Principal Analyst & Co-Founder

Martin Kuppinger

Martin Kuppinger is the founder and Principal Analyst responsible for the KuppingerCole research. In his 25 years of IT experience he has already written more than 50 IT-related books and is known as a widely-read columnist and author of technical articles as well as reviews and is also a well-established speaker and moderator at seminars and congresses. His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Roles & Responsibilities at KuppingerCole

As Founder and Principal Analyst, Martin Kuppinger oversees the KuppingerCole research, provides own research, engages in Customer Advisories in his role as Trusted Advisor, and acts as a Member of the Board.

Background & Education

Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is a renowned global leader in Identity Mangement and Digital Identity and is among the top 10 experts in this field globally. He is also a well-established speaker and moderator at seminars and congresses. Martin holds a Bachelor in Economics.

Areas of coverage

Martin Kuppinger oversees all areas of KuppingerCole research and has outstanding expertise in areas such as cybersecurity, blockchain, and AI.

Professional experience

His interest in Identity Management dates back to the 80s, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.

Latest research

Whitepaper
Going Beyond Traditional Penetration Testing
February 08, 2023
Penetration testing is an essential methodology used to discover and remediate vulnerabilities and reduce risks from cyber-attacks and cybercrime. Regular penetration testing is recommended and, in some industries, is required for certification and regulatory compliance. Penetration testing…
Leadership Compass
Data Quality and Integration Solutions
January 17, 2023
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete range of data sources in your organization, for enabling use of that data, as well as enabling data…
Whitepaper
Accelerating Your Digital Business with Customer Identity
December 21, 2022
The role of Consumer Identity and Access Management (CIAM) is still massively undervalued by many organizations. Both drop-off and churn rates are heavily impacted by cumbersome registration and outdated authentication options. Despite this fact, CIAM still is frequently treated as a…
Whitepaper
How to Build the Modern CIAM: For Customers, Consumers, and Citizens
December 21, 2022
In the digital age, the “C identities” of customers, consumers, citizens, and all the other types of external identities, such as tourists, are at the forefront of every digital business and government. A modern CIAM is indispensable for digital organisations. This whitepaper looks at the…
Executive View
ZertID from Sysintegra
August 01, 2022
Sysintegra ZertID is an IGA solution that is built on top of the ServiceNow platform. It integrates natively with ServiceNow features such as the CMDB and Security Incident handling. By utilizing capabilities such as the data management and workflows of ServiceNow, and with full user…
Whitepaper
Vorsprung vor den Cyberkriminellen: Die externen Bedrohungen verstehen
June 30, 2022
Verantwortliche für Cybersicherheit sehen sich mit wachsenden Herausforderungen konfrontiert, da die Cyberkriminellen immer kreativer werden und mit einem anscheinend unendlichen Arsenal an Ressourcen bewaffnet sind. Die rasante Digitalisierung in der Folge der Pandemie und die unsichere…

Latest blog posts

Blog
Passwordless Authentication 101
January 11, 2023
Passwordless authentication has become a trending topic in IT over the past two years. This comes to no surprise, with all the password-related security incidents that happened in the past years. Passwords are known as a security risks, and passwords are inconvenient to the users.…
Blog
Enhancing Zero Trust in a ServiceNow Environment
November 11, 2022
Zero Trust has been established as the guiding principle for cybersecurity. The “don’t trust, always verify” approach stands for methods that don’t rely only on singular security tools, such as the traditional network perimeter firewall, to keep attackers out.…
Blog
Martin Kuppinger's Must Watch Sessions
October 10, 2022
CSLS (Cybersecurity Leadership Summit) 2022, a fully hybrid event taking place Nov 8th to 10th in Berlin, is approaching quickly. Being asked to pick few must watch sessions, I had the challenge of selecting only a few, instead of a long list of sessions worthwhile to attend or…
Blog
Training Non-techies on Cybersecurity Awareness
October 05, 2022
Most users are just a bit techie. Some more, some less. But as we all know, real cybersecurity experts are rare. Thus, it is best to assume that the ones you want to educate on cybersecurity awareness and response are no technical, nor cybersecurity experts.  However, with…
Blog
Thales Acquires OneWelcome: Beyond CIAM
July 18, 2022
Thales, a global provider of advanced technology solutions, with more than 80,000 employees worldwide, and an established business unit for Digital Identity and Security, has announced the acquisition of OneWelcome, one of the leading European providers of CIAM (Consumer IAM). While the…
Blog
Trending at EIC 2022: Identity Proofing & Fraud Reduction
June 09, 2022
Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing & fraud reduction. These are two closely related topics, with fraud covering not only the initial…

Latest videos

Analyst Chat
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
January 23, 2023
Who has not heard of the statement that "Data is the new Oil". But oil needs to be refined and so does data. The challenge of gathering, integrating, cleansing, improving, and enriching data across the complete range of data sources in an organization, for enabling use of that data as well…
Webinar Recording
Evolving Identity and Access Management for the Digital Era
January 18, 2023
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and explain why and how IAM needs to change to support modern app development, regulatory compliance,…
Interview
Continual Access Control, Policies and Zero Trust
January 04, 2023
Trust no one, always verify. We know that Zero Trust phrase already. But this principle is rather abstract - how and where exactly should we do that? Martin sits down with Jackson Shaw, Chief Strategy Officer at Clear Skye to discuss one very important part of Zero Trust: Identity and…
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
December 19, 2022
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity. They go beyond technology but also look at processes and business models. By this, they also…
Interview
Unifying the Perspectives - Application Access Governance
December 13, 2022
The application landscape in organizations is getting more and more complex. Applications from vendors are more plentiful - or they differ very much from each other - and the combination of on-prem and cloud applications is no longer unusual. It's easy to lose track of all the different…
Webinar Recording
You Deserve a Better Security Testing Experience
November 23, 2022
Join security experts from KuppingerCole Analysts and security testing firm Synack as they discuss how to address the security challenges of digital transformation, rapid infrastructure change, agile software development, compliance requirements, sophisticated attackers, and the global…