Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. It is...
Learn more
Blog
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
Learn more
Executive View
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identity Manager and...
Learn more
Event Recording
Event Recording
Global AI Ethics and Governance
Recent years have seen significant Artificial Intelligence (AI) development across all domains of business and society. This panel aims to bring attention to societal impacts of AI –...
Learn more
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and...
Effective Identity Access Governance in Hybrid SAP Environments
Webinar Recording
Effective Identity Access Governance in Hybrid SAP Environments
Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever,...
Attendees at the European Identity and Cloud Conference 2022
Event Recording
Attendees at the European Identity and Cloud Conference 2022
Impressions from the European Identity and Cloud Conference 2022
Event Recording
Impressions from the European Identity and Cloud Conference 2022
Privacy = Data Protection + X
Event Recording
Privacy = Data Protection + X
Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel...
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
Event Recording
Panel | Protocols, Standards, Alliances: How to Re-GAIN the Future Internet from the Big Platforms
In talking about a "Post Platform Digital Future", it is all about a Vision, or better: mission to not let the current platform dominance grow any further and create the foundations for a...
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect...
Panel | Decentralized, Global, Human-Owned. The Role of IDM in an Ideal (If there is One) Web3 World
Event Recording
Panel | Decentralized, Global, Human-Owned. The Role of IDM in an Ideal (If there is One) Web3 World
The Internet had been created without an identity layer, leaving it to websites and applications to take care for authentication, authorization, privacy and access. We all know the consequences -...
Enabling Digital Identity Ecosystems
Event Recording
Enabling Digital Identity Ecosystems
In Transition - From Platforms to Protocols
Event Recording
In Transition - From Platforms to Protocols
Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity...
Previous
1 2 3 4 5 6 7 Next