Identity Management

Virtual Event

cybernetix.world 2020

cybernetix.world is the first decentralized event for global communities. This event offers you talks, panel discussions and workshops relevant for an enterprise executive but also for a private citizen. The event will cover all aspects of digitalization and the interaction of humans and technology.

Virtual Event

Cyber Access Summit 2020

Willkommen zum Cyber Access Summit (CAS) 2020! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2020 nimmt aktuelle Themen und Trends im Bereich des Identity und Access…

Virtual Event

Customer Technology World 2020

Understanding your customer’s wishes and requirements and mapping them successfully with CIAM processes is the key to a successful online business. At the Customer Technology World you will learn how to create a customer-centric strategy for your digital business.

Webcast

Zugriffsschutz für sensible Daten – mit Data Access Governance und Identity Governance

Damit Sie besagte Vorschriften rechtzeitig erfüllen können, ist es notwendig, sensible Daten zu erkennen und zu klassifizieren, unabhängig davon, wo sie sich befinden. Vor einer Cloud-Migration müssen Sie die Kritikalität von Daten verstehen und definieren, welche…

Webcast

Identity and Access Management Strategies That Grow With Your Business

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity,…

Executive View

SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a range of on-premises services. It covers areas such as Access Analytics, Role Management, Access Requests,…

Webcast

IAM Essentials: Virtual Directory Services

Webcast

KuppingerCole Analyst Chat: Privacy and Consent Management

Anne Bailey and Matthias Reinwarth discuss the findings of the recently published Leadership Compass on Privacy and Consent Management.

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-party identities puts an extra strain on existing IAM tools but management solutions that provide added…

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative…

Leadership Compass

Access Governance & Intelligence

The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providing you a compass to help you find the products that can meet the criteria necessary for successful AG deployments.

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong support for managing Exchange Servers and Office 365, but also Identity Lifecycle Management that supports a range…

Buyer's Compass

Buyer’s Compass: Core Features of Privacy and Consent Management Solutions

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks such as helping organizations collect and manage consent signals provided by end-users, managing cookies and…

Webcast

IAM Essentials: What are Directory Services?

Executive View

Cygna Auditor Platform

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing analytics and alerting on these events. It incorporates the former BeyondTrust Auditor Suite. The Cygna Auditor…

Webcast

Panel - The Challenges Of Deploying SSI at Scale

In this panel we will discuss the challenges of deploying Self-Sovereign Identity at scale, both technical and regulatory.

Webcast

Prof. Dr. David Chadwick: COVID-19 Certificates for Everyone

Working with the NHS, we are connecting our verifiable credentials infrastructure to its COVID-19 tests database so that we will be able to issue COVID-19 verifiable credentials to people in real time. Our unique design provides selective disclosure and conformance to GDPR for both the…

Webcast

Adrian Doerk: Bringing Self-Sovereign Identity Into Practice: Lessons Learned from Lissi and the SSI for Germany Consortia

In the future, you will not only decide where your data is stored, but also with whom you want to share your data. If you share data, everything will be logged for you and you will always have an overview of who has received data from you. This is what transparency…

Webcast

Interview with Dr. Andre Kudra

Webcast

Markus Sabadello: U.S. Permanent Resident Cards with SSI

The U.S. Department of Homeland Security (DHS) has supported Self-Sovereign Identity technologies such as Decentralized Identifiers (DIDs) and Verifiable Credentials for several years. Now, a number of companies have been selected to work with DHS on implementing digital versions of…

Webcast

Will Abramson: Solving Problems with SSI

An overview of a number of problem-driven use cases for SSI technology, focusing on a number of different domains; healthcare, distributed machine learning and education. A recap of research undertaken at the Blockpass Identity Lab over the last year.

Webcast

Anne Bailey: Reimagining Identity: a Buyer’s Guide to Decentralized Identity

Blockchain is a reaction to real security and privacy concerns.  Whether or not you choose to adopt any blockchain solution, these concerns do exist and should be addressed in the way you manage enterprise Identity and Access Management. This session is for those who want to know…

Webcast

Marco Cuomo, Daniel Fritz: Blockchain-anchored Identities and Credentials Enabling Digital Transformation in the Pharma

With a SSI guarantee of privacy, patients will soon leverage a multitude of healthcare services that build on Decentralized Identity and Verifiable Credentials.  Marco and Dan are leading the “PharmaLedger” consortium in the evaluation and prioritization of these use cases…

Webcast

Dr. Manreet Nijjar: A Digital Staff Passport for Doctors

In this talk, you will learn how a doctor’s digital passport can improve patient safety, reduce the burden on clinical staff & lower operational inefficiencies and risks in the NHS.

Webcast

TJ Behe: Beyond Blockchain: Creating Value from Compliant Self-Sovereign Identity

Enterprise wants to focus on the value identity can bring beyond verified access. Whilst reducing identity management compliance risk and storage costs, more organizations are giving customers their identity ownership back. They are using intelligent agents, real-time data updates…

Webcast

Joy Chik: Making Digital Privacy Real

Digital privacy is a central concern for pretty much everyone. But what does ‘privacy’ really mean? How do you get it and what does it cost you? The identity community has been hard at work on a new identity model that gives people a path to take control of their online…

Webcast

Panel - Where Do We Stand on Self-Sovereign Identity? Business Value and Opportunities Under SSI Framework

Webcast

Peter Busch: Digital Trust and Digital Sovereignty in Mobility

Based on the foundational works for Distributed Ledger Technologies and strategies to use them for specific concrete mobility use cases, the next level of approaching the digital identity and security challenge of the Internet of Things will be shown in actual projects together with…

Webcast

KuppingerCole Analyst Chat: ITSM and IGA - How to Integrate Two Key Infrastructures Right

Matthias Reinwarth and Martin Kuppinger discuss the challenges of integrating IT service management with identity governance within an enterprise.

Blog

Decentralized Identity Could Become a Reality, but Blockchain May Not Be a Part of It

Decentralized Identity is a concept that may not be mainstream yet, but it is a term that embodies the sentiment that many individuals feel regarding the control they wish they had over their personal data. The public has become increasingly more vocal about the misuse of their data, and…

Webcast

KuppingerCole Analyst Chat: Consent Management Done Right

Graham Williamson and Matthias Reinwarth talk about consent: what does it mean for identity professionals, service providers or lawyers and how to reconcile all those different views in modern IAM environments.

Webinar

Sep 16, 2020: Zugriffsschutz für sensible Daten – mit Data Access Governance und Identity Governance

Ein Großteil der geschäftlichen Dokumente in Unternehmen ist in Dateiordnern auf Microsoft SharePoint, Box, Dropbox und Google Drive gespeichert. Da ist es keine Überraschung, dass diese Daten zu den neuen Zielen von Hackern geworden sind. Mit zunehmenden Compliance-Anforderungen wie DSGVO,…

Webcast

Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers. Continually changing and increasing…

Webcast

Agile GRC: Adapting to the Pace of Change in the Digital Era

In the digital era, the rapid rate of change in business, IT and regulatory environments is continually accelerating, making it extremely challenging for organizations to keep pace in terms of their governance, risk and compliance (GRC) capability without the right mindset and…

Webcast

Gain a Unified Business View With Enterprise Identity Management

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as…

Webinar

Sep 09, 2020: Identity and Access Management Strategies That Grow With Your Business

For companies that don’t need a complex Identity Governance & Administration solution (IGA), account and group administration is still a priority. Every company needs a solution for at least baseline IAM (Identity and Access Management), that fits their current state but can also equip them…

Webcast

KuppingerCole Analyst Chat: Identity Vetting - Dealing With the Wave of Fraud During the Pandemic

Matthias Reinwarth and John Tolbert discuss the latest "innovations" fraudsters are using during the pandemic crisis and the methods to mitigate them.

Webinar

Jun 30, 2020: Workforce Continuity in a Time of Crisis

It is not only in times of crisis like the current coronavirus pandemic that companies need to adapt and respond quickly to changing circumstances to provide workers with remote access and deal with onboarding and deprovisioning contingent workers.

Executive View

Executive View: Omada Identity Suite - 80506

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing insight into access risks. Omada Identity Suite not only supports this with Access Governance…

Executive View

Executive View: Microsoft Azure Active Directory - 80401

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD)…

Blog

Microsoft Adding New Capabilities to Azure Active Directory

Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now announced several new capabilities that help to support further use cases. New features in Azure AD…

Executive View

Executive View: Ilantus Compact Identity - 80177

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Management. Deployment is shifting towards flexible models supporting a range of deployment options, including IDaaS…

Blog

Will Azure Arc Help Hybrid IT Customers to Find the Pot of Gold?

At Ignite in November 2019 Microsoft announced Azure Arc which is now in public preview. Azure Arc extends Azure Resource Manager capabilities to cover Linux and Windows servers, as well as Kubernetes clusters on any infrastructure across on-premises, and multi-cloud. In French…

Executive View

Executive View: One Identity Manager - 80310

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experience, rapid customization and easy deployment. One Identity Manager is offering a rich toolset and framework to…

Webinar

Jun 17, 2020: Gain a Unified Business View With Enterprise Identity Management

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as…

Webcast

Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security & Privacy

IAM infrastructure is becoming increasingly critical to the business success of healthcare providers. This is driven in the first instance by digitization and connectivity of everything and the inevitable efforts of cyber-criminals to compromise the newly connected assets. At the same time,…

Webinar

Jun 23, 2020: Agile GRC: Adapting to the Pace of Change in the Digital Era

In the digital era, the rapid rate of change in business, IT and regulatory environments is continually accelerating, making it extremely challenging for organizations to keep pace in terms of their governance, risk and compliance (GRC) capability without the right mindset and tools.

Leadership Compass

Leadership Compass: Identity Governance & Administration (IGA) - 80063

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA…

Webcast

Access all Apps with Azure AD: A Single Identity Solution for Secure Access

Most businesses already rely on Azure Active Directory for secure, seamless access to Microsoft services like Office 365 and Azure. But with more applications being used than ever before, organizations are asking themselves what bigger role Azure Active Directory can play in securing their…

Blog

Why IAM From the Cloud is the New Normal

Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Webcast

Why IAM From the Cloud is the New Normal

Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Blog

CoronaApp: Time to Act Now, Not to Talk

Kuppingercole's Principal Analyst Martin Kuppinger gives his opinion on problems and arguments surrounding various apps for tracking the spread of the virus. And privacy is not the biggest challenge here... You can watch his speech in English or in German below.

Webcast

CoronaApp: Time to Act Now, Not to Talk

Kuppingercole's Principal Analyst Martin Kuppinger gives his opinion on problems and arguments surrounding various apps for tracking the spread of the virus. And privacy is not the biggest challenge here...

Whitepaper

Whitepaper: Fast Access Management in the Hybrid Cloud for SMBs - 80137

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud services that are used on-demand but discarded when no longer needed, finding a scalable solution without big IT…

Blog

COVID-19 Contact Tracing: Privacy Is not the only Challenge

In the UK there are plans to use a mobile ‘phone app to trace people who have been in contact with someone who has COVID-19 to warn them to go into quarantine in order to slow the spread of the virus. This approach is reported to have been successful in other countries, but it has…

Webinar

Apr 29, 2020: Access all Apps with Azure AD: A Single Identity Solution for Secure Access

Most businesses already rely on Azure Active Directory for secure, seamless access to Microsoft services like Office 365 and Azure. But with more applications being used than ever before, organizations are asking themselves what bigger role Azure Active Directory can play in securing their…

Leadership Brief

Leadership Brief: Typical Risks and Pitfalls for IGA Projects - 72580

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effective Identity Governance & Administration (IGA) capability has never been greater. This leadership brief…

Executive View

Executive View: iWelcome IDaaS and CIAM - 80328

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-users as well as app developers. As an EU-based company, iWelcome strives to fulfill regional…

Webcast

The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static…

Executive View

Executive View: Atos DirX Identity - 80166

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility…

Market Compass

Market Compass: Decentralized Identity: Blockchain ID & Self-Sovereign Identity Solutions - 80064

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment.  This Market Compass covers decentralized identity, specifically Blockchain Identity and Self-Sovereign Identity (SSI) solutions. This is a very dynamic space filled with…

Executive View

Executive View: Google's Cloud Identity - 80326

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based applications in the enterprise. Google’s Cloud Identity provides access to many popular…

Webinar

May 07, 2020: Digital Identities & Healthcare IAM: Balancing Efficiency in Clinical Workflows and the Need for Security & Privacy

IAM infrastructure is becoming increasingly critical to the business success of healthcare providers. This is driven in the first instance by digitization and connectivity of everything and the inevitable efforts of cyber-criminals to compromise the newly connected assets. At the same time,…

Executive View

Executive View: PlainID Policy Manager - 80315

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access  across  all identities, systems, and applications with the help of centrally managed business-focused policies.

Executive View

Executive View: Callsign Intelligence Driven Authentication - 80174

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solutions, all capabilities are tightly integrated. The platform uses AI/ML for risk analysis and supports passive and…

Executive View

Executive View: Onegini Connect - 80168

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expanding across Europe, and has global ambitions. They have expertise in EU regulations such as GDPR, PSD2 and…

Blog

The Next Best Thing After "Secure by Design"

There is an old saying that goes like this: “you can lead a horse to water, but you can’t make it drink”. Nothing personal against anyone in particular, but it seems to me that it perfectly represents the current state of cybersecurity across almost any industry. Although…

Leadership Brief

Leadership Brief: Six Key Actions to Prepare for CCPA - 80353

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed.  This report identifies six key actions that IT needs to take to prepare for compliance.

Blog

Applying the Information Protection Life Cycle and Framework to CCPA

The California Consumer Privacy Act (CCPA) became effective on January 1, 2020. Enforcement is slated to start by July 1, 2020. CCPA is complex regulation which does bear some similarities with EU GDPR. For more information on how CCPA and GDPR compare, see our webinar. Both regulations deal…

Whitepaper

Whitepaper: Healthcare IAM: Enhance the Clinical Workflow - 80163

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has unique challenges because clinical operations depend on continual access to customers’ most sensitive…

Leadership Brief

Leadership Brief: Robotic Process Automation - 80333

Robotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes by implementing (software) “robots” to perform these tasks instead of humans. This leadership brief…

Executive View

Executive View: Oracle Identity Governance - 80157

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identity Governance (OIG) addresses compliance at scale within the more modern cloud environments.

Executive View

Executive View: Saviynt Security Manager for Enterprise IGA - 80325

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functionality. Designed to be deployed as a cloud, hybrid, or on-premise solution, the Saviynt Security Manager for…

Webinar

Mar 10, 2020: The Perils of Today’s Approach on Access Governance: Start Protecting Data at Source

Protecting sensitive, valuable data is a must for every organization. Ever-increasing cyber-attacks and ever-tightening regulations mandate businesses to take action. Unfortunately, the common approaches of IGA (Identity Governance and Administration) that focus on managing static…

Executive View

Executive View: Informatica Data Privacy Management - 80276

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable businesses to get the most out of company data and digital transformation processes without exposing the…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

5 Key Benefits of Marrying IGA and ITSM

5 Key Benefits of Marrying IGA and ITSM

For today’s companies, IT service management is more than IT support. ITSM is about working behind the scenes to help employees to do the work that drives your business – providing a one-stop shop for service needs, upgrades, improvements, and asset management. If IGA doesn’t play a critical role in your ITSM strategy, it should. We frequently hear from customers who are looking to better align IGA and ITSM, and our conversations with the analyst firm KuppingerCole often [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00