Article No. / Date
Articles
ev80319

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...

wp80135

Whitepaper

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...

lc80051

Leadership Compass

Identity as a Service (IDaaS) - IGA

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the applicat...

ab72550

Architecture Blueprint

Identity and Access Management

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...

ev79067

Executive View

IBM MaaS360 with Watson

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops,...

lc80035

Leadership Compass

Infrastructure as a Service – Global Providers

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...

wp80302

Whitepaper

Understanding Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to...

bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

ev80167

Executive View

Atos DirX Access

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive su...

ev70337

Executive View

OpenIAM Identity and Access Management

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SS...

ev70295

Executive View

Ping Identity Data Governance

In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply wi...

ev80074

Executive View

One Identity Safeguard Suite

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital...

ev70345

Executive View

Axiomatics Data Security

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute...

lb72008

Leadership Brief

Why Adaptive Authentication Is A Must

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devi...

wp70360

Whitepaper

Moving towards a holistic Cyber Risk Governance approach

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more...

ev71321

Executive View

Entrust IdentityGuard for Enterprise

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterpri...

ev79077

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

lb80271

Leadership Brief

Hype vs. Reality in AI & ML: Where are the Concrete Business...

The conversation on artificial intelligence and machine learning is still largely driven by hype. But concrete business benefits exist for narrow AI solutions, and it is time to se...

lb80235

Leadership Brief

Defending Against Ransomware

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layere...

wp73000

Whitepaper

The Effect of GDPR on Customer Relations

The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and...

wp72613

Whitepaper

Protecting the keys to your kingdom against cyber-attacks an...

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...

wp70327de

Whitepaper

Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Ma...

Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogene...

ev71702

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Govern...

ev70275

Executive View

BeyondTrust PowerBroker PAM

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...

ev70613

Executive View

ManageEngine Password Manager Pro

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution...

ev70930

Executive View

Forum Sentry API Security Gateway

Forum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by...

lb70359

Leadership Brief

Penetration Testing Done Right

Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious act...

lc71139

Leadership Compass

Identity Provisioning

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT envi...

an72557

Advisory Note

Maturity Level Matrix for GDPR Readiness

KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current sta...

ev70270

Executive View

STEALTHbits® Products Overview

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions...

ev70262

Executive View

AlgoSec Security Management Suite

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across...

wp80123

Whitepaper

Privileged Access Management requirements for Small to Mediu...

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...

ev80162

Executive View

Optimal IdM - OptimalCloud

For many organizations, the adoption of cloud services has become a strategic imperative which includes moving security services to the cloud as well. Optimal IdM provides a compre...

wp70328

Whitepaper

Meeting PSD2 Challenges with Ergon Airlock Suite

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service provide...

ev72510

Executive View

ERPScan Smart Cybersecurity Platform for SAP

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP security that leverages machine learning. By addressing predictive, preventive, detec...

ev71330

Executive View

Duo Security

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user...

ev70252

Executive View

Ilantus IDaaS Next

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on...

ev70836

Executive View

Osirium: Privileged Access Management

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of...

ev70363

Executive View

BeyondTrust PowerBroker for Unix & Linux

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for...

ev70615

Executive View

Symantec CloudSOC™

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev70363de

Executive View

BeyondTrust PowerBroker for Unix & Linux

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowo...

ev70272

Executive View

SAP HANA Platform Security

SAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It...

ev70323

Executive View

RSA SecurID® Access

RSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integra...

ev70964

Executive View

Oracle Autonomous Database

Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provid...

ev80159

Executive View

Curity Identity Server

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their sol...

lc71172

Leadership Compass

Enterprise Endpoint Security: Anti-Malware Solutions

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product...

ev70840

Executive View

VMware AppDefense

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelli...

ev80070

Executive View

Devolutions PAM Solution

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a passwo...

an72563

Advisory Note

How to Assure Cloud Services

This report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to as...

ev80219

Executive View

AWS Control Tower

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern i...

ev80160

Executive View

Tremolo Security - A Different Approach

It’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain...

an80301

Advisory Note

Demystifying the Blockchain: What Makes a Blockchain Useful...

Blockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from...

an72561

Advisory Note

Cloud Services and Security

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and...

wp70368

Whitepaper

Meeting GDPR Challenges with Delphix

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance. Compliance requires costly controls tha...

wp70368de

Whitepaper

GDPR Herausforderungen mit Delphix meistern

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-...

ev71514

Executive View

Imprivata

On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from C...

ev70346

Executive View

Axiomatics APS

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS...

an72564

Advisory Note

Security Organization, Governance, and the Cloud

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overvi...

ev70263

Executive View

UNIFY Identity Broker

With today's ever-growing IT requirements for integrations between identity sources, applications and services whether on-premise, the cloud, or hybrid environments, an advanced id...

an80263

Advisory Note

The Future of Cryptocurrencies

Cryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread a...

ev72540

Executive View

Exploring the Microsoft Azure Information Protection Landsca...

Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; in...

wp70225

Whitepaper

Orchestrated Identity for Meeting IAM & CIAM Requirements

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...

ev71314

Executive View

Micro Focus Privileged Account Manager

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user ac...

lb72548

Leadership Brief

How to set up your IAM organization

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...

ev79002

Executive View

inWebo 2FA Platform

inWebo offers a cloud-based Two-Factor Authentication (2FA) solution, with some unique and proprietary authentication methods that can be less obtrusive and more user-friendly. The...

ev70950

Executive View

ARCON Privilege Account Management Suite

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privi...

wp70364

Whitepaper

IAM for the Hybrid Reality. Efficiently Managing On-Premise...

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...

ev70845

Executive View

RadiantOne: Radiant Logic’s Federated Identity Suite — It’s...

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important bui...

ev79030

Executive View

Cleafy

Cleafy is an integrated real-time clientless threat detection and prevention platform for online services in highly regulated industries, providing protection against advanced targ...

wp80044

Whitepaper

Why modern Enterprise IAM must be rearchitected: Build your...

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...

ev70223

Executive View

Pirean Consumer IAM Platform

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...

ev70965

Executive View

Oracle Database Security Assessment

This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional da...

ev70366

Executive View

StealthDEFEND®

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND i...

an79045

Advisory Note / Architecture Blueprint

Aligning Access Governance and Privilege Management

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...

wp79028

Whitepaper

Wertvolle Daten kennen, schützen und besser nutzen – die Cha...

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch C...

ev79031

Executive View

Onegini Connect

Onegini provides a compelling solution for Consumer Identity and Access Management (CIAM). Onegini is headquartered in Europe and has global ambitions. They have expertise in EU...

ev79000

Executive View

Cayosoft Administrator v5

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release add...

ev79029

Executive View

Varonis DatAdvantage

Getting a grip on your data is a bigger challenge than ever before. While solutions for central IT environments such as SAP are quite established, a significant portion of critical...

ev80054

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...

ev80045

Executive View

Uniken REL-ID Security Platform

When it comes to omni-channel and multi-device marketing and commerce, authentication is an important topic. The challenge is to achieve both security and the user experience as pa...

lc80061

Leadership Compass

Consumer Authentication

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...

an72562

Advisory Note / Buyer's Guide

Hybrid Cloud Services – A Buyer’s Guide

Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions...

ev71052

Executive View

RSA® Identity Governance and Lifecycle

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all a...

ev79042

Executive View

One Identity Safeguard

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...

ev79056

Executive View

Deep Secure Content Threat Removal Platform

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while elim...

ev79036

Executive View

Centrify Next-Gen Access Platform

Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...

ev70367

Executive View

StealthINTERCEPT®

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, c...

ev79063

Executive View

MinerEye Data Tracker

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and anal...

ev79064

Executive View

1Kosmos BlockID

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well-thought-out and imple...

ev79054

Executive View

Semperis Directory Services Protector for Active Directory

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Prot...

ev79037

Executive View

CipherCloud CASB+

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev79057

Executive View

WidasConcepts cidaas

WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...

ev72525

Executive View

Senrio Insight

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive non-intrusive network device discovery to provide visibility and analytics of industrial device behavio...

ev70851

Executive View

ViewDS Cobalt

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...

ev70362

Executive View

TechDemocracy Intellicta

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience...

ev79047

Executive View

CA Privileged Acces Management Suite

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...

ev79010

Executive View

Delphix Dynamic Data Platform

Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance vi...

ev79010de

Executive View

Delphix Dynamic Data Platform

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie ko...

lb80303

Leadership Brief

PSD2: New business opportunities and risks

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for...

wp79062

Whitepaper

Preparing for PSD2 technical requirements using RSA solution...

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service provide...

ev79038

Executive View

ObserveIT Insider Threat Management

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...

ev70872

Executive View

Evidian Identity & Access Management

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...

ev79040

Executive View

United Security Providers Secure Entry Server

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authenticatio...

wp79058

Whitepaper

Overcoming PSD2 Challenges with Onegini Connect

Many changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential bene...

wp79046

Whitepaper

Governance for all data: Get a grip on unstructured data

While many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they...

ev79050de

Executive View

FSP Identity Governance & Administration Suite ORG

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning...

ev72505

Executive View

Zscaler Security-as-a-Service Platform

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, includi...

ev79035

Executive View

Securonix Cloud SIEM and UEBA

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analy...

ev79048

Executive View

AWS Identity and Access Management

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...

ev79049

Executive View

ThreatMetrix Digital Identity Network, powered by ThreatMetr...

ThreatMetrix, a LexisNexis Risk Solutions Company, is a global fraud, identity and authentication company, helping customers deliver a unified experience across their digital cust...

ev80066

Executive View

AdNovum NEVIS Security Suite

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable mai...

ev79066

Executive View

IBM Security Access Manager (ISAM)

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access...

ev79052

Executive View

Sphere Identity Platform

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support...

ev70370

Executive View

Saviynt Identity Governance and Administration (IGA)

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User...

an80018

Advisory Note / Buyer's Guide

Buyer’s Guide: Marketing Automation Systems and GDPR Readine...

Marketing automation systems are key when it comes to digital or omni-channel marketing. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria t...

ev80156

Executive View

Oracle Identity Cloud Service

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around s...

wp79081

Whitepaper

Balancing Security and Convenience: Identity Verification &...

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience...

ev80053

Executive View

Radiflow SCADA Security Suite

Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligen...

wp80155

Whitepaper

Oracle Identity Cloud Service: Identity for Business Applica...

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...

ev80154

Executive View

Symphonic – Intelligent Authorization

There are several trends that continue to make the use of identity information for access control more complex. The prevalence of smartphones as the end-user client of choice, the...

ev80128

Executive View

Xton Technologies Access Manager

Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared...

ev79065

Executive View

IBM Cloud Identity

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...

lb80204

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...

wp80134

Whitepaper

Do Identity Right - So Your Digital Business Strategy Succee...

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptan...

wp80015

Whitepaper

Privileged Access Governance

Privileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of pri...

lb79026

Leadership Brief

Marketing Chatbots and GDPR

Chatbots are a recent trend in marketing automation, designed to enhance customers’ digital journeys and elicit more information from consumers. This report evaluates the impact of...

wp80194

Whitepaper

KRITIS - Kritische Infrastrukturen verstehen und schützen

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unter...

wp80065

Whitepaper

KRITIS – Understanding and protecting critical infrastructur...

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensiv...

lb70222

Leadership Brief

A Practical Approach to Enterprise Security Architecture (ES...

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected...

lb79027

Leadership Brief

The Anti-Malware Requirement in PSD2

The Revised Payment Service Directive (PSD2) mandates that service providers evaluate transaction requests for signs of malware infection. In order for transactions to be considere...

lb72596

Leadership Brief

Securing PSD2 APIs

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs) and Payment Initiation Service Providers (PISPs) to...

lb72011

Leadership Brief

Product security as your biggest challenge: Start before it’...

The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. A...

lb80195

Leadership Brief

Access Reviews Done Right

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum...

lc79012

Leadership Compass

Identity API Platforms

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT env...

ev80071

Executive View

TrustBuilder Identity Hub

TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seam...

lb80209

Leadership Brief

Responding to Cyber Incidents

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protec...

lb80296

Leadership Brief

Do I need Network Threat Detection & Response (NDTR)?

NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reason...

ev80193

Executive View

Micro Focus® Data Protector

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT s...

ev80076

Executive View

Oracle Data Safe

Oracle Data Safe is a cloud-based service that improves Oracle database security by identifying risky configuration, users and sensitive data, which allows customers to closely mon...

ev80181

Executive View

ESET Endpoint Security

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent...

lb72573

Leadership Brief

How to get a Grip on OT Cybersecurity

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT...

lb72574

Leadership Brief

Top Cyber Threats

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...

ev80129

Executive View

Service Layers Managed IAM

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...

wp80297

Whitepaper

Identitäten richtig handhaben - damit Ihre digitale Geschäft...

Registrierung und Authentifizierung sind die ersten Schritte, die erfolgen, wenn ein Nutzer Kunde digitaler Dienstleistungen werden möchte. Funktionieren diese Schritte nicht wie v...

lc70303

Leadership Compass

Infrastructure as a Service – Global Providers

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infras...

wp80029

Whitepaper

IAM for Healthcare: It’s time to act

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...

lc79016

Leadership Compass

IDaaS Access Management

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...

an72570

Advisory Note

Protect Your Cloud Against Hacks and Industrial Espionage

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government in...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

top