Principal Analyst & Co-Founder

Martin Kuppinger

Martin Kuppinger is the founder and Principal Analyst responsible for the KuppingerCole research. In his 25 years of IT experience he has already written more than 50 IT-related books and is known as a widely-read columnist and author of technical articles as well as reviews and is also a well-established speaker and moderator at seminars and congresses. His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Roles & Responsibilities at KuppingerCole

As Founder and Principal Analyst, Martin Kuppinger oversees the KuppingerCole research, provides own research, engages in Customer Advisories in his role as Trusted Advisor, and acts as a Member of the Board.

Background & Education

Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is a renowned global leader in Identity Mangement and Digital Identity and is among the top 10 experts in this field globally. He is also a well-established speaker and moderator at seminars and congresses. Martin holds a Bachelor in Economics.

Areas of coverage

Martin Kuppinger oversees all areas of KuppingerCole research and has outstanding expertise in areas such as cybersecurity, blockchain, and AI.

Professional experience

His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Latest publications

Analyst Chat
Analyst Chat #206: Access Denied? The Role of Physical Access in Business Resilience
March 18, 2024
Matthias invited Martin to discuss the importance of physical access control in the context of identity and access management (IAM) and cybersecurity. Martin highlights the three layers of access control: physical access, logical access to systems, and authentication and authorization.…
Blog
SAP Identity Management End-of-Life: What’s Next?
March 13, 2024
SAP recently announced the end-of-life of their SAP Identity Management solution in 2027, with an extended maintenance period until 2030. With already being in 2024, this leaves three to at maximum six years for migrating SAP Identity Management to another solution. Three years, if avoiding…
Webinar Recording
Road to EIC: Exploring the Power of Decentralized Identity Solutions
March 07, 2024
Join us for this “Road to EIC” virtual fireside chat where we will discuss whether decentralized identity will revolutionize the way we deal with identities. Together with our guests, we will give you a taste of the much larger discussions to be held at…
Blog
EIC 2024: Don’t Miss These Highlight Sessions
March 05, 2024
Hundreds of keynotes and sessions in six tracks are awaiting you. While the agenda is already far developed, there still will be some additions. Anyway, time to have a look at the agenda. I did and selected ten favorite sessions from that long list. In the morning of June 4 th , one of…
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
February 22, 2024
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital identity help establish secure authentication methods and protocols to safeguard user information by offering…
Leadership Compass
Identity Fabrics
February 20, 2024
This report provides an overview of the market of providers of technology for building Identity Fabrics, which are comprehensive IAM solutions built on a modern, modular architecture. It provides a compass to help organizations find the solution that best meets their needs. We examine the…
Leadership Compass
Policy Based Access Management
February 19, 2024
Efficient, effective management of access controls from infrastructure to applications remains an aspiration for enterprises. The main drivers of this goal include the need for strengthening the cybersecurity posture, efficiency gains in managing access controls, the need for consistency in…
Video
IAM and Cybersecurity Insights and Trends in 2024
February 09, 2024
Martin Kuppinger was a virtual guest at SailPoint's SAILforward24 and was invited to have a chat with Matthew Mills about the industry and market, trends and his perspectives. Delve into the future of identity and access management (IAM) as Martin and Matthew discuss the profound impact…
Analyst Chat
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
February 05, 2024
What a milestone! 200 episodes of the Analyst Chat. Matthias and Martin celebrate the journey of the three years of the podcast. Dive into the evolution of cybersecurity and identity management, industry impact, memorable moments, and key insights. From this episode, we will…
Buyer's Compass
SAP Security Solutions — SecurityBridge
February 01, 2024
SAP is the leading vendor of Line of Business (LoB) applications. Their applications covering ERP (Enterprise Resource Planning) and many other user cases form the backbone of business operations in many organizations, ranging from medium-sized business to the world’s largest organizations.…
Webinar Recording
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
January 31, 2024
Join us for a compelling webinar on "Mastering Identity Security in the Age of Evolving Attack Surfaces." This session will address how to minimize human error, eliminate gaps, and overlaps within your different IAM tools, and align your security strategy with the constantly evolving…
Blog
Digital ID, Web3, and Metaverses
January 30, 2024
A while ago, I was asked how to deal with cybersecurity for Web3 and the metaverses. There is not a simple answer to this. I talked about this last year at KuppingerCole Analyst’s cyberevolution 2023, our cybersecurity conference. It’ll be a hot topic again at the upcoming…
Advisory Note
SBOM as a Core Element of Cyber Resilience
January 29, 2024
This advisory note delves into the critical intersection of Software Bill of Materials (SBOM) and cyber resilience, exploring the role of SBOM in fortifying digital landscapes against evolving cyber threats. With a focus on recent incidents, regulatory developments, and the intricate web of…
Advisory Note
Patch Management: Zero Day Risks
January 29, 2024
This advisory note explores Patch Management as a cornerstone of cyber resilience in the contemporary threat landscape. Delving into the evolution of strategies, it navigates the reader through the delicate balance between swift deployment and meticulous testing. Focusing on the urgency…
Webinar Recording
Beyond Secrets Management: Transforming Security in the Digital Age
January 26, 2024
Join security and identity experts from KuppingerCole Analysts and Entrust to reveal the intrinsic and symbiotic relationship between key management and secrets, offering visibility, compliance assurance, and effective risk management. Learn the importance of safe, repeatable processes…
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
January 22, 2024
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to coexistence. Stay tuned for upcoming trends and predictions!
Video
NIS2: What Everyone Needs to Consider
January 11, 2024
The upcoming EU regulation, NIS2, moves closer and organizations will need to act in order to close gaps. Anders Askåsen from Okta and Martin Kuppinger discuss the impact on critical infrastructure organizations and the implications for identity management, particularly in…
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
January 08, 2024
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into persistent issues, innovations, and an outlook on trends for 2024 in the realms of…
Webinar Recording
IGA and LoB Application Access Management: What We’ll See in 2024
December 15, 2023
In this webinar, you will learn about The current state of IGA and Application Access Management convergence Trends impacting these areas: Generative AI, Risk Based Access Controls, Automation & More The potential and challenges of convergence New capability areas to look…
Leadership Compass
Email Security
December 14, 2023
This report provides an overview of the Email Security market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Email Security…
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
December 13, 2023
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of the business. A different approach is needed to introduce modern identity governance and…
Analyst Chat
Analyst Chat #196: AIdentity - The Crucial Link Between AI and Identity
November 27, 2023
In this episode, Matthias and Martin explore the evolving role of AIs in business processes. AIs are becoming significant actors, representing human identities in tools like chatbots and even functioning autonomously. Martin underscores the importance of traceability, access management,…
Webinar Recording
Are You Prepared for the True AD Disaster?
November 24, 2023
In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events triggering the need for directory services DR Planning for directory services / Microsoft AD…
Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
November 16, 2023