Buyer's Compass
Buyer’s Compass: Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with que...
Leadership Compass
Datenbank- und Big-Data-Sicherheit
Dieser Leadership Compass bietet einen Überblick über den Markt für Datenbank- und Big-Data-Sicherheitslösungen sowie einen Leitfaden und Empfehlungen für die Wahl von denjenigen P...
Executive View
Cysiv SOCaaS
Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ing...
Buyer's Compass
Buyer’s Compass: SOAR
Security Orchestration Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole...
Advisory Note
Identity Authentication Standards
Authentication is a core component of Identity and Access Management (IAM) Solutions and central to the security and management of modern organizations. For many years, the industr...
Whitepaper
Identity Governance Herausforderungen mit ForgeRock Autonomo...
Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben...
Executive View
HID Global Authentication Platform
HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuan...
Leadership Compass
Privileged Access Management for DevOps
Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to ad...
Leadership Compass
Enterprise Authentication Solutions
This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We e...
Whitepaper
Overcoming Identity Governance Challenges with ForgeRock Aut...
Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex a...
Executive View
BeyondTrust Endpoint Privilege Management
Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware,...
Leadership Compass
Access Management
This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your comp...
Buyer's Compass
Identity Governance & Administration (IGA)
Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intell...
Market Compass
IGA Solutions for ServiceNow Infrastructures
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Govern...
Market Compass
SOC as a Service
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as...
Executive View
BMC Helix ITSM
BMC Helix ITSM is flexible, scalable and secure IT Service Management application built on top of a no-code platform enables organizations create their own custom apps. BMC Helix I...
Whitepaper
Technical Approaches to Consent Management and Dynamic Acces...
Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from...
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data prote...
Whitepaper
Leveraging Your Organization's Expertise: Departmental IAM...
To benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and mai...
Market Compass
Digital Workplace Delivery Platforms
The KuppingerCole Market Compass Workplace Delivery covers solutions that assist organizations in managing applications and data that end users access from a “single pane of glass...
Executive View
SAP Enterprise Threat Detection
In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...
Executive View
SecurEnds Credential Entitlement Management
Due to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. Se...
Executive View
Datamatics TruBot
Datamatics TruBot is a multi-skilled low-code Robotic Process Automation (RPA) solution for automating high volume repetitive tasks and processes. Datamatics currently provides RPA...
Executive View
Simeio Identity Orchestrator
Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, custo...
Executive View
Atos DirX Audit
DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can anal...
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper...
Advisory Note
Redefining Access Governance: A broader perspective
Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory complianc...
Executive View
Elastic Security
Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monit...
Executive View
Ping Identity’s PingFederate
PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...
Leadership Compass
CIAM Platforms
This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...
Executive View
Cisco Zero Trust Security
Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional secu...
Executive View
Cherwell ITSM
Cherwell ITSM is a comprehensive IT Service Management application that can be installed on premise or in the cloud and is built on top of the Cherwell CORE platform – a low-code,...
Executive View
ARCON PAM SaaS
Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a...
Executive View
BigID
In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...
Executive View
Illusive Platform
Illusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture f...
Advisory Note
The Role of APIs for Business
An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accusto...
Executive View
IBM QRadar Advisor with Watson
QRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dr...
Whitepaper
Geistiges Eigentum schützen und gleichzeitig geschäftliche A...
Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirts...
Whitepaper
Privileged Access Management Solutions for Agile, Multi-Clou...
Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to...
Executive View
Oracle APEX – Secure Low-Code Application Development Platfo...
Oracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, stor...
Executive View
ideiio
Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...
Leadership Compass
Enterprise Databases in the Cloud
This Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as da...
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and provides you with a compass to help you to find the solution that best meets your needs. We examine the SOAR market segment,...
Whitepaper
Protecting Intellectual Properties While Enabling Business A...
Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run in...
Whitepaper
Safeguarding Your Most Valuable Data: Five Key Criteria to A...
This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.
Architecture Blueprint
Architecting your Security Operations Centre
A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect...
Executive View
Oxyliom Solutions GAÏA Advanced Identity Management
The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory complianc...
Executive View
Commvault Complete™ Data Protection
Business continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support tod...
Executive View
UNITY: IGA Modernization Framework by Persistent
Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...
Executive View
R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz...
Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePo...
Executive View
Fudo PAM by Fudo Security
Fudo Security’s PAM solution is the company’s primary product in the expanding PAM market. In the last few years PAM has evolved into a set of targeted technologies that addresses...
Market Compass
Cloud Access Security Brokers
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broke...
Leadership Brief
Working for the Business, not the Auditors
Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicab...
Executive View
Atos DirX Directory
Atos DirX Directory is one of the few enterprise-grade directory services in the market, delivering a high-performance, high-scalability, high-availability, and high-secure impleme...
Executive View
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz...
Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms...
Executive View
SAP Cloud Identity Access Governance
SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a...
Buyer's Compass
Buyer’s Compass: Access Management
Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...
Leadership Brief
Status and Advantages of Small Data Machine Learning Paradig...
Consider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, so...
Executive View
SecZetta Third-Party Identity Risk Solution
Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...
Executive View
IdentityIQ – SailPoint
IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, t...
Executive View
CyberArk
Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation...
Executive View
ManageEngine Log360
Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...
Executive View
Radware Kubernetes WAF
Containerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers....
Leadership Brief
The Role of AI in Modern Business Intelligence Platforms
Business intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expan...
Leadership Compass
Privacy and Consent Management
This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...
Leadership Compass
Access Governance & Intelligence
The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providin...
Leadership Brief
Recommendations for aligning ITSM with IAM/IGA
The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...
Leadership Brief
The Information Protection Life Cycle and Framework: Deceive
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Executive View
One Identity Active Roles
One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...
Executive View
Password Safe von MATESO
Password Safe von MATESO ist eine Lösung für das zentrale, unternehmensweite Management von Kennwörtern und anderen „Secrets“ und die Überwachung und Kontrolle von deren Nutzung. D...
Buyer's Compass
Buyer’s Compass: Core Features of Privacy and Consent Manage...
Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...
Executive View
SailPoint Predictive Identity
SailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droi...
Executive View
SailPoint Predictive Identity
SailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die...
Executive View
Cygna Auditor Platform
The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...
Executive View
BioCatch
BioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which...
Leadership Brief
Join the dots: Operational Technology and Informational Tech...
One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technol...
Leadership Brief
Information Rights Management – Ready for Prime Time?
Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...
Leadership Brief
Prioritäten in der SAP-Sicherheit
Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedro-hungsgrad be...
Leadership Brief
Incident Response Management
The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose n...
Executive View
Adobe: Experience Cloud
When optimizing customer centricity and customer journeys across all touchpoints, automation is key. Various aspects have to be considered in order to create an individual and fit-...
Leadership Brief
The Information Protection Life Cycle and Framework: Dispose
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Market Compass
Endpoint Protection, Detection, and Response
The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much i...
Executive View
Centrify for Big Data
Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.
Advisory Note
Blockchain Impact on the Financial Industry
The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within t...
Executive View
Gurucul Predictive Risk Analytics
Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that...
Executive View
Clear Skye IGA: IGA on the ServiceNow NOW platform
Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...
Market Compass
IT-GRC Tools
The KuppingerCole Market Compass provides an overview of the product or service offerings in the IT-GRC Tools market. As organizations continue to embrace digital technologies, an...
Executive View
Auth0 Platform
Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...
Leadership Brief
Wie wir Passwörter loswerden – Noch Heute
Die IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dies...
Market Compass
Dynamic Authorization Management
The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Managem...
Leadership Brief
Security Fabric: A Methodology for Architecting a Secure Fut...
Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is co...
Executive View
Intralinks VIA®
Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when acce...
Executive View
NRI Secure Technologies: Uni-ID Libra 2.4
Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...
Executive View
YubiKey by Yubico
YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography wit...
Executive View
Symantec Identity Governance and Administration
In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...
Analyst Advice
Business Resilience Management (Crisis Roadmap for Beginners...
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Leadership Brief
The Information Protection Life Cycle and Framework: Secure
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Executive View
CSI tools
CSI tools provide a suite of solutions for managing access entitlements and risk in SAP environments. The solution come with a modern, web-based user interface and dashboarding. Th...
Leadership Brief
Enterprise Information Protection
The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and b...
Leadership Brief
The Information Protection Life Cycle and Framework: Contain...
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Buyer's Compass
Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...
Market Compass
Enterprise Information Protection
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers Enterprise Information Protection...
Leadership Compass
Network Detection and Response
This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your...
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...
Whitepaper
Fortgeschrittene Privileged Access Management Lösungen
Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Sicherheit in jeder Organisation. Sich ändernde Geschäftspraktiken, agile Softwa...
Executive View
ManageEngine PAM360
In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological chang...
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...
Executive View
Micro Focus Identity Governance
Identity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the mod...
Executive View
IBM Watson OpenScale
IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deplo...
Market Compass
Conversational AI Building Platforms
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platfor...
Executive View
Omada Identity Suite
Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...
Market Compass
Cloud Backup and Disaster Recovery
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers solutions that provide backup, re...
Executive View
Ilantus Compact Identity
IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...
Executive View
SentinelOne Singularity Platform
Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...
Executive View
SentinelOne Singularity Platform
SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...
Executive View
Thycotic Access Controller
Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that add...
Executive View
Symantec Privileged Access Manager
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...
Executive View
One Identity Manager
One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experien...
Executive View
Nexis Controle 3.4
Nexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...
Leadership Brief
How to Get Rid of Passwords - Today
The IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This lea...
Leadership Compass
Access Control Tools for SAP Environments
This report provides an overview of the market for Access Control Tools for SAP Environments and provides you with a compass to help you to find the solution that best meets your n...
Whitepaper
IAM: Globalization & Large-Scale Enterprise
Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...
Executive View
SailPoint Predictive Identity
SailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitleme...
Whitepaper
Single Sign-On and Managed Access to all Applications from t...
With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...
Leadership Compass
Identity Governance & Administration (IGA)
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...
Advisory Note
Integrating security into an agile DevOps paradigm
Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing...
Executive View
Balabit Blindspotter
Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.
Executive View
IBM Watson
IBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilit...
Executive View
Balabit syslog-ng
The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the st...
Executive View
Balabit Shell Control Box
Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a t...
Executive View
SAP Enterprise Threat Detection
In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...
Executive View
CyberArk Privileged Threat Analytics
CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system ac...
Leadership Brief
The 5 Biggest IAM Myths
Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...
Leadership Brief
Cloud SSO is not sufficient: What else do you need?
Cloud-based identity services have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need.
Executive View
Soterion for SAP
Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both o...
Whitepaper
Fast Access Management in the Hybrid Cloud for SMBs
Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...
Executive View
Universal SSH Key Manager
Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms an...
Executive View
PingAccess
PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web...
Executive View
One Identity Manager v7.0.1
One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...
Leadership Brief
Mitigating Availability & Security Risks in Centralized Dig...
Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised...
Executive View
Hitachi ID IAM Suite
Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...
Whitepaper
Enhanced Privilege Access Management Solutions
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development a...
Executive View
SAP HANA Enterprise Cloud – Security and Compliance
An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.
Leadership Brief
The Information Protection Life Cycle and Framework: Monitor...
The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...
Executive View
Sophos Intercept X
Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced d...
Executive View
Indeed Certificate Manager
Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote mana...
Leadership Brief
Managing Non-Human Identities
As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...
Executive View
Balabit Contextual Security Intelligence Platform
Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and repla...