Videos

Latest videos

Watch the latest video blogs and webinar recordings. Stay up to date on new trends in the cybersecurity and identity industry to meet and exceed key business challenges.
Webinar Recording
Identity & Access Management Predictions 2022
Dec 21, 2021
Increased remote working, a dramatically increased digital customer interaction landscape, the hyperconnected industry 4.0 enterprise, an increasingly complex multi-cloud multi-hybrid infrastructure - much of what we based our past strategic assumptions on has developed faster and with a different emphasis.
Webinar Recording
Prediction #4 - Identity & Access: The Big Efficiency Push
Dec 21, 2021

Workflows, integration, automation, low & no code – whatever reduces complexity and manual workload will be an even hotter topic in 2022. KuppingerCole Analysts Martin Kuppinger and Paul Fisher will discuss with Clear Skye´s Jackson Shaw on the new era of platform services and how they will help automating Identity & Access Management.

Webinar Recording
Prediction #5 - Zero Trust: The Next Level
Dec 21, 2021

Zero Trust will continue to play a crucial role in cybersecurity and identity management. In this session, KuppingerCole Analysts Martin Kuppinger and Paul Fisher will discuss with Sergej Epp from Palo Alto Networks on how to apply Zero Trust thinking to converge IAM, UEM, MDM, XDR, SIEM, SOAR to a seamless and holistic cybersecurity infrastructure.

Webinar Recording
Prediction #1 - Passwordless Authentication: Killing the Undead will become Mainstream in 2022
Dec 21, 2021

The increased importance of a frictionless user experience as a digital business success factor on the one side, and a big wave of ransomware and similar attacks with user credentials as a main entry point are forcing us to rethink authentication and finally get rid of the password. Interview guests of this session will be KC Analyst Martin Kuppinger, Paul Fisher and Jochen Koehler from HYPR.

Webinar Recording
Prediction #3 - Identity Proofing & Fraud Reduction Everywhere
Dec 21, 2021

The pandemic has dramatically accelerated the shift to online transactions in most industries, with the financial industry as an example for a heavily regulated sector being in the forefront of a movement to establish a global standard that leverages the assurance level of online identity vetting (the onboarding process of a digital identity) with traditional face-to-face methods. In this session, KuppingerCole Analysts Martin Kuppinger and Paul Fisher together with ForgeRock's Eve Maler will discuss the relevance of identity proofing for your enterprise and why it will be one of the key topics 2022.

Website www.forgerock.com, email eve.maler@forgerock.com, LinkedIn https://www.linkedin.com/in/evemaler/ 

Webinar Recording
Prediction #2 - The Convergence of IAM and how to Manage Complexity in a Multi Cloud, Multi Hybrid, Multi Identity World
Dec 21, 2021

It is the same set of drivers – first and foremost remote workforce requirements and seamless customer interaction, that make our infrastructure and service even more complex as they used to be, with multiple public and private clouds, on-site IT, all of them with identity silos. In this session, KuppingeCole´s Analyst Martin Kuppinger and Paul Fisher, will talk with André Priebe from iC Consult on how to leave silos behind and take advantage of global identity proofing networks, Decentralized (DID/SSI) or chain-agnostic (GAIN etc.) and how CIEM/DREAM can help reducing complexity.

Analyst Chat
Analyst Chat #106: 2021 - A Retrospective
Dec 20, 2021

Paul Fisher and Matthias present their very subjective summary of a really special and, in particular, especially challenging past year, 2021. They cannot do without the word 'pandemic' after all, but they also try to reach a first perspective on the year 2022 from the past 12 months.

Webinar Recording
Identity Security: A Top Priority for the Modern Enterprise
Dec 15, 2021
Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or challenging.
Interview
EIC Blog | Interview with David Pignolet
Dec 15, 2021
Webinar Recording
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA
Dec 10, 2021
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC) solutions alone are unable to meet the changing and dynamic IGA requirements of modern enterprises.
Webinar Recording
Lessons From a Journey Into a Real-World Ransomware Attack
Dec 08, 2021
Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.
Analyst Chat
Analyst Chat #105: A Deeper Dive into GAIN
Dec 06, 2021

The announcement of the GAIN initiative for the secure distribution of verified and assured identity data has been made at EIC in September. While the core concepts of this initiative have been discussed in earlier episodes, Martin and Anni sit down with Matthias to do a deeper dive into further aspects of GAIN, including the use beyond customer-related IAM and the challenge of privacy in such a hyper-connected network for PII.

Webinar Recording
Urgent Need to Protect the Most Critical Business Assets: Data & People
Dec 03, 2021
Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.
Interview
EIC Goes to Berlin | New Location, New Opportunities
Dec 02, 2021
Frontier Talk
Reinventing Government with Technology | Frontier Talk #8 - Sebastian Manhart
Dec 01, 2021

Raj Hegde is joined by Sebastian Manhart - Technical Advisor on Digital Identity for the German Chancellery to explore governmental reform and understand stakeholder expectations behind the rollout of digital identity projects in the post-COVID era.

Tune in to this episode to learn how governments can transition from risk-averse waterfall approaches, improve human factors in public services and navigate through the government-private sector nexus to promote citizen access to essential services.

Analyst Chat
Analyst Chat #104: Edge Computing
Nov 29, 2021

Senior Analyst Graham Williamson joins Matthias from down under to talk about edge computing. Starting from the definition and relevant use cases, they focus on where the edge brings value. They discuss what the key criteria for a successful deployment are and what needs to be looked at to do edge computing while preserving security and privacy.

Webinar Recording
Combatting Fraud Proactively With Behavioral Biometrics
Nov 26, 2021
Digital businesses are facing an increasing onslaught of fraud enabled by malware, social engineering, and other cyber criminal activities. Strong authentication is essential, especially in the context of PSD2, but it can be challenging to achieve without adding friction to the user experience.
Digital ID & Identification
8 videos
Webinar Recording
Engineering Successful IAM Projects to Support Digital Business
Nov 24, 2021
In the digital era, traditional approaches to Identity and Access Management (IAM) are ineffective. IAM is no longer just about managing employee identities, but about managing all kinds of identities across a wide variety of use cases. This requires a comprehensive and agile approach.
Analyst Chat
Analyst Chat #103: Data-Centric Security
Nov 22, 2021

Lead analyst Alexei Balaganski joins Matthias for an episode on Data-Centric Security. Starting with a definition behind that term, they look at relevant technologies and market segments and discuss adequate ways of adding Data-Centric Security to an organization's cybersecurity strategy.

Analyst Chat
Analyst Chat #102: Impressions and Insights From the CSLS 2021
Nov 15, 2021

From November 9th to 11th, the Cybersecurity Leadership Summit 2021 took place in Berlin and virtually online. The Monday after, Martin Kuppinger and Matthias sat together to talk about some first impressions and insights from this event.

The recordings and slide decks are available for participants and those interested.

Cybersecurity Leadership Summit 2021
72 videos
Analyst Chat
Analyst Chat #101: DREAM - Policies and Automation for All of Today's IT
Nov 08, 2021

In the past, servers and applications were rather static, and entitlements too were static. But this has changed. Organizations must deal with a multi-cloud, multi-hybrid IT. Entitlements and access in today’s cloud environments are dynamic, just like workloads. Martin Kuppinger joins Martin to explore the area of Dynamic Resource Entitlement and Access Management (DREAM). Together they look at policies and automation as one key building block for managing today's volatile IT.

Webinar Recording
Delivering on the Promise of an Identity Fabric in a Modern Enterprise
Nov 05, 2021
Identity sprawl is a challenge facing most modern enterprises as a result of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work. This sprawl leads to tremendous technical debt and has turned identity and access management into a roadblock for many organizations.
Analyst Chat
Analyst Chat #100: A Perspective on "Everything as Code"
Nov 01, 2021

No big celebration, but at least a mention: this is the 100th episode of the KuppingerCole analyst chat. Martin Kuppinger joins Matthias to discuss the increasingly important topic of "everything as code" and how to define proper strategies for approaching this, especially in the context of the BASIS concept. For more on this, both recommend revisiting Martin's opening keynote from this year's EIC.

Webinar Recording
Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können
Oct 29, 2021
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.
Securing Industry 4.0
9 videos
Webinar Recording
Why Continuous API Security Is Key to Protecting Your Digital Business
Oct 22, 2021
In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing only on the operational aspects is no longer enough.
Webinar Recording
Meeting the Identity and Access Challenges in a Multi-Cloud World
Oct 20, 2021
Multi-cloud deployments are becoming increasingly common as organizations seek to remain competitive in the digital economy and address demands for increased remote working. But while cloud migration is enabling business success, it is not without its identity and access challenges.
Webinar Recording
Understanding the Privileged Access Management (PAM) Market
Oct 19, 2021
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.
Analyst Chat
Analyst Chat #99: Protecting OT and ICS
Oct 18, 2021

John Tolbert sits down with Matthias and shares his insights into current approaches for protecting and defending essential enterprise systems beyond traditional, often office-focused cybersecurity. Safeguarding Operational Technology (OT), Industrial Control Systems (ICS), and the Industrial Internet of Things (IIoT) is getting increasingly important. John explains that modern approaches like Network Detection and Response (NDR) and especially Distributed Deception Platforms (DDP) can be valuable building blocks in an overall strategy for defending, for example, the factory floor or critical clinical systems.

Webinar Recording
Managing Risk in Ever-Changing As-a-Service Environments
Oct 15, 2021
In the infrastructure and platform-as-a-service worlds, application developers are the new infrastructure superstars. With concepts ranging from containers to infrastructure-as-code, we are experiencing a paradigm shift in how tightly coupled application code and the related infrastructure are. Often security is under-represented in this formula, and for good reason.
Enterprise Blockchain Day
9 videos
Webinar Recording
Verifiable Credentials: A Fresh Approach to Identity in the Digital Era
Oct 13, 2021
Establishing a verified digital identity is crucial to successful business collaboration and customer engagement in the digital economy. Verifiable Credentials provide a highly secure way of establishing digital identity. However, knowing exactly how to begin using this approach can be challenging.
Analyst Chat
Analyst Chat #98: GAIN and Reusable Identities
Oct 11, 2021

Annie Bailey and Matthias take a deeper look at the emerging concept of the Global Assured Identities Network (GAIN) and also seek a broader perspective on the benefits and challenges of reusable identities in general.

Webinar Recording
Uncovering the Truth About SAP Identity & Access Management
Oct 08, 2021
Ensuring everyone has access to the right systems and data is critical for security and compliance, but often the management of identity and access in SAP is siloed. A survey by SailPoint Technologies and Turnkey Consulting uncovers the extent to which this is true and points to potential solutions.
Analyst Chat
Analyst Chat #97: Low-Code/No-Code and the Citizen Developer
Oct 04, 2021

The idea of low-code/no-code (LC/NC) application development is for end users to create their own custom applications, perhaps using a graphical design tool, selecting from a library of existing building blocks, or perhaps even with the assistance of artificial intelligence. Alexei Balaganski explains the concepts behind this new development, takes a look at the current market and, finally, highlights the challenges and security issues that may be hidden behind the use of such application development.

Webinar Recording
API Management & Security Key to Digital Business Success
Oct 04, 2021
Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. APIs are found everywhere because they are key to creating new business models and connecting with business partners and customers. But opening up APIs is risky without the right security strategy and infrastructure in place.
Webinar Recording
Understanding the IGA-Focused Identity-as-a-Service (IDaaS) Market
Oct 01, 2021
The IDaaS market combines Access Management functions with Identity and Access Governance capabilities, and delivers them as a cloud-based managed service designed to meet the common IAM requirements of hybrid IT environments, but finding the right IDaaS solution with a focus on Identity Governance and Administration (IGA) can be challenging.
Webinar Recording
A Customer-First Approach to Identity-Based Authentication
Sep 30, 2021
Even though passwords can be compromised easily and are generally considered unsafe, they are still ubiquitous in a time when multi-factor authentication and biometrics are easily available. There’s little doubt that eliminating passwords improves security, but to effect fundamental change you must start with the customer experience and ask yourself where it’s possible to take it.
Frontier Talk
The Decentralized E-Commerce Story | Frontier Talk #7 - Dr. Michele Nati
Sep 30, 2021

In this episode, Raj Hegde sits with Dr. Michele Nati - Head of Telco and Infrastructure Development at #IOTA Foundation to understand how decentralization offers a fresh perspective towards marketplace transactions.

Tune in to this episode to explore how an international initiative comprising of banks, universities and telco providers comes together to safeguard the e-commerce ecosystem.

Webinar Recording
Disaster Planning Made Simple
Sep 29, 2021
In the digital era, as businesses become increasingly reliant on IT, a potentially devastating cyber-attack or other type of disruptive cyber incident is inevitable. Being prepared is the single most effective action that those responsible for information security can take.
Webinar Recording
Adding Certainty to Your Cyber-Attack Detection Capabilities
Sep 28, 2021
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.
Analyst Chat
Analyst Chat #96: How to Combine Security And Convenience (EIC 2021 Special)
Sep 27, 2021

While moderating and speaking at KuppingerCole's flagship EIC 2021 event in Munich, Matthias also took the opportunity to sit down one-on-one with his fellow analysts in the conference studio for some EIC special analyst chat episodes. In the third and final special episode, Martin Kuppinger and Matthias look at how current technologies and concepts complement each other to improve security and convenience for users of modern technologies at the same time.

Analyst Chat
Analyst Chat #95: Deconstructing the User Journey (EIC 2021 Special)
Sep 23, 2021

KuppingerCole's flagship event EIC 2021 took place very successfully in Munich and online in September. Of course, Matthias took the opportunity to sit down with his fellow analysts in person for some EIC Special Analyst Chat episodes. Building on the themes of his Opening Keynote, Martin Kuppinger explains the concepts behind "Deconstructing the User Journey".

European Identity and Cloud Conference 2021
157 videos
Analyst Chat
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
Sep 20, 2021

EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC special analyst chat episodes. In the first of three specials, Christopher Schütze talks to him about the findings from his pre-conference workshop on defending against ransomware, and they also turn their attention to a promising new approach to creating globally secured identities.

Event Recording
EIC 2021 - Keynotes & Workshops
Sep 19, 2021
Event Recording
EIC 2021 - Attendees Greetings
Sep 19, 2021
Event Recording
EIC 2021 - Impressions
Sep 19, 2021
Event Recording
EIC 2021 - Venue, Sponsor Booths
Sep 19, 2021
Event Recording
EIC 2021 - Networking Lounge & Buffet
Sep 19, 2021
Event Recording
Panel | Bringing the Global Assured Identity Network (GAIN) to Reality
Sep 15, 2021
Donna Beatty, Digital Identity Industry Expert, Digital Identity
Vittorio Bertocci, Principal Architect, Auth0
Daniel Goldscheider, CEO, yes.com
Don Thibeau, Executive Director, OpenID Foundation
Event Recording
Panel | From Piecemeal to Strategic Priority: What CISOs need to know about CIEM
Sep 15, 2021

CIEM (Cloud Infrastructure Entitlement Management) is a SAAS delivered, converged approach to next generation, ideally AI driven multi-cloud security, managing access and privileges in the cloud. It is playing across the disciplines Identity Management & Governance, Access, Privilege Management and Authentication, addressing the complexity of multi-cloud adoption with privilege & access management working differently for each provider.

Gerry Gebel, Head of Standards, Strata Identity, Inc
David Higgins, EMEA Technical Director, CyberArk
Jon Lehtinen, Director, Okta
Patrick Parker, Founder and CEO, EmpowerID
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Event Recording
Panel | Managing Zero Standing Access
Sep 15, 2021
Horst Bliedung, Head of IAM Product Management, Atos
Paul Fisher, Senior Analyst, KuppingerCole
Vadim Lander, Chief Technology Officer and Distinguished Engineer, Symantec Identity Security, Broadcom
Brandon Nolan, Global Digital Identity Lead, Avanade
Patrick Parker, Founder and CEO, EmpowerID
Event Recording
Panel | CIAM During Covid - How to Better Secure the Identities of Your Customers
Sep 14, 2021
Max Faun, Head of Consulting, Europe, Okta
Paul Fisher, Senior Analyst, KuppingerCole
Jason Goode, Regional Director – EMEA, Ping Identity
Dali Kilani, CTO, Lifen
Event Recording
Browser Features vs. Identity Protocols: An Arms Race?
Sep 14, 2021

In an attempt to protect users from excessive tracking and surveillance, the last couple of years have witnessed major browser vendors introducing increasingly restrictive anti-tracking measures. Identity protocols and features got caught in the crossfire, however, forcing identity software vendors and developers to hastily introduce changes to restore functionality that browser changes broke. Is this the new normal? What will we do when a change will break an identity feature beyond repair?

This session will review the main browser changes that have affected identity over the last few years – Chrome’s SameSite and Safari’s ITP2 in particular, interpreting them as part of a larger trend and attempting to predict what the future will look like for identity customers and practitioners.

Vittorio Bertocci, Principal Architect, Auth0
Event Recording
Goodbye Dogmatism / Hellō Pragmatism
Sep 14, 2021

Disciples of decentralized identity have preached for years that DIDs are the only true path to giving users control over their identity, AKA self sovereign identity. The lack of widespread adoption is evidence that a more pragmatic approach is needed.

Event Recording
European Identity & Cloud Awards Ceremony 2021
Sep 14, 2021
Event Recording
Panel | Prioritizing Identity - Identity-Centric Security Strategy
Sep 14, 2021

Identity management is critical for digital transformation and continues to evolve and gain importance as the business environment changes in today's hyperconnected world, where employees, business partners, devices, and things are all tightly interwoven. Deploying an identity security solution – regardless of your business size or industry is a fundamental requirement today to facilitate secure communications and reliable transactions.

This panel explores identity security strategies that enable your business to take full advantage of your solution’s capabilities.

Yvo van Doorn, Senior Solutions Engineer, Auth0
Oliver Krebs, GM EMEA, Onfido
Martin Kuppinger, Principal Analyst, KuppingerCole
Analyst Chat
Analyst Chat #93: Policies and Automation to Secure Your Agile and Dynamic IT Environment
Sep 13, 2021

Martin Kuppinger and Matthias discuss the high-priority topic of how to achieve automation of management and security across the entire multi-hybrid, multi-cloud IT infrastructure based on well-defined policies.

Event Recording
Modernizing the Customer Journey
Sep 13, 2021

As organizations are recovering from the pandemic, the need to adapt to rapid technology, organization and social changes makes many of them embark on a digital transformation at high speed. Investments to drive online business, powered by customer insights and an attractive user experience, yet secure and compliant to rules and regulations, have never been bigger.
Integrating Marketing and Customer Relationship Management (CRM) functions with Customer Identity & Access Management (CIAM), if done well, can help business owners achieve the ROI they are looking for.

Join Gerald Horst, who leads PwC's Digital Identity team in EMEA, as he explains how powerful Customer Identity & Access Management can be when you are transforming your organization to become successful in doing business online. Gerald will share relevant client experiences, demonstrate some key capabilities and give his view on future client demands in this context.

Key takeaways:

  • How to onboard new customers within minutes while applying a zero-trust approach
  • How to balance the user experience, cost, and security requirements the right way
  • Integrating CIAM with SalesForce to support a digital customer journey from A to Z
  • The power of CIAM in future online business models 

 

Event Recording
Introducing The Global Assured Identity Network (GAIN)
Sep 13, 2021
100 experts propose an interoperable scheme to create a virtual IDP.
Event Recording
Complexity has Reached a Tipping Point in IT – What Can we do About it?
Sep 13, 2021

"Act quickly; allow me to think less; protect me from risk." These incongruent objectives are being asked of IT departments and their staff. We are living through a great digital transformation that is rewriting our way of working and means of producing goods and services. Underlying and enabling this transformation is an increasingly complex, obscure, and challenging myriad of interwoven software systems spanning organizational and technological boundaries. IT complexity is no longer isolated to back-office nerds conversing in technobabble and pushing us aside to remedy our newb problems. All portions of the workforce are more exposed and dependent on technology to complete their day-to-day duties. 

Event Recording
Introducing BASIS - Addition to Martin Kuppinger's Opening Keynote
Sep 13, 2021
Speaker Spotlight
EIC Speaker Spotlight: Maarten Stultjens
Sep 09, 2021
Speaker Spotlight
EIC Speaker Spotlight: Vadim Lander
Sep 08, 2021
Webinar Recording
Making IAM Agile and a Business Enabler 
Sep 08, 2021
In the digital era, IAM is no longer just about employees. To become truly digital and tap into the new business benefits, organizations need IAM systems that can cater to partners, consumers and even things, as well as support IAM capabilities across all target systems, regardless of their deployment model.
Speaker Spotlight
EIC Speaker Spotlight: Kay Chopard
Sep 07, 2021
Speaker Spotlight
EIC Speaker Spotlight: Joni Brennan
Sep 06, 2021
Analyst Chat
Analyst Chat #92: How the Cybersecurity Market Is Evolving
Sep 06, 2021

Cybersecurity is one of the areas where virtually every business will need to invest because of ever-growing cyber risks and ever-tightening regulations, and in the post-Covid era, the cybsersecurity market continues to evolve and grow, having gained even greater importance. Warwick Ashford joins Matthias to discuss the factors driving the trends in this market and what businesses should be considering when making cybersecurity investments.

Speaker Spotlight
EIC Speaker Spotlight: Dave Mason
Sep 03, 2021
Frontier Talk
Bringing User-Centricity to Decentralized Identity | Frontier Talk #6 - Nat Sakimura
Sep 01, 2021
Raj Hegde sits with identity veteran, Nat Sakimura - Chairman of OpenID Foundation to understand how user-centric learnings from existing authentication protocols can be applied to future identity initiatives.

Tune in to this episode to explore ways to navigate tradeoffs between privacy and accessibility in decentralized identity and learn about interesting user-centric approaches that can be applied to modern identity protocols.

P.S.: You do not want to miss out on our little surprise at the end of this episode 😉

Speaker Spotlight
EIC Speaker Spotlight: Sadrick Widmann
Aug 31, 2021
Analyst Chat
Analyst Chat #91: Vulnerability Management
Aug 30, 2021

Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability management. Together with Matthias, he provides an overview of elementary aspects that need to be considered.

Speaker Spotlight
EIC Speaker Spotlight: Chris Owen
Aug 26, 2021
Webinar Recording
Trust No One: Zero Trust Strategy and Design
Aug 25, 2021
With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.
Speaker Spotlight
EIC Speaker Spotlight: Nat Sakimura
Aug 24, 2021
Analyst Chat
Analyst Chat #90: API Management and Security
Aug 23, 2021

The market segment of products and services that are designed to manage and secure APIs as essential resources in a multitude of different environments is constantly evolving. On the occasion of the publication of the latest edition of his Leadership Compass "API Management and Security", Alexei Balaganski explains the fundamentals and current developments of these products and services.

Speaker Spotlight
EIC Speaker Spotlight: Carsten Stöcker
Aug 21, 2021
Webinar Recording
Zero Trust Through Dynamic Authorization and Policy Driven Access
Aug 20, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Aug 18, 2021

Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch, to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to explore the concept of machine economy, understand the needs of machines and dive deep into the intersection of decentralized identity and the Internet of Things.

Speaker Spotlight
EIC Speaker Spotlight: Eric Newcomer
Aug 17, 2021
Analyst Chat
Analyst Chat #89: Next-Generation BI Platforms
Aug 16, 2021

Business Intelligence is the discipline of deriving business insights from raw enterprise data to inform decision making. Although this is a mature market, new trends are stirring up this market sector. Annie Bailey joins Matthias to explain what is changing and what 'Next-generation BI platforms' are.

Speaker Spotlight
EIC Speaker Spotlight: Mike Kiser
Aug 12, 2021
Speaker Spotlight
EIC Speaker Spotlight: Graham Williamson
Aug 10, 2021

Graham Williamson, Senior Analyst at KuppingerCole, is to deliver a presentation entitled Meeting Expectations – 5 pillars for IoT project success on Tuesday, September 14 starting at 7:20 pm. at EIC 2021.

To give you sneak preview of what to expect, we asked Graham some questions about his planned presentation.

Analyst Chat
Analyst Chat #88: What (and why) is XDR?
Aug 09, 2021
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei Balaganski join Matthias and share their views on this market, the existing offerings, and how it might evolve.
Speaker Spotlight
EIC Speaker Spotlight: Vittorio Bertocci
Aug 03, 2021
Analyst Chat
Analyst Chat #87: Data Governance Platforms
Aug 02, 2021

Paul Fisher has researched the topic of Data Governance Platforms extensively, and he published a Market Compass on this topic at KuppingerCole Analysts just a few weeks ago. In the current episode of Analyst Chat, he explains this market segment to Matthias and provides insight into current developments.

Speaker Spotlight
EIC Speaker Spotlight: Peter Busch
Jul 29, 2021
Speaker Spotlight
EIC Speaker Spotlight: Women in Identity
Jul 27, 2021
Analyst Chat
Analyst Chat #86: Zero Trust Means Zero Blind Spots
Jul 26, 2021

The path toward a Zero Trust architecture to improve cybersecurity for modern enterprises in a hybrid IT landscape often seems overly complex and burdensome. Alexei Balaganski is this week's chat partner for Matthias and he draws attention to an often overlooked benefit of such an infrastructure. One key idea of Zero Trust is to actually reduce complexity and unnecessary effort and instead focus on what really needs to be protected.

The Access Management Playbook
7 videos
Speaker Spotlight
EIC Speaker Spotlight: Doc Searls
Jul 22, 2021
Event Recording
The Future of Access Management: Beyond passwords, beyond static entitlements
Jul 22, 2021

In his talk, Martin Kuppinger will deconstruct the term Access Management and look at the various elements and concepts behind. Access Management is multi-facted and includes many concepts. On the other hand, many of the areas we should find being supported in Access Management are still missing in most implementations. So: What does it need for a modern, comprehensive Access Management? How will this look differently from now? Will we get rid of the burden of annoying authentication procedures or reviewing static entitlements we don’t understand? Which roles should policies play? Could we move forward to just-in-time entitlements? And will we finally get rid of passwords.

Martin Kuppinger will cover trends that are already visible, options you can take today, but also evolutions that are just visible at the horizon and innovations vendors should focus on today.

He will deliver you a high-level playbook for tactical and strategic steps for evolving what you have in Access Management towards a broader, future-proof solution.

Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.
Speaker Spotlight
EIC Speaker Spotlight: Gerald Horst
Jul 20, 2021
Analyst Chat
Analyst Chat #85: Hybrid IT 4 - Hyperconverged, Edge and Cloud in a Box
Jul 19, 2021

This episode concludes the four-part series on hybrid IT. To wrap things up, Mike Small and Matthias focus on the latest developments in hybrid infrastructures, between containers, hyperconverged, edge and cloud in a box.

Webinar Recording
Identity Verification: Why It Is Needed and How It Can Benefit the Business
Jul 16, 2021
The COVID-19 pandemic has transformed the way customers engage with brands and led to increased digital interaction. But this has increased the incidence of fraud during the account creation process. As a result, businesses now face the challenge of verifying customer identity and verifying that those entities interacting with their brand are human and who they claim to be.
Speaker Spotlight
EIC Speaker Spotlight: Anne Bailey
Jul 15, 2021
Webinar Recording
IT-Herausforderungen in der Digitalen Transformation
Jul 15, 2021
Die Digitale Transformation und die Notwendigkeit, von überall aus arbeiten zu können, nehmen massiven Einfluss auf die Unternehmensinfrastruktur. Das Ergebnis: Anwender, Applikationen und Daten sind nun überall und fordern bestehende Sicherheitslösungen heraus, sowohl einen umfassenden und konsistenten Schutz als auch eine performante User Experience zu bieten.
Frontier Talk
Building the Future of Identity | Frontier Talk #4 - Doc Searls
Jul 14, 2021

"Progress is the process by which the miraculous becomes mundane.” says Doc Searls, the next guest on our popular podcast series - Frontier Talk. In this episode, Raj Hegde sits down with one of the most prolific technology thinkers of our generation to understand the problems of the identity status quo and to determine the boundary conditions required to usher in a new era in identity - one that gives individuals independence and better ways to engage with businesses.

Speaker Spotlight
EIC Speaker Spotlight: Michele Nati
Jul 13, 2021
Analyst Chat
Analyst Chat #84: Hybrid IT 3 - Managing and Governing
Jul 12, 2021

Part three of the four-part series on hybrid IT looks at approaches to appropriately manage and evolve hybrid architectures. Mike Small and Matthias put the focus not only on technical management, but also on appropriate governance in particular.

Webinar Recording
Zero Trust Means Zero Blind Spots
Jul 09, 2021
The traditional model of enforcing security at the network perimeter is no longer effective. The nature of the corporate network is changing with mobile and cloud computing. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But deciding how best to adopt Zero Trust can be challenging.
Cloud Strategy Optimization
9 videos
Speaker Spotlight
EIC Speaker Spotlight: Patrick Parker
Jul 08, 2021
Event Recording
A Cloud for all Seasons
Jul 07, 2021

Even though the pandemic has been the main driver for digital workplace productivity as a strategic requirement, this topic will not go away after it is over. The Digital Business workforce needs to be “anywhere-enabled”. In order to support this Secure & Flexible Infrastructures for the Digitally Transformed Enterprise is necessary.

Developing a digital workplace strategy contains several layers:

  • Collaboration, EX (Employee Experience) and connectivity to forge productive business relationships within and beyond natural workgroups.
  •  Workplace Technology - the digital workplace toolbox
  • Secure Information Exchange & Digital Workplace Management

 

In this KC live event, we will discuss the future workplace trends such as De-Materialization & Anywhere Computing, Workplace-Consumerization, KyE (Know Your Employee), How to balance Zero Trust requirements with easy access and more.

Our expert speakers will share insights on how a solid digital workforce strategy, incorporating technologies like automation, collaboration, and artificial intelligence, can help propel your business forward.  

Webinar Recording
The Path to Going Passwordless
Jul 07, 2021
Password-based authentication is no longer fit for purpose. Passwords are costly and difficult to manage, they result in poor user experiences, and they are easily compromised. This has been widely recognized for some time, but going passwordless is also challenging and continues to be elusive for many organizations.
Event Recording
Confidential Computing and Why This Matters for Cloud
Jul 07, 2021
Speaker Spotlight
EIC Speaker Spotlight: Jackson Shaw
Jul 06, 2021
Analyst Chat
Analyst Chat #83: Hybrid IT 2 - The Challenges
Jul 05, 2021

Mike Small and Matthias continue their four-part series on hybrid IT, looking at the increasing complexity: they look at multiple dimensions of the challenges that come with deploying and operating hybrid IT architectures.

Webinar Recording
The IAM Cloud Journey
Jul 02, 2021
In the digital era, IT is increasingly being provided and consumed as cloud-based services, including Identity and Access Management (IAM). As more workloads and IT services move to the cloud, it makes sense to move IAM to the cloud as well. The most common path is to opt for an Identity as a service (IDaaS) solution, but this is not without its risks and challenges.
Webinar Recording
A Unified Approach to Modern Data Protection
Jul 01, 2021
Data is the lifeblood of business and government. Therefore, data breaches can be devastating in terms of disruption, damage to reputation, remediation costs, and data protection fines. But the ongoing high number of breaches shows that what many organizations are doing to protect their data is not working.
Webinar Recording
Accelerate Your Digital Transformation Through Identity
Jun 30, 2021
Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster digital transformation, better customer journeys, and improved security, privacy, and compliance.
Webinar Recording
Access Risk Management for SAP and Beyond
Jun 28, 2021
Organizations are increasingly under pressure to deliver security, identity, compliance, governance, and risk management for all types of business applications. This challenge is exacerbated by the fact that most organizations have a heterogeneous landscape of business applications both in terms of vendors and deployment models.
Analyst Chat
Analyst Chat #82: Hybrid IT 1 - The Basics
Jun 28, 2021

This is the kickoff of a four-part series of podcast episodes around hybrid IT. Mike Small and Matthias explore the fundamentals of modern architectures between the cloud and the traditional data center.

Digital Workflows with ServiceNow
7 videos
Event Recording
Exploring the Intersection of ITSM and ServiceNow
Jun 23, 2021

Christopher provides a deep-dive on the intersection of ITSM and ServiceNow

Webinar Recording
A Fresh Look at the Business Value of PAM in the Work-From-Anywhere World
Jun 23, 2021
As businesses continue their digital transformation journey, managing privileged users has taken on a new and greater importance. Privileged Access Management (PAM) has never been more important, with increased remote working and employees increasingly getting privileged access to data and services.
Analyst Chat
Analyst Chat #81: Fraud Reduction Intelligence Platforms Revisited
Jun 21, 2021

In episode seven of this podcast, John Tolbert and Matthias first looked at Fraud Reduction Intelligence Platforms more than a year ago. Much has happened in this market segment since then, and on the occasion of the release of the updated Leadership Compass, they look at the latest innovations.

Webinar Recording
Technological Approaches to a Zero Trust Security Model
Jun 18, 2021
The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices and workloads move outside the corporate network. A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.
Webinar Recording
Does Increased Security Still Mean Added Complexity?
Jun 18, 2021
We’re all accessing more goods and services online than we ever thought possible, which has presented a huge opportunity for cyber criminals. Rapid digital transformation has left some businesses exposed, and fraudsters are looking to exploit new weaknesses. Strong digital identity verification and authentication is essential, but has traditionally come with increased complexity at the expense of a good user experience. But is this still true?
Webinar Recording
Privileged Access Management: Cloud Delivery Without Compromise
Jun 16, 2021
Privileged Access Management (PAM) solutions are critical cybersecurity and risk management tools for just about every business to address the security risks associated with privileged users and privileged access, but not everyone can afford expensive on-prem deployments.
Analyst Chat
Analyst Chat #80: AI Service Clouds
Jun 14, 2021

Anne Bailey has just completed extensive research into the new market segment of AI Service Clouds. In this episode, she explains this innovative concept, which aims to overcome the lack of qualified personnel and bring artificial intelligence and machine learning to more companies.

Video
Zero Trust & SASE: Ohne IAM geht nichts
Jun 10, 2021

Zusammenarbeit und neue Arbeitsformen ermöglichen, IT-Modernisierung unterstützen

IAM (Identity und Access Management) ist ein Kernelement jeder Strategie im Bereich der Cybersicherheit. Kontext- und risikobasierte Zugriffssteuerung und adaptive Authentifizierung sind Kernelemente jeder funktionierenden Sicherheitsstrategie. Gerade für Zero Trust mit seinem Grundsatz „Nicht vertrauen – überprüfen!“ ist ein gutes, modernes IAM essentiell, um eben diese Überprüfung durchführen und Zugriffe in Abhängigkeit vom Risiko steuern zu können.

Martin Kuppinger wird in seinem Vortrag auf die Bedeutung von Zero Trust-Strategien ebenso wie für SASE (Secure Access Service Edge) eingehen, aber auch für die Möglichkeiten, IT insgesamt zu modernisieren. Dabei wird er aufzeigen, wie ein modernes IAM die heutigen Anforderungen unterstützen kann und dabei hilft, eine IT zu schaffen, in der Zusammenarbeitsmodelle mit Partnern und Kunden ebenso wie neue Arbeitsformen für Mitarbeiter flexibel und sicher unterstützt werden und die bereit für alle Varianten von Deployment-Modellen ist.

Cyber Access Summit 2021
19 videos
Video
Zugriff für alle und dennoch die Kontrolle behalten
Jun 09, 2021
Webinar Recording
Smart IAM Services for the Modern Digital Enterprise
Jun 09, 2021
The identities of employees, appropriate authorizations in processes and systems, and a permanent control and monitoring of access to prove compliance are becoming increasingly important for organizations. However, the management of these things remains less than optimal.
Analyst Chat
Analyst Chat #79: DNS and Privacy
Jun 07, 2021

Your DNS server knows what websites you use, what the name of your mail server is, and which corporate services you use while working from your home office. And there are even broader challenges when it comes to protecting sensitive personal data in that context. Alexei Balaganski and Matthias continue their conversation about a fundamental Internet resource, the Domain Name System, this time walking the fine line between technology and trust.

Webinar Recording
Digital Trust: Critical to Digital Business Success
Jun 02, 2021
2020 pushed the notion of trust to the forefront of all our lives. It made customer trust in brands acutely important to the bottom line amidst a severe economic recession. It also forced many organisations to overcome long-standing reservations about trusting their employees to work from home and placing their faith in digital channels to serve customers.
Analyst Chat
Analyst Chat #78: DNS and DNS Security
May 31, 2021

Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System. Alexei and Matthias discuss the basics of DNS, look at current cybersecurity threats targeted at it, and explain how they can be mitigated.

Event Recording
Matthias Reinwarth: The Future of IAM: Towards a Unified, Modular, Trusted, and Connected Identity Ecosystem
May 27, 2021

Identity and access management is evolving. Originating in centralized enterprise systems, IAM must now reflect the complex realities of modern organizations and our post-pandemic society. It is driven by the need for a seamless user experience for all types of identities with all types of devices while maintaining security, compliance and governance. Matthias Reinwarth, Director of KuppingerCole's IAM Practice, exemplifies the path to a big picture for IAM that combines federated and decentralized IAM with traditional IAM and promotes trust through verifiable credentials and the concept of an autonomous, sovereign user.

Enabling the Future of IAM
10 videos
Webinar Recording
Remote-Angestellte mit starker Authentifizierung schützen
May 25, 2021
Hacker schlagen Kapital aus Unsicherheit, Angst, Ablenkung, Isolation und Verwirrung. Die Verlagerung auf Remote-Arbeit hat viele dieser Eigenschaften, daher ist es entscheidend, das Vertrauen der Benutzer wiederherzustellen. Die Schulung der Mitarbeiter ist unerlässlich, schützt aber nicht zuverlässig vor Angriffen, eine Lösung kann die Integration starker MFA in die Sicherheitsinfrastruktur.
Analyst Chat
Analyst Chat #77: Don't Manage Access in Active Directory Groups
May 25, 2021

Maintaining finer grained access by administering AD groups through dedicated and delegated application administrators is the reality in many organizations. Martin Kuppinger and Matthias discuss these types of indirect authorization management and why they are no good choice, even more when AD becomes legacy.

Webinar Recording
Finding Your Path to Zero Trust
May 20, 2021
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.
Essentials
IAM Essentials: Identity Proofing and Verification
May 20, 2021
Analyst Chat
Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)
May 17, 2021

CIEM is one of the latest entries to the set of 3- and 4-letter acronyms in IAM technology. Martin Kuppinger and Matthias take a look at the functionality behind it and its role within an Identity Fabric.

Identity-Centric Security
7 videos
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
May 12, 2021
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
May 12, 2021
Frontier Talk
Decentralizing Provenance in an Industry 4.0 World | Frontier Talk #3 - Dr. Carsten Stöcker
May 12, 2021

In this episode, Raj Hegde sits down with Dr. Carsten Stöcker, Founder & CEO of Spherity to understand how #decentralized identity is transforming the end-to-end supply chain lifecycle.

Tune in to this episode to explore the increasingly important role of provenance in helping build a better world and learn about the intersection of exciting concepts such as non-fungible tokens (NFTs) and decentralized identifiers (DIDs).

Analyst Chat
Analyst Chat #75: Get Rid of IAM Siloes
May 10, 2021

Martin Kuppinger joins Matthias for a first hybrid audio plus video episode of the Analyst Chat. They talk about horizontal (capabilities like AM, IGA, and PAM) and vertical siloes (identities like things, robots, customers, partners, or employees). And they lay out a proper approach to strategically get rid of these siloes in the long run.

 

Webinar Recording
Die Angriffsfläche Ihres Unternehmens aus den Augen eines Hackers
May 07, 2021
Mit zunehmender Digitalisierung und der Nutzung von Cloud-Services steigt das Angriffspotenzial auf die digitale Infrastruktur von Unternehmen. Hacker nutzen neuste Technologien, um Schwachstellen ausfindig zu machen und starten mit diesem Wissen Ihre Angriffe.
Webinar Recording
Are You Ready for Security Automation?
May 06, 2021
Security Orchestration, Automation & Response (SOAR) tools are the latest in the evolution of automated cyber defenses and are set to become the foundation of modern Security Operations Centers (SOCs). But SOAR is not only for large enterprises. The benefits for smaller organizations should not be overlooked.
Analyst Chat
Analyst Chat #74: The Influence of PAM on WfH, and its Influence on PAM
May 03, 2021

Building on the first three podcast episodes of this series with Annie and Shikha, Paul Fisher and Matthias turn their attention to the Privileged Access Management aspect in the context of WfH and its Cybersecurity Threat Landscape. They look at the role PAM plays in the particular WfH use cases for administrators, as well as for business users. And they look at the potential changes that this will bring for the further development of PAM in the future.

Operationalizing PAM
9 videos
Event Recording
Raghu Dev: PAM for today’s Hybrid Enterprise – Practical Considerations
Apr 29, 2021
Interview
When AI meets IoT: Does the Public Perception Reflect Reality?
Apr 29, 2021

The Internet of Things is everywhere around us. Almost every device we use is connected to the internet. But are they really smart or intelligent? An most important – what are we and will we be doing about their security?

Join Thom from SentinelOne and Alexei as they discuss what AI and IoT really are to learn how many IoT devices Alexei has at home and how long we have to wait until "The Terminator" will be al real thing.

Event Recording
Paul Fisher: Privileged Access Management in a Changing World
Apr 29, 2021

In this keynote address, Senior KuppingerCole Analyst Paul Fisher will explain how PAM will further develop to become a central component of modern IT infrastructures and enable frictionless but secure access to data and services. Included in this talk:

  • Changes in the PAM vendor landscape and impact on the market
  • How innovation by PAM vendors is creating a new generation of PAM platforms
  • The importance of managing secrets and the role that PAM must play in this
  • Why Endpoint Privilege Management should be top of mind for every CISO and CIO
Event Recording
Paul Simmonds: Why Your Business Needs a Strategic Approach to PAM
Apr 29, 2021

Often missed as a niche part of IT, “admin” access is the holy grail for the bad-guys attacking your business. Thus, its crucial to understand why a strategic approach to PAM and Credential management will improve your corporate security posture. 

This talk will look at: 

  • The approach management should take to PAM 
  • The role of an HSM (High Security Module) in your PAM Strategy 
  • Why missing the “Sec” out of Dev-Ops make you the next target 
Event Recording
Insights of a CISO: Interview with Frank Fischer
Apr 29, 2021
Event Recording
Sean Kennedy: Best Practices for a PAM Deployment
Apr 29, 2021
Analyst Chat
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
Apr 26, 2021

Shikha Porwal and Matthias Reinwarth have a coffee conversation over the security risks of working remotely. They talk through the vulnerabilities of a home network, and touch base with the pandemic related end point security threats, employee behavior and finally, Zero trust.

 

Frontier Talk
Decentralized Biometrics and Next-Generation Authentication | Frontier Talk #2 - Frances Zelazny
Apr 22, 2021
Raj Hegde sits down with Frances Zelazny, Co-founder & CEO of Anonybit, to understand the novel concept of decentralized biometrics. Tune in to this exciting episode for a deep dive on biometrics, explore the relevance of decentralized biometrics as an alternative to centralized honeypots, and discover next-generation authentication mechanisms.
Webinar Recording
Consumer Identity Management Evolution
Apr 20, 2021
Consumer Identity & Access Management (CIAM) is about managing access to customer-facing systems. While organizations have typically focused on using CIAM to collect, store, and analyze consumer data to create sales opportunities and inspire brand loyalty, other potential business benefits are being overlooked.
Analyst Chat
Analyst Chat #72: WfH Global Technology Trends 2021
Apr 19, 2021

Annie and Matthias continue their conversation on the COVID-related trends in 2021. They conversate about different technology and internet usage trends, and also mention some potential topics that will become more prominent in the future as a learning from these trends.

Balancing SAP Security
11 videos
Event Recording
Interview with Hernan Huwyler
Apr 14, 2021
Event Recording
Hernan Huwyler: Security and Governance Done Right
Apr 14, 2021
Event Recording
Martin Kuppinger: Beyond SAP Security & SAP GRC: Reflecting the Changing Business Workloads
Apr 14, 2021

Defining strategies on governance, risk management, compliance, security, and identity beyond the SAP silo

Business applications are under change. While some remain on-premises and in traditional architectures, others have shifted to the cloud – and several of these being provided by specialist vendors such as Workday or Salesforce. The established vendors such as SAP also are changing their platforms, applications, and delivery models, while also acquiring SaaS vendors such as SuccessFactors and Ariba. The days of homogeneous, vendor-focused, one-stop-shopping business applications are past. Most organizations are dealing with a heterogeneous landscape of business applications, regarding both vendors and deployment models. While this raises the more fundamental questions whether IT organizations that still have a SAP unit are still reflecting today’s reality, or should undergo fundamental change, there is an ever more pressing need for delivering governance, risk management, compliance, security, and identity for all types of business applications and beyond to other parts of the IT services such as ESM/ITSM (Enterprise/IT Service Management) and newly born digital services.

Martin Kuppinger will look at this evolution and discuss what to change and how to balance depth of capabilities for certain environments with the need for a broad support of heterogeneous (business) applications

Interview
Accelerate your Identity's Digital Transformation
Apr 13, 2021

Join Martin with Jackson and TJ from Clear Skye as they talk about how Clear Skye accelerates your Identity's digital transformation.

Analyst Chat
Analyst Chat #71: Cybercriminal Behavior in the COVID Era
Apr 12, 2021

While the world tries to cope up with the on-going pandemic, cybercriminals have got their hands on a gold mine. Annie and Matthias sit down again to chat about the overall picture of cyberattacks, including COVID-related lures.

Frontier Talk
Decentralizing Mobility, Coopetition and Platforms | Frontier Talk #1 - Dr. Harry Behrens
Apr 07, 2021

Raj Hegde sits down with Dr. Harry Behrens, Head of Blockchain Factory at Daimler Mobility, to discuss how decentralization is transforming the fragmented mobility industry. Tune in to this exciting episode for a deep dive on decentralized identity, explore the rise of the platform economy and access the playbook required to kick start decentralization initiatives at your organization.

Analyst Chat
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Apr 06, 2021

Annie Bailey and Matthias continue their conversation around privacy, targeted marketing and the end of the era of the 3rd party cookie, that they started two weeks ago. They discuss the characteristics and the pros and cons of upcoming approaches, while this technology area is still continuing to evolve.

Frontier Talk
Introducing Frontier Talk - The World’s First Podcast on Decentralized Identity
Mar 31, 2021

Frontier Talk goes beyond technical jargon to stimulate conversations that matter. In this series, we take you inside the minds of influential leaders, innovators, and practitioners from eclectic areas (enterprise, startups, academia, venture capital, etc.) to extract their experience working with emerging technologies such as Blockchain and AI.

Join Raj Hegde on this journey to redefine the ‘I’ in Identity!

Analyst Chat
Analyst Chat #69: IAM Awareness in Daily Life
Mar 29, 2021

Dr. Phillip Messerschmidt is an experienced practitioner with extensive background knowledge in all things IAM. He helps us to take a step back and look at IAM in daily life. Drawing on simple, understandable definitions, he provides practical recommendations for successful and efficient identity and access management.

SOARing Towards an Enhanced SecOps Strategy
10 videos
Event Recording
Hemant Dusane: SOAR Use Cases for Effective Threat Response.
Mar 26, 2021
Webinar Recording
Identity ist kein Selbstzweck – Unternehmenskritische Applikationen mit Identity Security absichern
Mar 26, 2021
Die Corona-Pandemie hat die Digitalisierungsbemühungen in der DACH-Region angetrieben, aber auch Grenzen aufgezeigt. Die digitale Identität von Angestellten steht immer häufiger im Fokus des Interesses – sowohl von Sicherheitsbeauftragten als auch von Hackern. Identity Security ermöglicht Compliance über Plattformen und Anwendungen hinweg; sie hilft Komplexität und Kosten in den Griff zu bekommen.
Event Recording
John Tolbert: Why Enterprises are Choosing SOAR for SOCs
Mar 26, 2021
Event Recording
Dr. Eric Cole: 5 Security Metrics To Track Your Cyber Security Success
Mar 26, 2021
Event Recording
Insights of a CISO: Interview with Thomas Tschersich
Mar 26, 2021
Event Recording
Filipi Pires: #WhoIs: An Emerging Class of Incident Response Platforms Using Open Source Tools
Mar 26, 2021
Event Recording
Yaron Mazor: The Interplay between SOAR and PAM
Mar 26, 2021
Analyst Chat
Analyst Chat #68: FloC and the Death of the 3rd Party Cookie
Mar 22, 2021

Tracking of users via 3rd party cookies has been a constant issue regarding compliance and user privacy. This is about to change, as 3rd party cookies are being more and more blocked in browsers like Firefox and Safari. And Google has announced the same step for Chrome in upcoming versions. What does this mean for the ad business, what are new approaches for addressing targeted marketing in a potentially more privacy preserving manner? Annie Bailey joins Matthias to discuss recent developments in this field.

Webinar Recording
Maturing a Zero-Trust Strategy for the Extended Enterprise
Mar 19, 2021
In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based approach is required that can be implemented at every layer of IT, from devices and networks to applications and data.
Interview
How Can Privileged Access Management Help Securing the Enterprise?
Mar 18, 2021

How can PAM technologies fit into a Zero Trust architecture and model? How could a PAM technology help us sleep better at night, as many are anxious about falling victim to an attack similar to the Solar Winds attack? Is there a future in deploying PAM in DevOps environments? And how can PAM technologies help to address regulatory compliance? Join Paul and Jim as they talk about different current topics around PAM - Privileged Access Management.

IGA for Successfully Managed Identities
8 videos
Event Recording
Martin Kuppinger: Rethinking IGA: Deployment Models. Role Models. Recertification. Customization
Mar 16, 2021

IGA (Identity Governance & Administration) is an established area within IAM. Since the early days of Identity Provisioning some 20 years ago, more and more vendors have entered that market, and technologies have matured. However, 20 years of maturity are a lot for IT, also indicating that some concepts may benefit from modernization.

In his talk, Martin Kuppinger will look at four areas:

  1. What is the right approach for future IGA deployment models?
  2. What must change in role and entitlement management, to remain complaint but reduce complexity and workload?
  3. How to reduce the workload in access reviews/recertification while getting better in compliance and concrete risk mitigation?
  4. How to move to the next level in customization, orchestration, and integration, without staying in fear of the next major update?
Event Recording
Richard Hill: Identity Governance and Administration - Where Does IGA Fit In
Mar 16, 2021
Event Recording
Stephanie van der Loos: Seamless Employee Access Lifecycle
Mar 16, 2021
Analyst Chat
Analyst Chat #67: Ensuring Business Continuity for the Cloud
Mar 15, 2021

As organizations go through digital transformation, they increasingly turn to using cloud services. One aspect of the digital transformation plan that is often forgotten is ensuring business continuity. Mike Small joins Matthias to explain why business continuity is essential for cloud services, especially in light of current events.

Analyst Chat
Analyst Chat #66: Enterprise Authentication - an Updated Look at That Market Segment
Mar 08, 2021
John Tolbert has just recently completed an updated Leadership Compass research document in the market segment of Enterprise Authentication. He joins Matthias for this episode to talk about recent developments and trends in that important area of the Identity Fabric for both IAM and CIAM.
Identity Fabrics - Future-Proofing IAM
16 videos
Event Recording
Akhilesh Rajendran: Automation in Identity and Access Management Operation
Mar 04, 2021

 An organization’s Identity and access management have always been a busy scene, even if the economy is growing or shrinking. IAM operations- the lifecycle management and maintenance of Identities is a resource intensive and costly process. By leveraging the right automation technology, CISOs can bring down the risk involved in IAM operations; Robotic Process Automation (RPA) being one among them.

Event Recording
Martin Kuppinger: Your IAM Doesn’t Fit for Hybrid Multi-Clouds and Digital Transformation Needs? Time to Rethink
Mar 04, 2021

Leveraging what you have and extending it by new services and architectures to support today’s and tomorrow’s business demand on IAM.

IAM (Identity and Access Management) is no longer just an administrative tool or a solution supporting your regulatory compliance requirements. It is a business enabler, as well as an IT enabler. It is a central element of every cybersecurity strategy. It enables managing and access control for everyone from employees to consumers and everything from things to software robots. It is a foundation for your success in digital transformation. It also enables IT transformation, by managing access to all the clouds and services you have to deal with.

But: How to get to a modern IAM form where you may be today? What to preserve, what to extend, what to add, what to retire? And how to do such a migration in a way that you can serve the business demand rapidly, while gaining the time you need for more complex migrations – and while preserving investments in times of tight budgets?

Martin Kuppinger, Principal Analyst at KuppingerCole, will discuss these aspects and explain how the paradigm of an Identity Fabric can help you in successfully modernizing your IAM, at your own pace. He also will shed a light on the state of the market and the maturity of offerings serving the Identity Fabrics model.

Event Recording
Rakesh Tripathi: Future of Identity Management
Mar 04, 2021
Event Recording
David Doret: TOME: Strengthening the Semantic Foundations of IAM
Mar 04, 2021

We all know that communication is the most critical success factor of any human undertakings, and IAM initiatives are no exception. However, whether you are:

  • a manager trying to explain its IAM strategic program to top management,
  • an architect trying to make IAM efficiently and securely serve the information system,
  • an engineer trying to explain IAM technological challenges to colleagues,
  • a vendor trying to increase the value of its IAM product for his customers,
  • a researcher trying to push forward our understanding of IAM,

…the one critical thing we are all missing is a consistent and accurate vocabulary. Throughout decades of academic work, many authors proposed definitions for IAM terms and concepts. Yet, as a discipline, as an industry, as a career specialization, and as a research field, we failed to consolidate this and build a reference IAM dictionary, allowing us to communicate with precision and clarity.

 

In this session, I will present you with the TOME community project. Its goal is to become that reference dictionary. It is built as an open wiki to allow all experts to contribute. It is free of charge and licensed under Creative Commons to facilitate its widespread adoption. It is rooted in science with pervasive references from the literature to stand on the shoulders of giants.

Learning objectives

  • See how numerous, inconsistent and confusing IAM terms are in everyday usage
  • Realize how developing a clear and accurate vocabulary may contribute to the success of IAM
  • Get acquainted with the TOME IAM dictionary initiative and understand how to contribute
Event Recording
Matthias Reinwarth: User & Authorization Management. Real Benefits For The Business, Effective Projects, Efficient Operation And A High Level Of Acceptance
Mar 04, 2021
Event Recording
Christine Owen: Identity-Centric IAM For Enhanced Integration Into Emerging Security Models
Mar 04, 2021
Video
How to Find the Right Strategy for Access Control Management
Mar 03, 2021
Analyst Chat
Analyst Chat #65: A First Look at Homomorphic Encryption
Mar 01, 2021

Alexei Balaganski covers a broad range of security-related topics: from database, application and API security to information protection, cryptography and AI-based security automation. He joins Matthias to give a first insight into a fascinating new approach towards access encrypted data "in use", while maintaining privacy and security of data and processing. He explains the concepts behind homomorphic encryption, the current status, the technology required and he talks about first pioneering use cases.

Event Recording
Insights of a CISO: Interview with Thomas Malta
Feb 22, 2021
Analyst Chat
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Feb 22, 2021

Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins Matthias to talk about the importance of extending Zero Trust to cover software security, for software in any form (embedded, COTS, as-a-service) and regardless of whether it’s home-grown or externally procured.

Making Zero Trust a Reality
15 videos
Event Recording
Scott Rose: Zero Trust 101
Feb 18, 2021
Event Recording
Eleni Richter: Zero Trust Use Cases
Feb 18, 2021
Event Recording
Bryan Meister: Navigating Enterprise Enablement and Zero Trust
Feb 18, 2021
Event Recording
Paul Simmonds: Alignment of Zero Trust with Business Strategy
Feb 18, 2021
Event Recording
Expert Chat: Interview with Stefan Würtemberger
Feb 18, 2021
Event Recording
Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents
Feb 18, 2021
Event Recording
Rebecca Nielsen: What is Strong Authentication in a Zero Trust Environment
Feb 18, 2021
Event Recording
Henk Marsman: From Trust to Zero - Lessons from Halfway in a Large Enterprise Environment
Feb 18, 2021
Event Recording
John Tolbert: Zero Trust for Reducing the Risks of Security Incidents
Feb 18, 2021
Event Recording
Filipi Pires: Trust or Not Trust? Is there new mindset about CyberSecurity using Zero Trust?
Feb 18, 2021
Video
Where to Start Your IAM Modernization Journey
Feb 16, 2021

Many enterprises are nowadays dealing with the modernization of their Identity & Access Management. Modernizing Identity Governance and Administration (IGA) and well as Access Management at the same time can become too complex.

In this video blog post, Martin gives practical advice on how enterprises can get their priorities straight.

Interview
Privileged Access Management from a CISO Perspective
Feb 16, 2021

Privileged user accounts are significant targets for attacks as they have elevated permission, access to confidential data and the ability to change settings. And if compromised, the amount of damage to an organization can be disastrous. No wonder that this is on the mind of our chief information security officers. Join our CEO Berthold and Rob Edmondson, Technology Strategist at Thycotic in this conversation!

Analyst Chat
Analyst Chat #63: The Need For New Drivers to Improve Cybersecurity
Feb 15, 2021

The press, security vendors, politicians and analysts alike currently often focus only on the recent SolarWinds security incident and its exceptional features and effects While this is in fact an extremely important topic to learn from and to clean up, the shadow of this hype causes that at the same time it is often neglected that even very basic cybersecurity aspects are poorly addressed in many organizations. Alexei and Matthias look beyond the hype and discuss the need for new initiatives to achieve an actual adoption of proper measures to improve basic cybersecurity hygiene in essentially all organizations.

Analyst Chat
Analyst Chat #62: The SOCaaS Market Segment - A First Look
Feb 08, 2021

The Security Operations Center-as-a-Service (SOCaaS) market has emerged and continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. KuppingerCole Analyst Warwick Ashford joins Matthias for this week's episode and shares some insights into this evolving market segment he gained during his recent research.

Unlocking Decentralized Identity
15 videos
Event Recording
Ken Ebert: A Stepwise Approach to Deploying Decentralized Identity
Feb 04, 2021
Event Recording
Dr. Carsten Stöcker: Digital Identity for Enterprises
Feb 04, 2021
Event Recording
Bruce Pon: Data Monetization Model for the Decentralized Web
Feb 04, 2021
Event Recording
Christoph Burger: Blockchain: From Processes to Hybrid Platforms - The Case of the Energy Industry
Feb 04, 2021
Event Recording
Anne Bailey: Market Compass: What does the Future Require of Identity?
Feb 04, 2021

There are several external drivers that are putting pressure on the way we manage identity, made especially clear over the last year: digitalization, privacy, user-centricity, and reuse.

Rather than resist the change, let us consider what would happen to identity if we translated these pressures into requirements. Which capabilities are accelerated from the sidelines to being star players? What approaches best fit these future requirements? And how does decentralized identity come into play?

In this talk, Anne Bailey will pull from the insights of the upcoming Market Compass Providers of Verified Identity and consider where identity is going in 2021 and beyond.

Event Recording
Raj Hegde, Lauren Zuber: Welcome Session
Feb 04, 2021
Analyst Chat
Analyst Chat #61: Post-SolarWinds Software Security Strategies
Feb 01, 2021

More than a month into the post-SolarWinds-incident era Alexei joins Matthias to discuss further lessons learned and strategic approaches towards improving security in organizations depending on diverse cyber supply chains and their imminent threats. But they go beyond and look at the necessary changes between management awareness and software development security.

Webinar Recording
IT-Sicherheitsberatung hinter den Kulissen: Die Top 5 Herausforderungen, die Cloud Modelle mit sich bringen
Jan 28, 2021
Der Bedarf nach Cloud-Lösungen ist heute so stark wie nie zuvor. In den letzten Monaten konnten wir weltweit eine steigende Akzeptanz von Cloud Plattformen und Cloud-Diensten beobachten. Sogar die Deutsche Bahn verlagert ihre komplette IT in die Cloud.
Webinar Recording
The Evolution of Access Control
Jan 27, 2021
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process.
Interview
Security in Financial Services
Jan 27, 2021

Join Simon Keates (Head of Strategy and Payment Security at Thales) and Dr. Udo Milkau (Fellow Analyst at KuppingerCole) talking about Security Issues in the FinTec Industry!

Analyst Chat
Analyst Chat #60: The 2021 Trends in DevOps and Security
Jan 25, 2021

Although not really brand new, there are still a lot of interesting developments around DevOps when it comes to cybersecurity and more. Paul Fisher shares some trends and insights with Matthias and tells us what to expect in this rapidly evolving segment.

Webinar Recording
Accelerating Your Digital Transformation: Secure and Successful Cloud Migrations
Jan 21, 2021
The use of cloud services is one of the key enablers of digital transformation - accelerating time to value, providing more access to powerful IT resources in a more cost-effective manner and removing the management costs associated with commodity services. However, these benefits come with some risks. Migrating your business applications to the cloud without creating security vulnerabilities, unnecessary risks to your data and ensuring compliance, is critical for a successful digital transformation.
Analyst Chat
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
Jan 18, 2021

The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at this stage and which measures to look at first.

Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
Jan 15, 2021
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the market for solutions designed to detect attacks on endpoints and respond accordingly has grown significantly. These Endpoint Detection & Response (EDR) solutions look for evidence and effects of malware that may have slipped past Endpoint Protection (EPP) products. EDR tools also perform evaluation of threat intelligence, event correlation, and often allow interactive querying, live memory analysis, and activity recording and playback.
Interview
Encrypt Everything
Jan 13, 2021

Watch this Videocast with our Analyst Alexei and Todd Moore from Thales to learn why and how to encrypt everything!