Identity Governance & Administration

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions while also adding a series of own capabilities. Simeio IO allows customers to connect and direct their existing IAM infrastructure in a modern and more efficient way. Using Simeio IO,…

Video

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung…

Whitepaper

Governance over hybrid SAP Environments – the ANZ Story

Cloud adoption, and migration of on-premise applications to cloud services, is increasingly being undertaken by organisations wanting to leverage the business efficiencies that cloud infrastructure affords. For organisations with SAP environments there are impediments to a smooth journey.…

Executive View

NEXIS 4

NEXIS 4 implementiert intelligente Analytik für Rollen und Identitäten und Prozesse zum strategischen Lebenszyklusmanagement von Berechtigungen. Somit bietet NEXIS 4 eine Grundlage für dedizierte und geschäftsorientierte Identity und Access Management (IAM) Self-Services…

Whitepaper

A different way to IGA: Leveraging the ServiceNow infrastructure

IAM is evolving from traditional, on-premises solutions towards IDaaS (Identity as a Service), supporting the changing requirements to IAM as well as to deploying and operating IAM solutions. This whitepaper looks at how to plan for IAM modernization, the alternative paths, and the role IGA…

Whitepaper

Modular Decentralized Identity Architecture

A trend compelling IGA modernization is the need for an Identity driven security model; due to identity silos created by rapid cloud adoption. As organizations rethink their IAM/IGA systems, they may also need to utilize their existing systems while re-architecting their security…

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA, is characterized mainly by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for…

Video

Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market

The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM requirements of hybrid IT environments, but finding the right IDaaS solution with a focus on Identity…

Executive View

Atos Evidian IDaaS

Atos Evidian IDaaS Identity as-a-Service is a new IDaaS solution. In the current release, it is focused on Access Management, including MFA and Identity Federation, and Access Analytics. For authentication and integration with applications, Evidian IDaaS supports both modern standards and…

Executive View

One Identity Manager On Demand

One Identity Manager On Demand is the IDaaS solution of the established One Identity Manager. It comes with feature-parity for all established IGA capabilities, including connectors to target systems and governance capabilities. One Identity supports IDaaS deployments with continuous…

Webinar

Oct 28, 2021: Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls…

Blog

EIC Speaker Spotlight: Mike Kiser on Why Identity Is the New Blue

Mike Kiser, Senior Identity Strategist at SailPoint and passionate storyteller, is to deliver a presentation entitled Identity Is the New Blue on Monday, September 13 starting at 6:00 pm. at EIC 2021. To give you sneak preview of what to expect, we asked Mike some questions about his…

Webinar

Sep 30, 2021: Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market

The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM requirements of hybrid IT environments, but finding the right IDaaS solution with a focus on Identity…

Executive View

Kapstone Autonomous IGA

Due to the quickly changing landscape of IT environments, the complexity of compliance requirements, and the need to shorten application onboarding time, IGA solutions adapt through identity and access intelligence, automation, and flexibility. Kapstone addresses these challenges with its…

Whitepaper

The future of IAM lies in the cloud and as a service

IAM software and tools have traditionally been installed and run on-premises by the organization itself. In recent years, the growth in identities operating across cloud and digital services has seen vendors offering IAM solutions as a service to assist with this growing complexity and…

Leadership Compass

Identity Governance & Administration 2021

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the…

Executive View

NEXIS 4

NEXIS 4 implements intelligent role and identity analytics together with strategic entitlement lifecycle management processes. As such, it provides the basis for dedicated, business-oriented Identity and Access Management (IAM) self-services within an organization either as a stand-alone…

Executive View

Accenture Memority

Accenture Memority is an IDaaS solution supporting both Identity Lifecycle Management and Access Management use cases. It comes with full API support and positions itself as the foundation for a customer’s Identity Fabric. Its strengths stems from the leading-edge support for digital…

Video

Frances Zelazny: The Co-Existence of Biometric Identity, Consumer Privacy, and Digital Security

Video

David Doret: Improving IAM Success Rates with Rigorous Concepts

Video

Amy Nichols: Best Practice Presentation - Using Functional Roles to Solve the Developer Segregation of Duties challenge

Video

Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust

Video

Interview with Robert Byrne

Video

Robert Byrne: IGA in the Cloud without Compromise

Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity Governance and Administration strategy. There is no single right way to do cloud-based Identity and…

Video

Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity

Blog

IGA in a World of Zero Trust

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the…

Blog

IGA in the Cloud without Compromise

There is no single right way to do cloud-based identity and access management (IAM) services. Not only is every organization at a different place in their journey, but each will prioritize cloud benefits differently. Therefore, no matter where you are on your cloud journey, modular and…

Video

Alex Gambill: The Tricky Business of Protecting Your Assets in SAP: A Holistic Perspective

With 77 percent of the world’s transaction revenue touching SAP ERP systems, these crown jewels have long been the prime target for cybercrime and internal threats due to Separation of Duties (SOD) risks, weak access controls and lack of identity management and governance. Today, a…

Video

Accelerate your Identity's Digital Transformation

Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.

Whitepaper

Identity for the Business: Identity Fabrics supporting the Digital Transformation

Business is changing fundamentally. Digital Services are the new normal, both as autonomous business models and accompanying physical goods. The connected vehicle and the changes in transportation illustrate this perfectly well. Businesses require a new type of infrastructure for managing…

Video

Pooja Agrawalla: Are You Building a Legacy IGA?

Video

Insights of A CISO: Interview with Dr. Ralf Schneider

Video

Darran Rolls: IGA Under Fire? Requirements and Essential Best Practices for Protecting the Keys to your Kingdom

Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector.  In today’s complex and highly distributed enterprise security supply chain, are you adequately protecting the identity and access administration capabilities at the center of your…

Video

Flemming Hartwich: IGA - the Right Place for Identities?

Video

Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization

IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market, and technologies have matured. However, 20 years of maturity are a lot for IT, also indicating…

Video

Stephanie van der Loos: Seamless Employee Access Lifecycle

Video

Joakim Hardell: Cloud Strategy vs. National Security. Telia's Road to IGA Systems Modernization

We will give you a sneak peek on Telia Company’s current journey towards IGA system modernization. After the presentation you will have a good overview and some insight in what is cooking right now and where we are going with focus on Cloud strategy VS National Security which is the…

Video

Richard Hill: Identity Governance and Administration - Where Does IGA Fit In

Video

Where to Start Your IAM Modernization Journey

Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex. In this video blog post, Martin gives practical advice on…

Virtual Event

May 11, 2021: Modern IGA Capabilities for Identity-Centric Security

Join the KCLive Event on IGA capabilities for identity-centric security to challenge legacy IGA and get insights on reducing security risk, strengthen compliance and improve efficiency with a modern future-oriented approach.

Executive View

BeyondTrust Endpoint Privilege Management

Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin accounts, privilege management now…

Buyer's Compass

Identity Governance & Administration (IGA)

Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intelligent features. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors,…

Virtual Event

Jun 09 - 10, 2021: Cyber Access Summit 2021

Erfahren Sie alles rund um modernes Access Management auf dem virtuellen KCLive Event Cyber Access Summit 2021 am 9. und 10. Juni. Jetzt anmelden!

Virtual Event

Mar 16, 2021: IGA for Successfully Managed Identities

Join the KCLive Event on Identity Governance and Administration on March 16, 2021 to discover IGA's core capabilities to enable and protect digital transformation.

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, customers can converge existing IAM siloed solutions, that can then be operated by Simeio as an MSP or as an IDaaS.…

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the mature Archer Suite which offers a comprehensive range of solutions and features to assist…

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards.  PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications.  PingFederate works both on-premises or in the cloud and is easy for…

Video

IAM Essentials: Lifecycle Management

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables organizations to take action on that data to meet privacy, security, and governance requirements by…

Executive View

ideiio

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and ensure compliance with applicable laws and regulations. ideiio focuses on providing a straightforward and…

Video

IAM Essentials: Identity Governance and Administration

Video

Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers. Continually changing and increasing…

Webinar

Jun 30, 2020: Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers.

Executive View

Executive View: Omada Identity Suite - 80506

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing insight into access risks. Omada Identity Suite not only supports this with Access Governance…

Leadership Compass

Leadership Compass: Identity Governance & Administration (IGA) - 80063

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA…

Whitepaper

Whitepaper: Fast Access Management in the Hybrid Cloud for SMBs - 80137

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud services that are used on-demand but discarded when no longer needed, finding a scalable solution without big IT…

Leadership Brief

Leadership Brief: Typical Risks and Pitfalls for IGA Projects - 72580

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effective Identity Governance & Administration (IGA) capability has never been greater. This leadership brief…

Executive View

Executive View: PlainID Policy Manager - 80315

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access  across  all identities, systems, and applications with the help of centrally managed business-focused policies.

Executive View

Executive View: Callsign Intelligence Driven Authentication - 80174

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solutions, all capabilities are tightly integrated. The platform uses AI/ML for risk analysis and supports passive and…

Executive View

Executive View: Oracle Identity Governance - 80157

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identity Governance (OIG) addresses compliance at scale within the more modern cloud environments.

Whitepaper

Whitepaper: CCPA: The Need for Data-Centric Security - 80136

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take appropriate action to comply with CCPA. While handling consent and opt-outs are at the forefront,…

Leadership Compass

Leadership Compass: Identity as a Service (IDaaS) IGA - 80051

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for…

Executive View

Executive View: Devolutions PAM Solution - 80070

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced…

Whitepaper

Whitepaper: Ein schlanker Ansatz für Identity & Access Governance - 80107

Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die Ansätze zu Identity & Access Governance zu überprüfen und schlanke Konzepte…

Whitepaper

Whitepaper: A Lean Approach on Identity & Access Governance - 80048

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean concepts that help businesses to comply in an…

Executive View

Executive View: Service Layers Managed IAM - 80129

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, container-based deployments, and microservices architectures. It thus can be run and operated on various…

Blog

Benefits of IAM in Healthcare: Compliance, Security, Profits and More

Healthcare organizations must use IAM as an integral part of their IT infrastructure in order to cope with challenges in various fields, such as compliance, regulations, cybersecurity, and Digital Transformation. In this respect, IAM not only serves as a security technology but also as a…

Blog

Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)

Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial IoT continue to be developed and designed to perform specific functions and security is often a…

Video

The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance

Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across the entire IT landscape, starting with an initial clean-up. This can result in complex projects…

Executive View

Executive View: ManageEngine AD360 - 79070

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that go beyond pure entitlement, by adding authentication features, UBA (User Behavior Analytics), and even Single…

Executive View

Executive View: WSO2 Identity Server - 80060

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of application and service APIs. WSO2 Identity Server provides a comprehensive and flexible solution for the…

Webinar

Apr 09, 2019: The Fast Track to Regulatory Compliance: Lean, Efficient, and User-Centric Access Governance

Various regulations mandate businesses not only to implement an IGA (Identity Governance & Administration) solution, but as part of that to regularly review their access entitlements across the entire IT landscape, starting with an initial clean-up. This can result in complex projects with…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 79050

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des…

Executive View

Executive View: 1Kosmos BlockID - 79064

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and…

Executive View

Executive View: MinerEye Data Tracker - 79063

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access…

Executive View

Executive View: One Identity Safeguard - 79042

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market,…

Executive View

Executive View: RSA® Identity Governance and Lifecycle - 71052

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to…

Executive View

Executive View: RadiantOne Federated Identity Suite - 70845

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important building block at the center of an integrated identity management capability.

Executive View

Executive View: Axiomatics APS - 70346

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy…

Executive View

Excutive View: Imprivata - 71514

On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from Caradigm. With that offering they are broadening their portfolio while remaining focused on the healthcare…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 70841

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des…

Blog

Blog

CSLS Speaker Spotlight: Martin Kuppinger on Cloud Security

CSLS Speaker Spotlight: Martin Kuppinger on Cloud Security
Fabian Süß

Martin Kuppinger, Principal Analyst at KuppingerCole, will give a presentation entitled Cloud Security 2025 – Perspective & Roadmap on Thursday, November 11 from 11:00 am to 11:20 am at Cybersecurity Leadership Summit 2021. To give you a sneak preview of what to expect, we asked Martin some questions about his presentation. Are today's identity and access solutions such as IGA and PAM able to serve the needs of today's complex multi-cloud, multi-hybrid IT environments? I think [...]

Latest Insights

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00