Access Management

Congress

European Identity & Cloud Conference 2018

Get to the place where the Digital Transformation is alive. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture out of best practice discussion, visionary presentations and networking with a future orientated community. More than 800 participants consisting…

Conference

Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Executive View

Executive View: SailPoint SecurityIQ - 70849

SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the…

Executive View

Executive View: Thycotic Secret Server - 71060

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach…

Blog

A Short History of EIC - Europe's Leading Event on Digital ID & Transformation

More than 12 years ago, the first EIC attracted an already surprisingly large number of practitioners dealing with directory services, user provisioning and single sign-on, as well as vendors, domain experts, thought leaders and analysts. I remember Dick Hardt giving an incredibly visionary…

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients…

Survey

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003

La « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité…

Blog

Finally: Building up Trust as a Foundation for Sustainable Business Strategies

It seems almost ironical, but the currently and constantly growing number of legal and regulatory requirements might be the important (and first actually working) catalyst for changing the attitude of organizations towards privacy. While the true rationale behind it are most probably the…

Executive View

Executive View: ForgeRock Identity Platform - 70296

ForgeRock Identity Platform delivers a common set of capabilities, as well as  good  integration for the various ForgeRock components. It provides a common layer  for identity and access management services that customers require when  building new consumer - facing…

Executive View

Executive View: SecureAuth IdP - 71327

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Blog

At the Intersection of Identity and Marketing

Digital Transformation is driving a diverse set of business initiatives today, including advanced marketing techniques, creating new consumer services, acquiring better customer information, and even deploying new identity management solutions.  As organizations discover new and…

Executive View

Executive View: Nexis Controle 3.0 - 72535

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entweder als eigenständige Lösung oder als ergänzende Komponente zu bestehenden…

Executive View

Executive View: Nexis Controle 3.0 - 72535

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. The integration of corporate…

Press Release

Analyst Companies Publish Survey about the Current State of Identity and Access Management in Organizations on behalf of BetaSystems

Wiesbaden, June 29th, 2017 – KuppingerCole Ltd., an international and independent analyst organization with a strong focus on Information Security, Identity and Access Management as well as all areas concerning the Digital Transformation, together with CXP Group, an independent…

Survey

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well…

Survey

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most…

Leadership Brief

Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.

Webcast

Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the…

Webcast

Luca Martelli - The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era

Data, People and Software security: how does them relate to the GDPR security principles? In this new attack landscape, network-centric security is no longer enough because threats come from inside and outside the network. Oracle Identity SOC is an identity-centric, context-aware…

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Webcast

André Koot - From RBAC to ABAC in a Pragmatic Way

An Expert Stage presentation at the European Identity and Cloud Conference 2017

Webcast

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data…

Webcast

Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless…

Webinar

Jun 28, 2017: Interoperability and Intelligence: Two Keys to a Successful Privilege Management Deployment

As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the…

Press Release

European Identity & Cloud Awards 2017

Wiesbaden, May 11, 2017 – Last night the European Identity & Cloud Awards 2017 were presented by KuppingerCole at the 11th European Identity & Cloud Conference (EIC). The awards honor outstanding projects and initiatives in Identity & Access Management (IAM),…

Blog

The New Role of Privilege Management

Privilege Management or PxM, also referred to by some vendors as Privileged Account Management, Privileged User Management, Privileged Identity Management, or a number of other terms, is changing rapidly, in two areas: Privilege Management is not only an IAM (Identity & Access…

Webinar

Jun 01, 2017: (Big) Data Security: Protecting Information at the Source

The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just…

Advisory Note

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained …

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Webinar

May 23, 2017: Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of…

Executive View

Executive View: Hitachi ID IAM Suite - 72543

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and…

Advisory Note

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the…

Webcast

Creating Secure and Unified Next Generation Workspaces

Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Webinar

Mar 28, 2017: Creating Secure and Unified Next Generation Workspaces

A key challenge in every organization is making sure that the right tools are available, in the right place, at the right time, for the right people. The continual on and off boarding of large groups of employees, external workforces or partners creates increased pressure on administrative…

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Blog

Do You Need a Better IAM System to Meet the GDPR Requirements?

GDPR, the EU General Data Protection Regulation, is increasingly becoming a hot topic. That does not come as a surprise, given that the EU GDPR has a very broad scope, affecting every data controller (the one who “controls” the PII) and data processor (the one who…

Blog

Accenture to acquire French IAM System Integrator Arismore

Just before Christmas Accenture Security announced the acquisition of French IAM system integrator Arismore, a company with about 270 employees and an estimated turnover of €40M. This makes Arismore a leading IAM system integrator in France, while also being involved in IT…

Executive View

Executive View: FSP Identity Governance and Administration Suite - 71324

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The Sweet Spot for Blockchains: Registries

A couple of days ago, DIACC (Digital ID & Authentication Council of Canada) together with IBM Canada and the Province of British Columbia released information about a PoC (Proof of Concept) for moving corporate registrations to a blockchain-based register. The PoC, which used the Hyperledger [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00