Interview

The Interplay between Zero Trust and IAM

Show description
Speaker
Principal Analyst & Co-Founder
KuppingerCole Analysts AG
Martin Kuppinger is the founder and Principal Analyst responsible for the KuppingerCole research. In his 25 years of IT experience he has already written more than 50 IT-related books and is known as a widely-read columnist and author of technical articles as well as reviews and is also a...
View profile
Top related content
Event Recording
Zero Trust and the Business – why you have to align with the application owners!
May 12, 2022
Analyst Chat
Analyst Chat #15: Zero Trust as a Concept for … Trust and Security
May 22, 2020

Matthias Reinwarth and Martin Kuppinger dispel a few myths about Zero Trust.

Analyst Chat
Analyst Chat #86: Zero Trust Means Zero Blind Spots
Jul 26, 2021

The path toward a Zero Trust architecture to improve cybersecurity for modern enterprises in a hybrid IT landscape often seems overly complex and burdensome. Alexei Balaganski is this week's chat partner for Matthias and he draws attention to an often overlooked benefit of such an infrastructure. One key idea of Zero Trust is to actually reduce complexity and unnecessary effort and instead focus on what really needs to be protected.

Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Interview
Continual Access Control, Policies and Zero Trust
Jan 04, 2023

Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and Access Management. Because you can only verify what or who you know - they need an identity to get access.

Webinar Recording
Buying Into Zero Trust? What You Need to Consider to Be Successful
Oct 12, 2018

As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to change the way we approach security, we need to think beyond the technology and focus on the gaps we need to consider.

Webinar Recording
Making Zero Trust Work With the NIST Framework
Dec 17, 2020

There’s lots of hype around Zero Trust Security in the context of our changing mobile and cloud-centric working environments. Moving towards a modern and agile Zero Trust security concept is essential in today's mobile first, work-securely-from-anywhere world.

Webinar Recording
Zero Trust for the Workforce
Dec 02, 2020

While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.

Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.