KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Felix geek is a former Analyst for cooking, a Cole who just switched sides and is now working for axiomatic. What's it like to work for the other side?
Well, it's quite a change. Let's say like this DIC is a different experience when you're sitting here on the other side, I really like C every year, the first year I came here, when I still work for SYOP and the next three years as an Analyst Analyst, working for you guys. And that was fun too, but it all kind of passed in a blur because you have so many things to consider. You have so many people that you have to chase. You have your people that you need to shepherd to your, to your panels and all of that. So right now I'm actually, I'm still enjoying myself, but I'm much more relaxed.
What are you actually working on now? I have a pretty glorious title now at AIMA I'm the director of technology partnerships and developer relations. I always have to swallow when I, when I say, because it's quite a title, but it just kind of says what I'll be doing for, for axiomatic. I'll be doing quite a bit of both and bringing the technology and people together. Why did you choose to work on some rocket science stuff? Like thesal why got something simpler?
Well, you, when, when, when we were still colleagues, this was kind of a sweet spot for me. I really liked externalized authorization. And that's what we've been kind of doing all of these these years, trying to make things simpler and trying to say, make the it systems more aligned with, with business systems. It kind of started off probably a decade ago with identity management, where you had all of these different islands of interconnected systems, each of them doing their own kind of thing, kind of playing to the same tune and with authorization. It's kind of the next thing.
What we have right now is we have business policies and we have it systems and they're really not aligned. So if your business process dictates that need to authorize and you need to grant access in a particular way, it's not a very easy way to do this business. People say, this is what needs to happen. Then it people say, well, you know, we've got this kind of role model that we can use and we can kind of try to, to map it, but not really. So we have to do all these kinds of things, these weird extensions, we have all these hoops that we have to jump to what should actually happens.
That business drives the policy and that gets mapped and implemented all down to up to the low level, lowest level system. And that's what policy based authorization is really about. So I think it's really, really cool. It's not exactly rocket science, it's complex because the domain is complex, but we're doing ways to, to make it simple, to really map that, that high level business policy up down to the, the lowest level to level access decision. Okay. What do you think we'll be talking about next year at I EIC?
Ah, good question. Probably cloud is gonna be even more on the horizon though. We have had a few very, very sunny days over year. We're probably talking even more about externalized authorization. I think we're gonna see much more services being actually migrated out to the cloud and some non let's say core services from enterprises being externalized and probably there's going to be some other interesting, interesting, weird things that happen.
Some big leaks, leakages of data and some other big whoopies that that happened that will happen over the next 12 months that we analyzed and looked at. Great. And hopefully we'll have time to have a beer this year and next to DIC wish you all the luck, Felix. Absolutely. The new conference location is absolutely great. I'll be looking forward to next year and beyond cheer.