KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Cloud is here to fundamentally change the way Identity and Access Management services are delivered. It is an imperative but also an opportunity to re-visit and challenge a few tried and tested approaches to delivering core IAM capabilities. It also provides an important pause to design the IAM capability of the future. The speaker will share his experiences in deploying a native cloud-based IAM solution at scale, the challenges, pitfalls, and the watch-outs.
We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are:
…the one critical thing we are all missing is a consistent and accurate vocabulary. Throughout decades of academic work, many authors proposed definitions for IAM terms and concepts. Yet, as a discipline, as an industry, as a career specialization, and as a research field, we failed to consolidate this and build a reference IAM dictionary, allowing us to communicate with precision and clarity.
In this session, I will present you with the TOME community project. Its goal is to become that reference dictionary. It is built as an open wiki to allow all experts to contribute. It is free of charge and licensed under Creative Commons to facilitate its widespread adoption. It is rooted in science with pervasive references from the literature to stand on the shoulders of giants.
Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM.
IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance requirements. It is a business enabler, as well as an IT enabler. It is a central element of every cybersecurity strategy. It enables managing and access control for everyone from employees to consumers and everything from things to software robots. It is a foundation for your success in digital transformation. It also enables IT transformation, by managing access to all the clouds and services you have to deal with.
But: How to get to a modern IAM form where you may be today? What to preserve, what to extend, what to add, what to retire? And how to do such a migration in a way that you can serve the business demand rapidly, while gaining the time you need for more complex migrations – and while preserving investments in times of tight budgets?
Martin Kuppinger, Principal Analyst at KuppingerCole, will discuss these aspects and explain how the paradigm of an Identity Fabric can help you in successfully modernizing your IAM, at your own pace. He also will shed a light on the state of the market and the maturity of offerings serving the Identity Fabrics model.
Organizations are in a constant race when it comes to cybersecurity. Identity and Access Management has a more relevant role than ever in this ruthless fight against cyber enemies that may cause fatal operational, monetary and reputational damage to organizations. IAM teams must offer a set of security solutions and processes to safeguard and protect the business, and nowadays the teams are expected to deploy those faster and more efficiently than ever. The presentation will go through how to implement an efficient, centralized IAM approach that makes no compromises and shows no mercy for any attempt to unauthorized access outside the IAM solution. It will also be explained how the approach can be implemented in an agile manner during an on-going IAM project.
An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation technology, CISOs can bring down the risk involved in IAM operations; Robotic Process Automation (RPA) being one among them.
In a world where you never meet our customers or employees face to face, it’s critical to anchor their real identity to their digital one.
It’s only by doing this that you can securely provision access, verify high-risk actions, and deliver on an experience that keeps them engaged. In this session, Olli Krebs (VP Central EMEA at Onfido) will examine how document and biometric verification can seamlessly enable trust throughout the identity lifecycle.
Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs. A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling way. What does success look like in the CIAM world and how do identity fabrics enable it?