Analyst details

Matthias Reinwarth Lead Advisor, Senior Analyst & IAM Practice Director

Kaiserslautern / Germany

Experience:
25 years in IT
At KuppingerCole since 2014

Email    @mreinwarth    Profile   

Roles & Responsibilities at KuppingerCole:

As Lead Advisor & Senior Analyst at KuppingerCole, Matthias oversees the KuppingerCole advisory team, acts as lead advisor in various customer advisories and also provides research in his areas of expertise.

Background & Education:

Based on a combined education in economics and IT, Matthias has been working as a trusted advisor and consultant for customers since 1993.

  

Areas of coverage:

  • IAM (Identity & Access Management)
  • Identity & Access governance and compliance
  • All areas of KuppingerCole expertise

Professional experience:

Matthias has acquired profound practical experiences in IT as a consultant and advisor for more than 25 years. He has been successfully working in assignments with a wide range of customers covering many sectors including media, government, financial, telecommunications, logistics, automotive and other industries. He has co-authored the first German book on directory services in 1999 and has since 1994 authored many publications, including articles, research documents, webinars and blog posts.

Recent blog posts

Blog

As You Make Your KRITIS so You Must Audit It

Organizations of major importance to the German state whose failure or disruption would result in sustained supply shortages, significant public safety disruptions, or other dramatic consequences are categorized as critical infrastructure (KRITIS) . Nine sectors and 29 industries…

Blog

Stell Dir vor, es ist KRITIS und keiner geht hin

„ Kritische Infrastrukturen (KRITIS) sind Organisationen oder Einrichtungen mit wichtiger Bedeutung für das staatliche Gemeinwesen, bei deren Ausfall oder Beeinträchtigung nachhaltig wirkende Versorgungsengpässe, erhebliche Störungen der öffentlichen…

Blog

Cognitive! - Entering a New Era of Business Models Between Converging Technologies and Data

Digitalization or more precisely the "digital transformation" has led us to the "digital enterprise". It strives to deliver on its promise to leverage previously unused data and the information it contains for the benefit of the enterprise and its business. And although these two…

Blog

PSD2 in a Europe of Small Principalities

Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being tightened. The aim is to better protect the customers of e-commerce services.   This sounds…

Blog

How Do You Protect Your Notebook?

The other day I found a notebook on a train. It was in a compartment on the seat of a first-class car. The compartment was empty, no more passengers to see, no luggage, nothing. And no, it wasn't a laptop or tablet, it was a *notebook*. One made of paper, very pretty, with the name of a…

Blog

Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures

Requirements for - and context of - the future Identity Fabric.  We call it Digital Transformation for lack of a better term, but it consists of much more than this buzzword is able to convey. Digital technologies are influencing and changing all areas of a company, and this is…


Recent research documents

Leadership Brief

Leadership Brief: Identity Fabrics - Connecting Anyone to Every Service - 80204

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together and how value is delivered to customers. Ever-changing application and infrastructure architectures reflect the…

Whitepaper

Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall…

Whitepaper

Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant…

Leadership Brief

Leadership Brief: Access Reviews Done Right - 80195

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always  only the minimum amount of access rights, which are necessary to perform associated tasks. In light of compliance,…

Executive View

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80036

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft® SharePoint™, Office 365™) gespeichert sind durch Virtualisierung, Verschlüsselung und Datenfragmentierung. Sichere und…


Recent webcasts

Webcast

Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Webcast

Regaining Control With IGA Solutions

Role management remains a pivotal challenge in many companies. Regulations (such as BAIT and VAIT in Germany) require companies not only to implement an IGA solution (Identity Governance & Administration), but also a uniform authorization concept and its regular review, including the…

Webcast

Matthias Reinwarth - The wrong click: it can happen to anyone of us

The wrong click: it can happen to anyone of us

Webcast

CCPA vs. GDPR: An Overview on Similarities and Differences

Over the last few years, the world has witnessed an increasing number of data breaches involving the credentials and PII of employees, citizens, and consumers. We've all experienced breach fatigue and/or been impacted by these losses.

Webcast

Matthias Reinwarth - CIAM as a Building Block of an Online-Success Story

Consumer Identity and Access Management (CIAM) encompasses many aspects. On the one hand, it is about optimizing the usability of services through technologies and practices to make it easier and secure for users sign up for a service. For the service providers, CIAM is all about lifecycle…


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News