Identity Management

Video

IAM Projects Done Right

Delivering effective IAM is not always easy, and around half of IAM projects run into difficulties and stall. While opting for IAM that is delivered as a service is a potential solution, not all offerings are equal. Finding a service with the right combination of well-integrated…

Blog

Trending at EIC 2022: Identity Proofing & Fraud Reduction

Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing & fraud reduction. These are two closely related topics, with fraud covering not only the initial…

Blog

Trending at EIC 2022: The Return of Policy-Based IAM

Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My #2 on the list of outstanding topics at EIC 2022, is the return of policy-based IAM. More than…

Blog

Trending at EIC 2022: Integrating Decentralized & Centralized Identity

At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10th to 13th, some topics stood out from all the vibrant discussions and enlightening presentations. My #1 topic is the emergence of integration between decentralized identity (DID) -…

Video

Effective Identity Access Governance in Hybrid SAP Environments

Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them…

Video

Attendees at the European Identity and Cloud Conference 2022

Video

Impressions from the European Identity and Cloud Conference 2022

Video

In Transition - From Platforms to Protocols

Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity technology ecosystem is in flux. What will emerge? OIDC? OIDC/SIOP? DIDComm? Join us for a discussion…

Video

Trust is a Team Sport, and Like all Good Sports it has Rules

Trust is not just technical, and it’s not just derived from a process or an organisation. The need for Trust is also variable based on the risk involved in a transaction or the risk appetite of the service provider. Sometimes trust is almost irrelevant. Digital doesn’t make…

Video

Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security! IAM-related experiences from the automobile and home appliances sector.

Video

Insights from India’s Data Empowerment & Protection Architecture

Video

Cyber-Securing the Digital Industry

Video

Enabling Digital Identity Ecosystems

Video

Panel | Decentralized, Global, Human-Owned. The Role of IDM in an Ideal (If there is One) Web3 World

The Internet had been created without an identity layer, leaving it to websites and applications to take care for authentication, authorization, privacy and access. We all know the consequences - username and password still being the dominant paradigm and, even more important, users not…

Video

Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment

Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect to the Service and/or Deployment Model they implement. Users are thus lacking guidance for…

Video

Solving "The Right to be Forgotten" for Blockchains

"The Right to be Forgotten" presents a conundrum to builders of blockchain solutions, because the focus of most blockchains is to create an indelible, permanent record. This makes "The Right to be Forgotten" appear irreconcilable with blockchains. I will present a solution to "The Right to…

Video

Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms

In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a pluralistic digital society & business world where size would not be the only thing that matters.…

Video

Privacy = Data Protection + X

Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel we will try to find answers on how we can translate privacy into the (metaverse) future.

Video

Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds

Video

Global AI Ethics and Governance

Recent years have seen significant Artificial Intelligence (AI) development across all domains of business and society. This panel aims to bring attention to societal impacts of AI – benefits and challenges, by bringing thought leaders and practitioners from different parts of the…

Video

Closing Keynote & Announcement of EIC 2022 Gamification Winners

Video

Inside the Mind of a Hacker – From Initial Access to Full Domain Admin

Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and moves laterally to identify and exfiltrate your critical data. He will share insights into how…

Video

Navigating the OT World – Selecting a Solution to Suit

Video

Enabling MFA and SSO for IoT and Constrained Devices

Video

OT Patch Management Best Practices

Video

The impact of decentralized identity solutions in the marketplace, insights and lessons

Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s interested, why, and what we learned building a series of solutions for global enterprises in…

Video

Knowing differences between Cyber Resistance and Cyber Resilience

You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this presentation, we will be understanding the differences between Cyber Resistance and Cyber resilience,…

Video

"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?

Video

Reducing the Species in your Cybersecurity Zoo

Video

How to innovate your Identity Governance and Administration program

The Holcim EMEA digital center has received the EMEA innovation award in 2021 from their IGA program.

Video

Privacy Enhancing Mobile Credentials

The Kantara Initiative is developing a standard and requirements so that organizations can demonstrate to their stakeholders that their commitments to privacy and data protection go beyond transactional and technical trust. At the end of the day people trust, or don't trust, organizations…

Video

Verifiable Credentials on the front line

Learn how businesses are using verifiable credentials, decentralized orchestration and blockchain identity to reduce fraud, increase privacy and improve user experience. See real-world examples of production ready solutions from one state’s Department of Education and other public…

Video

Enterprise Domain Annotation based Segregation of Duties strategies

Video

Panel | B2B IAM

Video

Best Practice: CIAM as Business Enabler for Digital Transformation

Video

Panel | How to improve customer IAM and CIAM

Video

Signing in the Rain: HTTP Message Signatures and Web Security

HTTP is an amazingly powerful protocol, and it's the lifeblood of the internet today. On the surface, it seems to be a simple protocol: send a request to a server and get back a response, and everything's structured in useful ways. HTTPS adds the TLS protocol to secure the connections…

Video

The Balance Between Decentralization and Efficiency

Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to realize the true power of decentralization – bringing privacy, speed, scalability and user…

Video

The SolarWinds Hack and the Executive Order on Cybersecurity Happened - It Is Time to Prepare

Again and again, I am asked how one can start with the topic of security in an agile project environment. What are the essential first steps, and what should you focus on at the beginning? Of course, this raises the question of suitable methodologies and tools. At the same time, the…

Video

Your Journey to the Cloud: Can you Finally Replace Active Directory?

In this session, we will answer a question that everyone is asking: "Can we really get rid of Active Directory in the cloud era?". In the conversations with many CISOs and CTOs, the future of Active Directory was constantly being questioned and we could see a lot of confusion about what…

Video

Panel | The Future of Corporate Directories in the Cloud Era. Will they Survive?

In this session we will have a look at traditional corporate directy systems and discuss wether, how and where they will survive a cloud first stragey. Do we still need a corporate directory? If so, what are or will be their role compared to oter centralized directories like Azure…

Video

The Identity R/Evolution

The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “ The Laws of identity ”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal…

Video

Credentials and Privacy - History and New Kinds of Cards

David will talk aboout a new technology that allows the person owning a public key to prove that they have memorized a passphrase, from which they could at any time easily compute the private key. One example use is for votexx.org elections, which are conducted remotely without polling…

Video

Panel | Turning (Distributed) Workforce Challenges into Productivity Gains

Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 

Video

Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?

Video

Friends don’t let Friends Centralize Authorization Enforcement

Video

Creating a Seamless Access Experience with the Digital Double

Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated access. But, is this enough for the next epoch of digital applications, metaverse, and Web…

Video

The Unique Challenges of Identity M&A in High-Growth Organizations

Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes with its own set of unique issues and risks? One year ago, Okta announced its acquisition of…

Video

Digital Identity in Travel (and beyond): a public-private affair

Video

Protocol Independent Data Standards for Interoperability

Video

Remote onboarding with Verifiable Credentials

Many companies are engaging in remote onboarding and need to adopt new methods of identity verification that can be done digitally. While new forms of ID verification are most prevalent today with Financial Services as a means of performing Know-Your-Customer regulations, there is nascent…

Video

Securely Identifying Mobile Apps

Today's open standards ensure that when a user chooses to login, the user’s authentication is protected and only delivered to the mobile app that initiated the authentication. However, how does the Authorization Server identify or verify the invoking app? This talk will look at the…

Video

There is No Consensus About Consent

 

Video

Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience

This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We will discuss whether you should invite attackers into your network. Much like with vampires,…

Video

Cyber Security Architectures in a Hybrid World

A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after all cloud services are adding another dimension of complexity. We will take a short look at the…

Video

Panel | CIAM and Customer Data Platforms

Video

Latest Developments in CIAM

Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way into B2B and B2E IAM solutions through the "consumerization of IT". KuppingerCole is updating…

Video

Interoperability Between Global Identity Networks

Video

Bridging Traditional IGA with Cloud Native Authorization

IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context information is coming from. The talk will shed some light on how the grey area between IGA and cloud…

Video

Drivers for Identity & Access Management in the Financial Industries

Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the new solutions are presented in this talk.

Video

IGA in the Financial Industry - Implementing IAM

Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.

Video

Designing an European Identity Wallet: An overview of UI and UX aspects

The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview of how a potential user interface (UI) might look like and will illustrate common…

Video

Connecting 10.000+ mobility companies and multi million customers

Video

Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats

We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as well as the identity ecosystem embrace themselves for a change in the way we perceived security.…

Video

Human-Centric Identity

Security vs experience. Platform vs best of breed. Fast vs thorough. The identity technology world forces us to make trade-offs. These difficult decisions are an endless exercise in technical and logistical nuances like developer and IT resources, product licenses, integrations, and…

Video

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been…

Video

Implementing SSI using the existing web infrastructure

SSI and Verifiable Credentials are the latest development in identity management. They offer many benefits over existing federated identity management systems. Unfortunately some proponents of SSI are mandating that companies implement decentralised identifiers (DIDs) and blockchains in…

Video

All Other Identities - The Risk That Is Hiding in Plain Sight

For the last 30 years  virtually every  company, agency and organization has been forced to accept the risks associated with identity management and control for third parties and  all  the other identities that  are not  directly addressed by today's workforce or customer access management…

Video

Proofing your Success: Defining & Measuring Meaningful Metrics for IAM

Video

Preserving Privacy in Identity-Aware Customer Applications

  As customer identity programs mature, they bring new opportunities and risks. In the rush to launch new customer experiences, personal data is over-exposed and over-replicated. The default is to ship all identity attributes, to all systems, on every request in order to make access…

Video

Progress and lessons on the establishment of Digital Identity in UK

Video

Joni Brennan and Allan Foster

Video

The Future of Digital ID in South Africa

Video

Unified Endpoint Management: Practical Considerations

Video

Trimming down User Access Governance to its Essentials

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy. In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear…

Video

PAM for the People

The cyberssecurity approaches and strategies that works well for a multinational with a large and well funded cybersecurity department may not be as applicable for a mid sized company where the security department may be a single person. Still if the partner company that delivers the…

Video

Challenges for Women in Identity and Security

It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security and identity is even worse, as some studies have shown. "Women in Identity" is a global…

Video

PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management

A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management.  Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more…

Video

Panel | IGA for Successfully Managed Identities

Video

Panel | PAM

Video

Self-Sovereign Identity for Legal Entities and their Representatives globally

Video

Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect

 

Video

If it’s not Simple, Scalable and Agile, it’s not Modern IGA

Video

Qualified electronic signatures in times of the eIDAS2-wallet - a Nordic-Baltic perspective

When dealing with digital identity, emphasis is often put on the identification and authentication part. An equally important aspect is digital signing (or more broadly: electronic signing). Qualified electronic signatures have the same legal status as handwritten signatures in the EU. In…

Video

Zero Trust and the Business – why you have to align with the application owners!

Video

Cloud Security Standards: Expectations, Benefits and Use Case

Video

What if your digital twin misbehaves?

The concept of the digital twin comes originally from the Industry 4.0 domain with the idea of having a digital representation of real-life objects or processes. The representation of the digital twin consists of the physical object, the virtual product, and the connections between those.…

Video

Hybrid Central/Decentralized Identity: Deployment Strategies for SSI

The disruptive changes in the SSI paradigm will not be effortlessly adopted by the industry worldwide without technological enablers. Indeed, before transitioning to a fully decentralized ecosystem, standard enterprise IAM solutions and canonical IGA disciples will need to adapt and…

Video

Kubernetes and Crossplane at Deutsche Bahn

This session will be about the journey of Kubernetes and Crossplane at Deutsche Bahn, to provide platform consumers with access to a unified API for deployments, infrastructure provisioning and applications in a manner that is independent from the cloud, addressing compliance and…

Video

Quo vadis, SSI? – Self-sovereign Identity on route to production

Self-sovereign identity (SSI) has reached the in-between stage: more than a concept, not yet fully deployed. This is where the work can get the most gruesome and exhausting, but also the most creative and rewarding. While the dedicated W3C standards are reaching maturity levels, we see…

Video

Identity Management in a Web 3.0 World

The third iteration of the Web, Web 3, aims to put more control over web content in users’ hands. It promises to be built on blockchain, eliminating all big intermediaries, including centralized governing bodies. The vision for a Web3 world is for people to control their own data and…

Video

An ecosystem for trusted identities

 

Video

Enterprise Identity: A case study of the EU Gaia-X project

Gaia-X Federation Services is a European project that promotes innovation through data sharing and represents the next generation of the data infrastructure ecosystem. To see how we bring about an open, transparent, and secure digital ecosystem, we thus share a practical example and working…

Video

Making SSI accessible: IOTA technology, solutions and projects

Traditional identity and access management solutions built so far on the trust for selected identity providers and their adoption from an ecosystem of identity owners and identity verifiers. The decentralized identity paradigm is disrupting these ecosystems and required more…

Video

Transatlantic SSI Interoperability: Building the Identity Layer for the Internet

Many decentralized identity infrastructures and ecosystems around the world are emerging, but how can we get to true global interoperability, where my digital identity works seamlessly across borders and across different use cases? Two of the most prominent initiatives in the digital…

Video

Deploying Open Policy Agent (OPA) at Scale and in Production

OPA is a fast rising star in the Authz market. In this deep dive we will cover lessons learned and best practice from early adopters on how to deploy OPA at scale and in production. How can you ensure consistent polices, how do you test and life cycle policies, how do connect with external…

Video

Access Control - The new Frontier

Video

The Omniverse SWOT

Our headlines and podcasts are filled with the promise of web3. Positioned as a digital utopia that will foster and reward creativity whilst righting the wrongs of data equity. This new world, fusing our physical and digital – will be more immersive, collaborative and experiential…

Video

Global Trust Frameworks Interoperability

Video

GAIN Insight

In this session, Daniel Goldscheider will give an overview on GAIN, the standards behind, and use cases. 

Video

Panel | GAIN Interoperability

Video

Creative Disruption: How Web 3 Models are Capturing Markets & Customers

Web 3 businesses are gaining traction. Data and metrics around customers and markets show growing usage, early adoption and huge growth potential. Currently, these businesses built on decentralized networks are separate from traditional web 2 platforms. Will the 2 paths converge? Will there…

Video

Panel | The Pieces of Modern Authorization - Whats Happening in the Market

Video

The Digital Identity Shake-up we’ve been waiting for: How to Survive, and how to Thrive

 

Video

A Learning Agenda for Federal Identity

Video

The Value Paradox: The 3 Inflections of IGA

Video

What Does It Mean to Package Ethics Into a Technology Stack?

Video

Key Requirements for Next Generation MFA

In this talk you will learn how MFA can be a foundation for your Zero Trust Initiative

Video

We’re Gonna Need an even Bigger Boat: How Pervasive Digital Transformation, Nation State Actors, and Open Code Repositories Mandate a Reinvention of Identity

Video

A Key Milestone towards CBDC Wallets - The eIDAS 2.0 Payment-Authorising Wallets

The presentation to be made by Stéphane Mouy (SGM Consulting - France) and Michael Adams (Quali-Sign - UK) will focus on the forthcoming eIDAS 2.0 digital identity wallets (DIWs) and the payment use case. DIWs will allow users to share high LoA identity and status credentials to…

Video

The 'Credentials-first Mobile-first' Identity Ecosystem

This is a new development in the world and touches on mDL, Verifiable Credentials, decentralized identity, and personal data topics. A forward-looking presentation about what the world might look like, the foundational changes represented by this change, and some current and potential…

Video

Drone Pilot Credentialing for Air Safety

Drone operations are estimated to bring €10bn/yr to the EU economy by 2035. A critical e-Government issue is the ability to fly drones in regulated airspace around airports. Unauthorised drone operations in the flightpath of passenger aircraft can endanger lives and cause…

Video

Cardea: verifiable credentials for health information go open source

As an incubator for innovation in air travel, Aruba has chosen to use verifiable digital credentials to manage entry requirements and health testing for travel to the island. This decentralized, open-source technology, which provides secure authentication while preserving traveler…

Video

Identity Ecosystems for a Better Customer Experience

Portable, verifiable and, most importantly, reusable representations of personal data can enable high-touch, high-trust and low-cost engagement between customers and networks of complementary service providers. The EU is already adjusting to the opportunities of Self-Sovereign Identity, but…

Video

The CASE for a Vehicle Lifecycle Ledger

Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation. Ranging from eScooters, bicycles, ride-sharing to car-sharing, ride-hailing and public transport.

Video

SSI Market Size (and opportunity in web3.0) and use cases

Who is this new beast, which widespread technology is going to be used everywhere from banking to metaverse, travel to healthcare? The technology that has no limits in its application across sectors is equally welcome in centralised and decentralised worlds. Meet, self-sovereign…

Video

European Identity & Cloud Awards Ceremony

Once again, analysts from KuppingerCole come together to showcase outstanding Identity Management and Security projects, standards and people. The winners will be honored live on stage during the award ceremony.

Video

Panel | Identity Fabrics: The Mesh and the Factory for Identity Services

Identity Fabrics as a concept has established itself as a common paradigm for defining and implementing the identity services needed by organizations to provide seamless, yet secure and controlled access of everyone and everything to every type of service, regardless whether its legacy or…

Video

IAM 2025: Integrated, Agile, Flexible. Decentralized?

Times are challenging, probably more than during the last few decades, with a pandemic that seems to never ending, homeoffice workers who don´t want to return, some frightening growth rates on the dark side of digital with ransomware everywhere and nation-state intellectual…

Video

SSI, NFTs, ENS & Co - Trends and Adoption of Decentralized Identity in 2022

Goal of this Deep Dive: Listeners will leave with a solid understanding of different approaches to decentralized identity like Self-Sovereign Identity (SSI) and Non-Fungible Token (NFTs), Ethereum Name Service (ENS) their adoption (based on real use cases) their impact on…

Video

IAM-Suites for Medium-Sized/Mid-market Organizations

Video

A Blueprint for Achieving a Passwordless Reality

Password-related attacks increased by a staggering 450% in 2020, with over 1.48 billion records breached worldwide. Meanwhile, the average cost of a password reset exceeds $50 USD. We all know that passwords fail to deliver adequate Zero-Trust security and cause unnecessary friction for…

Video

Trends in Enterprise Authentication

Video

Panel | Best Practices for Implementing Zero Trust

The “zero trust” approach to cybersecurity has been gaining momentum in recent years, as both corporations and government agencies have struggled with how to enhance security given the de-emphasis on the network perimeter. For the most part, the…

Video

Why KYC Isn’t Enough

Video

Panel | Overcoming SMS OTP: Secure passwordless MFA with your mobile phone

Video

Fraud Reduction Intelligence Platforms - an Overview

Video

The State of Passwordless Authentication

The FIDO Alliance has made tremendous strides in its mission to change the nature of authentication with stronger, simpler and passwordless authentication. Join this session to get find out the state of passwordless authentication from the FIDO lens, including a sneak peak at major news…

Video

Panel | MFA usage in enterprise

There are so many ways enterprises could benefit from using Multi-Factor Authorization (MFA). Benefits include identity theft prevention, secure devices, lower breach risks, to name just a few. But why are so many businesses still not using MFA? Perhaps because it is too complex and…

Video

Practicalities of Identity Proofing for Authentication

Video

Panel | Centralized vs. Decentralized: Pros, Cons, Use Cases

Video

Siemens AG: Real-World Enterprise IAM at Scale

In today´s unpredictable business environment where change is the normal, it has become critical to have a manageable and scalable Identity & Access Management program in place. In this Best Practice Presentation, Leonardo Morales will talk about the challenges and his learnings…

Video

Implementing Multi-Region Identity Identifiers and IAM

Video

Building a robust CIAM foundation, fit for the dynamic financial market

As organizations are recovering from the pandemic, many of them embark on a digital transformation at high-speed. Investments to drive online business, powered by customer insights and an attractive user experience, yet secure and compliant to rules and…

Video

Panel | Deliver on the Promise of an Identity Fabric: The Power of Data

Digital identities of consumers, customers, business partners, employees, but also devices, things, or services are at the core of the digital business.  Unfortunately, most digital identities reside in siloes. Building a modern Identity Fabric that delivers seamless yet secure and…

Video

The Importance of a Centralized Access Management System

Video

Denmark's 2022 brand new eID solution

Video

The ICaaS (Identity Component as a Service) approach for taking control of customer experience

Video

Panel | The Future of Authentication

Video

Reinventing the Network with Zero Trust to Stop External Network Attacks

Video

OAuth DPoP (Demonstration of Proof of Possession): How to Not Let Attackers Steal your OAuth Token

Most OAuth deployments today use bearer tokens – tokens that can be used by anyone in possession of a copy of them, with no way to distinguish between legitimate uses of them and those that stole them and used them for nefarious purposes. The solution to this is proof-of-possession…

Video

How to use the framework of a Trusted Data Ecosystem to simplify building decentralized identity solutions

Decentralized identity is an incredibly flexible technology that solves fundamental problems in the way we manage digital communication. But this capacity to do more than one thing at once  can be a source of confusion: How do I actually build a decentralized or self-sovereign…

Video

Panel | Assessing the Cybersecurity Impact of Russia’s Invasion of Ukraine

Russia’s invasion of Ukraine has tectonic consequences for citizens and businesses across the world. An expectation of normalcy post the pandemic has been replaced with fears of increased gas prices and supply chain disruptions. Attackers are expected to leverage the context to carry…

Video

Panel | The Stack, the Stack, the Stack: How Trust over IP is Enabling Internet-Scale Digital Trust

The internet was designed without a trusted identity layer to connect physical entities to the digital world. This layer is now emerging in the form of decentralized digital identity systems (aka self-sovereign identity or “SSI”) based on digital wallets and digital…

Video

Dissecting Zero Trust, a real life example

After his presentation on Strategic and Tactical approaches for Zero Trust, in this presentation Fabrizio will breakdown the components of a Zero Trust implementation and highlight what a company needs to implement it. Fabrizio will also cover use-cases like legacy or cloud-based applications.

Video

Security Improvement Through Visibility of Changes in Hybrid/Multi-Cloud Environments

Performing accidentally wrong or intentionally bad configuration changes by administrators, scripts or systems can lead to serious security vulnerabilities or unintentional visibility or leakage of data. This applies to on-premises systems, but especially to systems and applications in…

Video

Panel | Multi-Cloud Agility Must-Haves

With a highly prioritized digital tranfsformation towards a composable enterprise, it will be inevitable to work with multi-cloud solutions to achieve the level of agility and flexibility required. If it was to avoid vendor lock-in or to consequently go for best-of-breed solutions - in this…

Video

Demystifying CIEM for an Effective Multi-Cloud Security Enablement

As digital business pushes organizations towards an accelerated multi-cloud adoption, CIEM (Cloud Infrastructure Entitlements Management) emerges as a strong enabler for securing access and entitlements across an increasingly distributed cloud environment. Traditional PAM and IGA tools…

Video

Certificate Based Authentication in a Cloud Native Environment - a Migration Journey from Handcrafted XML Signing to OpenID Connect

During this best practice session we will present you with hands-on experience from one of our financial services industry customers. The company used a handcrafted xml signature mechanism to authenticate their business partners when initiating machine-to-machine communication to…

Video

From A to B - How Decentralized Technologies Are Changing Collaboration Between the Public and Private Sector

The world of modern urban mobility is full of - unused - opportunities. To get to their destination, people can use public transportation, take a cab or rent an e-scooter. But many options also means many providers. Anyone who uses more than one of the aforementioned forms of…

Video

The strategic building blocks of the composable enterprise: Concepts & technologies

This session is a continuation of the opening keynote by Martin Kuppinger on the future Composable Enterprise. Together we take a look at what powers the composable enterprise and which concepts and technologies can contribute to building a composable enterprise. KuppingerCole proposes…

Video

Give me 10 minutes, I'll give you the truth about verified Identities

Video

Promoting Cyber Resilience through Identity and Zero Trust

Resilience is defined as the dynamic process of encompassing positive adaptation within the context of adversity. Organizations today are under constant siege from any number of security threats. The only path to weathering this ongoing storm is to learn to intelligently adapt…

Video

A Story About Convenient Security

Video

The Empowered Consumer and the Next Era of Digital Identity

Video

Making Digital Identity Enable Your Organization's Cloud/Digital Transformation

Video

The Changing Cyber Threat Landscape and its impact on IAM (I)

Video

How organizations can make and save money with decentralized identity

In this talk John will present one way of modelling the potential value propositions for the parties (people and organisations) in decentralised identity models. Using real world examples of products and systems, he’ll use the model to consider their value propositions, and whether…

Video

Panel | Digital Identity & Web3- Rethinking Business Models

Video

Experience is What Counts, Orchestration is How you Get There

Video

Dealing with Multi-Cloud, Multi-Hybrid, Multi-Identity: Recommendations from the Field

Video

Panel | Introducing Open Policy Agent (OPA) for Multicloud Policy and Process Portability

With over 120 million downloads, and users like Netflix, Zalando and GS,  the open source project Open Policy Agent has quickly become the de facto standard for Authorization. In this session, KuppingerCole´s Alejandro Leal will discuss with  Jeff Broberg, Gustaf…

Video

Plan A: Reduce Complexity in your Cloud Native Environment (there is no Plan B)

Organizations with an advanced cloud migration program have hit a roadblock. TO successfully navigate the adoption of compartmentalized code, in order to reap the benefits of improved agility and reduced costs, The CISO must embrace automated deployment and gain control over APIs.

Video

The Path to Zero Trust by Securing Privileged Identities

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on…

Video

What Supports Zero Trust in the Enterprise?

When we think of Zero Trust, we often discuss how it can support and improve your security posture, defense-in-depth strategies, and architecture -- but what supports Zero Trust? This discussion will focus on other IT / Security strategies, methodologies, and business practices that can…

Video

What Ails Enterprise Authorization

Continued advances in authentication technology have made the "identity" part of "identity and access management" more manageable over the years. Access management on the other hand, is still very much a "wild-west" landscape. As enterprises move to a zero-trust network access model, access…

Video

OpenID SSE, CAEP and RISC - Critical standards that enable Zero-Trust security

Zero-trust security relies heavily on the ability for independently owned and operated services to dynamically adjust users’ account and access parameters. These adjustments are based on related changes at other network services, such as identity providers, device management services…

Video

Zero Trust and Software Supply Chain Security: Must-do’s for Every Organization

Video

SASE vs. Zero Trust: Perfect twins or antagonists?

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in…

Video

The Role of Identity & Access Management for Ransomware Resilience

Video

The Changing Cyber Threat Landscape and its impact on IAM (II)

Video

Panel | Cloud Infrastructure Entitlement Management (CIEM): Managing Your Cloud Scale Risk with an Identity Defined Security Approach

CIEM adopts a zero trust approach to Identity and Access Management (IAM) for cloud infrastructures, making access risks visible and avoidable. In this panel session 

Video

Identity in Polyglot Cloud Environments

Video

Demystifying Zero Trust

“It’s about the journey, not the destination” they said. “It’s basically just Don’t Trust But Check, what’s the real difference?” they said. “ What’s the big deal?” They said. Zero trust has been the panacea to…

Video

Zero Trust at Siemens: Where the impossible and the doable shake hands

Two years ago, Siemens started a still going on process to change its security architecture to Zero Trust. Not an easy task for a company that big, widespread, and divers in products. In this session program leads Thomas Müller-Lynch and Peter Stoll are talking about what …

Blog

In the Midst of Change, Somethings Remain the Same

Industry 4.0 is the fourth revolution in manufacturing. I won't bore you with the details of the prior iteration or versions and how we got where we are today, only that Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. Smart or intelligent…

Video

New Face, Who Dis? Privacy vs Authentication in a World of Surveillance

Facial recognition technology is evolving rapidly, presenting the benefits and dangers that innovation always does. Will it provide reliable biometric authentication, or will it erode personal privacy? We’ll examine the current landscape from both a policy and a technical…

Video

Welcome to EIC 2022

Video

Identity. Security. Decentralized. The Future of IT in the Age of Change

The future of the enterprise is changing. In the Digital Age, much is different than it has been in the past. The focus must be on agility in business models and delivery, innovation, and reliability in delivering to the customers. This requires a shift in focus, in all areas, including IT.…

Video

Future Government: Transforming Public Services to Be More Agile and Innovative

Video

Advocating for Decentralised Identity in Europe: 7 Lessons Learnt

Video

Model, Measure, Manage - The Journey to Autonomous Security in a Hybrid Multi-Cloud World

We cannot manage what we cannot measure.

Video

Digital Identity and Privacy: Stories from the Frontline

As the pace of digitalization gathers momentum, organizations are witnessing a dramatic increase in the number of digital identities. These identities interact with systems and applications relentlessly to perform day-to-day IT tasks. Nevertheless, maintaining the privacy of this data is a…

Video

Dynamic Authorization in Zero Trust Architecture

Video

Pre-Conference Workshop | How OpenID Standards are Enabling Secure & Interoperable Digital Identity Ecosystems

OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while also enabling a collaborative platform to openly address current trends and market opportunities. The OpenID Foundation Workshop at EIC includes a number of presentations focused…

Video

Pre-Conference Workshop | The IAM Experience Your Users Really Deserve

Organisations that are being targeted by SaaS and B2B companies might struggle when it comes to building a smooth and quick process of authentication for their users. Issues with business needs, such as user organisation within a specific target business, separate branding, access control…

Video

I'm None of your Business

Video

Privacy and Data Protection. What is this Thing Called Privacy?

Video

CISO Panel | Securing the Composable Enterprise

As if it all came together on the foundations of an agile, fully decentralized enterprise, embracing the API economy to deliver results through assembling and combining pre-packaged business capabilities. AI-driven, automated, everything delivered on-demand, providing the best possible user…

Video

The New Digital Identity Wallet for all Europeans: Latest Amendments

An impactful 73 pages proposal for amending the 2014 e-IDAS regulation was made in June last year, a.o. providing EU wide wallets for national e-ID’s. Market consultations and impact assessments have been concluded early 2022 and the European Parliament discussed the proposal with…

Video

It's the Relationship, Stupid

Video

Privacy: The Real Cost

Privacy is one of the most challenging aspects to protect in identity solutions. The entities that stand to gain the most from surveilling users can use convenience as a bargaining chip. Users understand and appreciate convenience, but they often don't appreciate the costs of loss of…

Video

Pre-Conference Workshop | Standards Matter. Trustworthy use of Identity and Personal Data

The world has changed because of COVID. More fraud is taking place. More misuse of identity is occurring. To combat the rise in fraud and to mitigate risk, the Kantara Initiative offers a 3rd party conformity assessment program.

Video

Tribute to Kim Cameron: Privacy & the 7 Laws of Identity

Last November, the creator of the 7 Laws of Identity, Digital ID thought leader and focal point of a Global Identity Community, Kim Cameron, passed away. He not only left us with an uncountable number of unforgettable moments. He also left us with those 7 laws of Identity, a set of…

Video

Pre-Conference Workshop | IAM, the Cloud, and GDPR - Why you will fail on GDPR without a strong IAM posture

Video

Journey to the North: Canadian Perspectives and Progress on Digital Identity

Video

Modern Identity Management: Security Without Compromising Usability

In the digital age, effective customer, partner, and employee identity and access management (IAM) is essential to enable secure online transactions, collaboration, and other interactions. But finding the right balance between security and usability has traditionally been challenging and…

Webinar

Jun 21, 2022: IAM Projects Done Right

Delivering effective IAM is not always easy, and around half of IAM projects run into difficulties and stall. While opting for IAM that is delivered as a service is a potential solution, not all offerings are equal. Finding a service with the right combination of well-integrated capabilities…

Webinar

May 24, 2022: Effective Identity Access Governance in Hybrid SAP Environments

Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them effectively…

Blog

Human-Centric Identity - When Customers No Longer Tolerate a Bad UX

A poor user experience is increasingly becoming a no-go for customers, even to the point of them not buying a product. So a good user experience is a must, but how can you achieve that without neglecting security? Candace Worley from Ping Identity will elaborate on this challenge in her…

Blog

Where IAM trends are set: Everything around Identity & Privacy at EIC 2022

Anyone who has attended our European Identity & Cloud Conference (EIC) in the past 15 years will know that this is the leading event when it comes to current and future trends in  IAM and privacy (not to mention cloud security or cybersecurity). EIC is about the union of analyst…

Blog

Siemens' Challenging IAM Success Story

When Leonardo Morales from Siemens first attended the European Identity and Cloud Conference, he tried to gather experience and knowledge from others to avoid common mistakes on his IAM journey. Now he is giving a keynote speech Siemens AG: Real-World Enterprise IAM at Scale on…

Blog

Global Identity Networks: How to Leverage Them for Business Benefit

The organization that is ready to onboard pre-verified customers should pay attention to global identity networks. The organization that is ready to provision, authenticate, authorize their employees, contractors, suppliers, etc. remotely and based on credentials verified by trusted service…

Webinar

May 03, 2022: Modern Identity Management: Security Without Compromising Usability

In the digital age, effective customer, partner, and employee identity and access management (IAM) is essential to enable secure online transactions, collaboration, and other interactions. But finding the right balance between security and usability has traditionally been challenging and…

Video

Identity & Access Management Predictions 2022

Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a…

Video

Analyst Chat #106: 2021 - A Retrospective

Paul Fisher and Matthias present their very subjective summary of a really special and, in particular, especially challenging past year, 2021. They cannot do without the word 'pandemic' after all, but they also try to reach a first perspective on the year 2022 from the past 12 months.

Blog

How to Grant Access Right

Find out about the importance of context for Identity Risk Management. Watch the insightful interview Martin Kuppinger had with David Pignolet from SecZetta on the EIC 2021.

Video

Identity Security: A Top Priority for the Modern Enterprise

Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or…

Video

Engineering Successful IAM Projects to Support Digital Business

In the digital era, traditional approaches to Identity and Access Management (IAM) are ineffective. IAM is no longer just about managing employee identities, but about managing all kinds of identities across a wide variety of use cases. This requires a comprehensive and agile approach.

Webinar

Dec 20, 2021: Identity & Access Management Predictions 2022

Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a…

Video

Analyst Chat #95: Deconstructing the User Journey (EIC 2021 Special)

KuppingerCole's flagship event EIC 2021 took place very successfully in Munich and online in September. Of course, Matthias took the opportunity to sit down with his fellow analysts in person for some EIC Special Analyst Chat episodes. Building on the themes of his Opening Keynote, Martin…

Blog

Managing Access and Entitlements in Multi-Cloud Multi-Hybrid IT

Introducing DREAM (Dynamic Resource Entitlement and Access Management) Paradigm for managing all access of everyone and everything to all resources consistently in a multi-cloud multi-hybrid environment. Policy-based, automated, consuming the current state of services & infrastructure.…

Blog

IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service

A paradigm for unified delivery of IT services to the business demand, based on automated, policy-based management, and supported by the unification of heterogeneous multi-cloud multi-hybrid IT environments following a services-based approach. Businesses need to reinvent themselves…

Blog

EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity

Maarten Stultjens, VP Corporate Development at OneWelcome is to partake in a panel discussion entitled Identity, Privacy, Security - The European Perspective on Monday, September 13 starting at 15:50 pm at EIC 2021. To give you a sneak preview of what to expect, we asked Maarten some…

Blog

EIC Speaker Spotlight: Vadim Lander on the Dawn of Digital IAM

Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, Broadcom is to give a presentation entitled The Dawn of Digital IAM on Monday, September 13 starting at 17:40 pm at EIC 2021. To give you a sneak preview of what to expect, we asked Vadim some questions about his…

Video

Making IAM Agile and a Business Enabler 

In the digital era, IAM is no longer just about employees. To become truly digital and tap into the new business benefits, organizations need IAM systems that can cater to partners, consumers and even things, as well as support IAM capabilities across all target systems, regardless of their…

Blog

EIC Speaker Spotlight: Joni Brennan on the Growing Public Demand for Digital Identity During the Pandemic

Joni Brennan, President of the Digital ID & Authentication Council of Canada is to deliver a presentation entitled COVID Has Accelerated Public Demand for Digital ID on Monday, September 13 starting at 19:40 pm at EIC 2021. To give you sneak preview of what to expect, we asked Joni…

Blog

EIC Speaker Spotlight: Sadrick Widmann on the Truth About Identity

Sadrick Widmann, Chief Product Officer at Cidaas is to deliver a presentation entitled Give Me 10 Minutes, I'll Give You The Truth About Identity on Monday, September 13 starting at 20:00 pm at EIC 2021. To give you sneak preview of what to expect, we asked Sadrick some questions about his…

Blog

EIC Speaker Spotlight: Chris Owen on Identity Management

Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC 2021. To give you sneak preview of what to expect, we asked Chris some questions about his planned…

Hybrid Event

May 10 - 13, 2022: European Identity and Cloud Conference 2022

After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital.

Blog

EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management

Eric Newcomer, Chief Technology Officer at WSO2 is to deliver a presentation entitled The Rise of the Developer in IAM on Monday, September 13 starting at 6:40 pm at EIC 2021. To give you sneak preview of what to expect, we asked Eric some questions about his planned presentation. What…

Blog

EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue

Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at EIC 2021. To give you sneak preview of what to expect, we asked Mike some questions about his…

Blog

EIC Speaker Spotlight: Peter Busch on Trust as the Key Concept

Peter Busch, Product Owner Distributed Ledger Technologies Mobility at Robert Bosch Group, is to deliver a presentation entitled Trust as the Key Concept in Future Mobility on Tuesday, September 14 starting at 3:30 pm. at EIC 2021. To give you sneak preview of what to expect, we asked Peter…

Blog

EIC Speaker Spotlight: Dr. Barbara Mandl & Dr. Angelika Steinacker on the Women in Identity Workshop

Women in Identity exists to foster new relationships and mentorship between women in technical fields and beyond. At EIC 2021, Dr. Angelika Steinacker and Dr. Barbara Mandl will hold a pre-conference workshop on Monday, September 13 starting at 9:00 am. To give you sneak preview of what to…

Blog

EIC Speaker Spotlight: Patrick Parker on Complexity in IT

Patrick Parker, innovation-driven entrepreneur as well as founder and CEO at Identity Management and Cloud Security firm EmpowerID, will deliver a keynote presentation entitled Complexity Has Reached a Tipping Point in IT – What Can We Do About It? at the European Identity and Cloud…

Video

Accelerate Your Digital Transformation Through Identity

Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster…

Blog

Where Workflows, Service Management, Digital Identities, and Work From Home Meet

Simplifying access to IT services by building on platforms for IT workflows and beyond ServiceNow, over the past few years, has emerged as one of the leaders in the ITSM (IT Service Management) market and beyond to what today is named ESM (Enterprise Service Management). In fact, the…

Video

Smart IAM Services for the Modern Digital Enterprise

The identities of employees, appropriate authorizations in processes and systems, and a permanent control and monitoring of access to prove compliance are becoming increasingly important for organizations. However, the management of these things remains less than optimal.

Video

Matthias Reinwarth: The Future of IAM: Towards a Unified, Modular, Trusted, and Connected Identity Ecosystem

Identity and access management is evolving. Originating in centralized enterprise systems, IAM must now reflect the complex realities of modern organizations and our post-pandemic society. It is driven by the need for a seamless user experience for all types of identities with all types of…

Video

Ian Lowe: Trust Arrives on Foot But Leaves in a Ferrari

Inspired by this quote from Mark Carney, the former Governor of the Bank of Canada (2008-2013) and the Governor of the Bank of England (2013 -2020), we will take a look at how identity and trust are intimately connected, yet how fragile they are in the digital world. And, using two customer…

Video

Expert Chat: Interview with Ian Lowe

Video

Frances Zelazny: Enabling the Future of IAM with Zero Knowledge Authentication

Video

Francois Lasnier: The Key to Post Covid Success - Aim to Thrive Not Merely Survive

Video

Panel - What's Next for IAM: Building for the Future

Video

Jas Sagoo: The Business Balancing Act: User Experience and Security

In today’s digital environment, the bar has been reset when it comes to remote working, e-commerce, e-learning, e-health and streaming services. The demand for simple and secure digital experiences for customers has never been higher. And while logging in is such a common process,…

Video

Alan Bachmann: Bringing Accountability to the Digital Identity While Preserving Privacy and Security

Video

Expert Chat: Interview with Francois Lasnier

Blog

Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It

When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are important to keep the business profitable, remain at the forefront of innovation, maintain…

Video

David Doret: Improving IAM Success Rates with Rigorous Concepts

Video

Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust

Video

Analyst Chat #75: Get Rid of IAM Siloes

Martin Kuppinger joins Matthias for a first hybrid audio plus video episode of the Analyst Chat. They talk about horizontal (capabilities like AM, IGA, and PAM) and vertical siloes (identities like things, robots, customers, partners, or employees). And they lay out a proper approach to…

Video

Analyst Chat #69: IAM Awareness in Daily Life

Dr. Phillip Messerschmidt is an experienced practitioner with extensive background knowledge in all things IAM. He helps us to take a step back and look at IAM in daily life. Drawing on simple, understandable definitions, he provides practical recommendations for successful and efficient…

Video

Identity ist kein Selbstzweck – Unternehmenskritische Applikationen mit Identity Security absichern

Die Corona-Pandemie hat die Digitalisierungsbemühungen in der DACH-Region angetrieben, aber auch Grenzen aufgezeigt. Die digitale Identität von Angestellten steht immer häufiger im Fokus des Interesses – sowohl von Sicherheitsbeauftragten als auch von Hackern. Identity…

Video

Rakesh Tripathi: Future of Identity Management

Video

Akhilesh Rajendran: Automation in Identity and Access Management Operation

 An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation…

Video

David Doret: TOME: Strengthening the Semantic Foundations of IAM

We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are: a manager trying to explain its IAM strategic program to top management, an architect trying to make IAM efficiently and…

Video

Vinay Dabas: Securing the Digital World - Identity Verification and Authentication

Video

Christine Owen: Identity-Centric IAM For Enhanced Integration Into Emerging Security Models

Video

Panel: Tackling the Legacy IAM - Towards Future- Proof Identity Fabric

Video

Matthias Reinwarth: User & Authorization Management. Real Benefits For The Business, Effective Projects, Efficient Operation And A High Level Of Acceptance

Video

Oliver Krebs: Anchoring Real Identity in a Digital World

In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one. It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them…

Video

Sylvie Vandevelde: From a Centralized Digital ID Towards a Hybrid Model

Video

Tobias Urban: The Balance Between User Experience and Security

Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver…

Video

Martin Kuppinger: Interview with Simon Moffatt

Video

Simon Moffatt: The Road to CIAM Success: Why an Identity Fabric Powers Digital Transformation

Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs.  A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling…

Video

Manoj Kumar: Cloud-delivered IAM: Promises and Challenges

Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the…

Video

Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink

Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM. IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance…

Video

Vilma Blomberg: No Compromises, No Mercy – IAM’s Inevitable Role in Safeguarding The Organization

Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a…

Video

How to Find the Right Strategy for Access Control Management

Video

Where to Start Your IAM Modernization Journey

Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex. In this video blog post, Martin gives practical advice on…

Virtual Event

May 27, 2021: Enabling the Future of Identity and Access Management

Join the KCLive Event on the future of identity and access management to learn how to implement an interconnected IAM architecture designed for the post-pandemic era.

Video

The Evolution of Access Control

The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary…

Video

Making Zero Trust Work With the NIST Framework

There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.

Video

The 3 Pillars of Access Control Optimization: IAM, GRC and User Monitoring

Identity & Access Management (IAM) tools are used to automate processes of user lifecycle management and control user access permissions from a single point. We can improve these processes by using conditions and policies, and eventually implementing rule-based access controls (RBAC)…

Video

There Is No Successful Digital Transformation Without Strong Identity Management

2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices…

Blog

Ivanti’s Zero Trust Journey

Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch management, and had added full IT asset, service, and workspace management, as well as IAM…

Video

Managing Azure AD – Regardless of How You Use It

Microsoft Azure Active Directory (Azure AD) has gained widespread adoption. Coming with Microsoft Azure Cloud as well as Microsoft 365 (i.e. Office 365), it appears in many organizations just because of decisions made outside of the IAM team.

Video

The Interplay between Zero Trust and IAM

Martin Kuppinger and Danna Bethlehem, Director of Product Marketing at Thales discuss their perspectives on the interplay of Zero Trust and Identity and Access Management.

Video

The Role of Customer Identity & Access Management in Digital Transformation

Companies and organizations have strategic decisions to make at the Customer Identity & Access Management (CIAM) front. First, they have to decide whether to invest into a dedicated CIAM solution or to build on existing infrastructure. If there is already a foundation, what should be…

Video

The Future of IAM is Automated

Interview with Paul Trulove, Chief Product Owner, SailPoint

Video

2020 Is the Year of the Identity Management Revolution

2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big…

Webinar

Jan 26, 2021: The Evolution of Access Control

The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to…

Video

Identity and Access Management

Video

How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.

Webinar

Dec 03, 2020: There Is No Successful Digital Transformation Without Strong Identity Management

2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices…

Video

IAM Essentials: Identity Data Integration

Video

In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical

Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of…

Webinar

Dec 02, 2020: Managing Azure AD – Regardless of How You Use It

Microsoft Azure Active Directory (Azure AD) has gained widespread adoption. Coming with Microsoft Azure Cloud as well as Microsoft 365 (i.e. Office 365), it appears in many organizations just because of decisions made outside of the IAM team.

Video

The Fast Track to Optimized Operations With IAM-as-a-Service

IAM-as-a-Service provides the operational agility by bringing-in skills and expertise to implement a precise strategy, technology deployment, process automation, service delivery and support model, thus, gaining operational efficiency and streamlining budgets. Therefore, IAM-as-a-Service,…

Webinar

Dec 09, 2020: The 3 Pillars of Access Control Optimization: IAM, GRC and User Monitoring

Identity & Access Management (IAM) tools are used to automate processes of user lifecycle management and control user access permissions from a single point. We can improve these processes by using conditions and policies, and eventually implementing rule-based access controls (RBAC) and…

Webinar

Dec 16, 2020: Making Zero Trust Work With the NIST Framework

There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.

Video

Identity and Access Management Strategies That Grow With Your Business

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity,…

Video

Identity for All – Not for the Few

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and…

Video

The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Blog

A Look at NIST’s Zero Trust Architecture

NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture. The NIST special publication examines the principles of and motivations for ZTA, as well as implementation considerations, security concerns, and suggestions for improvements…

Webinar

Sep 08, 2020: Identity for All – Not for the Few

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and…

Video

Remote Work and IAM – A Unique Opportunity for Security Leaders

Nowadays, Identity and Access Management (IAM) is undeniably the first line of defense for organizations worldwide. It enables employees to securely access applications while enhancing control and transparency. But IAM is also on the change. It is already more than just the traditional…

Webinar

Oct 13, 2020: 2020 Is the Year of the Identity Management Revolution

2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and…

Webinar

Sep 14, 2020: The Fast Track to Optimized Operations With IAM-as-a-Service

When IAM projects stall it is usually due to budget or timeline constraints as well as a lack of automation that can be leveraged by operations team to accelerate IAM processes and IAM modernization. Also, IAM operations and administration teams are often too busy with low-value tasks or…

Video

Analyst Chat #30: Consent Management Done Right

Graham Williamson and Matthias Reinwarth talk about consent: what does it mean for identity professionals, service providers or lawyers and how to reconcile all those different views in modern IAM environments.

Video

Working From Home Is Not Secure Without an Effective IAM

The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is…

Webinar

Aug 25, 2020: The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges…

Video

Identity Für Alle – Nicht Nur Für Wenige: Identity Management Für Den Mittelstand

Die digitale Transformation ist eine globale Herausforderung für Unternehmen jeder Größe. Im Gegensatz zu großen Konzernen fehlt es kleinen und mittelständischen Unternehmen aber oft an Fachpersonal und finanziellen Ressourcen, um Transformationsprozessen und den…

Video

Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers. Continually changing and increasing…

Webinar

Jul 23, 2020: Remote Work and IAM – A Unique Opportunity for Security Leaders

Nowadays, Identity and Access Management (IAM) is undeniably the first line of defense for organizations worldwide. It enables employees to securely access applications while enhancing control and transparency. But IAM is also on the change. It is already more than just the traditional…

Webinar

Sep 30, 2020: How Security and Identity Fabrics Work to Help Improve Security

Many organizations struggle or even fail because they overcomplicate the implementation and extension of their cybersecurity toolset. Most do not have a central approach on security, and often use a set of tools that are not well-integrated with each other.

Webinar

Sep 17, 2020: In an Age of Digital Transformation, Managing Vendor and Partner Identity Is Critical

Organizations have been managing the identity and access of employees for many years to protect data and the overall security of the enterprise. However, the onset of digital transformation has driven a need for faster, cost-effective innovation and with it the increased utilization of…

Webinar

Sep 09, 2020: Identity and Access Management Strategies That Grow With Your Business

For companies that don’t need a complex Identity Governance & Administration solution (IGA), account and group administration is still a priority. Every company needs a solution for at least baseline IAM (Identity and Access Management), that fits their current state but can also equip them…

Video

Redefining IAM: Harnessing AI to Identify Risk at the Speed of Change

In an increasingly complex and rapidly changing business, IT and regulatory environment, traditional approaches to identity governance must evolve to keep up with the rate of change. Given the dynamic nature of today’s business, managing entitlements and conducting access reviews have…

Blog

The Role of Identity in Business Continuity Planning

When it’s “business as usual”, it seems strange to think about disruptions and disasters. With competing priorities and the pressure of everyday demands, planning for worst-case scenarios can feel alarmist and macabre. But as anyone experienced in disaster preparedness will…

Webinar

Jun 30, 2020: Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers.

Blog

Microsoft Adding New Capabilities to Azure Active Directory

Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now announced several new capabilities that help to support further use cases. New features in Azure AD…

Webinar

Jul 02, 2020: Identity für Alle – nicht nur für Wenige: Identity Management für den Mittelstand

Die digitale Transformation ist eine globale Herausforderung für Unternehmen jeder Größe. Im Gegensatz zu großen Konzernen fehlt es kleinen und mittelständischen Unternehmen aber oft an Fachpersonal und finanziellen Ressourcen, um Transformationsprozessen und den notwendigen technischen…

Video

Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security & Privacy

IAM infrastructure is becoming increasingly critical to the business success of healthcare providers. This is driven in the first instance by digitization and connectivity of everything and the inevitable efforts of cyber-criminals to compromise the newly connected assets. At the same time,…

Webinar

May 28, 2020: Redefining IAM: Harnessing AI to Identify Risk at the Speed of Change

In an increasingly complex and rapidly changing business, IT and regulatory environment, traditional approaches to identity governance must evolve to keep up with the rate of change. Given the dynamic nature of today’s business, managing entitlements and conducting access reviews have become…

Video

Analyst Chat #10: Making IAM Projects Succeed - The Importance of Project Management

Matthias Reinwarth and Graham Williamson are talking about managing IAM projects properly.

Video

Why IAM From the Cloud is the New Normal

Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Video

Analyst Chat #8: Making IAM Projects Succeed - Why You Need a Solution Architecture

Matthias Reinwarth and Graham Williamson are talking about designing an IAM project architecture.

Hybrid Event

Sep 13 - 16, 2021: European Identity and Cloud Conference 2021

The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.

Video

IAM Projects Stalling – Too Tools-centric

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Video

IAM Projects Stalling – Too Big to Win

Martin Kuppinger explains the reasons why so many Identity and Access Management projects can stall or even fail.

Blog

KuppingerCole Analyst Chat - Our New Regular Podcast

Today we're officially launching KuppingerCole Analyst Chat - our new soon-to-be-regular audio podcast. In the pilot episode Martin Kuppinger and I are discussing Identity & Access Management challenges so many are facing now while having to work from home. At the moment, you can…

Virtual Event

May 12, 2020: Identity Fabrics & the Future of Identity Management

With this Virtual Event, KuppingerCole will help you in defining a step-by-step approach to migrate from your legacy IAM to a future-proof Identity Fabric.

Webinar

Jul 09, 2020: Working From Home Is Not Secure Without an Effective IAM

The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding…

Video

Analyst Chat: Identity & Access Management Challenges - Work From Home Edition

Welcome to the pilot issue of the KuppingerCole Analyst Chat - our soon-to-be-regular podcast. Stay tuned for more episodes!

Webinar

Apr 21, 2020: AI Governance From a Practical Perspective

How can you ensure that your Artificial Intelligence project does not become a liability? An improper implementation, a socially insensitive data label, or negligent data management can easily lead to an auditing nightmare. What are the best practices to safely utilize and govern AI?

Blog

5G and Identity

5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the future cloud of things and to provide the enhanced bandwidth needed for new mobile data…

Blog

Modernizing IAM Solutions Leveraging New Operating Models With the KuppingerCole Identity Fabric

Video

Modernizing IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric

Learn more about Legacy IAM and how to modernize IAM solutions leveraging new operating models with the KuppingerCole Identity Fabric.

Video

The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static…

Webinar

May 07, 2020: Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security & Privacy

IAM infrastructure is becoming increasingly critical to the business success of healthcare providers. This is driven in the first instance by digitization and connectivity of everything and the inevitable efforts of cyber-criminals to compromise the newly connected assets. At the same time,…

Blog

Taking One Step Back: The Road to Real IDaaS and What IAM Really Is About

Shifting IAM to Modern Architecture and Deployment Models There is a lot of talk about IDaaS (Identity as a Service) these days, as the way to do IAM (Identity and Access Management). There are also fundamental changes in technology, such as the shift to containers (or even serverless) and…

Webinar

Nov 12, 2020: The Role of Customer Identity & Access Management in Digital Transformation

Companies and organizations have strategic decisions to make at the Customer Identity & Access Management (CIAM) front. First, they have to decide whether to invest into a dedicated CIAM solution or to build on existing infrastructure. If there is already a foundation, what should be their…

Webinar

Mar 10, 2020: The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static…

Virtual Academy KC Master Class

Feb 04, 2020: PAM for the 2020s

Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability…

Video

Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and…

Blog

API Platforms as the Secure Front Door to Your Identity Fabric

Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate separate IAM services in a cohesive way. Identity Fabrics help the enterprise meet the current…

Video

Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust

The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.

Blog

Renovate Your IAM-House While You Continue to Live in It

Do you belong to the group of people who would like to completely retire all obsolete solutions and replace existing solutions with new ones in a Big Bang? Do you do the same with company infrastructures? Then you don't need to read any further here. Please tell us later, how things worked…

Video

Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Webinar

Dec 10, 2019: Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and…

Blog

Leading IDaaS Supplier OneLogin Aiming for the Top

OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management, but is aiming to move even further up the ranks. In a media and analyst briefing, OneLogin…

Video

Onboarding Your Business Partners to Your Services: B2B IAM in Practice

Virtually any business needs to grant business partners access to certain IT services. While employee IAM is a well-established discipline, where HR frequently delivers the information about joiners, movers, and leavers, and while Consumer IAM (CIAM) commonly relies on self-registration,…

Blog

When Cyber "Defense" is no Longer Enough

The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments, the number of cyber-attacks is growing. The types and sophistication of these attacks are…

Video

How Leading Brands Build Trust With CIAM

In the age of digital transformation, consumers tend to have multiple digital identities across several devices deploying a variety of services. In this environment, digital trust is what sets brands apart from their competitors. Taking and storing customer data is a duty of care, and…

Webinar

Dec 03, 2019: Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust

The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.

Video

The Globalization of IAM for Manufacturing Businesses

Globalization has given many companies the opportunity to run factories and other operations in various countries. In doing so, manufacturers are faced with challenging regulations they have to comply with and that may differ in the U.S., EMEA, Russia, China, and other countries. IAM is an…

Video

KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market

Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.

Webinar

Sep 03, 2019: KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market

Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.

Blog

Coming soon: The KuppingerCole Leadership Compass IDaaS AM

We are about to release the update of the first of two KuppingerCole Leadership Compass documents on IDaaS (Identity as a Service). We have segmented this market into two categories: Access Management (AM) Identity Governance and Administration (IGA) A fast-growing market, IDaaS AM is…

Blog

Technology Trend: The Road to Integrated, Hybrid and Heterogeneous IAM Architectures

Requirements for - and context of - the future Identity Fabric.  We call it Digital Transformation for lack of a better term, but it consists of much more than this buzzword is able to convey. Digital technologies are influencing and changing all areas of a company, and this is…

Blog

The changing role of Azure AD in Enterprise IAM Architectures

For many companies, Microsoft Azure Active Directory (Azure AD) was the basis for a coordinated step into the cloud, by extending the reach of their existing on-premises Active Directory to the cloud. For others, Azure AD was at the beginning just something that came with Microsoft Office…

Webinar

Nov 07, 2019: Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Webinar

Oct 01, 2019: How Leading Brands Build Trust With CIAM

In the age of digital transformation, consumers tend to have multiple digital identities across several devices deploying a variety of services. In this environment, digital trust is what sets brands apart from their competitors. Taking and storing customer data is a duty of care, and brands…

Blog

Benefits of IAM in Healthcare: Compliance, Security, Profits and More

Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital Transformation. In this respect, IAM not only serves as a security technology but also as a…

Webinar

Sep 17, 2019: The Globalization of IAM for Manufacturing Businesses

Globalization has given many companies the opportunity to run factories and other operations in various countries. In doing so, manufacturers are faced with challenging regulations they have to comply with and that may differ in the U.S., EMEA, Russia, China, and other countries. IAM is an…

Webinar

Oct 10, 2019: Onboarding Your Business Partners to Your Services: B2B IAM in Practice

Virtually any business needs to grant business partners access to certain IT services. While employee IAM is a well-established discipline, where HR frequently delivers the information about joiners, movers, and leavers, and while Consumer IAM (CIAM) commonly relies on self-registration, B2B…

Blog

M&A Activity in Cybersecurity and IAM

It seems almost every week in cybersecurity and IAM we read of a large company buying a smaller one. Many times, it is a big stack vendor adding something that may be missing to their catalog, or buying a regional competitor. Sometimes it’s a medium-sized technology vendor picking up a…

Video

All the Roads Lead to the C, Paved with B2B

More and more organizations use CIAM for B2B use cases as such combination can help companies position themselves on the market. While no one argues that user experience journey for the B2B Customer is just as important as any other customer, they most certainly need a relatively different…

Blog

Oops, Google Did It Again!

Like many people with a long career in IT, I have numerous small computer-related side duties I’m supposed to perform for my less skilled friends and relatives. Among those, I’m helping manage a G Suite account for a small business a friend of mine has. Needless to say, I was a…

Blog

CIAM as a Key Factor in the Digital Transformation

Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors, at conferences, and in the general media. But Digital Transformation, or DT as we like to…

Blog

Robotic Process Automation – an IAM Challenge

Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform tasks that humans executed before, companies unlock a significant potential for cost savings. AI…

Video

Next-Gen Identity Analytics and Access Governance Approach

Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity…

Virtual Event

Nov 24 - 25, 2020: cybernetix.world 2020

cybernetix.world is the first decentralized event for global communities. This event offers you talks, panel discussions and workshops relevant for an enterprise executive but also for a private citizen. The event will cover all aspects of digitalization and the interaction of humans and technology.

Video

Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems. That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of…

Blog

The Perfect Shot!

Shooting from the hip is easy, because it is fast and sound like you’re making an impact. But do you hit the mark? When you study the ‘art of shooting’ a bit there is a whole lot of practice to it, it takes time and every shot is highly contextual. No soldier goes into…

Blog

There Is a Price to Pay for Using the Shiny, Bright Cloud Service

One of the slides I use most frequently these days is about Identity Brokers or Identity Fabrics, that manage the access of everyone to every service. This slide is based on recent experience from several customer advisories, with these customers needing to connect an ever-increasing number…

Video

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.

Webinar

May 09, 2019: Next-Gen Identity Analytics and Access Governance Approach

Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity…

Video

Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart…

Webinar

May 28, 2019: All the Roads Lead to the C, Paved with B2B

More and more organizations use CIAM for B2B use cases as such combination can help companies position themselves on the market. While no one argues that user experience journey for the B2B Customer is just as important as any other customer, they most certainly need a relatively different…

Webinar

Apr 30, 2019: Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems.

Boot Camp

May 17, 2019: Microservice & Identity Boot Camp

Webinar

Mar 26, 2019: Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 

Webinar

Mar 21, 2019: Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

Conference

Nov 12 - 14, 2019: Cyber Access Summit 2019

Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access…

Video

Solving New Authentication Challenges While Finding Parity Between User Experience and Security

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.