Advisory Note
Redefining Access Governance: A broader perspective
Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory complianc...
Executive View
UNITY: IGA Modernization Framework by Persistent
Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...
Leadership Compass
Access Governance & Intelligence
The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providin...
Executive View
Omada Identity Suite
Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...
Executive View
One Identity Manager
One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experien...
Leadership Compass
Identity Governance & Administration (IGA)
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...
Leadership Brief
Typical Risks and Pitfalls for IGA Projects
As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...
Executive View
Atos DirX Identity
Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...
Executive View
Callsign Intelligence Driven Authentication
Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...
Whitepaper
Healthcare IAM: Enhance the Clinical Workflow
The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...
Leadership Brief
Robotic Process Automation
Robotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes...
Executive View
Oracle Identity Governance
As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...
Executive View
Saviynt Security Manager for Enterprise IGA
Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functio...
Whitepaper
California Consumer Privacy Act: The Need for Data-Centric S...
CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses...
Leadership Compass
Identity as a Service (IDaaS) - IGA
An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...
Executive View
Ping Identity Data Governance
In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply wi...
Executive View
Devolutions PAM Solution
Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...
Whitepaper
A Lean Approach on Identity & Access Governance
Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approache...
Whitepaper
Ein schlanker Ansatz für Identity & Access Governance
Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die A...
Whitepaper
Why Modern Enterprise IAM Must Be Rearchitected: Build Your...
IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...
Executive View
Service Layers Managed IAM
Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...
Whitepaper
Privileged Access Governance
Privileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of pri...
Executive View
TrustBuilder Identity Hub
TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seam...
Executive View
SAST SUITE der akquinet AG
Die heutigen SAP-Sicherheitsanforderungen gehen weit über die traditionellen Access Governance-Anforderungen an Benutzer, deren Zugriff und Rollen hinaus. akquinet bietet eine voll...
Executive View
SAST SUITE by akquinet AG
Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users and their access and roles. AKQUINET offers a full-featured product suite for GR...
Whitepaper
Do Identity Right - So Your Digital Business Strategy Succee...
Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data prote...
Executive View
Osirium Opus Privileged IT Process Automation
Osirium Opus is a specialized solution that focuses on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service N...
Whitepaper
Identity Governance. The Value of Leveraging IGA Functions f...
With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administratio...
Executive View
One Identity Manager SAP Integration
One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The int...
Executive View
Kleverware IAG
Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermö...
Leadership Brief
Data Security and Governance (DSG) for Big Data and BI Envir...
Increased relevance of Big Data and BI environments in supporting business decisions requires a broad set of data points to be collected throughout the lifetime of an application a...
Executive View
ManageEngine AD360
ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...
Executive View
WSO2 Identity Server
Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...
Executive View
Kleverware IAG
Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rap...
Executive View
Saviynt Identity Governance and Administration (IGA)
Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User...
Executive View
FSP Identity Governance & Administration Suite ORG
Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning...
Leadership Compass
Identity Governance & Administration
Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors...
Whitepaper
Governance for all data: Get a grip on unstructured data
While many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they...
Executive View
CipherCloud CASB+
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...
Executive View
MinerEye Data Tracker
MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...
Executive View
StealthINTERCEPT®
Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, c...
Executive View
RSA® Identity Governance and Lifecycle
RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all a...
Leadership Compass
Access Governance & Intelligence
Leaders in innovation, product features, and market reach for access governance & intelligence. Delivering the capabilities for managing access entitlements, always knowing the sta...
Executive View
Varonis DatAdvantage
Getting a grip on your data is a bigger challenge than ever before. While solutions for central IT environments such as SAP are quite established, a significant portion of critical...
Architecture Blueprint
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...
Executive View
StealthDEFEND®
Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...
Whitepaper
IAM for the Hybrid Reality. Efficiently Managing On-Premise...
Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...
Executive View
Imprivata
On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from C...
Leadership Compass
Identity Provisioning
Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT envi...
Executive View
Atos DirX Identity
Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Govern...
Advisory Note
KRIs and KPI for Access Governance
This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of t...
Executive View
Omada Identity Suite
Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other fe...
Executive View
IBM Security Identity Governance and Intelligence
A business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with stron...
Executive View
SailPoint SecurityIQ
SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governa...
Leadership Compass
Identity as a Service: Cloud-based Provisioning, Access Gove...
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employee...
Advisory Note
Enterprise role management done right
Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model r...
Executive View
Avatier Identity Management Suite (AIMS)
AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.
Executive View
Beta Systems Garancy Recertification Center
With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enabl...
Executive View
SailPoint IdentityIQ
SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...
Executive View
Gurucul Predictive Risk Analytics
Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that...