Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Webinar
Webinar
Navigating the Access Control Maze 
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of...
Learn more
Blog
Blog
Secure Collaboration
The world of working is changing – we are increasingly working collaboratively in teams, but members of those teams are no longer necessarily in the same office, location, or even the same...
Learn more
Whitepaper
Whitepaper
Delivering Business Value through Orchestration
In an ever-changing digital world, enterprises and vendors face new digital challenges. This is driving the adoption of new solution strategies in which delivering satisfactory modern identity...
Learn more
Event Recording
Event Recording
The CASE for a Vehicle Lifecycle Ledger
Mobility-as-a-service is changing the way people move. From mobility based on driving your own car, it is converging to the consuming of various services using multiple modes of transportation....
Learn more
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
SASE Integration Suites
Leadership Compass
SASE Integration Suites
This report provides an overview of the market for Secure Access Service Edge (SASE) Integration Suites. In this Leadership Compass, we examine the market segment, vendor service functionality,...
Cloud Access Governance
Whitepaper
Cloud Access Governance
Across the globe there has been a significant increase in the adoption of cloud and multi-cloud environments, as businesses scramble to take advantage of digital transformation. With more clouds...
Evolving Identity and Access Management for the Digital Era
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and...
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
Analyst Chat #152: How to Measure a Market
Analyst Chat
Analyst Chat #152: How to Measure a Market
Research Analyst Marina Iantorno works on determining market sizing data as a service for vendors, service providers, but especially for investors. She joins Matthias to explain key terms and...
IGA, the key to security and compliance
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Cymmetri Identity Platform
Executive View
Cymmetri Identity Platform
Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...
Reducing Risk Through Effective Access Management
Blog
Reducing Risk Through Effective Access Management
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it...
Previous
3 4 5 6 7 8 9 Next