Analyst details

Matthias Reinwarth Lead Advisor & Senior Analyst

Kaiserslautern / Germany

Experience:
25 years in IT
At KuppingerCole since 2014

Email    @mreinwarth    Profile   

Roles & Responsibilities at KuppingerCole:

As Lead Advisor & Senior Analyst at KuppingerCole, Matthias oversees the KuppingerCole advisory team, acts as lead advisor in various customer advisories and also provides research in his areas of expertise.

Background & Education:

Based on a combined education in economics and IT, Matthias has been working as a trusted advisor and consultant for customers since 1993.

  

Areas of coverage:

  • IAM (Identity & Access Management)
  • Identity & Access governance and compliance
  • All areas of KuppingerCole expertise

Professional experience:

Matthias has acquired profound practical experiences in IT as a consultant and advisor for more than 25 years. He has been successfully working in assignments with a wide range of customers covering many sectors including media, government, financial, telecommunications, logistics, automotive and other industries. He has co-authored the first German book on directory services in 1999 and has since 1994 authored many publications, including articles, research documents, webinars and blog posts.

Recent blog posts

Blog

Intelligente Governance jenseits von Auditoren und regulatorischen Anforderungen

Es kann viele Gründe geben, warum ein Unternehmen eine Initiative zur Verbesserung seiner Informationssicherheit ergreift. Es gibt jedoch einen spezifischen Grund, der sich immer wieder wiederholt: "Weil die Auditoren das sagen, müssen wir....". Die Realität und die…

Blog

Intelligent Governance Beyond Auditors and Regulatory Requirements

There can be many reasons why a company takes an initiative to improve its information security. However, there is one specific reason that repeats itself time and again: "Because the auditors say that, we have to..." The reality and the resulting logic have so far often been as follows:…

Blog

Insight, Control and Automation for Intelligent Security Technologies Within Virtualized Environments

Traditional endpoint and infrastructure security approaches are tackling changes to OS, application and communication by monitoring these through dedicated solutions installed as agents onto the actual system. Often these solutions search for specific violations and act upon predefined…

Blog

BAIT: Clearer Guidelines as a Basis for More Effective Implementation

If legal laypersons (as I am) read legal texts and regulations, they often miss clear and obligatory guidelines on how to implement them in practice. This is not least due to the fact that laws are generally designed to last and are not directly geared to concrete measures. This type of…

Blog

Make Things Happen Rather Than Watch Things Happen With Vendor-Provided Compliance Solutions

In May 2017, my fellow KuppingerCole analyst Mike Small published the Executive Brief research document entitled “Six Key Actions to Prepare for GDPR” (then and now free to download). This was published almost exactly one year before the GDPR takes full effect and outlines six…

Blog

Please! No More GDPR Related Blog Posts!

You have heard it all before: May 25th, 2018, enormous fines, "you have to act now", the "right to be forgotten", DPO and breach notification. Every manufacturer whose marketing database contains your data will send you information, whitepapers, webinars , product information and…


Recent research documents

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 79050

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des…

Leadership Brief

Leadership Brief: Mit den VAIT zu einer transparenteren Versicherungs-IT - 79081

Mit dem im Juli 2018 final vorgelegten Dokument „Versicherungsaufsichtliche Anforderungen an die IT“ (VAIT) gibt die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) Versicherungsunternehmen konkretere Vorgaben für die Umsetzung ihrer Geschäftsprozesse…

Executive View

Executive View: United Security Providers Secure Entry Server - 79040

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and Identity Federation capabilities for complex use cases and hybrid on-premises and cloud solutions.

Executive View

Executive View: TechDemocracy Intellicta - 70362

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience and protection from cyber threats through the deployment of a standards-based risk governance framework.

Advisory Note

Architecture Blueprint: Access Governance and Privilege Management - 79045

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and…


Recent webcasts

Webcast

Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter. But things have changed substantially: The traditional security perimeter is…

Webcast

Managing Authentication and Access for Different Identities in Hybrid Environments

The Digital Transformation is driving enterprises in all geographies and throughout most verticals to become open and connected. These enterprises need to digitally engage with their customers, to technologically empower and mobilize their employees, to optimize their current business…

Webcast

Holistic Approach to Cyber Risk Governance in the GDPR Era

Pressured by the Digital Transformation, corporate networks are becoming increasingly complex, spanning across multiple geographical locations and technology platforms. Unfortunately, even as companies are becoming more open to the outside world, different business units within the same…

Webcast

Understanding the GDPR Impact on Corporate IT

Addressing GDPR requirements is a complex undertaking that requires coordination between different departments including but not limited to IT, security, legal, human resources, marketing and communications. Translating the legal requirements into concrete organizational, technical and…

Webcast

Unstructured Data – A Blind Spot for GDPR Compliance

GDPR will apply to all types of systems where personal data resides. That goes beyond traditional database, CRM or Identity Management systems: Emails, spreadsheets and text documents, PDFs and images, web pages and data collected from social media are only a few examples, and they are…