Whitepaper
Overcoming Identity Governance Challenges with ForgeRock Aut...
Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex a...
Leadership Compass
Privileged Access Management for DevOps
Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to ad...
Executive View
HID Global Authentication Platform
HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuan...
Whitepaper
Identity Governance Herausforderungen mit ForgeRock Autonomo...
Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben...
Executive View
BeyondTrust Endpoint Privilege Management
Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware,...
Leadership Compass
Access Management
This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your comp...
Market Compass
IGA Solutions for ServiceNow Infrastructures
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Govern...
Executive View
Atos DirX Audit
DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can anal...
Executive View
Simeio Identity Orchestrator
Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, custo...
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper...
Executive View
Ping Identity’s PingFederate
PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...
Leadership Compass
CIAM Platforms
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...
Executive View
BigID
In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...
Executive View
ideiio
Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...
Executive View
UNITY: IGA Modernization Framework by Persistent
Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...
Buyer's Compass
Buyer’s Compass: Access Management
Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...
Executive View
SecZetta Third-Party Identity Risk Solution
Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...
Leadership Compass
Privacy and Consent Management
This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...
Executive View
One Identity Active Roles
One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...
Leadership Brief
Recommendations for aligning ITSM with IAM/IGA
The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...
Buyer's Compass
Buyer’s Compass: Core Features of Privacy and Consent Manage...
Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...
Executive View
Cygna Auditor Platform
The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...
Executive View
Clear Skye IGA: IGA on the ServiceNow NOW platform
Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...
Executive View
Auth0 Platform
Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...
Executive View
Symantec Identity Governance and Administration
In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...
Executive View
Omada Identity Suite
Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...
Executive View
Ilantus Compact Identity
IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...
Whitepaper
IAM: Globalization & Large-Scale Enterprise
Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...
Leadership Compass
Identity Governance & Administration (IGA)
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...
Whitepaper
Single Sign-On and Managed Access to all Applications from t...
With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...
Whitepaper
Fast Access Management in the Hybrid Cloud for SMBs
Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...
Executive View
Hitachi ID IAM Suite
Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...
Leadership Brief
Managing Non-Human Identities
As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...
Leadership Brief
What strategic role should Azure AD play in your org?
As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...
Leadership Brief
Typical Risks and Pitfalls for IGA Projects
As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...
Executive View
iWelcome IDaaS and CIAM
iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...
Executive View
Atos DirX Identity
Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...
Leadership Brief
What to Consider When Evaluating Decentralized Identity?
Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...
Leadership Brief
10 Top Trends in IAM
Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...
Market Compass
Decentralized Identity: Blockchain ID & Self-Sovereign Ident...
The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...
Leadership Brief
Leveraging Identity Fabrics on Your Way Towards Cloud Based...
Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...
Executive View
PlainID Policy Manager
PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...
Executive View
Callsign Intelligence Driven Authentication
Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...
Leadership Brief
Six Key Actions to Prepare for CCPA
From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key a...
Executive View
Onegini Connect
Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expan...
Whitepaper
Healthcare IAM: Enhance the Clinical Workflow
The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...
Executive View
Oracle Identity Governance
As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...
Leadership Brief
IAM for Robotic Process Automation: How to avoid Security Ch...
Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...
Executive View
Informatica Data Privacy Management
Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable...
Executive View
Sovrin Network Self-Sovereign Identity
Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship...
Whitepaper
California Consumer Privacy Act: The Need for Data-Centric S...
CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses...
Advisory Note
Future of Identity Management
Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have t...
Whitepaper
Digital Transformation for Business Enablement Requires a Mo...
Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...
Whitepaper
Modern Identity Fabrics: A Cornerstone of your Digital Stra...
Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...
Buyer's Compass
Decentralized Identity
Decentralized identity solutions - sometimes referred to as blockchain ID - are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and...
Executive View
Identity Automation's RapidIdentity Solution
Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...
Executive View
IBM Decentralized Identity
The IBM Decentralized Identity platform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized...
Leadership Compass
Identity as a Service (IDaaS) - IGA
An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...
Executive View
ForgeRock Access Management
ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...
Architecture Blueprint
Identity and Access Management
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...
Whitepaper
Modern B2B Identity Management
With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...
Whitepaper
Privileged Access Management requirements for Small to Mediu...
Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...
Executive View
Devolutions PAM Solution
Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...
Leadership Compass
Consumer Authentication
This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...
Whitepaper
A Lean Approach on Identity & Access Governance
Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approache...
Whitepaper
Ein schlanker Ansatz für Identity & Access Governance
Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die A...
Leadership Brief
How to set up your IAM organization
A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...
Whitepaper
Why Modern Enterprise IAM Must Be Rearchitected: Build Your...
IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...
Executive View
AdNovum NEVIS Security Suite
A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable mai...
Leadership Brief
Identity Fabrics - Connecting Anyone to Every Service
Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...
Executive View
IBM Cloud Identity
IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...
Leadership Compass
Identity API Platforms
Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT env...
Executive View
Service Layers Managed IAM
Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...
Leadership Compass
IDaaS Access Management
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...
Executive View
TrustBuilder Identity Hub
TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seam...
Whitepaper
Do Identity Right - So Your Digital Business Strategy Succee...
Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...
Whitepaper
IAM for Healthcare: It’s time to act
Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...
Whitepaper
Radiant Logic and the Identity Integration Imperative
Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently....
Executive View
Osirium Opus Privileged IT Process Automation
Osirium Opus is a specialized solution that focuses on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service N...
Leadership Brief
Blockchain ID & Self Sovereign Identity
As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in com...
Whitepaper
Identity Governance. The Value of Leveraging IGA Functions f...
With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administratio...
Buyer's Compass
Consumer Identity and Access Management Solution
Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requi...
Executive View
One Identity Manager SAP Integration
One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The int...
Executive View
Kleverware IAG
Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermö...
Executive View
Ubisecure Identity Platform
Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, in...
Executive View
ManageEngine AD360
ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...
Executive View
NRI SecureTechnologies: Uni-ID Libra 2.2
Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...
Executive View
Simeio IAM for SMB
Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrator...
Executive View
WSO2 Identity Server
Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...
Executive View
CyberArk Privileged Session Manager for Cloud
Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...
Executive View
Kleverware IAG
Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rap...
Executive View
Ilantus Compact Identity
IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the...
Leadership Compass
Access Management and Federation
This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....
Executive View
SAP Customer Data Cloud
SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management. Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identit...
Executive View
VeriClouds Identity Threat Protection Platform
Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against...
Whitepaper
Balancing Security and Convenience: Identity Verification &...
Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience...
Executive View
Sphere Identity Platform
Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support...
Buyer's Compass
Buyer's Guide: Identity-as-a-Service (IDaaS)
Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance...
Executive View
AWS Identity and Access Management
AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...
Executive View
FSP Identity Governance & Administration Suite ORG
Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning...
Leadership Compass
Identity Governance & Administration
Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors...
Executive View
Evidian Identity & Access Management
With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...
Executive View
CA Privileged Acces Management Suite
CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...
Executive View
ViewDS Cobalt
ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...
Executive View
WidasConcepts cidaas
WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...
Executive View
Semperis Directory Services Protector for Active Directory
Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...
Executive View
1Kosmos BlockID
1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well-thought-out and imple...
Executive View
StealthINTERCEPT®
Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, c...
Executive View
Centrify Next-Gen Access Platform
Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...
Executive View
One Identity Safeguard
One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...
Executive View
RSA® Identity Governance and Lifecycle
RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all a...
Leadership Compass
Access Governance & Intelligence
Leaders in innovation, product features, and market reach for access governance & intelligence. Delivering the capabilities for managing access entitlements, always knowing the sta...
Executive View
Cayosoft Administrator v5
Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...
Leadership Brief
Product security as your biggest challenge: Start before it’...
The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. A...
Architecture Blueprint
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...
Executive View
Pirean Consumer IAM Platform
In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...
Executive View
RadiantOne: Radiant Logic’s Federated Identity Suite — It’s...
Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important bui...
Whitepaper
IAM for the Hybrid Reality. Efficiently Managing On-Premise...
Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...
Leadership Compass
Infrastructure as a Service – Global Providers
The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...
Whitepaper
Orchestrated Identity for Meeting IAM & CIAM Requirements
Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...
Executive View
Imprivata
On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from C...
Executive View
Ilantus IDaaS Next
Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on...
Leadership Compass
Identity Provisioning
Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT envi...
Executive View
BeyondTrust PowerBroker PAM
BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...
Executive View
Atos DirX Identity
Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Govern...
Whitepaper
Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Ma...
Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogene...
Whitepaper
The Effect of GDPR on Customer Relations
The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and...
Executive View
PlainID
PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technolo...
Executive View
iWelcome IDaaS and CIAM
IWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers...
Executive View
Omada Identity Suite
Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other fe...
Buyer's Compass
Beta Systems Garancy IAM Suite
Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong...
Buyer's Compass
Buyer’s Guide: Consumer Identity and Access Management Solut...
Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and require...
Executive View
ForgeRock Identity Platform
ForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and acc...
Executive View
Nexis Controle 3.0
Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entwed...
Leadership Compass
Identity as a Service: Cloud-based Provisioning, Access Gove...
Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employee...
Executive View
Nexis Controle 3.0
Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...
Executive View
PingIdentity’s PingDirectory
PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...
Executive View
Salesforce Identity
Salesforce has been a pioneer in Software as a Service (SaaS) from the early days. Digital identity has been an integral part of the Salesforce platform. Salesforce Identity is an...
Executive View
EmpowerID
EmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functi...
Executive View
Hitachi ID Identity and Access Management Suite
Hitachi ID offers an all-in-one IAM package to address enterprise business requirements. With an emphasis on process automation and self-service, the Hitachi ID IAM Suite helps bu...
Executive View
PingOne
PingOne provides cloud-based Single Sign-On (SSO) and Identity-as-a-Service (IDaaS) for employees, business partners, and consumers. PingOne is a key component of PingIdentity’s C...
Whitepaper
Ping Identity solutions for Customer Identity and Access Man...
Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...
Executive View
SAP HANA Cloud Platform Identity Authentication and Provisio...
SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....
Executive View
ForgeRock Access Management
ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...
Executive View
Avatier Identity Management Suite (AIMS)
AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.