Identity and Access Insights (IAM): Learn, Plan, Modernise | Kocho
Skip to content

The IAM resource hub

arrow icon arrow icon

Guides, webinars, case studies and advice from Kocho’s identity, access, and Microsoft Entra specialists.

Strong identity is the building block for progress

This hub helps security, IT and transformation teams make better identity decisions.

The Kocho Identity Hub is a central library of identity and access management resources created by our team of world-class identity and Microsoft Entra specialists.

It brings together practical guides, expert insight, demos, webinars and real-world customer stories to help organisations plan, secure and modernise identity.

Use it to explore best practice, stay ahead of change, and make informed identity decisions at every stage of your journey.

Get the latest thinking from Kocho’s identity specialists

""
  • Blog

How to automate user provisioning from any HR system

Efficient user lifecycle guide

  • Blog

Is Microsoft Entra Ready to Replace MIM?

Identity migration advice

  • Blog

Microsoft Entra and the journey to cloud identity transformation

Major new Entra update

  • Blog

How Microsoft Entra Suite is improving user experience and compliance

Key Entra updates examined

  • Blog

HR driven provisioning: How to perfect the JML process with Entra ID

Fast, secure access. Greater productivity.

  • News

Preparing for Conditional Access approved client app retirement

Critical Conditional Access advice

  • On Demand

Microsoft Identity Update – Latest Entra Developments Revealed

49-minute watch

  • News

Microsoft Identity Manager SP3: What it means for your identity strategy

Important MIM SP3 Update

  • Blog

How to rethink privileged access with Microsoft Entra

Perfect Privilege Access Advice

  • Blog

Why tenant sprawl is a business risk hiding in plain sight

Protect against ungoverned tenants

Phishing resistant MFA Zero trust
  • Blog

Why phishing-resistant MFA belongs in every Zero Trust access strategy

Avoid MFA bypass risks

  • On Demand

Modern identity verification with Microsoft Entra Verified ID and Face Check

40-minute watch

  • Blog

Your quick guide to securing non-human identities

Protect against AI and automation risks

  • Blog

Why access management fails when it forgets about people

A better access experience

  • Blog

How to secure external access with Microsoft Entra ID Governance

Solving external user security

  • Blog

Microsoft Entra: Simplify hybrid identity lifecycle management

Streamline identity management

  • Blog

7 Business benefits of Entra ID that you need to know

Unlock Entra's full potential

  • Blog

Why authentication and identity security need a rethink

Latest identity security advice

  • Blog

Why it's time for identity-first unified device management

Future-proof device management

  • Blog

Dial M for Mover: How to streamline employee role changes with Entra ID

Improve employee efficiency

""
  • Blog

Identity-first onboarding: How technology supports talent retention

Reduce staff turnover costs

  • Blog

6 essential steps to secure privileged account access

Tips to secure privileged identities

  • Blog

The Corleone effect: Manage insider risk while retaining staff loyalty

Build security without suspicion

  • Blog

Why you need to choose an identity-centric security partner

Instant ID protection

tag icon

Become Greater

Sign up to the Kocho newsletter

Stay ahead of the pack with exclusive identity and security news, expert views, and in-depth analysis. Plus invites to every webinar and industry events.

securing non-human identities
play icon 00:49:34 Play video

play icon 00:19:7 Play Dojo: A cloud-first identity success story video

tag icon

Microsoft Entra e-Guide

Move beyond legacy identity with Microsoft Entra

Discover how to:

  • Migrate identity services without disrupting business operations
  • Simplify provisioning with HR‑driven, API‑based workflows
  • Replace fragile on‑premises components with resilient cloud controls
  • Strengthen access decisions using Conditional Access
  • Reduce long‑term technical debt and identity risk
Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.