Article No. / Date
Articles
ev70295

Executive View

Ping Identity Data Governance

In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply wi...

ev80159

Executive View

Curity Identity Server

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their sol...

lb72574

Leadership Brief

Top Cyber Threats

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...

wp80044

Whitepaper

Why modern Enterprise IAM must be rearchitected: Build your...

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...

lc79012

Leadership Compass

Identity API Platforms

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT env...

wp80297

Whitepaper

Identitäten richtig handhaben - damit Ihre digitale Geschäft...

Registrierung und Authentifizierung sind die ersten Schritte, die erfolgen, wenn ein Nutzer Kunde digitaler Dienstleistungen werden möchte. Funktionieren diese Schritte nicht wie v...

wp80134

Whitepaper

Do Identity Right - So Your Digital Business Strategy Succee...

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...

ev80154

Executive View

Symphonic – Intelligent Authorization

There are several trends that continue to make the use of identity information for access control more complex. The prevalence of smartphones as the end-user client of choice, the...

wp80049

Whitepaper

ForgeRock Identity Platform for PSD2 & API Security

The Revised Payment Service Directive (PSD2) promises to make the European Union (EU) cross-border transactions further transparent, faster and more secure while increasing competi...

wp80019

Whitepaper

The Dark Side of the API Economy

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything...

ev80060

Executive View

WSO2 Identity Server

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...

ev71309

Executive View

Bromium Secure Platform 4.1

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user beh...

ev80030

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophistic...

ev72525

Executive View

Senrio Insight

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...

lb72596

Leadership Brief

Securing PSD2 APIs

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs) and Payment Initiation Service Providers (PISPs) to...

ev70930

Executive View

Forum Sentry API Security Gateway

Forum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by...

ev70337

Executive View

OpenIAM Identity and Access Management

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SS...

top