Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. It is...
Learn more
Blog
Blog
EIC Speaker Spotlight: Eric Newcomer on How to Improve Security Through IAM Code Management
Eric Newcomer, Chief Technology Officer at WSO2 is to deliver a presentation entitled The Rise of the Developer in IAM on Monday, September 13 starting at 6:40 pm at EIC 2021 . To give...
Learn more
Leadership Compass
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Learn more
Event Recording
Event Recording
Frances Zelazny: Enabling the Future of IAM with Zero Knowledge Authentication
Learn more
Insights from India’s Data Empowerment & Protection Architecture
Event Recording
Insights from India’s Data Empowerment & Protection Architecture
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Event Recording
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Cyber-Securing the Digital Industry
Event Recording
Cyber-Securing the Digital Industry
Trust is a Team Sport, and Like all Good Sports it has Rules
Event Recording
Trust is a Team Sport, and Like all Good Sports it has Rules
Trust is not just technical, and it’s not just derived from a process or an organisation. The need for Trust is also variable based on the risk involved in a transaction or the risk appetite...
Solving
Event Recording
Solving "The Right to be Forgotten" for Blockchains
"The Right to be Forgotten" presents a conundrum to builders of blockchain solutions, because the focus of most blockchains is to create an indelible, permanent record. This makes "The Right to be...
The impact of decentralized identity solutions in the marketplace, insights and lessons
Event Recording
The impact of decentralized identity solutions in the marketplace, insights and lessons
Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s...
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Event Recording
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and...
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Previous
2 3 4 5 6 7 8 Next