Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
EIC Speaker Spotlight: Maarten Stultjens on the European Perspective of Identity
Maarten Stultjens, VP Corporate Development at OneWelcome is to partake in a panel discussion entitled Identity, Privacy, Security - The European Perspective on Monday, September 13 starting at...
Learn more
Whitepaper
Whitepaper
IAM: Globalization & Large-Scale Enterprise
Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true for...
Learn more
Event Recording
Event Recording
Access Control - The new Frontier
Learn more
Cyber Hygiene Is the Backbone of an IAM Strategy
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security...
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Event Recording
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an...
Advanced Authorization in a Web 3.0 World
Webinar Recording
Advanced Authorization in a Web 3.0 World
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who...
Digital Transformation
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
CIAM a Way of Managing and Getting Value from Consumer Data
Blog
CIAM a Way of Managing and Getting Value from Consumer Data
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly...
Passwordless Authentication
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Providers of Verified Identity 2022
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
DREAM: A New Entitlement Management Model for Modern IT 
Blog
DREAM: A New Entitlement Management Model for Modern IT 
KuppingerCole has defined a model for this new paradigm of Dynamic Resource Entitlement and Access Management (DREAM). The DREAM model envisages common service development, delivery, and...
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
Leadership Compass
CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms
This report provides an overview of the market for platforms that support CIEM and DREAM environments and provides you with a compass to help find the solution(s) that best meets your needs. We...
Panel | What does the future hold for Identity and Access Management?
Event Recording
Panel | What does the future hold for Identity and Access Management?
Digital identities of customers, devices and services are at the core of the digital enterprise today. However, traditional IAM is riddled with complexity and siloes. Building a modern Identity...
Previous
4 5 6 7 8 9 10 Next