Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Identity Fabrics for True Digital TransformationDec 10, 20194:00pm CET, 10:00am EST, 7:00am PST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
API Platforms as the Secure Front Door to Your Identity Fabric
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Transitioning the NSTIC from the 2nd goal to the 4th and how we plan to finish the job, as, US President Barack Obama stated it, NSTIC was really a 10-year effort. In this keynote, Paul Grassi talks about modularization and performance-based standards, future proofing by leveraging a diverse marketplace, transition to the next phase of Connect.gov which will be moving from pilot to production, and landing high-risk, large user volume of transactions.
Language: English • Duration: 22:54 • Resolution: 1280x720
Leadership Compass: API Management and Security - 70311
Whitepaper: Digital Transformation for Business Enablement Requires a Modern Identity Fabric - 80165
Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170
Buyer's Compass: Blockchain ID - 80050
Executive View: IBM Cloud Pak for Security - 80172
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning