Analyst details

Martin Kuppinger Founder and Principal Analyst

Stuttgart / Germany

Experience:
25 years in IT industry

Email    Blog    @MartinKuppinger    Profile   

Roles & Responsibilities at KuppingerCole:

As Founder and Principal Analyst, Martin Kuppinger oversees the KuppingerCole research, provides own research, engages in Customer Advisories in his role as Trusted Advisor, and acts as a Member of the Board.

Background & Education:

Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is a renowned global leader in Identity Mangement and Digital Identity and is among the top 10 experts in this field globally. He is also a well-established speaker and moderator at seminars and congresses. Martin holds a Bachelor in Economics.

  

Areas of coverage:

Martin Kuppinger oversees all areas of KuppingerCole research and has outstanding expertise in areas such as cybersecurity, blockchain, and AI.

Professional experience:

His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Recent blog posts

Blog

Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One

Cyberattack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include BCM (Business Continuity Management) activities. It is time to redefine the role of CISOs. I made this point in…

Blog

Blockchain: It’s not About Technology, It Is About Use Cases

Today, the German Federal Government announced its Blockchain Strategy . What might sound as a great thing, falls short, for a number of reasons. One is that it is late: after the first hype and somewhere in the phase of disillusion. This should have happened much earlier, specifically…

Blog

Coming soon: The KuppingerCole Leadership Compass IDaaS AM

We are about to release the update of the first of two KuppingerCole Leadership Compass documents on IDaaS (Identity as a Service). We have segmented this market into two categories: Access Management (AM) Identity Governance and Administration (IGA) A fast-growing market,…

Blog

The changing role of Azure AD in Enterprise IAM Architectures

For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the cloud. For others, Azure AD was at the beginning just something that came with Microsoft Office…

Blog

Benefits of IAM in Healthcare: Compliance, Security, Profits and More

Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital Transformation. In this respect, IAM not only serves as a security technology but also as a…

Blog

Robotic Process Automation – an IAM Challenge

Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform tasks that humans executed before, companies unlock a significant potential for cost savings.…


Recent research documents

Leadership Brief

Leadership Brief: IAM for Robotic Process Automation: How to Avoid Security Challenges - 80383

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software) “robots” that perform these tasks instead of humans. Such software robots must have a…

Whitepaper

Whitepaper: CCPA: The Need for Data-Centric Security - 80136

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take appropriate action to comply with CCPA. While handling consent and opt-outs are at the forefront,…

Whitepaper

Whitepaper: Digital Transformation for Business Enablement Requires a Modern Identity Fabric - 80165

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything  to every digital service effectively, transformation initiatives will fail. Business can’t afford to implement these…

Whitepaper

Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide identity services that can be consumed by digital services. Focus is shifting from modern UIs for managing…

Executive View

Executive View: IBM Cloud Pak for Security - 80172

IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybrid and multi-cloud environments. It provides a consolidated view on security and threat information…


Recent webcasts

Webcast

Upgrade your IAM with IDaaS IGA

The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of…

Webcast

Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and…

Webcast

Martin Kuppinger - AI Already Revolutionizes the Way We Do Cybersecurity & IAM

There are many challenges business are facing when they are implementing IAM and Cybersecurity, be it role management and access controls or efficient analytics in the SOC that narrows down the incidents to put the focus of investigation on. As AI augments us increasingly in our daily live…

Webcast

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Webcast

Onboarding Your Business Partners to Your Services: B2B IAM in Practice

Virtually any business needs to grant business partners access to certain IT services. While employee IAM is a well-established discipline, where HR frequently delivers the information about joiners, movers, and leavers, and while Consumer IAM (CIAM) commonly relies on self-registration,…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News