Video

Why IAM From the Cloud is the New Normal


Martin Kuppinger explains the benefits of Identity and Access Management delivered from the cloud.

Hello to my regular podcast. My name is Martin Kuppinger. Let's look at one of these questions. I'm asked quite frequently, shall we use identity and access management from the cloud first it's not identity access management as the one big thing. It is a lot of very different disciplines. We have these three main ones which are IGAs or the identity governance, administrations of identity, life cycles, access, governances, all that stuff. We have access management of federating users in authentication, all these things. And we have privileged access management for the highly privileged accounts, plus variety, a range of other disciplines. And so the answer might be slightly different depending on what are we looking at. But basically there's a simple element in that answer based on two, two fundamental changes, we see the first of these fundamental changes is that more and more critical business workloads are shifting to the cloud.
And if the workloads are deployed as a service, then the management of security for these workloads should be provided from the cloud. So apparently it makes a lot of sense to also shift identity management gradually to the cloud, because we have reached this tipping point almost for many organizations, at least where the most of the critical workloads or the bigger part of critical workloads are in the cloud. And then the infrastructure management should be there as well. That is one factor we are seeing the other is that we see this shift to the broadest sense, zero trust where clients access services run somewhere. And this is also something which goes away or leads us away from our traditional parameter based thinking our data centers. And then again for such environments where, where the internal network not necessarily is part of the entire access anymore. It makes sense to manage this from the cloud. So basically there's a clear tendency. There's a logic behind shifting from traditional on premises, identity management to cloud-based identity and access management. This is not a simply yes, no answer. We need to look carefully at each and every environment, the requirements regarding security, the status, other stuff, but the tendency is very clear. It will be Ida in most areas over time. That is the basic element, despite the way also the basic element of what we call identity fabric sync in services, which you can deploy in a flexible manner and different deployment models, including full
As a service models. So look at our research and identity fabrics and all the other stuff we provided and think about how to shift your workloads. For sure. We will be more than happy to support you and reviewing your identity management strategy and shifting to a new modern strategy. Following what we call the paradigm of an identity fabric. Thank you for listening to me.

Video Links

Stay Connected

KuppingerCole on social media

Related Videos

Event Recording

Cyber Hygiene Is the Backbone of an IAM Strategy

When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security means, above all, good, clean and clear security practices that happen before-hand and all day,…

Event Recording

The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business

Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an agile ecosystem of commerce and corporation governed by security, protection, management of…

Webinar Recording

Advanced Authorization in a Web 3.0 World

Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who and what has access to what in what context, is extremely challenging. Business success depends…

Webinar Recording

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine…

Event Recording

The Role of Managed Security Service Providers (MSSPs) In Your Future IAM Application Landscape

Trying to “do identity” as a conventional IAM or Security workload with in-house resources and vendor platform deployments may not satisfy identity and access today’s requirements for IaaS, PaaS, databases and other cloud infrastructures. There are now a growing number of…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00