KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market, and technologies have matured. However, 20 years of maturity are a lot for IT, also indicating that some concepts may benefit from modernization.
In his talk, Martin Kuppinger will look at four areas:
We will give you a sneak peek on Telia Company’s current journey towards IGA system modernization. After the presentation you will have a good overview and some insight in what is cooking right now and where we are going with focus on Cloud strategy VS National Security which is the next challenge after our Phase 1 Go-live this year.
Recent forensic evidence shows that IAM solutions and infrastructure are a strategic attack vector. In today’s complex and highly distributed enterprise security supply chain, are you adequately protecting the identity and access administration capabilities at the center of your security architecture?
In this session, former CTO and CISO Darran Rolls will provide a unique perspective on the critical steps required to secure your Identity Governance and Administration infrastructure. Whether you employ on-prem or SaaS technology to meet your provisioning and governance needs, this session will highlight the obligations and best practices for securing your processes and your infrastructure. IGA holds the keys to your kingdom – do you know who has access to it?