Personalization

Conference

Blockchain Enterprise Days 2019

Blockchain Enterprise Days (#BeDays19) will take place February 19-20, 2019 in Frankfurt, Germany. Blockchain is still on everyone's lips and is no longer reserved for the financial sector. For this reason, the Blockchain Enterprise Days will focus on further enterprise application areas of…

Leadership Brief

Leadership Brief: What AI Can Do for You Today – and What Not - 79002

AI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This leadership brief describes the current state of AI technologies and recommends the areas where they can be applied today.

Webcast

Andre Priebe - CIAM & API Management

Customer Identity & Access Management und API Management sind als Business Enabler bekannt. Aber in Kombination sind sie sogar mehr als die Summe ihrer Teile.  Erfahren Sie, wie digitale Identitäten Ihrer Kunden und Ihrer APIs das digitale Ökosystem Ihrer Kunden…

Webcast

Identity Verification & Authentication Made Easy

Business is undergoing change. The Digital Transformation affects business models and changes the way businesses interact with their customers. A seamless customer journey is a key success factor for the digital business. This journey starts with attracting the customer and includes steps…

Webcast

The Future of Identity Management at Border Controls: Gateless and Multiple Biometric and Beyond

Obviously, our work at Hub Airports has already radically changed the Consumer’s expectations of how their Identity is to be handled at Airport Border Control; since we were on the front page of the Times, the Telegraph and NYT; as well as over 150 other publications.  Gateless…

Webcast

Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but…

Webcast

Privacy By Design in Practice

Privacy has become a global concern, with regulations such as GDPR coming into effect. In this context, e-commerce businesses that operate globally cannot simply adopt data protection regulations of a single country/region. Supporting each and every regulation as they emerge is challenging…

Webcast

Panel: Blockchain, Identity and Privacy - How to Combine It?

Blockchain, Identity and Privacy: Three words that buzz, fade and mature.  The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead.…

Webcast

A Digital Society Needs a Digital ID

Our world is becoming more digital and more mobile every day. The sensitivity of information being exchanged online grows rapidly and data privacy is a real concern to many people. How are we facing new challenges to keep pace with today's digital transformation? Getting rid of all paper…

Webcast

Panel: CIAM Strategy Best Practice

When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a…

Webcast

Data Privacy — Who Actually Cares and Why?

Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for…

Webcast

The End of the Password – How to Really Protect Digital Identity

In the digitalized world, passwords are not sufficient anymore to protect digital logins and transactions. What’s even worse: In 81 percent of all cases, they are the main reason for a hack. Once a password is stolen, it opens the doors to fraudulent use and data theft. Furthermore,…

Webcast

Consent Life Cycle Management

Consent Management is a crucial aspect of PSD2 and GDPR regulation. At initial thought, consent seems to be simple but from legal and regulatory perspective its complexity arises. Managing consent within an organization should be well planned with all units of businesses and audit trail to…

Webcast

Panel: How to Defend your Customer from Current and Future Threats

This  panel will explore contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.  Learn best practices from data protection & privacy experts on how to use the latest defenses to secure your organization against the latest…

Webcast

CX as the core of any CIAM

Customer Experience (CX) is the central starting point when it comes to the strategic definition of your CIAM. The management of millions of identities and the handling of several millions of interactions per day is a technical challenge that changes every day. However, ease of use,…

Webcast

Transform Your Customer Experience: Customer Identity Today and Tomorrow

Customers are increasingly expecting more from the businesses they interact with, especially as security and privacy breaches dominate headlines. Customer Identity and Access Management can help businesses transform their customer experiences. Join this session to learn about key use…

Webcast

How Policy Based CIAM can Improve the Customer Journey

In an ever-changing and rapidly evolving world, the fight about the customer is getting tougher. Companies that can offer a customer-centric approach have the advantage. With new technologies such as mobile, internet of things, social media, and big data, the approach towards customers is…

Webcast

5 months of GDPR – status quo on implementation of the most extensive digital law in the world

How are companies, consumers and authorities taking the new regulation?

Webinar

Nov 29, 2018: Identity Verification & Authentication Made Easy

Business is undergoing change. The Digital Transformation affects business models and changes the way businesses interact with their customers. A seamless customer journey is a key success factor for the digital business. This journey starts with attracting the customer and includes steps…

Webinar

Nov 15, 2018: Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify”…

Webcast

Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDPR Compliant

Digital Business Transformation is a continuous process that affects all areas of doing business, with technology finally getting the right focus: The customer and his/her experience with your business. It is now all about providing that ultimate Frictionless CX (customer experience) so…

Webcast

William Spruill - Trust and Privacy in Digital Identity Verification

Webcast

John Tolbert - The Journey to CIAM Success

Consumer Identity and Access Management (CIAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management –…

Webcast

Patrick Salyer - The Digital Imperative: Build Trust with Customers, Don't Break It

Today’s customers, beset with endless choices, expect brands to understand their needs and deliver contextual experiences that reduce stress and increase convenience. But, these same customers don’t want this kind of personalization at any cost. Unfortunately, many businesses…

Webcast

Andrew Shikiar - Moving Beyond Passwords with Standards-based Strong Authentication

Webcast

Dr. Hans Lombardo - Identity for a Connected World

  In this session, we will examine use of blockchain tech and smart contracts How the blockchain can support identity verification of humans (KYC), objects (KYO) and connected devices (KYD) Building a platform-as-a-service offering shared regulatory compliance services for…

Webcast

Panel: Blockchain, Identity and Privacy - How to Combine It

Blockchain, Identity and Privacy: Three words that buzz, fade and mature.  The blockchain is currently one of the most-hyped technologies. In this panel, we will explore how security and privacy can be enhanced by blockchain technology and outline the challenges ahead.…

Webcast

John Tolbert - The CIAM Solutions Market

Webcast

Panel: Multi-Factor Authentication Options for Consumer Identity Solutions

Webcast

Panel: CIAM Strategy Best Practice

When dealing with consumers and customers directly the most important asset for any forward-thinking organization is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a…

Webcast

Tim Maiorino - GDPR: Four Months in... And Now

A quick overview of how the perception of GDPR has developed over the last few weeks prior to 25th May 2018 and in the weeks following the date everyone had been waiting for and working towards for months and months. Is GDPR as dangerous as everyone thought? What are the most relevant…

Webcast

Prabath Siriwardena - Five Pillars of Consumer IAM

Transforming the customer experience is at the heart of digital transformation. Digital technologies are changing the game of customer interactions, with new rules and possibilities that were unimaginable only a few years back. Customer Identity and Access Management (CIAM) is a whole…

Webcast

Christian Goy - Data Privacy: Who Actually Cares and Why

Most of us know that Facebook, Google, Amazon and million others are collecting vast troves of demographic and behavioral data about us — sometimes even if you aren't on Facebook. That’s bad, right? But do we really care? If we don't care — that is excellent news for…

Webcast

Panel: How to Defend Your Customer from Current and Future Threats

Learn best practices from data protection experts on how to use the latest defenses to secure your organization against the latest threats and to offer your customer a smooth customer journey without fears.

Webcast

Marisa Rogers - Privacy by Design for Consumer Goods and Services

Blog

Consumer Identity World (CIW) USA 2018 - Report

Fall is Consumer Identity Season at KuppingerCole, just in time for holiday shopping. Last week we kicked off our 2018 tour in Seattle. The number of attendees and sponsors was well up over last year, indicating the significant increase in interest in the Consumer Identity and Access…

Webcast

Digital Identities in the Internet of Things - Securely Manage Devices at Scale

The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and…

Whitepaper

Whitepaper: Overcoming PSD2 Challenges with Onegini Connect - 79058

Many changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential benefits for Third Party Providers (TPPs) and consumers.  Account Information Service Providers (AISP) and…

Webcast

Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)

It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in advance, your customer's needs has on the one hand become a must. On the other hand, GDPR is…

Executive View

Executive View: WidasConcepts cidaas - 79057

WidasConcepts offers a complete consumer identity and access management solution:  cidaas.  cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management.  It is based on a micro-services…

Webinar

Oct 02, 2018: Customer Identity Access Management (CIAM): Creating the Foundations for User Focused Digital Business, GDPR Compliant

Digital Business Transformation is a continuous process that affects all areas of doing business, with technology finally getting the right focus: The customer and his/her experience with your business. It is now all about providing that ultimate Frictionless CX (customer experience) so that…

Blog

Decentralized Identity 101: What It Is and Why It Matters

Guest Author: Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain technology. Yet, there is often a lack of context about what those terms actually mean and the impact they will…

Executive View

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266

NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product emphasizes security, leveraging the company’s expertise in managed SOC services and…

Executive View

Executive View: Centrify Next-Gen Access Platform - 79036

Often, enterprise security is delivered as separate services such as Identity-as-aService (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Centrify converges these market segments into a single platform to deliver the next generation of access management.

Webinar

Sep 11, 2018: Consumer Identity & Access Management (CIAM), Big Data and the Internet of Things (IoT)

It is all about providing your customer a great experience so that they return to you and not to your competitor, who has never before been that close to your business. Anticipating, maybe even in advance, your customer's needs has on the one hand become a must. On the other hand, GDPR is…

Webinar

Sep 25, 2018: Digital Identities in the Internet of Things - Securely Manage Devices at Scale

The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and…

Webcast

Patients, People and Things - Managing Identities in Healthcare

Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all…

Blog

Cross-Border Data Management and Cybersecurity: Walking the Tightrope of Compliance and Business Efficiency

Guest Author: Jordan L. Fischer, Esq., Co-Founder & Managing Partner of XPAN Law Group, LLC Technology is changing rapidly, correlating in an increasing amount of data collected every second.  These technologies cross-borders and allow businesses to operate on a global scale, at…

Webinar

Jul 05, 2018: Patients, People and Things - Managing Identities in Healthcare

Digital transformation is a game changer in the health sector and a core requirement is better identity management. The need for improved security in modern medical facilities, the growing reliance on monitoring devices and support for millennials in their health outcome management, all…

Executive View

Executive View: Onegini Connect - 79031

Onegini provides a compelling solution for Consumer Identity and Access Management (CIAM). Onegini is headquartered in Europe and has global ambitions. They have expertise in EU regulations such as GDPR and PSD2. They are positioning their product as a CIAM solution for financial, health…

Executive View

Executive View: Pirean Consumer IAM Platform - 70223

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single point of access and control that can meet these need with support for secure mobility and flexible workflows.

Whitepaper

Whitepaper: Pirean: Orchestrated Identity for Meeting IAM & CIAM Requirements -70225

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today.  Consumer Identity and Access Management (CIAM) systems and services provide new technical capabilities for organizations to know their customers better. …

Conference

Nov 20 - 22, 2018: Consumer Identity World APAC 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Conference

Oct 29 - 31, 2018: Consumer Identity World EUROPE 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Conference

Sep 19 - 21, 2018: Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Conference

Sep 19 - Nov 22, 2018: Consumer Identity World Tour 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

AWS re:Invent Impressions

This year’s flagship conference for AWS – the re:Invent 2018 in Las Vegas – has just officially wrapped. Continuing the tradition, it has been bigger than ever – with more than 50 thousand attendees, over 2000 sessions, workshops, hackathons, certification courses, a huge expo area, and, of course, tons of entertainment programs. Kudos to the organizers for pulling off an event of this scale – I can only imagine the amount of effort that went into it. I have to [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00