Access Management

Webcast

IAM and GRC Market Today and 2009

What We Have Observed This Year and What We Expect for 2009

Blog

GRC platforms - more than IAM

GRC (Governance, Risk Management, Compliance) is frequently reduced to IAM (Identity and Access Management) or, in best case, to a more business-centric layer on top of IAM infrastructures. In our research and publications around GRC we've pointed out that GRC platforms will have to go well…

Webinar

Dec 18, 2008: IAM and GRC Market Today and 2009 – What we have Observed this Year and what we Expect for 2009

The final Kuppinger Cole Webinar in 2008 will provide a conclusion of what we have observed in our research during 2008 - trends, interesting vendors and concepts, emerging standards, remarkable best practices. Based on this, we will also talk about our view on what we expect to happen in 2009.

Blog

Who should be in charge of IAM?

This morning, I had two conversations on the question about who should be in charge of IAM in an organization. Afterwards, I run through my records and did some analysis. The main question: Which role do the IAM and GRC responsibles have in their organizations? I for sure only did a sample…

Blog

Trend Report IAM and GRC 2009-2019

Investments in IAM and GRC have to solve current needs - but what about the future? With IAM and GRC building the cornerstones of a holistic security infrastructure, decisions within these areas are fundamentally influencing corporate IT and therefore should remain valid beyond a scope of…

Advisory Note

Trend Report IAM and GRC 2009-2019

Webinar

Oct 02, 2008: Kuppinger Cole Trend Report IAM and GRC 2009-2019

During this webinar, Martin Kuppinger will present the key results of the Kuppinger Cole Trend Report IAM and GRC 2009-2019.

Blog

GRC and IAM - you can't separate it

At EIC 2008 I've presented our view on the relationship of GRC and IAM as well as our definition of the GRC market, the core results of our GRC market report 2008. Basically, the generic GRC tools we see emerging in the market are becoming more and more the business layer above the classical…

Blog

Siemens DirX - back in the IAM market...

Some time ago, as a result of some of the fundamental reorganizations Siemens had to do within the last two years ago, the department responsible for the DirX solutions has been moved into the healthcare unit of Siemens. That was a somewhat unusual place for an identity management product…

Advisory Note

Trend Report: IAM und SOA 2008

Eine gemeinsame Studie von KCP und Ernst & Young AG Wirtschaftsprüfungsgesellschaft Steuerberatungsgesellschaft Deutschland

Blog

M-Tech - another interesting player in the IAM market

While M-Tech has a long customer list in northern America there are only a few customers here in Europe - even while M-Tech offers a comprehensive IAM suite. But M-Tech plans to address the European market more actively than before. They might have success if they do it the right way, with…

Webcast

IAM und SOA

8 Minutes audio enhanced presentation

Blog

User Centric IAM - all a lie?

I talked to my Sensei-san, Dr. Kpatcha Bayarou of Fraunhofer SIT, recently and allthough only having a few minutes, we came to some extreme views on what User Centric IAM really was about. Power! The power to control who gets access to what of my content and information! You are reading…

Blog

Still unsolved: The relationship between IAM, SOA, and BSM

In a, may be, simplistic view on IT there are three important pillars on the IT infrastructure level. Using the - sometimes improper - buzzwords, these are Identity (and Access) Management (IAM) SOA - in fact more the technologies for business processes and flexible applications, e.g.…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Data-Driven Decision Making for Identity Security

Data-Driven Decision Making for Identity Security

Symantec Enterprise: With more informed decisions comes more automated security. In today’s Zero Trust world, where the principle of least privilege is ubiquitous, enterprises are struggling to balance security while simultaneously enabling a highly agile business environment. There has always been friction with security and making highly specific security decisions quickly and efficiently contributes to this. Moreover, decision-making in enterprises exists on a spectrum from completely [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00