Please choose your search criteria and click on "search" or browse all reports

Buyers_Compass

Buyer's Compass

Database and Big Data Security

As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCole Buyer's Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for implementing the necessary security and compliance controls to protect your sensitive corporate data against a multitude of risks. [...]

Executive_View

Executive View

Accenture Memority

Accenture Memority is an IDaaS solution supporting both Identity Lifecycle Management and Access Management use cases. It comes with full API support and positions itself as the foundation for a customer’s Identity Fabric. Its strengths stems from the leading-edge support for digital transformation use cases such as support for IoT and connected devices, which is also powered by the close interaction with Accenture consulting services. [...]

Executive_View

Executive View

IBM Security Verify for CIAM

IBM Security Verify is an industry-leading Consumer Identity and Access Management (CIAM) solution that can satisfy both B2B and B2C requirements. Customers can choose to operate the product on-premises or in IaaS and IBM hosts it as fully multi-tenant SaaS. The micro-services design exemplifies the modern paradigm of Identity Fabrics. IBM Security Verify addresses the full range of common CIAM capabilities plus many advanced use cases for IoT device association. IBM Trusteer integration allows for robust fraud prevention for consumers and customers. [...]

Buyers_Compass

Buyer's Compass

IT Service Management

IT Service Management (ITSM) refers to comprehensive solutions that support IT management capabilities to help organizations to optimize the design, delivery, support, use and governance of IT. This KuppingerCole Buyer's Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will also help prepare your organization to conduct RFIs and RFP for ITSM solutions [...]

top