Access Management

Advisory Note

Advisory Note: Enterprise Role Management - 70285

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the…

Executive View

Executive View: ForgeRock Access Management - 71316

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system.  It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards…

Webcast

The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient. Privilege…

Blog

Consumer Identity Summit 2016 - Summary

KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well attended, and featured excellent expert speakers from all across the globe.  The popularity of…

Webcast

Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures with a known ROI, a detection plan so that you know before your customers and a mitigation…

Blog

GlobalPlatform Conference Review

GlobalPlatform recently held their annual conference in Santa Clara, California. GlobalPlatform is an international standards organization that defines specifications for the Trusted Execution Environment (TEE), or the secure virtual operating system within the OSes of mobile devices. It…

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Advisory Note

Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect,…

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Webinar

Dec 06, 2016: Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new…

Webcast

How to easily expand Identity & Access Management to the Cloud

Many large enterprises operate with a glut of access security platforms and tools that each service a specific silo of applications and resources. Most are proprietary, and many have expensive and time-consuming agent-based architectures. In addition, because they are usually very tightly…

Webcast

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust…

Press Release

Save The Date – Consumer Identity Summit, 22 to 23 November 2016

Wiesbaden, 18 October 2016 – For the first time the Consumer Identity Summit 2016 will take place from 22nd to 23rd November 2016 at the Palais Brongniart in Paris France. The event is one of the first collaborative events between CXP Group, the independent European…

Webinar

Dec 08, 2016: The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.

Webcast

State-of-the-Art Privilege Management by Design

Privilege Management needs to be injected into the DNA of any IT infrastructure, it must not merely be understood as a point solution for some critical access. An adequate management of shared accounts is still a vital foundation layer for Privilege Management. Controlling applications on…

Webinar

Oct 25, 2016: How to easily expand Identity & Access Management to the Cloud

Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.

Executive View

Executive View: Ergon Airlock Suite - 72509

Ergon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management…

Leadership Brief

Leadership Brief: Transforming IAM – not Panicking - 71411

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Blog

Ping Identity Acquires UnboundID

Today, Ping Identity announced the acquisition of UnboundID. The two companies have been partnering already for a while, with a number of joint customers. After the recent acquisition of Ping Identity by Vista Equity Partners, a private equity firm, this first acquisition of Ping Identity…

Webinar

Oct 06, 2016: State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

Executive View

Executive View: Deep Identity - 71453

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open…

Executive View

Executive View: IBM Privileged Identity Manager - 71557

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its…

Webinar

Oct 18, 2016: The Future of Data-Centric Security

Business boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with…

Leadership Seminar

Sep 22, 2016: Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one…

Executive View

Executive View: Auth0 Authentication Service - 71325

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are…

Executive View

Executive View: ForgeRock OpenIDM - 71317

ForgeRock OpenIDM is a standards- and platform-centric product which combines proven reliability with ForgeRock’s commitment to innovation. Given the growing importance of customer-centric identity management, OpenIDM’s focus on performance, flexibility and the management of not…

Executive View

Executive View: Microsoft Azure Active Directory - 71550

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

Executive View

Executive View: Protected Networks 8MAN - 71520

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende…

Webcast

Identity Relationship Management: Kommunikation und Kollaboration mit Partnern und Kunden sicher steuern

Mit der steigenden Nachfrage von Unternehmen nach engerer Kommunikation und Kollaboration mit externen Partnern und Kunden wächst auch der Bedarf an professionellem Web Access Management und Identity Federation. Geeignete Lösungen ermöglichen sichere Zugänge von und auf externe Systeme, auch…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Executive View

Executive View: ForgeRock Identity Gateway - 71318

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

Executive View

Executive View: AdNovum Nevis Security Suite - 71094

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Executive View

Executive View: Bomgar Privileged Access Management - 71307

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise…

Webcast

Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against…

Executive View

Executive View: Forum Systems Sentry and Identity Federation - 72511

Sentry, Forum Systems flagship product, implements a wide range of features: support for a wide range of federation use case scenarios are complemented with API Gateway functionality and mature Web Access Management services.

Executive View

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged…

Blog

Security & Privacy by Design is Agility by Design – time to rethink Banking IT

81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed quickly in other banks. SWIFT reacted by announcing security improvements, including two-factor…

Blog

Vista Equity Partners to Acquire Ping Identity

Yesterday, Ping Identity announced the intent of Vista Equity Partners to acquire it. Ping Identity is a privately held company backed by venture capital, and will become acquired by a private equity firm. This acquisition is no real surprise to me. We have seen a few private equity deals…

Executive View

Executive View: One Identity Manager v7.0.1 - 70894

One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the major release (v7), and adds a significant number of new features along with performance…

Webinar

Jun 28, 2016: Identity Relationship Management: Kommunikation und Kollaboration mit Partnern und Kunden sicher steuern

Mit der steigenden Nachfrage von Unternehmen nach engerer Kommunikation und Kollaboration mit externen Partnern und Kunden wächst auch der Bedarf an professionellem Web Access Management und Identity Federation. Geeignete Lösungen ermöglichen sichere Zugänge von und auf externe Systeme, auch…

Webcast

Darran Rolls - The Anatomy of Your Next Cyber Attack: IAM Pitfalls and Protections

Security breaches and cyber attacks have become a daily occurrence. Worse, in some cases it can take an organization months to realize they’ve been breached. Open the pages of the latest breach forensic report and you will find a litany of basic IAM errors that read like a horror…

Executive View

Executive View: PingAccess - 71507

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web Access Management products with its ability to provide policy- and context-driven access control to…

Executive View

Executive View: Omada Identity Suite v11.1 - 70835

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

Webcast

Patrick Parker - Reimagining Identity and Access Management Processes with Algorithms

We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine. The machine-reengineering revolution will leverage powerful algorithms and…

Webcast

John Worrall - The Most Travelled Attack Route: Securing the Privileged Pathway

Privileged accounts have been at the center of each recent high-profile attack. This session will explain how hackers that successfully exploit these accounts are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely…

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Press Release

Rückblick auf die 10. European Identity and Cloud Conference 2016

Wiesbaden, 18. Mai 2016 – Am letzten Freitag endete die von KuppingerCole in München veranstaltete 10. European Identity & Cloud Conference 2016, Europas führende Veranstaltung für Identity and Access Management (IAM), Governance, Risk Management and Compliance…

Blog

Winners of the European Identity & Cloud Awards 2016

KuppingerCole presented The European Identity & Cloud Awards 2016 last night at the 10th European Identity & Cloud Conference (EIC). These awards honor outstanding projects and initiatives in Identity & Access Management (IAM), Governance, Risk Management and Compliance (GRC), as…

Webcast

Ian Glazer - The Moments Ahead for Identity

Remember when we used to pay for a TCP/IP stack? It’s hard to believe that companies used to pay for networking stacks, but we did. And once network stacks became free, the networking profession didn’t die out… instead it flourished. Today, the identity industry is going…

Webcast

Dr. Sridhar Muppidi - Security Starts with Identity and Access

People are the weak link in security. Most data breaches start with bad actors using stolen user credentials and this is fundamentally an identity problem. For too long Identity & Access Management has been viewed as silo often walled off from the security group but this must change.…

Webcast

Dr. Emilio Mordini - In a Wilderness of Mirrors: Do we still need Trust in the Online World?

Trust always involves some level of vulnerability on the actions of another. When we trust others, we are relying on them and consequently we are making ourselves more vulnerable. A bit naively, some scholars argue that trust decisions are based on a cost/benefit analysis, which is maybe…

Webcast

André Durand - Navigating a Moment of Change, Disruption & Inflection in Identity & Security

Webcast

Mia Harbitz - Identity Management, Governance and Forced Migration

New thinking is required with regards to identity management for forced migrants and the role supranational institutions can play to help solve some of the problems regarding aid distribution and settlement.

Press Release

10. European Identity and Cloud Conference 2016 startet morgen

München, 9. Mai 2016 – Unter dem Motto „Enabling Agility and Innovation in the Age of Digital Transformation“ (Agilität und Innovation im Zeitalter der Digitalen Transformation ermöglichen) startet morgen in München die European Identity &…

Press Release

10th European Identity and Cloud Conference 2016 is approaching

Munich, May 9, 2016 – Under the motto „Enabling Agility and Innovation in the Age of Digital Transformation “ the European Identity & Cloud Conference 2016, Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and…

Leadership Brief

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

Leadership Brief

Leadership Brief: The 5 Biggest IAM Myths - 72001

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

Webcast

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Executive View

Executive View: CyberArk Privileged Threat Analytics - 71540

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now…

Webinar

Jun 14, 2016: Authentication, Access, Assets: The Triple A of Securing Sensitive Systems and Information

In more than two thirds of all cyber breaches, a misused privileged account serves as the entrance gate. Historically, managing privileged access focused on protecting privileged accounts by securing and managing passwords. But today, simply rotating passwords isn’t enough to defend against…

Executive View

Executive View: Atos DirX Identity V8.5 - 70896

Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for…

Webcast

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to…

Executive View

Executive View: BeyondTrust PowerBroker - 71504

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Executive View

Executive View: Gigya Customer Identity Management Suite - 71529

A feature-rich customer identity management platform providing strong analytics and tools for business-oriented decision-making processes while enabling compliance with legal and regulatory requirements and an adequately high level of security.

Executive View

Executive View: Balabit Shell Control Box - 71570

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change…

Webcast

Fueling Digital Innovation with Customer Identities

Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining…

Webcast

Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Webinar

May 03, 2016: Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Webinar

Apr 28, 2016: Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Webinar

Apr 19, 2016: Fueling Digital Innovation with Customer Identities

Identity management has become far more than a key component for defining security and access controls. Understanding customers’ identities through all of their interactions with an organization is key to developing strong and enduring relationships across multiple channels. Combining…

Press Release

Save The Date – European Identity & Cloud Conference, 10. bis 13. Mai 2016

Wiesbaden, 08. März 2016  – Bereits zum 10. Mal findet die  European Identity & Cloud Conference (EIC)  statt. Vom  10. bis 13. Mai 2016  lädt KuppingerCole  ins Dolce Ballhaus Forum Unterschleißheim, München  ein. Als…

Press Release

Save The Date – European Identity & Cloud Conference, 10 to 13 May 2016

Wiesbaden, 8th March 2016 – For the 10th time KuppingerCole’s European Identity & Cloud Conference (EIC) takes place from 10th to 13th May 2016 at the Dolce Ballhaus Forum in Unterschleissheim, Munich, Germany . As Europe’s leading event for the Future of…

Blog

Challenges of large-scale IAM environments

Long before analysts, vendors or journalists were coining terms like Digitalization, Identity Relationship Management or Customer IAM, several industries were already confronted with large-scale Identity and Access management (IAM) environments. Due to the character of their businesses they…

Blog

„Disruptive Change“: Right time to think security anew

Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already changing profoundly. Communication with customers no longer happens over traditional websites. It…

Blog

Thycotic acquires Arellia – moving beyond pure Privilege Management

On February 23rd, 2016, Thycotic, one of the leading vendors in the area of Privilege Management (also commonly referred to as Privileged Account Management or Privileged Identity Management) announced the acquisition of Arellia. Arellia delivers Endpoint Security functionality and, in…

Executive View

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with…

Webinar

Apr 14, 2016: Consumer-Focused Identity Management

Consumer expectations of Identity and Access Management (IAM) - even if they don't know what it is - are evolving and growing ever higher. The ability to use social media accounts to gain access to various services has revolutionised the way consumers see the space. Increasingly, banks and…

Leadership Compass

Leadership Compass: Privilege Management - 71100

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre…

Webcast

Identitätsmanagement im Mittelpunkt der digitalen Transformation

KuppingerCole Webinar recording

Executive View

Executive View: Nexis contROLE - 71502

Nexis contROLE bietet ein effizientes und komfortables Role Lifecycle Management in Kombination mit Role Analytics, entweder als Standalone-Lösung oder als Add-on zu vorhandenen Identity and Access Management-Infrastrukturen.

Webcast

How to Ensure the Success of Your Privileged Access Management Projects

KuppingerCole Webinar recording

Webcast

Dell Identity Manager 7.0: Why Things Have Changed

KuppingerCole Webinar recording

Leadership Brief

Leadership Brief: Information Rights Management – Ready for Prime Time? - 72013

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of…

Executive View

Executive View: Nexis contROLE - 71502

Nexis contROLE provides effective and convenient role lifecycle management combined with role analytics as either a stand-alone solution or as an add-on to existing Identity and Access Management infrastructures.

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Cisco Promises Future of the Internet – But Can They Deliver?

On December 11th I attended an analyst webcast from Cisco entitled “The Future of the Internet”. At this Cisco unveiled its plans for its next generation of networking products. While this was interesting, it did not meet my expectations for a deeper vision of the future of the internet. The timing is interesting because 50 years ago in 1969 there were several events that were seminal to the internet. Many people will remember Apollo 11 and the moon landing – while this was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00