Article No. / Date
Articles
ev80330

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...

lc80040

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...

ev80055

Executive View

Cisco Zero Trust Security

Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional secu...

ev80395

Executive View

Cherwell ITSM

Cherwell ITSM is a comprehensive IT Service Management application that can be installed on premise or in the cloud and is built on top of the Cherwell CORE platform – a low-code,...

ev80146

Executive View

ARCON PAM SaaS

Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a...

ev80145

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...

ev80426

Executive View

Illusive Platform

Illusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture f...

an70946

Advisory Note

The Role of APIs for Business

An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accusto...

ev80229

Executive View

IBM QRadar Advisor with Watson

QRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dr...

wp80419de

Whitepaper

Geistiges Eigentum schützen und gleichzeitig geschäftliche A...

Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirts...

wp80138

Whitepaper

Privileged Access Management solutions for Agile, multi-clou...

Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to...

ev80405

Executive View

Oracle APEX – secure low-code application development platfo...

Oracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, stor...

ev80149

Executive View

ideiio

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...

lc70309

Leadership Compass

Enterprise Databases in the Cloud

This Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as da...

lc80016

Leadership Compass

Security Orchestration Automation and Response (SOAR)

This report provides an overview of the SOAR market and provides you with a compass to help you to find the solution that best meets your needs. We examine the SOAR market segment,...

wp80419

Whitepaper

Protecting Intellectual Properties while enabling business a...

Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run in...

wp80403

Whitepaper

Safeguarding Your Most Valuable Data: Five Key Criteria to A...

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

ab72551

Architecture Blueprint

Architecting your Security Operations Centre

A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect...

ev80175

Executive View

Oxyliom Solutions GAÏA Advanced Identity Management

The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory complianc...

ev80148

Executive View

Commvault Complete™ Data Protection

Business continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support tod...

ev80522

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...

ev80420de

Executive View

R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz...

Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePo...

ev80416

Executive View

Fudo PAM by Fudo Security

Fudo Security’s PAM solution is the company’s primary product in the expanding PAM market. In the last few years PAM has evolved into a set of targeted technologies that addresses...

mc80079

Market Compass

Cloud Access Security Brokers

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broke...

lb72583

Leadership Brief

Working for the Business, not the Auditors

Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicab...

ev80421

Executive View

Atos DirX Directory

Atos DirX Directory is one of the few enterprise-grade directory services in the market, delivering a high-performance, high-scalability, high-availability, and high-secure impleme...

ev80420

Executive View

R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz...

Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms...

ev80418

Executive View

SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a...

bc80201

Buyer's Compass

Buyer’s Compass: Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...

lb80364

Leadership Brief

Status and Advantages of Small Data Machine Learning Paradig...

Consider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, so...

ev80144

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...

ev80321

Executive View

IdentityIQ – SailPoint

IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, t...

ev80312

Executive View

CyberArk

Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation...

ev80141

Executive View

ManageEngine Log360

Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...

ev80143

Executive View

Radware Kubernetes WAF

Containerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers....

lb80393

Leadership Brief

The Role of AI in Modern Business Intelligence Platforms

Business intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expan...

lc80199

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...

lc80098

Leadership Compass

Access Governance & Intelligence

The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providin...

lb80262

Leadership Brief

Recommendations for aligning ITSM with IAM/IGA

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...

lb80376

Leadership Brief

The Information Protection Life Cycle and Framework: Deceive

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80413

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...

ev80173de

Executive View

Password Safe von MATESO

Password Safe von MATESO ist eine Lösung für das zentrale, unternehmensweite Management von Kennwörtern und anderen „Secrets“ und die Überwachung und Kontrolle von deren Nutzung. D...

bc80198

Buyer's Compass

Buyer’s Compass: Core Features of Privacy and Consent Manage...

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...

ev80124fr

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droi...

ev80124de

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die...

ev80417

Executive View

Cygna Auditor Platform

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...

ev80415

Executive View

BioCatch

BioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which...

lb72012

Leadership Brief

Join the dots: Operational Technology and Informational Tech...

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technol...

lb72013

Leadership Brief

Information Rights Management – Ready for Prime Time?

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...

lb72017de

Leadership Brief

Prioritäten in der SAP-Sicherheit

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedro-hungsgrad be...

lb80344

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose n...

ev80291

Executive View

Adobe: Experience Cloud

When optimizing customer centricity and customer journeys across all touchpoints, automation is key. Various aspects have to be considered in order to create an individual and fit-...

lb80377

Leadership Brief

The Information Protection Life Cycle and Framework: Dispose

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

mc80508

Market Compass

Endpoint Protection, Detection, and Response

The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much i...

ev71531

Executive View

Centrify for Big Data

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.

an71601

Advisory Note

Blockchain Impact on the Financial Industry

The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within t...

ev71511

Executive View

Gurucul Predictive Risk Analytics

Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that...

ev80412

Executive View

Clear Skye IGA: IGA on the ServiceNow NOW platform

Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...

mc71165

Market Compass

IT-GRC Tools

The KuppingerCole Market Compass provides an overview of the product or service offerings in the IT-GRC Tools market. As organizations continue to embrace digital technologies, an...

ev80329

Executive View

Auth0 Platform

Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...

lb80478

Leadership Brief

Wie wir Passwörter loswerden – Noch Heute

Die IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dies...

mc71144

Market Compass

Dynamic Authorization Management

The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Managem...

lb80476

Leadership Brief

Security Fabric: A Methodology for Architecting a Secure Fut...

Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is co...

ev71263

Executive View

Intralinks VIA®

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when acce...

ev80161

Executive View

NRI Secure Technologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...

ev70842

Executive View

YubiKey by Yubico

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography wit...

ev80324

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...

lb80373

Leadership Brief

The Information Protection Life Cycle and Framework: Secure

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80407

Executive View

CSI tools

CSI tools provide a suite of solutions for managing access entitlements and risk in SAP environments. The solution come with a modern, web-based user interface and dashboarding. Th...

lb71036

Leadership Brief

Enterprise Information Protection

The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and b...

lb80375

Leadership Brief

The Information Protection Life Cycle and Framework: Contain...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

bc80200

Buyer's Compass

Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

mc80217

Market Compass

Enterprise Information Protection

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers Enterprise Information Protection...

lc80126

Leadership Compass

Network Detection and Response

This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your...

lc70314

Leadership Compass

Unified Endpoint Management (UEM)

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...

wp80510

Whitepaper

Fortgeschrittene Privileged Access Management Lösungen

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Sicherheit in jeder Organisation. Sich ändernde Geschäftspraktiken, agile Softwa...

ev80140

Executive View

ManageEngine PAM360

In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological chang...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80103

Executive View

Micro Focus Identity Governance

Identity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the mod...

ev80505

Executive View

IBM Watson OpenScale

IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deplo...

mc80384

Market Compass

Conversational AI Building Platforms

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platfor...

ev80506

Executive View

Omada Identity Suite

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

mc71176

Market Compass

Cloud Backup and Disaster Recovery

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers solutions that provide backup, re...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

ev80139de

Executive View

SentinelOne Singularity Platform

Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...

ev80139

Executive View

SentinelOne Singularity Platform

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...

ev80406

Executive View

Thycotic Access Controller

Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that add...

ev80331

Executive View

Symantec Privileged Access Manager

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...

ev80310

Executive View

One Identity Manager

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experien...

ev80158

Executive View

Nexis Controle 3.4

Nexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

lb80234

Leadership Brief

How to Get Rid of Passwords - Today

The IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This lea...

lc80104

Leadership Compass

Access Control Tools for SAP Environments

This report provides an overview of the market for Access Control Tools for SAP Environments and provides you with a compass to help you to find the solution that best meets your n...

wp80130

Whitepaper

IAM: Globalization & Large-Scale Enterprise

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...

lc80088

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

ev80124

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitleme...

wp80402

Whitepaper

Single Sign-On and Managed Access to all Applications from t...

With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...

lc80063

Leadership Compass

Identity Governance & Administration (IGA)

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...

an71125

Advisory Note

Integrating security into an agile DevOps paradigm

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing...

ev71572

Executive View

Balabit Blindspotter

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

ev80232

Executive View

IBM Watson

IBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilit...

ev71571

Executive View

Balabit syslog-ng

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the st...

ev71570

Executive View

Balabit Shell Control Box

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a t...

ev71181

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...

ev71540

Executive View

CyberArk Privileged Threat Analytics

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system ac...

lb72001

Leadership Brief

The 5 Biggest IAM Myths

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...

lb72007

Leadership Brief

Cloud SSO is not sufficient: What else do you need?

Cloud-based identity services have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need.

ev80113

Executive View

Soterion for SAP

Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both o...

wp80137

Whitepaper

Fast Access Management in the Hybrid Cloud for SMBs

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...

ev71509

Executive View

Universal SSH Key Manager

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms an...

ev71507

Executive View

PingAccess

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web...

ev70894

Executive View

One Identity Manager v7.0.1

One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...

lb80223

Leadership Brief

Mitigating Availability & Security Risks in Centralized Dig...

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised...

ev80399

Executive View

Hitachi ID IAM Suite

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...

wp80176

Whitepaper

Enhanced Privilege Access Management Solutions

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development a...

ev71117

Executive View

SAP HANA Enterprise Cloud – Security and Compliance

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

lb80374

Leadership Brief

The Information Protection Life Cycle and Framework: Monitor...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80227

Executive View

Sophos Intercept X

Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced d...

ev80178

Executive View

Indeed Certificate Manager

Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote mana...

lb80278

Leadership Brief

Managing Non-Human Identities

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...

ev71306

Executive View

Balabit Contextual Security Intelligence Platform

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and repla...

an80265

Advisory Note

Emerging Technologies Fostering Digital Business Innovation:...

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids a...

ev80400de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds...

ev71094

Executive View

AdNovum Nevis Security Suite

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance pro...

ev71318

Executive View

ForgeRock Identity Gateway

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things.

ev80230

Executive View

Vectra Cognito

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning...

lb80372

Leadership Brief

The Information Protection Life Cycle and Framework: Control...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80455

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...

lb80371

Leadership Brief

The Information Protection Life Cycle and Framework: Acquire...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev71313

Executive View

IRM-Prot-On

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection...

ev80311

Executive View

Micro Focus Access Manager

The Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the prod...

ev80400

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...

ev80122

Executive View

CyberArk Privilege Cloud

Privileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transfor...

lb72580

Leadership Brief

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...

wp80120

Whitepaper

AI, Machine Learning and Privileged Access Management

Choosing a PAM solution has become a complex, and potentially time consuming, decision for modern organizations but one they must get right. If trends such as customer identities o...

ev80328

Executive View

iWelcome IDaaS and CIAM

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...

lc80127

Leadership Compass

Fraud Reduction Intelligence Platforms

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your need...

ev71550

Executive View

Microsoft Azure Active Directory

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage b...

ev71325

Executive View

Auth0 Authentication Service

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single iden...

ev71557

Executive View

IBM Privileged Identity Manager

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80292

Leadership Brief

Beyond Marketing: The Future of Customer Interaction

Customer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as...

ev71319

Executive View

SailPoint IdentityIQ

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...

bc80215

Buyer's Compass

API Management and Security

The complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you wi...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

ev80001

Executive View

Exabeam Security Management Platform

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrate...

an71603

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algori...

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

an70361

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...

top