
Every month we keep you informed about current developments at Nexis, share insights into our NEXIS Platform, NEXIS 4 and QSEC, and provide updates from the world of Identity Analytics & Access Governance and GRC.
Enjoy reading! 💙
🔍 The Rise of the IVIP – Game Changer or Hype?
Cloud, SaaS sprawl, non-human identities, and AI-driven access are pushing traditional IAM and IGA to their limits. One challenge stands out across all environments: visibility.
In this webinar, Dr. Heiko Klarl (CEO, Nexis), Dr. Maarten Decat (CEO & Co-Founder, Elimity) and Timo Copp (Managing Director, SonicBee) discuss Gartner’s new category Identity Visibility and Intelligence Platforms (IVIP).
📅 February 26, 2026 | 🕑 3:00 p.m. CET | 🌐 Language: English | Format: Live with Q&A
🤖 AI You Can Trust – Transparent Identity Governance with NEXIS
AI is becoming a core capability of modern Identity Governance, but it only creates value when decisions remain transparent, explainable, and under human control.
In this interactive webinar Dr. Heiko Klarl (CEO, Nexis) and Viktoria Müller (IAM Consultant, Nexis) show how AI and machine learning are applied across the NEXIS Platform to improve recertifications, access decisions, role mining, application onboarding, and IAM Governance Documentation.
📅 March 12, 2026 | 🕑 4:00 p.m. CET | 🌐 Language: English | Format: Live with Q&A
🧩 ICT Risk Management in Practice – Data Collection, Methods and Live Showcase
Effective ICT risk management requires more than frameworks and policies. It needs structured data, clear methods, and seamless integration into existing system landscapes.
In this webinar Jonas Link (Product Manager QSEC, Nexis) and Nabil Arzouni (Information Security Officer, IKB) demonstrate how ICT risk management can be implemented in a practical and controllable way, from structured data collection to hands-on execution directly in the tool.
📅 March 17, 2026 | 🕑 3:00 p.m. CET | 🌐 Language: English | Format: Live with Q&A
In his latest blog post, Dr. Heiko Klarl takes a critical look at the OWASP Top 10 2025 and explains why many of today’s most critical risks persist even when application security controls are in place.
The article shows how broken access control, misconfiguration, supply chain risk, and insecure design increasingly originate from insufficient identity, access, and third-party governance rather than vulnerable code alone. Using concrete OWASP categories, it outlines how continuous access governance, Identity Visibility and Intelligence, and structured IAM Governance Documentation help close this enterprise reality gap.
We are proud that over the past year, Nexis has been referenced in multiple reports by leading analyst firms, underlining the growing relevance of Identity Visibility, Intelligence, and Governance in complex enterprise environments.
In particular, Gartner and KuppingerCole have highlighted Nexis across several publications, including research on Identity Visibility and Intelligence Platforms (IVIP), AI-driven access governance, and modern Identity Governance and Administration.
👉 Have a Look at the Overview of All Analyst Reports and References
Dr. Heiko Klarl was a guest on The Cyber Security Matters podcast by neuco. The conversation moves beyond tools and frameworks and focuses on a core reason why IAM initiatives stall: a lack of honest visibility into the current state of identity and access management.
Heiko shares why realistic assessments, trusted data, and clear ownership are essential for sustainable identity governance.
A thoughtful episode for security and IAM leaders who want to understand why identity security is as much about people and processes as it is about technology.
IAM Application onboarding is one of the biggest bottlenecks in IGA. Manual data collection, fragmented documentation, and late involvement of application owners slow projects down and increase risk.
NEXIS IAM Application Onboarding brings structure and automation to this process:
You are currently viewing a placeholder content from Vimeo. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou need to load content from reCAPTCHA to submit the form. Please note that doing so will share data with third-party providers.
More Information
Comments are closed