Director IAM Research

Richard Hill

Richard is the Director of IAM Research and Lead Analyst at KuppingerCole, supervising research initiatives and researching emerging cybersecurity and IAM technology and market trends. Richard has over 25 years of experience in technology, with an educational background in Computer Science and Engineering, and has contributed work on several technology standards committees.

Roles & Responsibilities at KuppingerCole

As the Director of IAM Research at KuppingerCole, Richard oversees research and provides thought leadership regarding products, technologies, and industry trends, published on the KuppingerCole website. As a Lead Analyst, he researches established and leading-edge IAM and cybersecurity solutions.

Professional Experience and Education

Richard has over 25 years of experience as an IAM Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He holds a Master's degree in Computer Science and a Bachelor's degree in Engineering and is internationally known for his work on several standards committees.

Areas of Coverage

IAM Identity & Access Management (IAM)

Cybersecurity

Latest research

Executive View
ForgeRock Workforce Identity Governance
October 10, 2023
This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete identity lifecycle within a single platform.
Executive View
Tanium XEM Platform
August 03, 2023
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Leadership Compass
Software Supply Chain Security
August 02, 2023
This Leadership Compass evaluates and gives insight into the emerging end-to-end Software Supply Chain Security (SSCS) market. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing SSCS solutions to help you find the…
Leadership Compass
Unified Endpoint Management (UEM)
May 30, 2023
This report provides an updated overview of the Unified Endpoint Management (UEM) market and provides a compass to help you find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing…
Executive View
NRI Secure Uni-ID Libra 2.7
May 08, 2023
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide…
Executive View
IndyKite Knowledge-Based Access Control (KBAC)
September 13, 2022
Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity of interactions between them to determine access decisions. Using the identity data, context,…

Latest blog posts

Blog
SBOM - A First Step in Software Supply Chain Security (SSCS)
July 21, 2022
Software Bill of Material (SBOM) tools have come sharply into focus as a foundational component of any Software Supply Chain Security (SSCS) strategy, spurred on by the U.S. Executive Order to improve the security of the software supply chain. This was in response to a number of highly…
Blog
In the Midst of Change, Somethings Remain the Same
May 10, 2022
Industry 4.0 is the fourth revolution in manufacturing. I won't bore you with the details of the prior iteration or versions and how we got where we are today, only that Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. Smart or intelligent…
Blog
IT Security Transformation Can Come from Unexpected Places
June 02, 2021
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the unforeseen tsunami waves of network traffic and flexible enough to address cyber-attacks in areas least…
Blog
IGA in a World of Zero Trust
May 06, 2021
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always verifies .” This traditionally meant verifying Who has access to What resource. In the…
Blog
When Cyber "Defense" is no Longer Enough
October 04, 2019
The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments, the number of cyber-attacks is growing. The types and sophistication of these attacks are…
Blog
Web Access & Federation
February 15, 2019
An organization’s need to support communication and collaboration with external parties such as business partners and customers is just as an essential technical foundation today as it has been in the past. Web Access Management and Identity Federation are two vital and inseparable…

Latest videos

Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
June 16, 2023
Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome them by adopting a proactive approach that will increase efficiency and reduce risk.…
Webinar Recording
Protecting Web Applications Amid Severe Staff Shortages
November 03, 2022
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical. But many companies are facing severe skills shortages exacerbated by the “Great Resignation”,…
Webinar Recording
Advanced Authorization in a Web 3.0 World
October 26, 2022
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who and what has access to what in what context, is extremely challenging. Business success depends…
Webinar Recording
A Comprehensive Approach to Solving SaaS Complexity
September 23, 2022
As businesses adopt cloud-based services as part of digital transformation programs to enable flexible working, boost productivity, and increase business agility to remain competitive, many IT and security teams are finding it challenging to gain oversight and control over the multitude of…
Analyst Chat
Analyst Chat #133: Leadership Compass Web Application Firewalls
July 18, 2022
Web Application Firewalls (WAF) have been around for quite some time to protect web applications through the inspection of HTTP traffic. But with a changing nature of web applications and the ever changing threats landscape they nee to evolve constantly. Richard Hill sits down with…
Analyst Chat
Analyst Chat #125: Leadership Compass Access Management
May 23, 2022
Access Management refers to the group of capabilities targeted at supporting an organization's access management requirements traditionally found within Web Access Management & Identity Federation solutions, such as Authentication, Authorization, Single Sign-On, Identity Federation.…