Article No. / Date
Articles
ev71306

Executive View

Balabit Contextual Security Intelligence Platform

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and repla...

an80265

Advisory Note

Emerging Technologies Fostering Digital Business Innovation:...

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids a...

ev80400de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds...

ev71094

Executive View

AdNovum Nevis Security Suite

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance pro...

ev71318

Executive View

ForgeRock Identity Gateway

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things.

ev80230

Executive View

Vectra Cognito

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning...

lb80372

Leadership Brief

The Information Protection Life Cycle and Framework: Control...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80455

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...

lb80371

Leadership Brief

The Information Protection Life Cycle and Framework: Acquire...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev71313

Executive View

IRM-Prot-On

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection...

ev80311

Executive View

Micro Focus Access Manager

The Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the prod...

ev80400

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...

lb72580

Leadership Brief

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...

wp80120

Whitepaper

AI, Machine learning and Privileged Access Management

Choosing a PAM solution has become a complex, and potentially time consuming, decision for modern organizations but one they must get right. If trends such as customer identities o...

ev80328

Executive View

iWelcome IDaaS and CIAM

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...

lc80127

Leadership Compass

Fraud Reduction Intelligence Platforms

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your need...

ev71550

Executive View

Microsoft Azure Active Directory

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage b...

ev71325

Executive View

Auth0 Authentication Service

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single iden...

ev71557

Executive View

IBM Privileged Identity Manager

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80292

Leadership Brief

Beyond Marketing: The Future of Customer Interaction

Customer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as...

ev71319

Executive View

SailPoint IdentityIQ

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...

bc80215

Buyer's Compass

API Management and Security

The complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you wi...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

ev80001

Executive View

Exabeam Security Management Platform

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrate...

an71603

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algori...

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

an70361

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...

ev80391

Executive View

Informatica CLAIRE Engine

Intelligent data management allows enterprises to identify, understand, and act upon trends in enterprise data and metadata, and is an essential addition to the digitized organizat...

lb80008

Leadership Brief

Find Your Route from SIEM to SIP and SOAR

Security Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing nu...

lb80335

Leadership Brief

10 Top Trends in IAM

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...

lb80362

Leadership Brief

Explainable AI

One of the largest barriers to widespread machine learning (ML) adoption is its lack of explainability. Most ML models are not inherently explainable on a local level, meaning that...

mc80064

Market Compass

Decentralized Identity: Blockchain ID & Self-Sovereign Ident...

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...

ev80326

Executive View

Google's Cloud Identity

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...

lb80502

Leadership Brief

Cybersecurity Trends & Challenges 2020

2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyber...

an80237

Advisory Note

Cyber Risk – Choosing the Right Framework

As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks...

lb80238

Leadership Brief

5G Impact on Organizations and Security

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This...

an71612

Advisory Note

The Disruptive Potential of Blockchains in IoT Security

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other d...

an71608

Advisory Note

Blockchain and Risk

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technolog...

ev72515

Executive View

IBM QRadar Security Intelligence Platform

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks...

ev71453

Executive View

Deep Identity

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process th...

lb80501

Leadership Brief

Leveraging Identity Fabrics on Your Way Towards Cloud Based...

Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...

ev71315

Executive View

Beta Systems Garancy Recertification Center

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enabl...

lb71411

Leadership Brief

Transforming IAM – not Panicking

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.

ev71332

Executive View

Microsoft Azure Blockchain Services

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template librar...

an71606

Advisory Note

The Blockchain and Life Management Platforms

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, a...

an71609

Advisory Note

The Impact of Blockchains on Business Process Management and...

Distributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimi...

wp80164

Whitepaper

Success in Digital Finance: Doing Digital Identities right f...

Success in Digital Finance is not a miracle, but a combination of having the right offerings and services, and delivering a seamless and modern digital experience to the customers....

ev71554

Executive View

Microsoft Advanced Threat Analytics

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious use...

ev71455

Executive View

VMware Identity Manager

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delive...

ev80192

Executive View

ESET Enterprise Inspector

Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows with future plans to cover Linux, and Mac clients, collecting and analyzin...

ev70813

Executive View

Salesforce Identity

Salesforce has been a pioneer in Software as a Service (SaaS) from the early days. Digital identity has been an integral part of the Salesforce platform. Salesforce Identity is an...

lb70340de

Leadership Brief

Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten

Mit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs z...

ev72516

Executive View

RSA NetWitness® Suite

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and...

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

mc70324

Market Compass

Web Application Firewalls

The KuppingerCole Market Compass provides an overview of the product or service offerings in a specific market segment. This Market Compass covers Web Application Firewall (WAF) so...

an72542

Advisory Note

Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or...

an71273

Advisory Note

Trends in Privileged Access Management for the Digital Enter...

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

lb80390

Leadership Brief

Assessing the Maturity of Core AI Disciplines

There are several disciplines that contribute to the Artificial Intelligence field: Natural Language Processing, Machine Learning, Machine Reasoning, and others. This Leadership Br...

an80289

Advisory Note

Why High-Profile Digital Transformation Initiatives Fail: Ho...

A growing number of organizations are adapting their products, processes and strategies to capitalize on the benefits of digital technology, but some high-profile Digital Transform...

ev80309

Executive View

Cleafy Advanced Threat Detection & Protection

Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection agai...

ev80174

Executive View

Callsign Intelligence Driven Authentication

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...

an80239

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the...

ev71256

Executive View

Indeed AirKey Enterprise

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unif...

an71602

Advisory Note

Information Stewardship in the Age of Blockchain

Blockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent p...

ev80168

Executive View

Onegini Connect

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expan...

lb80336

Leadership Brief

Top Ten Trends in Cybersecurity

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...

lb80353

Leadership Brief

Six Key Actions to Prepare for CCPA

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key a...

an72523

Advisory Note

KYC as an Enabler in the Financial Services Business Transfo...

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challen...

wp80163

Whitepaper

Healthcare IAM: Enhance the Clinical Workflow

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...

ev80290

Executive View

Informatica: Customer 360

When optimizing customer centricity and customer engagement, data is an important resource. To ensure an ideal customer experience, various challenges across the customer lifecycle...

ev80307

Executive View

Apigee Edge API Management Platform

Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to mon...

ev71510

Executive View

Avatier Identity Management Suite (AIMS)

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

ev72508

Executive View

Data Classification – Boldon James Solution

Data classification is a requirement of every security framework. More importantly it should be a key part of any organization’s control framework, by clearly informing the person...

lb80333

Leadership Brief

Robotic Process Automation

Robotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes...

ev80157

Executive View

Oracle Identity Governance

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...

ev80233

Executive View

Microsoft Azure AI Platform

The Microsoft Azure AI platform provides a comprehensive enterprise solution for designing and implementing customized AI solutions. The cloud and hybrid deployment options, modula...

ev80325

Executive View

Saviynt Security Manager for Enterprise IGA

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functio...

an71701

Advisory Note

Consumer Identity and Access Management for “Know Your Custo...

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide bet...

n72533

Executive View

Vaultive Cloud Data Security Platform

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is prot...

av72025

Advisory Note

Sustainable Infrastructures through IT Compliance

Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand complian...

ev80220

Executive View

AWS Security Analytics Solutions

AWS provides a comprehensive suite of services to monitor for threats, misconfigurations and compliance violations across its portfolio, with all security alerts aggregated, organi...

lb80383

Leadership Brief

IAM for Robotic Process Automation: How to avoid Security Ch...

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...

ev72532

Executive View

Skyhigh Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev71316

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...

ev80182

Executive View

F-Secure Rapid Detection & Response

Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security ana...

an70285

Advisory Note

Enterprise role management done right

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model r...

an71560

Advisory Note

Plant Automation Security

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system c...

ev70290

Executive View

SAP HANA Cloud Platform Identity Authentication and Provisio...

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....

ev71326

Executive View

Centrify Privilege Service

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.

ev72541

Executive View

Microsoft Enterprise Mobility + Security Suite

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecur...

ev72524

Executive View

AWS Lambda

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality...

lb80305

Leadership Brief

Radically Lean: NoOps and Serverless Computing

Computing is continually getting leaner and becoming more like a utility as it moves increasingly further away from on-premise physical hardware by abstracting IT environments away...

ev80276

Executive View

Informatica Data Privacy Management

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable...

wp72705

Whitepaper

Manage privileged access from everyone & everywhere. Underst...

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of thei...

ev72529

Executive View

CensorNet Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev70284

Executive View

Ping Identity’s PingFederate

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS ap...

ev80323

Executive View

PingAccess

With the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management,...

an70283

Advisory Note

Mobile Biometrics for Authentication and Authorization

Many new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobi...

ev72531

Executive View

NextLabs Data Centric Security in the Hybrid Cloud

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with ex...

lc70970

Leadership Compass

Database Security

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability...

wp70289

Whitepaper

Ping Identity solutions for Customer Identity and Access Man...

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...

ev72518

Executive View

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malw...

ev71255

Executive View

HexaTier Database Security and Compliance

HexaTier provides an all-in-one database security and compliance solution across multiple platforms with a strong focus on cloud environments and Database-as-a-Service products.

ev70288

Executive View

PingOne

PingOne provides cloud-based Single Sign-On (SSO) and Identity-as-a-Service (IDaaS) for employees, business partners, and consumers. PingOne is a key component of PingIdentity’s C...

wp70286

Whitepaper

Unified management and control of the digital workspace

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governa...

an72163

Advisory Note

Firewalls Are Dead - How to Build a Resilient, Defendable Ne...

The firewall is dead – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often th...

lb70336

Leadership Brief

Defending against ransomware

Ransomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom.

ev72543

Executive View

Hitachi ID Identity and Access Management Suite

Hitachi ID offers an all-in-one IAM package to address enterprise business requirements. With an emphasis on process automation and self-service, the Hitachi ID IAM Suite helps bu...

lb72800

Leadership Brief

How to close the skill gap in your Cyber Defense Center

Getting sufficient and sufficiently skilled people for your Cyber Defense Center (or your IT Security department) is tough. The answer to the skill gaps consists of three elements:...

lb71518

Leadership Brief

Mobile Connect

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers compl...

ev70811

Executive View

CA Technologies Mobile API Gateway, Mobile App Services, and...

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for...

ev80112

Executive View

Sovrin Network Self-Sovereign Identity

Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship...

ev70297

Executive View

EmpowerID

EmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functi...

lb80260

Leadership Brief

Optimizing your Cybersecurity Spending

Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attac...

lb80272

Leadership Brief

Distributed Decentralized AI: Create, Share, Scale, Monetiz...

Using artificial intelligence services in combination can offer heightened results, whether it be in accuracy, robustness, customization, or geographical spread. Distributed, decen...

an80264

Advisory Note

Emerging Technologies Fostering Digital Business Innovation:...

The relative success of FinTech drives the conversation surrounding finance and emerging technologies, and their products are capturing the hearts and minds of consumers. But despi...

an72611

Advisory Note

Unifying RBAC and ABAC in a Dynamic Authorization Framework

Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex env...

ev70280

Executive View

CyberArk Portfolio Overview

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering...

ev71155

Executive View

Symantec Advanced Threat Protection

Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symante...

ev71261

Executive View

Nok Nok Labs S3 Authentication Suite

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary...

an70282

Advisory Note

Identity in IoT

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and hum...

ev70294

Executive View

PingIdentity’s PingDirectory

PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...

lb80269

Leadership Brief

AI in the Legal Industry: The Basics in a Nutshell

Artificial Intelligence (AI) applications in the legal industry already range from naissent to mature. However, the legal implications of such applications and trends in global reg...

lb72549

Leadership Brief

5 Steps to Consumer Identity and Access Management

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulato...

an71303

Advisory Note

Future of Identity Management

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have t...

wp80136

Whitepaper

California Consumer Privacy Act: The Need for Data-Centric S...

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses...

ev80314

Executive View

Axiomatics APS

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS...

lc71141

Leadership Compass

Identity as a Service: Single Sign-On to the Cloud (IDaaS SS...

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cl...

ev72535

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

ev72535de

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entwed...

lb70276

Leadership Brief

Cloud Provider Codes of Conduct and GDPR

Codes of Conduct can help organizations choose between suppliers. This report compares two recently announced codes for cloud service providers and how these relate to GDPR.

ev71312

Executive View

IdentityX® from Daon

Daon’s IdentityX authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy aut...

ev72537

Executive View

Signicat

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, the...

ev70342

Executive View

Magenta Security

Unter der Bezeichnung Magenta Security werden alle Angebote für Dienstleistungen und Managed Services des Telekom-Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes...

ev71327

Executive View

SecureAuth IdP

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and Use...

ev70296

Executive View

ForgeRock Identity Platform

ForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and acc...

ev72592

Executive View

Microsoft Azure Stack

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure...

lb70340

Leadership Brief

Six Key Actions to Prepare for GDPR

From May 2018, when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. This report identifies six...

lb70336de

Leadership Brief

Schutz gegen Ransomware

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

lb70268

Leadership Brief

Lösungen für die Personalknappheit in Ihrem Cyber Defense Ce...

Ausreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den IT-Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus d...

ev71053

Executive View

Auth0 Customer Identity Management

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) scenario...

ev80169

Executive View

TrueFort Fortress XDR

TrueFort Fortress XDR is an application detection and response platform offering integrated application behavior analysis and security for real-time visibility into critical busine...

ev71060

Executive View

Thycotic Secret Server

Thycotic Secret Server is a mature enterprise-class offering for Privilege Management, supporting the key areas of the market such as Shared Account and Privileged Password Managem...

lc70311

Leadership Compass

API Management and Security

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address...

an70947

Advisory Note

Understanding and Countering Ransomware

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; how...

wp80165

Whitepaper

Digital Transformation for Business Enablement Requires a Mo...

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...

wp80170

Whitepaper

Modern Identity Fabrics: A Cornerstone of your Digital Stra...

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...

an72599

Advisory Note / Buyer's Guide

Buyer’s Guide: Ransomware Protection

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for s...

an70259

Advisory Note / Buyer's Guide

Buyer’s Guide: Consumer Identity and Access Management Solut...

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and require...

top