Access Management

Webcast

Business Ready IAM with Sony Computer Entertainment and Simeio Solutions

KuppingerCole Webinar recording

Seminar

Feb 19, 2014: Identity & Access Management Experts Day

Deep dives into technology & architectures: The Identity & Access Management Experts Day is the place, where you meet with Identity & Access Management experts for in-depth discussion on the future of Identity Management, Cloud Computing and Information Security.

Webcast

Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?

KuppingerCole Webinar recording

Blog

IAM@IBM: Finally back to leadership

It has been somewhat quiet around IBM’s IAM offering for the past few years. Having been one of the first large vendors entering that market, other vendors had overhauled IBM, being more innovative and setting the pace in this still emerging market. This seems to be over now and IBM is…

Webinar

Dec 10, 2013: Best Practice Webinar: Business Ready IAM with Sony Computer Entertainment and Simeio Solutions

In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important…

Webinar

Dec 04, 2013: Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?

Many organizations have started their journey into the world of IAM several years ago.

Executive View

Executive View: Evidian Enterprise SSO - 70823

Despite being one of the more traditional and well-established areas of Identity and Access Management (IAM), and despite the fact there is still an obvious business benefit and quick-win potential in Enterprise Single Sign-On (E-SSO)  there are still many organizations that have not…

Leadership Compass

Leadership Compass: Access Management and Federation - 70790

With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that…

Blog

GEICO prepares to take IAM to new levels

GEICO the third-largest private passenger auto insurer, serving more that 12 million private passenger customers, have selected the Open Identity Stack from ForgeRock to help them take IAM to the next level. The ForgeRock Open Identity Stack is a 100 percent open source identity stack to…

Blog

RSA acquires Aveksa: Will they redefine the IAM/IAG market?

Today RSA Security, a part of EMC [officially it’s “RSA, The Security Division of EMC”], has officially announced the acquisition of Aveksa, a company based in Waltham, MA. The deal closed on July 1st, 2013. Aveksa is a leading provider in the area of Identity and Access Governance (IAG), as…

Webcast

Panel Discussion - From Risk to Value: The Future of Social Media and their Role as Catalysts in Enterprise IAM

Session at the European Identity & Cloud Conference 2013 May 16, 2013 15:30

Webcast

Daniel Frei - Risk-based Access Management @Swiss Re

Session at the European Identity & Cloud Conference 2013 May 15, 2013 15:30

Webcast

Ulrich Haumann - IAM Governance Outside IT

Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:30

Webcast

Dr. Carsten Mielke - A Success Story Introducing User Access Management for an Energy Trading Company

Session at the European Identity & Cloud Conference 2013 May 15, 2013 14:00

Webcast

Peter Weierich - Consumer IAM: Business Drivers and Challenges

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Webcast

Philip Lieberman - Securing Privileged Identities in the Real World: A Proposed Maturity Model of Competence and Capabilities

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Webcast

Panel Discussion - The Future of IAM

Keynote at the European Identity & Cloud Conference 2013 May 14-17, 2013 at Munich, Germany

Executive View

European Identity & Cloud Award 2013: OAuth 2.0 - 70778

European Identity Award 2013 for „Best Innovation/New Standard in Information Security”: A new standard that rapidly gained momentum and plays a central role for future concepts of Identity Federation and Cloud Security.

Advisory Note

Advisory Note: Top Trends 2013-2014 IAM/IAG, Cloud, Privacy - 70782

As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended…

Advisory Note

Advisory Note: Typical Risks and Pitfalls for IAM and IAG projects - 70749

Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can…

Blog

Another dead body in IT? Or is XACML still alive?

Since my colleague Craig Burton has declared that SAML is dead, it seems to be in vogue among analysts to take the role of the public medical officer and to diagnose the death of standards or even IAM (Identity and Access Management) in general. Admittedly, the latter case was not about…

Webcast

The Common Credentials Dilemma - How to Get a Grip on Password Sprawl for Privileged Accounts

KuppingerCole Webinar recording

Webinar

May 10, 2013: The Common Credentials Dilemma – how to get a grip on password sprawl for privileged accounts

A lot of organizations still have not mitigated one of the most severe IT security risks: Password sprawl for privileged accounts. Privileged accounts are accounts that have elevated privileges. They can be both personal, such as business users with high-level privileges, and shared, such as…

Webcast

Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!

KuppingerCole Webinar recording

Webcast

Rapidly Evolving Identity & Access Management to Meet Today´s B2C & Cloud Challenges

KuppingerCole Webinar recording

Webinar

Apr 23, 2013: Bridging (the gap between) Access Governance and Privileged User Management … and they lived happily ever after!

Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within…

Advisory Note

Advisory Note: Privilege Management - 70736

Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years,…

Blog

How to license Identity and Access Management software?

Recently I had some conversations with both vendors and customers about licensing models for IAM (Identity and Access Management) software. Historically, most licensing models were (and still are) based on the number of users, typically “named” users (rather than “concurrent” users). License…

Webinar

Apr 16, 2013: Rapidly Evolving Identity & Access Management to Meet Today´s B2C & Cloud Challenges

The world of Identity and Access Management is growing in scope, and must change and adapt faster than ever before. CIOs are under pressure to shift from employee-centric IAM to consumer-facing IAM that drives top-line revenue. As a result, they are quickly learning that legacy enterprise…

Blog

Why we need Dynamic Authorization Management

One of the topics I’ve been evangelizing for years is Dynamic Authorization Management. Dynamic Authorization Management is about externalizing authorization decisions outside of applications. It is about using an “application security infrastructure” which performs the authorization…

Blog

Do we need to kill IAM to save it?

Last week I received a newsletter from Radiant Logic, a vendor of Virtual Directory Services and some other IAM stuff like Federation Services. This newsletter pointed to a video of a presentation of Gartner analyst Ian Glazer titled “Killing Identity Management in Order to Save it,” which…

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Leading IDaaS Supplier OneLogin Aiming for the Top

OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management, but is aiming to move even further up the ranks. In a media and analyst briefing, OneLogin representatives talked through key and recent product features and capabilities in an ongoing effort improve the completeness of products. Innovation is a key capability in IT market segments, and unsurprisingly this [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00