KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
But Toal already welcome to our closing keynote session of the European identity cloud conference 2021, which was the first time that we did the EIC in a fully hybrid format. So we had the maximum, the limit of people we were allowed to have on site here in Munich, but we had on average, a thousand people at any point of time listening in via the internet. So it was the biggest EIC ever, and we had more 2,300 register. And so really quite a number. And I'm very proud of that. I'm very proud of my team. I really want to thank you.
Say thank you to all of the team, to all of the people who made it over to Munich, to all of the people who joined via the internet via web. And so this really makes me proud and I was proud that this was in fact probably the first global identity and security went, where people could meet again, face to face for more than 18 months globally. So thank you for that. And before I go into further details, I wanna talk a little bit about some of the main themes we had at the European identity conference.
It is always an interesting challenge to pick only three out of these many topics we have discussed over the course of the past three days. So I made up my mind discussed with my colleagues, from our cooking, a call Analyst team with the moderators of the various directs and asked them what are the teams that were most relevant, most intensively discussed and nailed it down to three. I could have brought up a list of eight or 10 or more, but these are my, my three favorites for this year. So it is managing entitlements and access across all of the multicloud multi hybrid.
It, that is what I started my keynote, my opening keynote on Monday with, and it was very interesting to see that I think six other keynotes in this afternoon picked up that theme about saying, we need to make this work. We need to make everything work for this reality of a multi-cloud multi hybrid.
It, we have this, the various clouds we need to manage. We have our, on-premise it, our edge computing, our private clouds. We need to make this work consistently across everything. We need to get a better crib, not multiple islands, but a more unified and more holistic view on what we do. And part of that, and we are an identity and access management conference. We are an identity conference. We also look at cloud. So it really joins these topics. Part of that clearly is really how do you keep control? How do you enforce the lease privilege? How do you manage entitlements?
How do you manage access? And this was a, a scene which really was very intensively discussed, not only in the keynotes, for sure, but also in many of the subsequent presentations panels, etcetera. And we had, I think 169 sessions probably we had 164. So until now, and we have a few workshops tomorrow, but so more than 160 sessions. And this definitely was a very important scene. I believe this is something which will so keep us working, keep us evolving over the next couple of years, we need to, to solve some problems relatively fast.
So how to really get a CRI on these different AWS Azure, et cetera, clouds and manage entitlements. And we need them to bring this into a bigger picture, into a scene, which really works across the entire breadth of the it we have. So that would be one of my main, my big themes I've I've seen here. And so really works. I think to look at many of the sessions we had, all of them are available as recordings. The slide X are available. So just use the event, app and track for the content that you need.
And you also receive when you have been registered here, you receive our brand new Casey navigator or newsletter. Think I started on a newsletter. If I call it a newsletter, my colleague Europe probably gets a little bit angry, but this navigator it's really modern a newsletter. It's not saying this is news. It's a navigator, it's a navigator throughout content.
It's something which helps you on a certain topic to find what is the information we provide information we've created as analysts, our leadership composes, other types of content, the videos, but also the event content, which is related to that. And on all of these subjects, we have really a huge amount of content. And by the way, if you ever feel there's something missing, if you say, okay, Hey, I need an answer on that or that or that subject. So feel free to drop me an email, say, okay, Hey Martin, shouldn't you cover that topic? Shouldn't you answer that question? Do it.
My email address is easy to find, and I can say it again here it's MK or cole.com or Martin doer. If you want to type a little longer Martin doer Ko or cole.com.
So do it, send me an email. If there's something where you say, Hey, Ko or Cole, I'd like your precision that I like your perspective. I like your answer. Drop me an email. And we will look at it and I will discuss with my team. And if it's in any way, fits in a lot of fits into our subject and our topic areas, we will deliver on that. And this is then also your opportunity to get access to that and to, to, to access our, our content.
And so, as I've said, one of the themes going back to, to this, these topics in the, the disclosing keynote, one of the hot themes, definitely we will do more about is around how to solve this challenge of managing entitlement and access across all of the multi-cloud multi hybrid. The second topic, surely doesn't come at a, as a surprise making zero trust. The reality. So zero trust has been around for more than 10 years, starting as zero trust networks, evolving to a way broader concept where identity and access play a very central role in because we can get a quite good grip at identities.
People authenticate things authenticates in some way services, et cetera, and on the access to services, to resources, to everything. These are the points where it's easy to, to authenticate, to verify and verify as this pattern in the zero trust concept we can do. So this is really something where identity management plays a super important role. And so until a little, we are around about 18 months ago, yes, zero dress was a scene, but then it really started to fly with the pandemic, with work from home organizations learned, okay, we need to do things differently.
We don't have this parameter anymore. We, they didn't have it before, but it was that clear message. The world is changing. Everyone is working from somewhere frequently even to bring your own device devices to services, which are somewhere. And so serial trust became way more relevant, way more intensively discussed in the past 18 months. And with S was every concept. And I found wheeled some, some, some methods, some concepts, some models in my keynote S was every concept. The next step is making it a reality. So what does it mean? What do we, how do we make it work?
What are the ingredients, the components we need for something, for instance, such as zero dress. And this is the hot seam. We saw a very great presentation by Siemens, have a look at again, the KC app, look at this where it's about how to make it work, how to go from a concept to a reality, which increases the security in your organization, which gives you a roadmap, a step by step roadmap. And this is another part of the work to do. And so this is also one of the very important themes.
So zero trust, I probably haven't been in any session where the term zero trust didn't appear sooner or later, at least very, very many of the sessions I've been in. And there's a reason for that because it's really a very good concept, which gives us a, a good way of thinking in this don't trust, but verify, which is at a core. And again, a lot in zero trust is really about identity and access. There's also some learning to have maybe to add, we should extend zero trust to software don't trust software, but verify, learn the hard way wire allowance and CAA.
So this concept will further evolve and we will further follow what is happening in the space of zero trust. And zero trust also will be a very hot signal. Touch this our conference again in a minute, it'll be a very important theme at our November event, the hybrid event in Berlin, the CSLs, the cybersecurity leadership summit, which is then more the cybersecurity side, but, you know, cybersecurity identity. You can't really keep them apart. They're they're really intertwined. So this was another theme. What else? Reusable identities.
I also might use the term decentralized here because behind reusable, there's at least for a significant portion of what we have in reusable identities. There's also decentralized identities behind that or things terms like verifiable credentials and past what less authentication. So this entire theme of how do we deal in future with identities? How do we make life easier? And this was also a subject. I also was in a couple of panels around these, these themes. We had the announcement of gain the global assured identity network here at the European identity conference.
Where is network, where, where there were more than 150 people worked on a paper where this concept has been the first time presented to the public. So we have this big semen. I think this is a very important one because I think when we look at our, our own online activities, it's, it's really annoying that we, again and again, have to register, maybe even verify that who we are. So is Martin really Martin. So maybe I've I've, I'm not Martin.
Maybe I've been, I've been I'm someone totally different, but no, I think I'm, I'm quite sure that I'm Martin, but verifying this again, entering the same information, this is annoying. It's really not modern anymore. So we need something we can reuse. And there are different ways to do that. Like gain like decentralized identities. And what we need to learn as organizations is how these things work together, because this is that you do the one or the other.
It is about giving choice to your customers and consumers, and to understand how this fits into your customer journeys and how you can deliver the best experience because at the end, and this goes also back to my opening keynote, the success of your business depends on the digital experience that you deliver with digital services. This is what you need to do. And this identity experience I I'm doing on my onboarding I'm later on authenticating again, or coming in again, maybe without a really whistle a indication.
So this is where, where a lot of things come together and password less indication I think is also very important thing I trust in the afternoon. Read, read an announcement of Microsoft saying you can remove the password, right, right now from the Microsoft account password less and password less, I think is a very important thing. What I like most with password less by the ways probably a lot of you had discussions about, oh, we need to balance security and convenience user convenience.
The problem with balancing is if security goes up, user convenience goes down, convenience goes up, security goes done. Balancing is not really good. The good thing with passwordless authentication is that it is about combining about having both security going up and convenience going up. So if we do password syndication, right, if we do reusable identities, right, by for instance, utilizing decentralized identities, we can have the best of both. We can get better. We make things more secure, more convenient. We have a better user experience, a better customer experience.
We will be more successful in the digital business. And this is where identity is way beyond trust, managing your workforce identity and stuff like that. Identity is an enabler, maybe the enabler, at least a very important part of the fuel you need for your digital journey. And this was, as I've said, also one of these really important, these hot themes we've discussed, as I've said, I could come up with with many more of these, because there are so many topics we we've talked about over the course of the past three days.
We will have some, as I've said, some interesting workshops tomorrow as well, where we go and again, more into detail of, of some of the different themes we had. So I I'm proud of all the speakers and I'm really want to thank all the speakers, the panelists who delivered, who contributed to that, who made it so, so interesting and so forward looking, I also, for sure want to thank all the sponsors of our conference. This is what makes this work, what makes this happen?
And again, as I've said, I, I want to thank all the team. So it was a super interesting conference. I can't sort of repeat everything.
We, we, we did over these past few days, but it was very interesting. And I personally enjoyed really all these face to face communications. I had the first time for more than one and a half years, because this is really also, which helps getting new ideas, discussing new concepts, but also just meeting other humans face to face again, which was really great. We will remain with hybrid for sure. We will do that next year, may and April next year may and Berlin hybrid.
But I think there's really an super great advantage as of seeing people again again, and by the way also, and when I look here to the audience, it's, it's really impressive. I want to thank everyone who was on side for being so consequent and strict in enforcing the hitch eye chain, the security, the safety rules we had, this is super because I think it made everyone feel more comfortable with when meeting the first time a lot of people and we were global. We we're very global Japan, New Zealand us.
So we had a global audience in the global gathering and I'd dare to say, we are world premier global identity cloud conference at EIC. And so I have talked about much enough about these things. Let's maybe quickly touch another important thing. At least for a few. We have as every time at ESE, we do this gamification thing. So the gamification, in fact, it's about, oops, let's go back.
I, okay, this is what I wanna see. The gamification is where you can engage with our sponsors guys data when you are the award ceremony, et cetera. And over time you can, can win points. And so we had a couple of, so it doesn't really like me. It looks like we had three prizes here. One is a barbecue. So more just hot oven style thing or Dutch over. I'm not exactly sure how it's called. We had this Phoenix six watch and the wireless earphones, this word presence. And so maybe we go back to the, yeah. So you see the slide.
So right now the point is, and some of you will be definitely very curious about having spent some time with the GA gamification, who are the winners for that this year, it's a little different than other years. So we will not ask the people on the stage, some participated also online. We will send the stuff to you. So the first place goes to Saltan liar of Ericson, which is this pretty big and heavy barbecuing. Yeah. Unfortunately I, I'm not allowed to participate because that was one where, where I would have been really interested.
I'm trying to convince my wife for quite a while that I need a bigger barbecue. And so that would have been a good opportunity, you know, saying, oh, I just wanted, I can, I couldn't do anything about it, but that's how life is.
So I, I still have to wait that the other other one gets I have at home gets rusty so that I have a reason for replacing it with a bigger one second place. That is the watch, the Phoenix watch.
Oh, Mr. Boko from Eric's and I I'm, I'm struggle trying to pronounce the probably Hungarian name correctly. So this is the second one. And the third one, the third place.
Yes, it blows, sorry. I was the fast, the third, the third one is Aamar of the continental.
So again, so, so I think, I think if we would have drawn six or seven, then I, I would have been used to how to do it right in the right order, et cetera, but congratulations to everyone. And I think there are always good reasons to take part in the gamification. The next events are waiting, but before we talk about the next events again, that I touched it before, thanks to all this. I think PowerPoint wants to, so PowerPoint seems to be a little tired after three days of a conference. So thanks to all our sponsors. Yes.
It seems to, to stay this picture, it makes me a little nervous because the, the, the screen in front of me flips around, oh, the screen behind me as well. So many sponsors. And as I've said, thank you so much. Thank you for contributing to the European identity conference, 2021 with being a sponsor. Many of you having had a boost here, some being have been only sort of virtual sponsors in some way. This is also what helps making this event such a success. So thank you. Thank you. Thank you. And then let's look forward upcoming event, number one already in November.
So it's not that far away anymore. November 9th to 11th and Berlin, we will run another hybrid event. So I would say the same options to participate, come to Berlin. If you're allowed to travel, if you feel comfortable with traveling, if not, just join online, It's our cyber security leadership summit. And as it says, it's about cyber security and it's about leadership. And it's an event where we will discuss a broad range of themes around cybersecurity, where also serial trust and some other aspects come in.
So, as I've said, some of these are really so, so close together that are no, no hard border lines, but this will really be more on the cybersecurity side. Don't miss this event and what you definitely must not miss. This is the thing to be, this is EIC 20, come on, EIC 2022, which will be not here in close to Munich.
Again, it will be in Berlin. So we are moving to Berlin, which to another venue. I think it's definitely an interesting one. We will do EIC. We will go back to may where we always have been ahead of the pandemic. It will be again, a fully hybrid event May 10th to 13th next year in Berlin. And I hope that all of you will be there on site in Berlin. If it allows, if the situation allows, if you're government governmental and corporate traveler restrictions, hopefully are, are losing. If you can travel again.
And I'm very confident, we will see way more people there on site meet again and have a super super event again, next year as we had this year. So looking forward to see you in Berlin, thank you again for making this year's EIC such a huge success, such a cool event, and such a great opportunity to finally meet people again, face to face or online to, by contributing to all the sessions by acting as a sponsor. Thank you and have a safe trip back.