Article No. / Date
Articles
wp80935

Whitepaper

Governance over hybrid SAP Environments – the ANZ Story

Cloud adoption, and migration of on-premise applications to cloud services, is increasingly being undertaken by organisations wanting to leverage the business efficiencies that clo...

ev80928

Executive View

Keyless Biometric Authentication

Keyless specializes in advanced authentication technologies to help customers increase authentication assurance and decrease risks of data leakage. Keyless delivers passwordless au...

ev80414de

Executive View

NEXIS 4

NEXIS 4 implementiert intelligente Analytik für Rollen und Identitäten und Prozesse zum strategischen Lebenszyklusmanagement von Berechtigungen. Somit bietet NEXIS 4 eine Grundlage...

wp80131

Whitepaper

A different way to IGA: Leveraging the ServiceNow infrastruc...

IAM is evolving from traditional, on-premises solutions towards IDaaS (Identity as a Service), supporting the changing requirements to IAM as well as to deploying and operating IAM...

lc80511

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA, is characterized mainly by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...

wp80542

Whitepaper

Modular Decentralized Identity Architecture

A trend compelling IGA modernization is the need for an Identity driven security model; due to identity silos created by rapid cloud adoption. As organizations rethink their IAM/IG...

ev80435

Executive View

One Identity Manager On Demand

One Identity Manager On Demand is the IDaaS solution of the established One Identity Manager. It comes with feature-parity for all established IGA capabilities, including connector...

ev80327

Executive View

Atos Evidian IDaaS

Atos Evidian IDaaS Identity as-a-Service is a new IDaaS solution. In the current release, it is focused on Access Management, including MFA and Identity Federation, and Access Anal...

wp80439

Whitepaper

Verifiable Credentials for Secure Digital Identity

Verified, digital identity is a key foundation to digital transformation. Verifiable Credentials is an up-and-coming method to establish digital, verified identity in a highly secu...

ev80443

Executive View

Widas ID GmbH cidaas

Widas ID GmbH offers a complete cloud identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative...

lc80516de

Leadership Compass

Identity Governance & Administration 2021

Der Markt für Identity Governance und Administration (IGA) entwickelt sich durch tiefer integrierte Lösungen für Identity Lifecycle Management und Access Governance stetig weiter,...

wp80444

Whitepaper

Planning for a "Passwordless" future

Passwords have been beyond their "sell-by" date for over twenty years and managing the password lifecycle within an organisation comes at a large cost to any enterprise; passwords...

ev80147

Executive View

Kapstone Autonomous IGA

Due to the quickly changing landscape of IT environments, including hybrid IT infrastructure, the complexity of compliance requirements, siloed identity management, and the need to...

wp80442

Whitepaper

The Future of IAM Lies in the Cloud and as a Service

IAM software and tools have traditionally been installed and run on-premises by the organization itself. In recent years, the growth in identities operating across cloud and digita...

lc80516

Leadership Compass

Identity Governance & Administration 2021

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now i...

ev80414

Executive View

NEXIS 4

NEXIS 4 implements intelligent role and identity analytics together with strategic entitlement lifecycle management processes. As such, it provides the basis for dedicated, busines...

bc80792

Buyer's Compass

Providers of Verified Identity

It is no longer enough to create and secure user identities. Verifying that the identity does indeed describe the individual it was created for is a valuable capability in many use...

ev80544

Executive View

Strivacity Fusion

Strivacity Fusion is a multi-instance SaaS-based Consumer Identity and Access Management (CIAM) solution. Strivacity Fusion was built in the cloud using the modern micro-services a...

ev80153

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. NRI Sec...

ev80422

Executive View

Accenture Memority

Accenture Memority is an IDaaS solution supporting both Identity Lifecycle Management and Access Management use cases. It comes with full API support and positions itself as the fo...

wp80427

Whitepaper

RadiantOne: Identity Integration for Zero-Trust and Digital...

Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt ab...

wp80404

Whitepaper

Identity for the Business: Identity Fabrics supporting the D...

Business is changing fundamentally. Digital Services are the new normal, both as autonomous business models and accompanying physical goods. The connected vehicle and the changes i...

ev80434

Executive View

Synacor Cloud ID

Synacor offers Cloud ID as a highly capable and scalable Consumer Identity and Access Management (CIAM) solution for the consumer services and media streaming market. Their platfor...

ev80433

Executive View

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and pr...

wp80424

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Aut...

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex a...

lc80355

Leadership Compass

Privileged Access Management for DevOps

Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to ad...

ev80537

Executive View

HID Global Authentication Platform

HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuan...

wp80432de

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomo...

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben...

ev79051

Executive View

BeyondTrust Endpoint Privilege Management

Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware,...

lc80257

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your comp...

mc80515

Market Compass

IGA Solutions for ServiceNow Infrastructures

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Govern...

ev80428

Executive View

Atos DirX Audit

DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can anal...

ev80151

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, custo...

ev80248

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper...

ev80330

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...

lc80040

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...

ev80145

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...

ev80149

Executive View

ideiio

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...

ev80522

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...

bc80201

Buyer's Compass

Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...

ev80144

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...

lc80199

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...

ev80413

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...

lb80262

Leadership Brief

Recommendations for aligning ITSM with IAM/IGA

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...

bc80198

Buyer's Compass

Core Features of Privacy and Consent Management Solutions

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...

ev80417

Executive View

Cygna Auditor Platform

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...

ev80412

Executive View

Clear Skye IGA: IGA on the ServiceNow NOW platform

Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...

ev80329

Executive View

Auth0 Platform

Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...

ev80324

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80506

Executive View

Omada Identity Suite

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

wp80130

Whitepaper

IAM: Globalization & Large-Scale Enterprise

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...

lc80063

Leadership Compass

Identity Governance & Administration (IGA)

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...

wp80402

Whitepaper

Single Sign-On and Managed Access to all Applications from t...

With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...

wp80137

Whitepaper

Fast Access Management in the Hybrid Cloud for SMBs

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...

ev80399

Executive View

Hitachi ID IAM Suite

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...

lb80278

Leadership Brief

Managing Non-Human Identities

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...

lb80455

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...

lb72580

Leadership Brief

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...

ev80328

Executive View

iWelcome IDaaS and CIAM

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

lb80335

Leadership Brief

10 Top Trends in IAM

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...

mc80064

Market Compass

Decentralized Identity: Blockchain ID & Self-Sovereign Ident...

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...

ev80326

Executive View

Google's Cloud Identity

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...

lb80501

Leadership Brief

Leveraging Identity Fabrics on Your Way Towards Cloud Based...

Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

ev80174

Executive View

Callsign Intelligence Driven Authentication

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...

lb80353

Leadership Brief

Six Key Actions to Prepare for CCPA

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key a...

ev80168

Executive View

Onegini Connect

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expan...

wp80163

Whitepaper

Healthcare IAM: Enhance the Clinical Workflow

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...

ev80157

Executive View

Oracle Identity Governance

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...

lb80383

Leadership Brief

IAM for Robotic Process Automation: How to avoid Security Ch...

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...

ev80276

Executive View

Informatica Data Privacy Management

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable...

ev80112

Executive View

Sovrin Network Self-Sovereign Identity

Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship...

lb80272

Leadership Brief

Distributed Decentralized AI: Create, Share, Scale, Monetiz...

Using artificial intelligence services in combination can offer heightened results, whether it be in accuracy, robustness, customization, or geographical spread. Distributed, decen...

wp80136

Whitepaper

California Consumer Privacy Act: The Need for Data-Centric S...

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses...

an71303

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have t...

wp80165

Whitepaper

Digital Transformation for Business Enablement Requires a Mo...

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...

wp80170

Whitepaper

Modern Identity Fabrics: A Cornerstone of your Digital Stra...

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...

bc80050

Buyer's Compass

Decentralized Identity

Decentralized identity solutions - sometimes referred to as blockchain ID - are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and...

ev80028

Executive View

Identity Automation's RapidIdentity Solution

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...

ev80099

Executive View

IBM Decentralized Identity

The IBM Decentralized Identity platform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized...

lc80051

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...

ev80319

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...

ab72550

Architecture Blueprint

Identity and Access Management

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...

wp80135

Whitepaper

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...

ev79077

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

wp80123

Whitepaper

Privileged Access Management requirements for Small to Mediu...

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...

ev80070

Executive View

Devolutions PAM Solution

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...

lc80061

Leadership Compass

Consumer Authentication

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...

wp80048

Whitepaper

A Lean Approach on Identity & Access Governance

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approache...

wp80107

Whitepaper

Ein schlanker Ansatz für Identity & Access Governance

Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die A...

lb72548

Leadership Brief

How to set up your IAM organization

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...

wp80044

Whitepaper

Why Modern Enterprise IAM Must Be Rearchitected: Build Your...

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...

ev80066

Executive View

AdNovum NEVIS Security Suite

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable mai...

lb80204

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...

ev79065

Executive View

IBM Cloud Identity

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...

lc79012

Leadership Compass

Identity API Platforms

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT env...

ev80129

Executive View

Service Layers Managed IAM

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...

lc79016

Leadership Compass

IDaaS Access Management

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...

ev80071

Executive View

TrustBuilder Identity Hub

TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seam...

wp80134

Whitepaper

Do Identity Right - So Your Digital Business Strategy Succee...

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...

wp80029

Whitepaper

IAM for Healthcare: It’s time to act

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...

wp80075

Whitepaper

Radiant Logic and the Identity Integration Imperative

Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently....

ev79068

Executive View

Osirium Opus Privileged IT Process Automation

Osirium Opus is a specialized solution that focuses on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service N...

lb80105

Leadership Brief

Blockchain ID & Self Sovereign Identity

As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in com...

wp80043

Whitepaper

Identity Governance. The Value of Leveraging IGA Functions f...

With IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administratio...

an80111

Buyer's Compass

Consumer Identity and Access Management Solution

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requi...

ev80073

Executive View

One Identity Manager SAP Integration

One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The int...

ev80106

Executive View

Kleverware IAG

Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermö...

ev79072

Executive View

Ubisecure Identity Platform

Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, in...

ev79070

Executive View

ManageEngine AD360

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...

ev79079

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.2

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...

ev79071

Executive View

Simeio IAM for SMB

Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrator...

ev80060

Executive View

WSO2 Identity Server

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev80042

Executive View

Kleverware IAG

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rap...

ev80052

Executive View

Ilantus Compact Identity

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

ev79001

Executive View

SAP Customer Data Cloud

SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management. Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identit...

ev79083

Executive View

VeriClouds Identity Threat Protection Platform

Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against...

wp79081

Whitepaper

Balancing Security and Convenience: Identity Verification &...

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience...

ev79052

Executive View

Sphere Identity Platform

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support...

an71526

Buyer's Compass

Buyer's Guide: Identity-as-a-Service (IDaaS)

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance...

ev79048

Executive View

AWS Identity and Access Management

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...

ev79050de

Executive View

FSP Identity Governance & Administration Suite ORG

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning...

lc71135

Leadership Compass

Identity Governance & Administration

Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors...

ev70872

Executive View

Evidian Identity & Access Management

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...

ev79047

Executive View

CA Privileged Acces Management Suite

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...

ev70851

Executive View

ViewDS Cobalt

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...

ev79057

Executive View

WidasConcepts cidaas

WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...

ev79054

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...

ev79064

Executive View

1Kosmos BlockID

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well-thought-out and imple...

ev70367

Executive View

StealthINTERCEPT®

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, c...

ev79036

Executive View

Centrify Next-Gen Access Platform

Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...

ev79042

Executive View

One Identity Safeguard

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...

ev71052

Executive View

RSA® Identity Governance and Lifecycle

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all a...

lc71145

Leadership Compass

Access Governance & Intelligence

Leaders in innovation, product features, and market reach for access governance & intelligence. Delivering the capabilities for managing access entitlements, always knowing the sta...

ev79000

Executive View

Cayosoft Administrator v5

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...

lb72011

Leadership Brief

Product security as your biggest challenge: Start before it’...

The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. A...

an79045

Architecture Blueprint

Aligning Access Governance and Privilege Management

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...

ev70223

Executive View

Pirean Consumer IAM Platform

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...

ev70845

Executive View

RadiantOne: Radiant Logic’s Federated Identity Suite — It’s...

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important bui...

wp70364

Whitepaper

IAM for the Hybrid Reality. Efficiently Managing On-Premise...

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...

lc70303

Leadership Compass

Infrastructure as a Service – Global Providers

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...

wp70225

Whitepaper

Orchestrated Identity for Meeting IAM & CIAM Requirements

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...

top