Analyst details

Anmol Singh Lead Analyst

Singapore

Experience:
15 years in IT industry

Email    Blog   

Anmol Singh is a lead analyst at KuppingerCole (Asia) Pte Ltd. headquartered in Singapore. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting, service delivery and program management across a wide array of industries. A well-known and recognized speaker at several industry events, Mr. Singh is frequently featured in regional and international media on cybersecurity and identity and access management topics.

Roles & Responsibilities at KuppingerCole:

Based in Singapore, Mr. Singh provides IAM research, advisory and consulting in the areas of user authentication, access management, identity governance and privileged access management. With a focus on regional cybersecurity trends and adoption patterns, Mr. Singh also offers insights into IAM program management, roadmap development, best implementation practices and guidelines

Background & Education:

He has served in various technical, consulting and managerial capacities at American Express, Fidelity Investments, Citibank, VISA and UBS. His primary responsibilities included engineering, policy design, program management, operational and procedural guidance, as well as technology and vendor selection within identity and access management.

Mr. Singh holds Bachelor of Engineering in Electronics and Communication from Institute of Engineering & Technology, Agra University, India.

   

Areas of coverage:

  • Authentication and Authorization
  • Identity Federation
  • Access Management and Single Sign-On
  • Identity Governance and Lifecycle Management
  • Privileged Access Management
  • Consumer IAM
  • IoT Security

 

Recent blog posts


Recent research documents

Advisory Note

Buyer’s Guide: Identity-as-a-Service (IDaaS) - 71526

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes.…

Leadership Compass

Leadership Compass: Identity Governance & Administration - 71135

Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors providing mature capabilities around the core IGA functions. This Leadership Compass provides insights into…

Executive View

Executive View: CA Privileged Access Management Suite - 79047

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large…

Leadership Compass

Leadership Compass: Access Governance & Intelligence - 71145

Leaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in…

Executive View

Executive View: ARCON Privilege Manager - 70950

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support…


Recent webcasts

Webcast

Panel: CIAM Strategy Best Practice

When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a…

Webcast

Patients, People and Things - Managing Identities in Healthcare

Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all…

Webcast

Securing your Hybrid IT Environment with Privileged Access Management

As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications in addition to existing ones. The conventional approaches of managing privileged access using…

Webcast

Best Practices of Privileged Identity Management

Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.

Webcast

Cloud IGA: Built for Hybrid Reality

Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the…