Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. It is...
Learn more
Blog
Blog
Global Identity Networks: How to Leverage Them for Business Benefit
Global identity networks propose a different way of identity management, one that operates on shared standards so that organizations don’t need to repeat onboarding and verification with the same...
Learn more
Leadership Compass
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #152: How to Measure a Market
Research Analyst Marina Iantorno works on determining market sizing data as a service for vendors, service providers, but especially for investors. She joins Matthias to explain key terms and...
Learn more
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Reducing Risk Through Effective Access Management
Blog
Reducing Risk Through Effective Access Management
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it...
Digital Transformation
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
CIAM a Way of Managing and Getting Value from Consumer Data
Blog
CIAM a Way of Managing and Getting Value from Consumer Data
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
Secure Collaboration
Blog
Secure Collaboration
The world of working is changing – we are increasingly working collaboratively in teams, but members of those teams are no longer necessarily in the same office, location, or even the same...
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Blog
Trending at EIC 2022: Identity Proofing & Fraud Reduction
Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing &...
Trending at EIC 2022: The Return of Policy-Based IAM
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My...
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and...
In the Midst of Change, Somethings Remain the Same
Blog
In the Midst of Change, Somethings Remain the Same
Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. This will be a significant change and will impact the digital transformation of a manufacturing company....
1 2 3 4 5 6 7 Next