Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Road to EIC 2024: Generative AI
Apr 18, 2024
Prepare to unlock the transformative power of Generative AI in our preparatory webinar for the "Constructing the Future" bootcamp. This essential primer is designed to equip you with the foundational knowledge necessary for a profound understanding and engagement in our intensive 4-hour workshop.
Webinar Recording
The Right Foundation for Your Identity Fabric
Apr 16, 2024
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of Identity Fabrics, on what to consider when defining the own approach for an Identity Fabric, and how the vendor landscape looks like. He will discuss different approaches, from unified solutions to integrating / orchestrating different best-of-breed solutions. He also will look at the best approach for defining your own Identity Fabric.
Analyst Chat
Analyst Chat #210: Exploring Real-Life Use Cases of Decentralized Identity
Apr 15, 2024
Matthias and Annie discuss real-life use cases of decentralized identity. They explore two categories of decentralized identity use cases: those that radically change the relationship between individuals and organizations, and those that solve specific problems using decentralized technology. They highlight the eIDAS 2.0 regulation in Europe as a driver for decentralized identity adoption and mention the importance of interoperability testing. They also touch on the potential use of decentralized identity in supply chain management and the need for open and interoperable...
Webinar Recording
Revolutionizing Secure PC Fleet Management
Apr 12, 2024
Many organizations are battling with effectively managing their PC fleet. These challenges range from hybrid work, temporary staff, and edge computing, especially when it comes to topics like data security and asset management. HP has come up with a way to overcome these challenges through Protect and Trace with Wolf Connect. Connect integrated into their E2E Security and Fleet Management Stack.
Webinar Recording
Navigating Security Silos: Identity as a New Security Perimeter
Apr 10, 2024
Companies are grappling with countless challenges in the realm of identity security. These challenges range from dealing with the dynamic nature of identities, the rise of insider threats, the ever-evolving threat landscapes, handling the complexity of identity ecosystems to insufficient visibility into identity posture. This webinar explores the fundamental role of Identity Threat Detection & Response (ITDR) and Identity Security Posture Management in fortifying defenses against these challenges.
Analyst Chat
Analyst Chat #209: Behind the Screens - A Day in the Life of a Tech Analyst
Apr 08, 2024
In this episode Matthias welcomes Osman Celik, a research analyst with KuppingerCole Analysts, to uncover the daily life and career dynamics within the tech analysis industry. They take a glimpse into Osman’s day-to-day activities, exploring the challenges and highlights of being a tech analyst. They discuss essential pathways for entering the tech analysis field, including the qualifications and experiences that bolster a candidate’s profile. Osman offers deep insights into the critical skills and attributes necessary for success in this role, addressing common...
Webinar Recording
Modern IAM builds on Policy Based Access
Apr 05, 2024
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the status and future of PBAM and the various types of solutions that are available in the market. He will look at the overall ratings for this market segment and provide concrete recommendations on how to best select the vendor, but also will discuss strategic approaches for PBAM.
Webinar Recording
Road to EIC: Leveraging Reusable Identities in Your Organization
Apr 04, 2024
In the realm of customer onboarding, the prevailing challenges are manifold. Traditional methods entail redundant data collection and authentication hurdles, contributing to inefficiencies and frustrations for both customers and businesses. Moreover, siloed systems exacerbate the issue, leading to fragmented user experiences that impede smooth onboarding processes and hinder operational agility.
Analyst Chat
Analyst Chat #208: Understanding Market Segments - KC Open Select's Latest Innovations
Apr 02, 2024
This episode of the Analyst Chat features a discussion with Christie Pugh, who oversees digital services at KuppingerCole Analysts. Christie gives insights into the newest topic release of KC Open Select (KCOS). KCOS is a comparison tool that helps users discover information about identity and access management and cybersecurity solutions. It enables users to make informed business decisions based on their requirements and provides insights into the current market state, direction, use cases, and necessary capabilities. Tune in to learn more about the tool and the new topics coming...
Webinar Recording
Navigating Identity Security: Integrating SAP Into an Identity Fabric
Mar 27, 2024
SAP customers are shifting away from SAP Identity Management (IDM), which will no longer be supported after 2027, as they are adopting newer SAP solutions. They need to find effective ways of dealing with the technical challenges, while at the same time ensuring secure access control and management of digital identities. Join identity and security experts from KuppingerCole Analysts, One Identity, and SAP as they discuss the significance of and key considerations for integrating and complementing the SAP identity security model across various SAP solutions, including SAP Identity...
Analyst Chat
Analyst Chat #207: Leading Cybersecurity - A Day in the Life of a CISO
Mar 25, 2024
Have you ever wondered what a CISO does every day? Christopher Schütze gives insight into his role as a CISO and the important tasks he performs on a daily basis. He emphasizes the need to build training and awareness with people in the organization and be the go-to person for security-related questions. Christopher also highlights the significance of third-party risk management and the challenges it presents.
Webinar Recording
IAM Meets Data Management: A Recipe for Peak Performance
Mar 22, 2024
In today's competitive landscape, organizations need to unlock the full potential of their data by ensuring the data management and identity and access Management (IAM) are tightly linked. However, this can be challenging due to factors such as disconnected data, inadequate tooling, and concerns about security and compliance risks. An integrated approach is essential. Join experts from KuppingerCole Analysts and IndyKite to explore real-world challenges and solutions, including the integration of data management and IAM. Discover how organizations can overcome obstacles to harnessing the...
The Journey Towards AI-Powered Endpoint Management
Mar 22, 2024
Chris Hallum, the Director of the Tanium Platform and John discuss the concept of autonomous endpoint management (AEM). AEM is a new market category that aims to converge unified endpoint management (UEM), digital experience (DEX), and vulnerability management, using AI to automate endpoint tasks. The conversation explores the role of automation in endpoint management, the importance of real-time data, and the potential actions that can be automated in AEM. It also highlights the journey towards autonomous endpoint management and the need for gradual adoption of automation.
Webinar Recording
Road to EIC: eIDAS 2.0 – The Way to "Trusted, Voluntary, and User-Controlled" Digital Identity
Mar 21, 2024
The regulation on electronic identification and trust services (eIDAS) is designed to increase trust and security in electronic transactions within the EU's internal market. One of eIDAS’ aims is to make it possible for individuals and businesses to use their own national e-Identification systems to access public services in other EU countries. EIDAS 2.o focuses on expanding the availability and usage of digital wallets, whereby member states provide citizens with secure and privacy-preserving digital wallets to manage digital credentials, aiming for 80% EU resident adoption by 2030.
Analyst Chat
Analyst Chat #206: Access Denied? The Role of Physical Access in Business Resilience
Mar 18, 2024
Matthias invited Martin to discuss the importance of physical access control in the context of identity and access management (IAM) and cybersecurity. Martin highlights the three layers of access control: physical access, logical access to systems, and authentication and authorization. They also explore the impact of regulations, such as the Digital Operations Resilience Act (DORA), on the requirements for physical security. The conversation delves into the integration of physical access control with identity management systems and the challenges and opportunities in this...
Webinar Recording
Decentralized Identity – a Key to Reusing Identity for Improved Security and User Experiences
Mar 15, 2024
Decentralized identity has earned a place in identity management for its capacity to increase privacy and security, while improving the user experience. It is fundamental to creating a reusable verified identity which enables numerous use cases such as reusable KYC, proof of employment, remote onboarding and passwordless authentication.
Webinar Recording
Unlocking Zero Trust Network Access
Mar 14, 2024
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. As a result, ZTNA solutions play a critical role in today's cybersecurity landscape by providing a holistic approach to secure access to business applications and resources regardless of user location. These solutions fundamentally align with the principles of Zero Trust, extending its influence across devices, networks, systems, applications, and data. This webinar provides a comprehensive overview of ZTNA solutions,...
Webinar Recording
Mastering CIAM: Advanced Techniques for Designing a Resilient CIAM Program
Mar 13, 2024
In today's digital landscape, mastering CIAM is crucial for IT professionals. Challenges like imperfect client touchpoints, high abandonment rates, and limited system insights hinder best practices. Join us to explore and overcome these hurdles, enhancing user experiences through strategic CIAM implementation. Explore advanced CIAM techniques in our webinar. From implementing best practices to deploying APIs for user insights, discover strategies to reduce abandonment rates. Unlock techniques for enhancing end-user engagement and revenue, supported by real-world testimonials. Learn to...
Analyst Chat
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
Mar 11, 2024
In this episode, Mike Small discusses the history and role of digital signatures. He explains that digital signatures are the modern-day equivalent of indelible ink and are fundamental to the security of everything we do digitally. The foundation of digital signatures lies in the use of public-private key pairs, which allow for secure message exchange and verification.
Webinar Recording
Proactive Cyber Defense with Intelligent SIEM Platforms
Mar 08, 2024
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security experts, and the rapid pace of change in the business IT and cyber threat environments, traditional SIEMs are no longer effective. A new generation of SIEMs has emerged.
Webinar Recording
Road to EIC: Exploring the Power of Decentralized Identity Solutions
Mar 07, 2024
Decentralized Identity is pivotal in the digital era, offering a secure, privacy-centric identity solution. In contrast to traditional systems, which are centralized and prone to breaches, Decentralized Identity is built on blockchain technology. With Decentralized Identity, users have control over their data, reducing the risk of identity theft. Interoperability is enhanced, enabling secure authentication across platforms without a central authority. Decentralized Identity aligns with privacy regulations like the EU’s GDPR, emphasizing user consent and data control in a self-sovereign...
Webinar Recording
Supercharge Your Business with Cloud-Based Data Modernization
Mar 06, 2024
Data modernization is critical for businesses to remain competitive in today’s data-driven world, and while the cloud is an important enabler of data modernization, migrating sensitive data to the cloud is challenging. However, it is possible, with the right approach.
Analyst Chat
Analyst Chat #204: Wallets, Decentralized ID, and Trust - Digital Identity Explained
Mar 04, 2024
Matthias and Annie discuss the basics of digital identity and decentralized identity. They explore the concept of a digital identity as an electronic representation of an individual's identity in the digital world. They also discuss the difference between centralized and decentralized identity and the role of governments in providing reliable legal identities. The conversation highlights the need for digital identity in accessing services and the benefits of decentralized identity, such as privacy and portability. The episode concludes with a discussion on the challenges...
Webinar Recording
Cloud Alphabet Soup - CNAPP
Mar 01, 2024
Organizations are using cloud services to develop and deploy new and existing applications. However, the responsibilities for security and compliance are shared between the CSP (Cloud Service Providers) and the cloud customer. The cloud user is responsible for implementing controls to meet their security and compliance obligations.
Analyst Chat
Analyst Chat #203: ChatGPT for Cybersecurity - How Much Can We Trust Generative AI?
Feb 26, 2024
Alexei and Matthias discuss the impact of generative AI on cybersecurity. They explore the shift in public perception towards generative AI and the practical implications for businesses. They highlight the challenges of integrating generative AI into cybersecurity strategies, including data leaks and the need for acceptable use policies. The conversation also covers the use cases of generative AI in cybersecurity, such as research and learning, training, and code generation. The limitations and considerations for security analysts using generative AI tools are discussed,...
Webinar Recording
The Rise of Identity as a Service (IDaaS) as the Cornerstone of Modern Cybersecurity
Feb 23, 2024
Cybersecurity professionals face similar challenges. They must safeguard their organizations against the escalating sophistication of cyber threats and attack vectors, while at the same time administering and securing identities in the context of a dispersed and remote workforce. They strive to strike a balance between stringent security measures and a seamless end-user experience. Furthermore, compliance with regulatory requirements and industry standards for data protection and privacy poses a critical concern, as does the management of identities across an expanding array of applications...
Webinar Recording
Road to EIC: What’s Next in Digital Identity Standards?
Feb 22, 2024
As the digital realm evolves rapidly, the importance of robust and secure identity verification mechanisms becomes paramount. Standards in digital identity help establish secure authentication methods and protocols to safeguard user information by offering frameworks that respect individual privacy rights, while still enabling effective identity verification. In an era dominated by online interactions and transactions, the significance of digital identity standards cannot be overstated. In this “Road to EIC” virtual fireside chat we explore the current state of digital identity standards...
Analyst Chat
Analyst Chat #202: Beyond Traditional Boundaries - Intelligent SIEM solutions
Feb 19, 2024
In this Analyst Chat episode, Matthias and guest Warwick Ashford explore the shift from traditional to next-gen Security Information and Event Management (SIEM) solutions. Highlighting the limitations of traditional SIEM in the face of evolving cyber threats and complex data landscapes, the discussion emphasizes the need for intelligent, automated, and integrated SIEM solutions. The conversation focuses on crucial features for modern Security Operations Centers (SOCs) dealing with high costs, skills shortages, and a surge in security alerts, providing insights into navigating...
Analyst Chat
Analyst Chat #201: Intelligent Defense - Is AI inevitable for Cybersecurity?
Feb 12, 2024
AI is becoming increasingly common and it appears to be unavoidable. However, is this really the case? Marina and Matthias have a conversation about the convergence of AI, machine learning, and cybersecurity. They highlight the importance of utilizing AI to protect our organizations, as attackers are also employing it. Marina explains the primary risks associated with AI in cybersecurity, such as automation mistakes, data security and privacy issues, and excessive dependence on AI. They also explore how defenders can safeguard their organizations from AI-generated threats and stress...
IAM and Cybersecurity Insights and Trends in 2024
Feb 09, 2024
Martin Kuppinger was a virtual guest at SailPoint's SAILforward24 and was invited to have a chat with Matthew Mills about the industry and market, trends and his perspectives. Delve into the future of identity and access management (IAM) as Martin and Matthew discuss the profound impact of AI, decentralized identity, and the regulatory landscape. Gain insights into cybersecurity trends and learn how SailPoint addresses these challenges.
Analyst Chat
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
Feb 05, 2024
What a milestone! 200 episodes of the Analyst Chat. Matthias and Martin celebrate the journey of the three years of the podcast. Dive into the evolution of cybersecurity and identity management, industry impact, memorable moments, and key insights. From this episode, we will come back to a weekly schedule, so stay tuned for the episode next Monday.
Webinar Recording
Zero Trust Unveiled: Securing Critical Data in SAP, CAD, and PLM Systems
Feb 02, 2024
In an era of escalating cyber threats, securing critical and commercially sensitive data becomes paramount. Join us for an informative webinar exploring the challenges posed by sophisticated cyber threats and the complexities introduced by the shift to remote working. Discover the heightened risks in sharing and storing SAP, computer-aided design (CAD), and product lifecycle management (PLM) data and learn why zero trust is essential for compliance with regulations like GDPR, NIS2, ISO27001, and CMMC 2.0.
Webinar Recording
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Jan 31, 2024
Enterprise attack surfaces are constantly evolving and expanding due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. New vulnerabilities are skillfully exploited by proactive cybercriminals every day. In this context, a strong Identity and Access Management (IAM) posture is vital to manage risks. However, maintaining this IAM strategy can be a complex task given the multitude of requirements and tools involved.
Webinar Recording
Beyond Secrets Management: Transforming Security in the Digital Age
Jan 26, 2024
In the ever-expanding digital landscape, the proliferation of secrets and cryptographic keys poses a risk and a challenge, with many organizations struggling to maintain control. Relying on secrets management is no longer sufficient. A new comprehensive approach is needed, with more than 40% of data breaches involving stolen credentials. Join security and identity experts from KuppingerCole Analysts and Entrust to reveal the intrinsic and symbiotic relationship between key management and secrets, offering visibility, compliance assurance, and effective risk management. Learn the...
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Jan 22, 2024
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to coexistence. Stay tuned for upcoming trends and predictions!
Webinar Recording
SAP IDM End of Life: Die IGA-Migration souverän meistern
Jan 19, 2024
Die Abkündigung von SAP Identity Management (SAP IDM) stellt Unternehmen vor eine kritische Herausforderung. Die bisherige Lösung erreicht das Ende ihres Lebenszyklus, und Organisationen müssen sich nun die Frage stellen: Wie kann trotzdem weiterhin Compliance aufrechterhalten werden? Die Gewährleistung der Identitätsverwaltung unter Berücksichtigung der gesetzlichen Bestimmungen entwickelt sich zu einem zentralen Anliegen für Fachleute im Bereich Informationstechnologie. In diesem Kontext suchen Unternehmen nach effektiven Wegen, um die bisherigen Ansätze und Verfahren aus dem SAP...
European Identity and Cloud Awards 2024
Jan 18, 2024
Webinar Recording
Sicherung Ihrer digitalen Grenze: Navigieren durch die sich ständig weiterentwickelnde Bedrohungslandschaft
Jan 17, 2024
In einer Zeit, in der die digitale Transformation die Art und Weise, wie wir Geschäfte machen, revolutioniert, ist die Sicherung der digitalen Grenzen Ihres Unternehmens von größter Bedeutung. Die Bedrohungen entwickeln sich ständig weiter. Nehmen Sie mit Sicherheitsexperten von KuppingerCole Analysts und Palo Alto Networks an einem aufschlussreichen und spannenden Webinar teil, das sich mit der dynamischen Welt des Angriffsflächen- und Bedrohungsmanagements befasst. Sie werden die Herausforderungen erörtern, mit denen Organisationen aller Größenordnungen - von kleinen Unternehmen bis...
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Jan 12, 2024
In an era where digital transformation is revolutionizing the way we do business, securing your organization's digital frontier is paramount. Threats are constantly evolving
NIS2: What Everyone Needs to Consider
Jan 11, 2024
The upcoming EU regulation, NIS2, moves closer and organizations will need to act in order to close gaps. Anders Askåsen from Okta and Martin Kuppinger discuss the impact on critical infrastructure organizations and the implications for identity management, particularly in authentication. Learn more about the key considerations, reporting challenges, liability aspects, and the role of identity in meeting NIS2 requirements.
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Jan 08, 2024
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into persistent issues, innovations, and an outlook on trends for 2024 in the realms of cybersecurity and identity and access management.