Analyst details

Graham Williamson Director APAC / Senior Analyst

Brisbane / Australia

Experience:
25 years in IT industry
At KuppingerCole since 2013

Email    Profile   

Roles & Responsibilities at KuppingerCole:

Graham is a director of KuppingerCole (Asia Pacific) Pte Ltd headquartered in Singapore.

He is an Analyst in the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy.

Background & Education:

Graham has consulted in the Identity Management sector for 15 years. He is the author of the book “Identity Management: A Primer”.

Graham holds a bachelor of Applied Science degree from the University of Toronto and an MBA degree from Bond University.

     

Areas of coverage:

  • Identity and Access Management
  • Federated Authentication
  • Entitlements Management
  • Dynamic Authorisation Control
  • Attestation and Governance
  • Privacy and Resource Protection

Professional experience:

Graham has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents.

Graham Williamson is a director of KuppingerCole (Asia Pacific) Pte Ltd headquartered in Singapore.

Graham has practical experience in the identity management and access control industry having completed assignments in the academic, government and large corporate industry sectors across three continents. He is an Analyst in the areas of Identity-as-a-Service, Dynamic Authorisation Control and Privacy.

Recent blog posts

Blog

Cybersecurity is in Crisis

Intel Security recently released an in-depth survey of the cybersecurity industry, looking at causal agents of the low availability of people with training and professional accreditation in computer security. The global report titled “Hacking the Skills Shortage” concludes:…

Blog

Comment: Know and Serve Your Customer

‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’ processes to ensure that all bank accounts could be traced back to the entities that owned them.…

Blog

Stack creep - from the network layer to the application layer

Last year saw an unprecedented interest in protection of corporate data. With several high-profile losses of intellectual property organisations have started looking for a better way. For the past 30 years the bastion against data loss has been network devices. We have relied on routers,…

Blog

IoT in industrial computer systems (ICS)

IoT, the Internet of Things, covers a wide range of technologies. My Fitbit e.g. is an IoT device, it connects to my smartphone which formats the data collected on my movements. Also, vehicles that communicate with diagnostic instruments and my home thermostat that I can control via the…

Blog

Adaptive Policy-based Access Management (APAM)

Attribute-based Access Control (ABAC ) has been with us for many years; it embodies a wide range of systems that control access to protected resources based on attributes of the requesting party. As the field has developed there are three characteristics that are most desirable in an ABAC…

Blog

OT, ICS, SCADA – What’s the difference?

Operational Technology (OT) refers to computing systems that are used to manage industrial operations as opposed to administrative operations. Operational systems include production line management, mining operations control, oil & gas monitoring etc. Industrial control systems…


Recent research documents

Executive View

Executive View: AWS Identity and Access Management - 79048

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now provides easy-to-use facilities to allow customer to better leverage their identity management environment.

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their…

Vendor Report

Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513

As a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Advisory Note

Advisory Note: Plant Automation Security - 71560

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are…


Recent webcasts