Access Management

Webinar

Jan 28, 2016: Identitätsmanagement im Mittelpunkt der digitalen Transformation

Die erste Hype-Welle um das Internet of Things (IoT) hat an vielen Stellen die Privatsphäre und das Dateneigentum unberücksichtigt gelassen. IoT Implementierungen müssen die Beziehung von Nutzern, Nutzerdaten, Dingen und Diensten (Services) berücksichtigen. Nur dann können sie erfolgreich…

Webinar

Jan 19, 2016: How to Ensure the Success of Your Privileged Access Management Projects

The majority of 2015's high profile security breaches can be attributed to lost or stolen credentials and nowhere are the stakes higher than with those distributed to “super users”. It’s no surprise, therefore, that many organisations looking to shore up their defences start with privileged…

Webinar

Jan 12, 2016: Dell Identity Manager 7.0: Why Things Have Changed

IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company.…

Webcast

One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Executive View

Executive View: AWS Directory Service and Identity and Access Management - 71450

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

Blog

Microsoft Azure AD B2B and B2C: Cloud IAM for managing the masses

With its recent announcement of Microsoft Azure Active Directory B2B (Business-to-Business) and B2C (Business-to-Customer/consumer/client), which are in Public Preview now, Microsoft has extended the capabilities of Azure AD (Active Directory). Detailed information is available in the Active…

Executive View

Executive View: Evidian Identity & Access Manager - 70871

Evidian Identity & Access Manager is an integrated solution for Identity Provisioning and Access Governance. It provides strong capabilities in these areas and excellent integration into the Evidian products such as Enterprise Single Sign-On.

Webcast

7 Common Symptoms of IAM & IAG Diseases

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Webcast

Effiziente Administration von Benutzerberechtigungen - Wenn Rollenvergaben alleine nicht ausreichen

Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig…

Webcast

From Static Roles to Dynamic Attribute-Based Authorisation

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than…

Blog

Adaptive Policy-based Access Management (APAM)

Attribute-based Access Control (ABAC ) has been with us for many years; it embodies a wide range of systems that control access to protected resources based on attributes of the requesting party. As the field has developed there are three characteristics that are most desirable in an ABAC…

Leadership Brief

Leadership Brief: Prevent, Detect, Respond: the Changing Face of IAM - 71305

As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.

Leadership Brief

Leadership Brief: How to Justify your IAM Investments - 71410

IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   

Advisory Note

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Webinar

Oct 22, 2015: One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

A few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital…

Webinar

Oct 08, 2015: 7 common symptoms of IAM & IAG diseases - the causes and how to heal them

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification,…

Executive View

Executive View: Unify Identity Broker V5.0 - 71300

In today’s environment, with so many demands on identity information, an advanced identity provider service is required that can integrate disparate technology and bridge mature identity management environments to the new requirements of Cloud services, mobile device management and…

Advisory Note

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

Webinar

Sep 17, 2015: Effiziente Administration von Benutzerberechtigungen - Wenn Rollenvergaben alleine nicht ausreichen

Die Einhaltung und Umsetzung komplexer Regularien stellt viele Organisationen vor große Herausforderungen. Das Berechtigungsmanagement muss mit Blick auf die Vielzahl möglicher Berechtigungen beherrschbar bleiben. Eine rein rollenbasierende Berechtigung ist aber mit Blick auf die notwendig…

Webcast

Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Webcast

How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Webcast

Ground Control to Major CRO: Is Identity Governance a Risky Experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Webinar

Sep 08, 2015: From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure compliance

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than…

Webinar

Jun 17, 2015: How to Cope with Challenging Identities in a Converged World

Over the past years the term of the Identity Explosion, depicting the exponential growth of identities organizations have to deal with, raised. We introduced the need for a new ABC: Agile Business, Connected. While agility is a key business requirement, connected organizations are a…

Leadership Brief

Leadership Brief: Facing the Future: Identity Opportunities for Telcos - 71287

Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising…

Webcast

Louis-Marie Fouchard - Cybersecurity for Critical Infrastructures and Industry 4.0: Shaping the future of IAM

Identity and Access Management is one of the core building blocks to address IT/OT challenges. The specific situation of OT solutions and critical infrastructures, however, entails a set of functional and non-functional requirements which cannot be fulfilled by off-the-shelf IAM products…

Webcast

Nick Tuffs - The Good, the Bad and the Ugly of IAM: An Enterprise View

Vodafone’s Workforce Identity and Access Management (WIAM) platform treads the line between Security - being a guardian of the Vodafone brand – and a Business Enabler – providing an agile, cost-effective, simple method of allowing 350,000 users to access IS and telecom…

Webcast

Ravi Srinivasan - Digital Identities = Security Threats. Is your IAM Program Ready?

Digital Identities are transforming the way companies architect their IT environment. They adapt and optimize by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering…

Executive View

Executive View: GlobalSign - 71051

GlobalSign, one of the world’s biggest certificate authorities, and a leading provider of identity services, recently acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management (IAM) solutions. Ubisecure’s leading…

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Executive View

Executive View: Identity Automation RapidIdentity - 71203

Identity Automation’s RapidIdentity is a streamlined solution covering key functions of Identity and Access Management & Governance in an integrated offering. A particular strength is the strong out-of-the-box support for common requirements in that area.

Webinar

Jun 23, 2015: Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Executive View

Executive View: iWelcome Identity & Access Management as a Service - 71205

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

Executive View

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

Webcast

Lean, Intelligent IAM Processes for the ABC - Agile, Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Webinar

Jun 02, 2015: Ground Control to Major CRO: Is Identity Governance a risky experience?

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Webcast

External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Blog

Redesigning access controls for IAM deployments?

A few weeks ago I read an article in Network World, entitled “A common theme in identity and access management failure: lack of Active Directory optimization”. Essentially, it is about the fact that Microsoft Active Directory (AD) commonly needs some redesign when starting an IAM…

Advisory Note

Advisory Note: Top Cyber Threats - 71032

Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand…

Webcast

Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Webinar

Apr 21, 2015: External IAM & Your CRM - A Winning Combination

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of…

Webinar

Apr 23, 2015: Lean, Intelligent IAM processes for the ABC - Agile Business, Connected

The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for…

Advisory Note

Advisory Note: ABAC done right - 71134

There is an increasing number of documents purporting to advise on how to migrate to an Attribute-Based Access Control environment. The real requirement is for Adaptive Policy-based Access Management. Here are some tips...

Blog

Adaptive Policy-based Access Management (APAM): The Future of Authentication and Authorization

It’s not RBAC vs. ABAC – it’s APAM. Over the past several years, there have been a lot of discussions around terms such as RBAC (Role Based Access Control), ABAC (Attribute Based Access Control), Dynamic Authorization Management (DAM) and standards such as XACML. Other terms such as RiskBAC…

Seminar

Mar 02, 2015: Executive Luncheon & Seminar: A "Krash" course on Identity & Access Management

This Executive Luncheon & Afternoon seminar will provide an overall view on Identity & Access Management and Identity & Access Governance IAM/IAG and the various subtopics to allow you to - define your own "big picture" for your future IAM infrastructure.

Advisory Note

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and…

Executive View

Executive View: NetIQ Access Manager - 71054

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid…

Webcast

Mastering the Digitalization of Business: Digital Identities and the Cloud

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their…

Webinar

Mar 10, 2015: Access Management and Federation for the Agile, Connected Enterprise

Two things are for sure in IT today: The cloud is here to stay. And on-premise IT at least in medium-sized and large organizations will not disappear quickly. IT environments are increasingly becoming hybrid. This requires well thought-out solutions for connecting the on-premise and the…

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Ambient Intelligence Can’t Mature Without an Identity Protocol

Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital experiences. This growing range of smart devices – both in the IoT sense and the intelligent AI sense – mean we are moving beyond a singular focus on the smartphone. This heightened immersion into increasingly distributed, decentralized digital networks is what KuppingerCole has termed [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00