Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture
Enterprise attack surfaces are constantly evolving and expanding due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. New vulnerabilities are...
Learn more
Blog
Blog
5G and Identity
5G Identity and Authentication 5G is the next generation of cellular mobile communications intended to support the massive increase in capacity and connectivity that will be required for the...
Learn more
Leadership Compass
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
Learn more
Event Recording
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Learn more
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Analyst Chat
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Matthias invited Martin Kuppinger to dissect IAM orchestration and convergence in this episode. Explore their insights on these concepts within identity and access management, from antagonism to...
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
Blog
The Vital Role of Regulation and Policies in Shaping a Secure and Trustworthy Digital Identity Landscape
In today's increasingly interconnected world, digital identity has emerged as a critical component of our daily lives. From accessing online services to conducting financial transactions, our...
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into...
Elevate Your Digital ID Game with This EIC 2023 Workshop
Blog
Elevate Your Digital ID Game with This EIC 2023 Workshop
At the 2023 European Identity and Cloud Conference, KuppingerCole held a workshop entitled “Building the Roadmap for Your Future IAM”. You can now watch this workshop for free.
IAM System Integrators - EU
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
The Power of Identity Management in Revolutionizing Financial Services
Blog
The Power of Identity Management in Revolutionizing Financial Services
The participation of financial services has always been a crucial aspect of the European Identity and Cloud Conference (EIC). In its 17-year history, EIC has seen many representatives of large...
Modernizing IGA: A Guide for IAM Leaders
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Join this webinar to learn more about Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into...
Navigating the Access Control Maze
Webinar Recording
Navigating the Access Control Maze
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration...
The Next Generation of Secure Access with Zero Trust
Event Recording
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.
IAM: The Guardian Angel of Zero Trust
Event Recording
IAM: The Guardian Angel of Zero Trust
In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes...
Panel | It all starts with the Endpoint
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
1 2 3 4 5 6 7 Next