Analyst/Advisor details

Martin Kuppinger Member of the Board

Stuttgart / Germany

25 years in IT industry

Email    Blog    @MartinKuppinger    Profile   

Roles & Responsibilities at KuppingerCole:

As Founder and Principal Analyst, Martin Kuppinger oversees the KuppingerCole research, provides own research, engages in Customer Advisories in his role as Trusted Advisor, and acts as a Member of the Board.

Background & Education:

Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is a renowned global leader in Identity Mangement and Digital Identity and is among the top 10 experts in this field globally. He is also a well-established speaker and moderator at seminars and congresses. Martin holds a Bachelor in Economics.


Areas of coverage:

Martin Kuppinger oversees all areas of KuppingerCole research and has outstanding expertise in areas such as cybersecurity, blockchain, and AI.

Professional experience:

His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Recent blog posts


The European Identity & Cloud Conference celebrates its 15th edition – time for looking back

As one of the founders of KuppingerCole Analysts, I’m also an EIC (European Identity & Cloud Conference) veteran. Looking back to the start in 2007, a lot has changed since then, but the core of EIC is what it has been from the very beginning: A conference that provides both…


Software Supply Chain Risks: How to re-assess when there is a ban?

Over the past 16 months, Software Supply Chain Risks have risen to a top concern of CISOs, caused by several software supply chain attacks as well as major risks induced by vulnerabilities in extensively used standard software components, specifically Log4j/Log4shell. Understanding and…


Where IAM trends are set: Everything around Identity & Privacy at EIC 2022

Anyone who has attended our European Identity & Cloud Conference (EIC) in the past 15 years will know that this is the leading event when it comes to current and future trends in  IAM and privacy (not to mention cloud security or cybersecurity). EIC is about the union of analyst…


Accelerating Your Digital Journey

With increasing security standards, companies are struggling to stay up to date. Efficiency is required but integrating new standards into an existing system is time-consuming. Tatsuo Kudo, from Authlete, and Martin Kuppinger discussed how an excellent time-to-value is possible. Watch…


No Security Without Confirmation

Today's organizations require a tool for authenticating, encrypting data, or signing documents to ensure security and trust. Konstantin Krasovsky, from Indeed Identity, and Martin Kuppinger discussed what challenges lay ahead for organizations. Watch the interview now to find out more.


Identity Fabrics: Developing your IAM Program from Vision to Strategy

Are you bothered by the ubiquitous dichotomy between delivering to urgent demand and delivering to a strategy for your organization’s IAM (Identity & Access Management)? The one good news on that is that you are not alone. But there is more good news: You can get both, without…

Recent videos


Making Zero Trust a Reality: Basing Decisions on Valid Identity Data

Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables…


Modern Identity Management: Security Without Compromising Usability

In the digital age, effective customer, partner, and employee identity and access management (IAM) is essential to enable secure online transactions, collaboration, and other interactions. But finding the right balance between security and usability has traditionally been challenging and…


Passwords: Dead, but Not Gone

Organizations are looking to eliminate passwords because they are costly and difficult to manage, they result in poor user experiences, and they are easily compromised, enabling 81% of breaches. But despite these efforts, many passwords remain unsecured. These passwords can still be…


Analyst Chat #119: Composable Enterprises

Martin Kuppinger gives Matthias one of these rare insights into the process of creating and delivering the next great opening keynote of an event. With EIC 2022 being already in sight in May 2022 in Berlin, they talk about the composable enterprise and more perceived or actual buzzwords,…


Zero Trust: Putting Theory Into Practice

Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective. However, moving from theory into practice can be challenging unless you start with a key element like effective endpoint management.