Insights

Identity & Access Management

Identity & Access Management (IAM) is one of today’s core disciplines of IT (Information Technology), and an essential element within every cybersecurity strategy. However, IAM is not limited to security, but is also one of the enablers of digital transformation.

Guide
Guide
The Definitive Guide to Identity & Access Management
Read the full guide! Everything you need to know about Identity and Access Management. Learn more about this important building block of any cybersecurity strategy.
Learn more
Master Class
Master Class
Identity & Access Management (IAM) Essentials
In this KC Master Class you will get a deep understanding of the terms and concepts of Identity and Access Management (IAM). Our analysts will teach common use cases, the various types of...
Learn more
Master Class
Master Class
PAM for the 2020s
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Where Workflows, Service Management, Digital Identities, and Work From Home Meet
Simplifying access to IT services by building on platforms for IT workflows and beyond ServiceNow, over the past few years, has emerged as one of the leaders in the ITSM (IT Service...
Learn more
Leadership Compass
Leadership Compass
Passwordless Authentication
This report provides an overview of the market for Passwordless Authentication products and services and presents you with a compass to help you to find the Passwordless Authentication product or...
Learn more
Event Recording
Event Recording
Denmark's 2022 brand new eID solution
Learn more
IAM System Integrators - EU
Leadership Compass
IAM System Integrators - EU
This Leadership Compass evaluates and provides insight into the capabilities of IAM system integrators serving customers in the European region. We examine market segments, provider service...
The Power of Identity Management in Revolutionizing Financial Services
Blog
The Power of Identity Management in Revolutionizing Financial Services
The participation of financial services has always been a crucial aspect of the European Identity and Cloud Conference (EIC). In its 17-year history, EIC has seen many representatives of large...
Modernizing IGA: A Guide for IAM Leaders
Webinar Recording
Modernizing IGA: A Guide for IAM Leaders
Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of...
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Join this webinar to learn more about Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into...
Navigating the Access Control Maze
Webinar Recording
Navigating the Access Control Maze
This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration...
The Next Generation of Secure Access with Zero Trust
Event Recording
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.
IAM: The Guardian Angel of Zero Trust
Event Recording
IAM: The Guardian Angel of Zero Trust
In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes...
Panel | It all starts with the Endpoint
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
A Foundational Data Layer: The Key to Value in Identity
Webinar Recording
A Foundational Data Layer: The Key to Value in Identity
Join identity experts at KuppingerCole Analysts and IndyKite as they discuss how to get more value out of identity data and address more use cases by thinking about the foundational data layer....
The Ping/ForgeRock combination
Blog
The Ping/ForgeRock combination
A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access...
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Webinar Recording
Harness IGA and GRC Synergies for Effective ID Management and Access Control
Join identity experts at KuppingerCole Analysts and Fastpath as they discuss the identity, access, and compliance challenges companies face, and examine how the convergence of Identity Governance...
Beyond Tradition - The Evolution and Integration of Access Management
Analyst Chat
Beyond Tradition - The Evolution and Integration of Access Management
Today, host Matthias and expert Alejandro Leal discuss the dynamic realm of Access Management. They'll touch on its evolution beyond traditional capabilities, the intertwined nature of Access...
Previous
1 2 3 4 5 6 7 Next