Article No. / Date
Articles
ev80330

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...

lc80040

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...

ev80145

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...

ev80149

Executive View

ideiio

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...

ev80522

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...

bc80201

Buyer's Compass

Buyer’s Compass: Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...

ev80144

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...

lc80199

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...

ev80413

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...

lb80262

Leadership Brief

Recommendations for aligning ITSM with IAM/IGA

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...

bc80198

Buyer's Compass

Buyer’s Compass: Core Features of Privacy and Consent Manage...

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...

ev80417

Executive View

Cygna Auditor Platform

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...

ev80412

Executive View

Clear Skye IGA: IGA on the ServiceNow NOW platform

Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...

ev80329

Executive View

Auth0 Platform

Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...

ev80324

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80506

Executive View

Omada Identity Suite

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

wp80130

Whitepaper

IAM: Globalization & Large-Scale Enterprise

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...

lc80063

Leadership Compass

Identity Governance & Administration (IGA)

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...

wp80402

Whitepaper

Single Sign-On and Managed Access to all Applications from t...

With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...

wp80137

Whitepaper

Fast Access Management in the Hybrid Cloud for SMBs

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...

ev80399

Executive View

Hitachi ID IAM Suite

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...

lb80278

Leadership Brief

Managing Non-Human Identities

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...

lb80455

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...

lb72580

Leadership Brief

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...

ev80328

Executive View

iWelcome IDaaS and CIAM

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

lb80335

Leadership Brief

10 Top Trends in IAM

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...

mc80064

Market Compass

Decentralized Identity: Blockchain ID & Self-Sovereign Ident...

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...

ev80326

Executive View

Google's Cloud Identity

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...

lb80501

Leadership Brief

Leveraging Identity Fabrics on Your Way Towards Cloud Based...

Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

ev80174

Executive View

Callsign Intelligence Driven Authentication

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...

lb80353

Leadership Brief

Six Key Actions to Prepare for CCPA

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key a...

ev80168

Executive View

Onegini Connect

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expan...

wp80163

Whitepaper

Healthcare IAM: Enhance the Clinical Workflow

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...

ev80157

Executive View

Oracle Identity Governance

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...

lb80383

Leadership Brief

IAM for Robotic Process Automation: How to avoid Security Ch...

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...

ev80276

Executive View

Informatica Data Privacy Management

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable...

ev80112

Executive View

Sovrin Network Self-Sovereign Identity

Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship...

wp80136

Whitepaper

California Consumer Privacy Act: The Need for Data-Centric S...

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses...

an71303

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have t...

wp80165

Whitepaper

Digital Transformation for Business Enablement Requires a Mo...

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...

wp80170

Whitepaper

Modern Identity Fabrics: A Cornerstone of your Digital Stra...

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...

bc80050

Buyer's Compass

Decentralized Identity

Decentralized identity solutions - sometimes referred to as blockchain ID - are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and...

ev80028

Executive View

Identity Automation's RapidIdentity Solution

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...

ev80099

Executive View

IBM Decentralized Identity

The IBM Decentralized Identity platform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized...

lc80051

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...

ev80319

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...

ab72550

Architecture Blueprint

Identity and Access Management

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...

wp80135

Whitepaper

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...

ev79077

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

wp80123

Whitepaper

Privileged Access Management requirements for Small to Mediu...

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...

ev80070

Executive View

Devolutions PAM Solution

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...

lc80061

Leadership Compass

Consumer Authentication

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...

wp80048

Whitepaper

A Lean Approach on Identity & Access Governance

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approache...

wp80107

Whitepaper

Ein schlanker Ansatz für Identity & Access Governance

Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die A...

lb72548

Leadership Brief

How to set up your IAM organization

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...

wp80044

Whitepaper

Why Modern Enterprise IAM Must Be Rearchitected: Build Your...

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...

ev80066

Executive View

AdNovum NEVIS Security Suite

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable mai...

lb80204

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...

ev79065

Executive View

IBM Cloud Identity

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...

lc79012

Leadership Compass

Identity API Platforms

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT env...

ev80129

Executive View

Service Layers Managed IAM

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...

lc79016

Leadership Compass

IDaaS Access Management

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...

ev80071

Executive View

TrustBuilder Identity Hub

TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seam...

wp80134

Whitepaper

Do Identity Right - So Your Digital Business Strategy Succee...

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...

wp80029

Whitepaper

IAM for Healthcare: It’s time to act

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...

wp80075

Whitepaper

Radiant Logic and the Identity Integration Imperative

Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently....

ev79068

Executive View

Osirium Opus Privileged IT Process Automation

Osirium Opus is a specialized solution that focuses on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service N...

lb80105

Leadership Brief

Blockchain ID & Self Sovereign Identity

As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in com...

wp80043

Whitepaper

Identity Governance. The Value of Leveraging IGA Functions f...

With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administratio...

an80111

Buyer's Compass

Consumer Identity and Access Management Solution

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requi...

ev80073

Executive View

One Identity Manager SAP Integration

One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The int...

ev80106

Executive View

Kleverware IAG

Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermö...

ev79072

Executive View

Ubisecure Identity Platform

Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, in...

ev79070

Executive View

ManageEngine AD360

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...

ev79079

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.2

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...

ev79071

Executive View

Simeio IAM for SMB

Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrator...

ev80060

Executive View

WSO2 Identity Server

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev80042

Executive View

Kleverware IAG

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rap...

ev80052

Executive View

Ilantus Compact Identity

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

ev79001

Executive View

SAP Customer Data Cloud

SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management. Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identit...

ev79083

Executive View

VeriClouds Identity Threat Protection Platform

Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against...

wp79081

Whitepaper

Balancing Security and Convenience: Identity Verification &...

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience...

ev79052

Executive View

Sphere Identity Platform

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support...

an71526

Buyer's Compass

Buyer's Guide: Identity-as-a-Service (IDaaS)

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance...

ev79048

Executive View

AWS Identity and Access Management

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...

ev79050de

Executive View

FSP Identity Governance & Administration Suite ORG

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning...

lc71135

Leadership Compass

Identity Governance & Administration

Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors...

ev70872

Executive View

Evidian Identity & Access Management

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...

ev79047

Executive View

CA Privileged Acces Management Suite

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...

ev70851

Executive View

ViewDS Cobalt

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...

ev79057

Executive View

WidasConcepts cidaas

WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...

ev79054

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...

ev79064

Executive View

1Kosmos BlockID

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well-thought-out and imple...

ev70367

Executive View

StealthINTERCEPT®

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, c...

ev79036

Executive View

Centrify Next-Gen Access Platform

Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...

ev79042

Executive View

One Identity Safeguard

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...

ev71052

Executive View

RSA® Identity Governance and Lifecycle

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all a...

lc71145

Leadership Compass

Access Governance & Intelligence

Leaders in innovation, product features, and market reach for access governance & intelligence. Delivering the capabilities for managing access entitlements, always knowing the sta...

ev79000

Executive View

Cayosoft Administrator v5

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...

lb72011

Leadership Brief

Product security as your biggest challenge: Start before it’...

The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. A...

an79045

Architecture Blueprint

Aligning Access Governance and Privilege Management

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...

ev70223

Executive View

Pirean Consumer IAM Platform

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...

ev70845

Executive View

RadiantOne: Radiant Logic’s Federated Identity Suite — It’s...

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important bui...

wp70364

Whitepaper

IAM for the Hybrid Reality. Efficiently Managing On-Premise...

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...

lc70303

Leadership Compass

Infrastructure as a Service – Global Providers

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...

wp70225

Whitepaper

Orchestrated Identity for Meeting IAM & CIAM Requirements

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...

ev71514

Executive View

Imprivata

On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from C...

ev70252

Executive View

Ilantus IDaaS Next

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on...

lc71139

Leadership Compass

Identity Provisioning

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT envi...

ev70275

Executive View

BeyondTrust PowerBroker PAM

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...

ev71702

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Govern...

wp70327de

Whitepaper

Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Ma...

Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogene...

wp73000

Whitepaper

The Effect of GDPR on Customer Relations

The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and...

ev70358

Executive View

PlainID

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technolo...

ev70298

Executive View

iWelcome IDaaS and CIAM

IWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers...

ev70301

Executive View

Omada Identity Suite

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other fe...

ev71530

Buyer's Compass

Beta Systems Garancy IAM Suite

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong...

an70259

Buyer's Compass

Buyer’s Guide: Consumer Identity and Access Management Solut...

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and require...

ev70296

Executive View

ForgeRock Identity Platform

ForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and acc...

ev72535de

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entwed...

lv70319

Leadership Compass

Identity as a Service: Cloud-based Provisioning, Access Gove...

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employee...

ev72535

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

ev70294

Executive View

PingIdentity’s PingDirectory

PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...

ev70813

Executive View

Salesforce Identity

Salesforce has been a pioneer in Software as a Service (SaaS) from the early days. Digital identity has been an integral part of the Salesforce platform. Salesforce Identity is an...

ev70297

Executive View

EmpowerID

EmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functi...

ev72543

Executive View

Hitachi ID Identity and Access Management Suite

Hitachi ID offers an all-in-one IAM package to address enterprise business requirements. With an emphasis on process automation and self-service, the Hitachi ID IAM Suite helps bu...

ev70288

Executive View

PingOne

PingOne provides cloud-based Single Sign-On (SSO) and Identity-as-a-Service (IDaaS) for employees, business partners, and consumers. PingOne is a key component of PingIdentity’s C...

wp70289

Whitepaper

Ping Identity solutions for Customer Identity and Access Man...

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...

ev70290

Executive View

SAP HANA Cloud Platform Identity Authentication and Provisio...

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....

ev71316

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...

ev71510

Executive View

Avatier Identity Management Suite (AIMS)

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

an72523

Advisory Note

KYC as an Enabler in the Financial Services Business Transfo...

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challen...

lb71411

Leadership Brief

Transforming IAM – not Panicking

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.

ev71319

Executive View

SailPoint IdentityIQ

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...

ev71550

Executive View

Microsoft Azure Active Directory

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage b...

ev70894

Executive View

One Identity Manager v7.0.1

One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...

lb72001

Leadership Brief

The 5 Biggest IAM Myths

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...

lb72013

Leadership Brief

Information Rights Management – Ready for Prime Time?

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...

top