KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
We share how understanding the human mind and the principle of behavioral economics can alter the way we approach product ideas, new thinking and what the future might/could look like, let's say, for self-driving cars or smart cities.
In a world full of uncertainties and data breaches, Identity and Access Management (IAM) must deliver more than ever, faster than ever, for businesses to succeed at building trusted relationships and delighting customers at every interaction. With such large-scale breaches becoming commonplace, it is more important than ever to integrate threat intelligence insights proactively into authentication workflows. Risk aware IAM requires business processes to be enhanced by deeper integration with modern security solutions and automated within an organization’s security operations center for rapid visibility, to continuously assess what is going on, and increase speed to resolution. Risk comes from many different angles; to be effective, risk insight must be more than an entry on an Excel spreadsheet. The transformation of risk insight into policy enforcement in real-time is an evolution for most companies, and it is one that must be realized for IAM programs to deliver more value to the business.
Heather Flanagan talks about the confidence that is needed to accelerate the digital economy and now business and governments can work together toward that common goal of growing the economy. Digital ID is how we get the confidence as a platform to grow the economy.
KuppingerCole's Lead Analyst John Tolbert presents the findings from a recently published Leadership Compass on CIAM solutions
Panel discussion at the Kantara Workshop
Presentation at the Kantara Workshop
The truly awful practice of tracking through cookie matching may finally have found its nemesis in combined effects of ad blockers, new browsers, and the GDPR. But there is still a big headwind to be navigated before we can say the job is done. What could be the role of industry consortia like Kantara to help bring about improved privacy - aware practices and education? In this presentation, we overview the landscape and the forces for 'good'.
When large-scale breaches occur, they not only hurt the impacted service but also erode the trust our customers have in online commerce as a whole. Protecting our customers online can no longer be a siloed activity but need to be coordinated among service providers to ensure customers continue to transact with confidence online. The current market of consumer identity protection solutions are limited in scope and capability. Credit checks, insurance, concierge services when things go wrong only provide mechanisms to mitigate losses after an incident has occurred. A new set of innovative services need to be developed that bring service providers together. With both technology and policy efforts working in parallel we may finally be able to successfully protect our customers online.
Keynote at the Consumer Identity World 2017 in Seattle, USA
As if Data Protection wasn't regulated to the bone already, Europe has come up with a new set of rules introducing a new level of regulation – in terms of detail, scope and in terms of applicability. The new rules have significant impact on how business are required to structure their internal processes, how they allocate responsibilities and – in general – how they focus on personal information.
People are notoriously unreliable witnesses to their own thoughts and motivations. However, the ability to design behavior-based solutions is the common denominator of every successful modern brand. Behavioral science is the way to navigate the chaos of choice and during this keynote we will share how to turn behavioral economic principle into practical brand and product success stories.
This panel includes a look at the GDPR requirements, with an emphasis on the business opportunities for creating closer customer relationships when moving to informed consent; including the ability to potentially convince customers of moving to non-freemium models and paying for better service. We also consider the impact on how the customer journey will change to gain consent for additional purposes.
Digital identity is central to all electronic transactions. Prevention of credential misuse is the first responsibility of identity management professionals today. Proper identity management includes identity vetting, issuance of credentials, risk-appropriate authentication and authorization, auditing, and more. Regulations such as GDPR also mandate that identity management systems must work to preserve the privacy of users. This session explores contemporary means of protecting identities to lower cyber risk while safeguarding the privacy of users.
The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. This combination must be taken seriously to provide a smooth Customer Experience (CX) and to guarantee that every consumer can control the access of his personal information. This panel discusses what is important for good User Experience and how you can create it without getting trouble with privacy regulations.