Analyst details

Matthias Reinwarth Lead Advisor & Senior Analyst

Kaiserslautern / Germany

Experience:
25 years in IT
At KuppingerCole since 2014

Email    @mreinwarth    Profile   

Roles & Responsibilities at KuppingerCole:

Matthias Reinwarth is a Senior Analyst at KuppingerCole focusing on Identity and Access Management, governance and compliance.

Background & Education:

Matthias has consulted in the Identity Management sector since  1993. Based on a combined education in economics and IT, Matthias developed a strong background in Identity and Access Management including Identity and Access governance and compliance.

He has co-authored the first German book on directory services in 1999.

  

Areas of coverage:

  • IAM (Identity & Access Management)
  • Identity & Access governance and compliance
  • Role based entitlement models

Professional experience:

Matthias has acquired practical experiences as an IAM consultant for more than 20 years. He has been successfully working in assignments across various sectors including media, government, financial, telecommunications, logistics and industry (e.g. chemistry and pharmaceutics). His areas of expertise cover all major aspects of IAM including technology and infrastructure, data and entitlement modeling as well as IAM processes and governance.

Recent blog posts

Blog

Beyond simplistic: Achieving compliance through standards and interoperability

"There is always an easy solution to every problem - neat, plausible, and wrong.  ( H.L. Mencken ) Finally, it's beginning: GDPR gains more and more visibility. Do you also get more and more GDPR-related marketing communication from IAM and security vendors,…

Blog

GDPR and Customer Data - Eyes on the Stars and Feet on the Ground

Big data analytics is getting more and more powerful and affordable at the same time. Probably the most important data within any organisation is knowledge of and insight into its customer's profiles. Many specialized vendors target these organisations. And it is obvious: The identification…

Blog

KYC is a must, not only for compliance reasons, but what about KYE?

Providing a corporate IT infrastructure is a strategic challenge. Delivering all services needed and fulfilling all requirements raised by all stakeholders for sure is one side of the medal. Understanding which services customers and all users in general are using and what they are doing…

Blog

GDPR and the post-Brexit UK

The Brexit-Leave-Vote will have substantial influences on the economy inside and outside of the UK. But the impact will be even higher on UK-based, but also on EU-based and even non-EU based organisations, potentially posing a major threat when it comes to various aspects of business.…

Blog

Managing the customer journey

Every one of us, whether a security professional or not, is also a part-time online customer or a subscriber of digital services. Providing personal information to a service organisation, to a social media platform or a retailer is a deliberate act. This will be even more the case with the…

Blog

GDPR now!

The news is already getting quieter around the GDPR, the general data protection regulation as issued by the European Union. Several weeks ago it has been discussed in detail in many articles, and background information has been provided by many sources, including lawyers and security…


Recent research documents

Executive View

Executive View: Nexis Controle 3.0 - 72535

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entweder als eigenständige Lösung oder als ergänzende Komponente zu bestehenden…

Executive View

Executive View: Nexis Controle 3.0 - 72535

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. The integration of corporate…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Executive View

Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536

Achieving risk governance and resilience, while ensuring protection from Cyber risks by creating a standards-based process framework focusing on a risk based approach and implemented using a complementary software platform.

Advisory Note

Advisory Note: Enterprise Role Management - 70285

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the…


Recent webcasts

Webcast

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the…

Webcast

Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben

Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine…

Webcast

Creating Secure and Unified Next Generation Workspaces

Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of…

Webcast

Personal data breach and the GDPR – Prevention, Detection and Notification

The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. All systems dealing with data subject to data protection legislation (i.e. PII = personally identifiable information) will need to…

Webcast

Sicherheit in den operativen Systemen der Industrie 4.0

Unter dem Begriff Operational Technology werden die Technologien zusammengefasst, die die Transformation von Waren und Dienstleistungen betreffen, etwa in produzierenden Unternehmen oder bei Energieversorgern (ICS: Industrial Control Systems & SCADA: Supervisory Control and Data…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Connected Consumer Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

News