as cybersecurity, blockchain, and AI.

Professional experience:

His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Recent blog posts


Recent research documents

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigen

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben sind komplex und schwerfällig. Bestehende IGA-Lösungen kommen dadurch an ihre Grenzen und werden als…

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Autonomous Identity

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex and cumbersome. As a result, existing IGA solutions are faltering. Dynamic businesses require new approaches…

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP S/4HANA. Identifying, analyzing, and…

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, customers can converge existing IAM siloed solutions, that can then be operated by Simeio as an MSP or as an IDaaS.…

Whitepaper

Protecting Intellectual Properties while enabling business agility with R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run industrial espionage – such as e.g. Life Sciences, Pharma, or BioTech – must enable information…


Recent videos

Webcast

KuppingerCole Analyst Chat: Applying The Zero Trust Principle To The Software Supply Chain

Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins Matthias to talk about the importance of extending Zero Trust to cover software security, for…

Webcast

Where to Start Your IAM Modernization Journey

Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex. In this video blog post, Martin gives practical advice on…

Webcast

The 3 Pillars of Access Control Optimization: IAM, GRC and User Monitoring

Identity & Access Management (IAM) tools are used to automate processes of user lifecycle management and control user access permissions from a single point. We can improve these processes by using conditions and policies, and eventually implementing rule-based access controls (RBAC)…

Webcast

Managing Azure AD – Regardless of How You Use It

Microsoft Azure Active Directory (Azure AD) has gained widespread adoption. Coming with Microsoft Azure Cloud as well as Microsoft 365 (i.e. Office 365), it appears in many organizations just because of decisions made outside of the IAM team.

Webcast

Martin Kuppinger: Where AI, Industrial IoT, Consumer IoT, Blockchain, Decentralized Identity, and Edge Computing Meet

Cybernetix Is What Makes Things Move, From Production to Modern 5G Based Public Infrastructures Cybernetix is not a new discipline. However, it appears being more important than ever before. It is ubiquitous when it comes to AI (Artificial Intelligence). And when AI meets industrial…