Analyst details

John Tolbert Lead Analyst

Seattle / USA

Email    Blog    @john_tolbert_kc    Profile   

Background:

John is a senior analyst at KuppingerCole, with internationally recognized expertise in cybersecurity and identity management. John has consulted for national governments, and has 20 years of experience working in Aerospace, Defense, Manufacturing, and Financial industries.  John was honored as an OASIS Distinguished Contributor in 2014, and as an Associate Technical Fellow at Boeing in 2011.  In addition to working with OASIS, he has also participated in Kantara Initiative, Transglobal Secure Collaboration Program (TSCP), the FIDO Alliance.  He has numerous technical security publications, and is a frequent speaker at cybersecurity and identity management events.

 

Areas of expertise:

  • Identity and access management
  • Attribute-based access controls
  • Identity federation
  • Mobile security
  • Data classification and Data Loss Prevention
  • Cloud-based Marketing Technologies
  • B2C & B2B 
  • Marketing Automation

Recent blog posts

Blog

GDPR vs. PSD2: why the European Commission must eliminate screen scraping

The General Data Protection Regulation (GDPR) and Revised Payment Service Directive (PSD2) are two of the most important and most talked about technical legislative actions to arise in recent years.  Both emanate from the European Commission, and both are aimed at consumer protection.…

Blog

At the Intersection of Identity and Marketing

Digital Transformation is driving a diverse set of business initiatives today, including advanced marketing techniques, creating new consumer services, acquiring better customer information, and even deploying new identity management solutions.  As organizations discover new and…

Blog

Don’t Fall Victim to Ransomware (Links to Free Tools)

Ransomware attacks have increased in popularity, and many outlets predict that it will be a $1 billion-dollar business this year.  Ransomware is a form of malware that either locks users’ screens or encrypts users’ data, demanding that ransom be paid for the return of…

Blog

PSD2 RTS Final Draft: The good and the not-so-good

The European Banking Authority released the final draft of the Regulatory Technical Specifications for PSD2 this week.  It contains several improvements and clarifications, but there are still a few areas that fall short of industry expectations. After the release of the initial…

Blog

The Importance of Consent Management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed…

Blog

Consumer Identity Summit 2016 - Summary

KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well attended, and featured excellent expert speakers from all across the globe.  The popularity of…


Recent research documents

Executive View

Executive View: Gigya Identity Enterprise - 70299

Gigya provides a complete solution for  Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service  functionality for enterprise customers.

Leadership Brief

Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.

Leadership Brief

GDPR and PSD2: Challenges and opportunities for CIAM

GDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations. This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst…

Executive View

Executive View: PingIdentity’s PingDirectory - 70294

PingDirectory provides a flexible and scalable base for IAM and customer IAM.  With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs.

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…


Recent webcasts


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

News