KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM.
IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance requirements. It is a business enabler, as well as an IT enabler. It is a central element of every cybersecurity strategy. It enables managing and access control for everyone from employees to consumers and everything from things to software robots. It is a foundation for your success in digital transformation. It also enables IT transformation, by managing access to all the clouds and services you have to deal with.
But: How to get to a modern IAM form where you may be today? What to preserve, what to extend, what to add, what to retire? And how to do such a migration in a way that you can serve the business demand rapidly, while gaining the time you need for more complex migrations – and while preserving investments in times of tight budgets?
Martin Kuppinger, Principal Analyst at KuppingerCole, will discuss these aspects and explain how the paradigm of an Identity Fabric can help you in successfully modernizing your IAM, at your own pace. He also will shed a light on the state of the market and the maturity of offerings serving the Identity Fabrics model.
Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the IAM capability of the future. The speaker will share his experiences in deploying a native cloud-based IAM solution at scale, the challenges, pitfalls, and the watch-outs.
Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs. A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling way. What does success look like in the CIAM world and how do identity fabrics enable it?
Logging in is such a common process, it’s easy to take for granted. However, that entry point to your application or service is also when organizations become responsible for the user’s digital identity. And with the increase in innovation, and use of technology to deliver products and services, there is an explosion in the number of sources from which users can gain access. Overlaying all of that is the constant evolution of the threat landscape and regulations that inevitably follow.
Tech leaders who want to grow their position in the market must balance two goals: delivering security and customer experience.
Join Auth0 as we discuss, and provide some insights on how to utilize a strategic approach to digital identities, that has helped customers such as Siemens, HolidayCheck, and EnBW to:
Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a set of security solutions and processes to safeguard and protect the business, and nowadays the teams are expected to deploy those faster and more efficiently than ever. The presentation will go through how to implement an efficient, centralized IAM approach that makes no compromises and shows no mercy for any attempt to unauthorized access outside the IAM solution. It will also be explained how the approach can be implemented in an agile manner during an on-going IAM project.
We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are:
…the one critical thing we are all missing is a consistent and accurate vocabulary. Throughout decades of academic work, many authors proposed definitions for IAM terms and concepts. Yet, as a discipline, as an industry, as a career specialization, and as a research field, we failed to consolidate this and build a reference IAM dictionary, allowing us to communicate with precision and clarity.
In this session, I will present you with the TOME community project. Its goal is to become that reference dictionary. It is built as an open wiki to allow all experts to contribute. It is free of charge and licensed under Creative Commons to facilitate its widespread adoption. It is rooted in science with pervasive references from the literature to stand on the shoulders of giants.
In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one.
It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them engaged. In this session, Olli Krebs (VP Central EMEA at Onfido) will examine how document and biometric verification can seamlessly enable trust throughout the identity lifecycle.
In the early years of this millennia Finland was already at the forefront in utilizing strong authentication for online services. Banks had been issuing two-factor authenticators to their customers already in the '90s. These means of strong authentication were quickly adopted by public and private sector services that required more than passwords. Mobile network operators began to offer PKI based SIM authentication. These two solutions and their somewhat legacy protocols conquered the strong authentication market and were the de-facto methods subscribing to or accessing services. Advances in technology, eIDAS, PSD2, and user expectations required a complete overhaul of the strong authentication landscape for the whole country. What happened and why? What were the lessons learned?
An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation technology, CISOs can bring down the risk involved in IAM operations; Robotic Process Automation (RPA) being one among them.