Blog
Identity as the Most Critical Element of Security
by Marius Goeddert
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing identities properly and shared some of his thoughts in this Speaker Spotlight. Tune in to today’s episode and don't forget to join Hed's keynote on Day 2 of the European Identity and Cloud Conference 2023 where he will be looking at The Identity Security Blind Spot: MFA for Legacy Systems...
Blog
The IAM Market: What is driving growth in 2023?
by Marina Iantorno
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve and data privacy regulations become more stringent. According to a recent survey conducted by KuppingerCole Analysts, nearly 95% of organizations have an IAM solution in place. Most medium-sized to large organizations, factually, have multiples different IAM solutions in place for providing...
Blog
Microsoft Security Copilot: Value-adding Generative AI
by Martin Kuppinger
Just recently, Microsoft announced the Microsoft Security Copilot , a new security offering based on a combination of the GPT-4 language model, the well-known technology provided by OpenAI that also powers ChatGPT and Microsoft Bing, and Microsoft’s own technology, data, knowledge, and security-specific model from their ongoing global threat intelligence. As the name indicates, the new solution, which is not publicly available yet, is positioned as a “copilot” augmenting the security analysts in SOCs (Security Operations Centers) / CDCs (Cyber Defense Centers) and...
Blog
Top 3 EIC Topics Picked by Martin Kuppinger
by Marius Goeddert
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud Conference. In his view, these are Cloud Infrastructure Entitlement Management (CIEM), Passwordless Authentication, and Decentralized Identity. Tune in to today’s Speaker Spotlight to hear why Martin thinks these three concepts have gained so much importance, and which other topics he believes will be highly relevant at EIC 2023.
Blog
Battling Insider Threats with Zero Trust
by Marius Goeddert
When the COVID-19 pandemic broke out in 2020, many organizations were forced to digitize at a speed exceeding their security capabilities. Remote work meant that employees accessed company networks from potentially unsafe end devices. Today, many in the e-commerce business work in a hybrid mode – partly from home, partly from the office – and are thus potential insider threats. According to today’s guest in our Speaker Spotlight, Rajan Barara, Director of Product Management for Identity at Entrust, Zero Trust can help mitigate the risk of insider threats. At its core,...
Blog
Managing Privileged Access in Complex IT Environments for Business Benefit
by Warwick Ashford
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials. Access management, therefore, is an essential part of any cybersecurity strategy, but in the modern business world, where cloud computing, virtual machines, DevOps, automation, AI, and remote working are common, this can be extremely challenging. Adding to the complexity of access management, these business IT technologies and practices increasingly involve the use of service accounts for...
Blog
The Disjointed State of CIAM
by Marius Goeddert
As conscious consumers, we are all familiar with the different stages of the digital consumer lifecycle from registration and onboarding to authentication, transaction, and sometimes also the deletion of an account. As users we expect a frictionless experience while our data is kept safe. In today’s Speaker Spotlight James Lapalme, Vice President Identity at Entrust, explains why organizations issuing digital identities need to gain a full view of the currently somewhat disjointed landscape of customer identities to be able to offer security and a frictionless user experience at...
Blog
2023 Trends and Predictions - Passwordless Authentication
by Alejandro Leal
We hear it all the time: “Humans are the weakest link in cybersecurity”. Unfortunately, this contemptuous characterization of human nature is deeply ingrained in the industry. While human error is still the driving force behind a number of security breaches and incidents, the modern cybersecurity landscape has become too broad and sophisticated to be managed by individuals alone. By modernizing and implementing the right tools, however, we may be able to reduce and improve the impact of the human factor on cybersecurity. The Alternative? Passwordless Authentication...
Blog
A New Pamocracy is Growing Inside Your Organization
by Paul Fisher
A New Pamocracy is Growing Inside Your Organization When you were not looking, the number of privileged identities you manage went from thousands to millions OK everybody is doing it right now, so I asked the analyst’s new best friend, Chat GPT , to define Privileged Access Management . Here is what it said: “Privileged Access Management (PAM) is a critical security discipline that provides a framework to manage and monitor privileged access to sensitive systems and data. PAM solutions aim to prevent unauthorized access, reduce the risk of cyberattacks, and ensure...
Blog
Identity Fabrics: Where Do You Stand? Where Should You Go?
by Martin Kuppinger
A maturity level matrix for Identity Fabrics The term and concept of Identity Fabrics has become popular in recent years. We observe widespread adoption of the concept as the foundation for further evolving IAM (Identity & Access Management) infrastructures. To provide a guideline for organizations, KuppingerCole Analysts have developed a maturity model for Identity Fabrics, as we have done for other areas of IAM and cybersecurity . What makes up maturity of an Identity Fabric When working on such maturity models, the first question to ask is what makes up maturity in that...
Previous
1 2 3 4 5 6 7 Next