Article No. / Date
Articles
lc70314

Leadership Compass

Unified Endpoint Management (UEM)

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...

wp80510

Whitepaper

Fortgeschrittene Privileged Access Management Lösungen

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Sicherheit in jeder Organisation. Sich ändernde Geschäftspraktiken, agile Softwa...

ev80140

Executive View

ManageEngine PAM360

In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological chang...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80103

Executive View

Micro Focus Identity Governance

Identity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the mod...

ev80505

Executive View

IBM Watson OpenScale

IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deplo...

mc80384

Market Compass

Conversational AI Building Platforms

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platfor...

ev80506

Executive View

Omada Identity Suite

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

mc71176

Market Compass

Cloud Backup and Disaster Recovery

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers solutions that provide backup, re...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

ev80139de

Executive View

SentinelOne Singularity Platform

Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...

ev80139

Executive View

SentinelOne Singularity Platform

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...

ev80406

Executive View

Thycotic Access Controller

Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that add...

ev80331

Executive View

Symantec Privileged Access Manager

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and c...

ev80310

Executive View

One Identity Manager

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experien...

ev80158

Executive View

Nexis Controle 3.4

Nexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

lb80234

Leadership Brief

How to Get Rid of Passwords - Today

The IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This lea...

lc80104

Leadership Compass

Access Control Tools for SAP Environments

This report provides an overview of the market for Access Control Tools for SAP Environments and provides you with a compass to help you to find the solution that best meets your n...

wp80130

Whitepaper

IAM: Globalization & Large-Scale Enterprise

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...

lc80088

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

ev80124

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitleme...

wp80402

Whitepaper

Single Sign-On and Managed Access to all Applications from t...

With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...

lc80063

Leadership Compass

Identity Governance & Administration (IGA)

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasin...

ev71572

Executive View

Balabit Blindspotter

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

ev80232

Executive View

IBM Watson

IBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilit...

ev71571

Executive View

Balabit syslog-ng

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the st...

ev71570

Executive View

Balabit Shell Control Box

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a t...

ev71181

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...

ev71540

Executive View

CyberArk Privileged Threat Analytics

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system ac...

lb72001

Leadership Brief

The 5 Biggest IAM Myths

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...

lb72007

Leadership Brief

Cloud SSO is not sufficient: What else do you need?

Cloud-based identity services have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need.

ev80113

Executive View

Soterion for SAP

Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both o...

wp80137

Whitepaper

Fast Access Management in the Hybrid Cloud for SMBs

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud se...

ev71509

Executive View

Universal SSH Key Manager

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms an...

ev71507

Executive View

PingAccess

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web...

ev70894

Executive View

One Identity Manager v7.0.1

One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...

lb80223

Leadership Brief

Mitigating Availability & Security Risks in Centralized Dig...

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised...

ev80399

Executive View

Hitachi ID IAM Suite

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...

wp80176

Whitepaper

Enhanced Privilege Access Management Solutions

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development a...

ev71117

Executive View

SAP HANA Enterprise Cloud – Security and Compliance

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

lb80374

Leadership Brief

The Information Protection Life Cycle and Framework: Monitor...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80227

Executive View

Sophos Intercept X

Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced d...

ev80178

Executive View

Indeed Certificate Manager

Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote mana...

lb80278

Leadership Brief

Managing Non-Human Identities

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non...

ev71306

Executive View

Balabit Contextual Security Intelligence Platform

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and repla...

an80265

Advisory Note

Emerging Technologies Fostering Digital Business Innovation:...

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids a...

ev80400de

Executive View

R&S®Trusted Gate von Rohde & Schwarz Cybersecurity

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds...

ev71094

Executive View

AdNovum Nevis Security Suite

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance pro...

ev71318

Executive View

ForgeRock Identity Gateway

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things.

ev80230

Executive View

Vectra Cognito

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning...

lb80372

Leadership Brief

The Information Protection Life Cycle and Framework: Control...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80455

Leadership Brief

What strategic role should Azure AD play in your org?

As access management and governance becomes more important for security and compliance reasons, businesses are looking for a single solution to manage both on-prem and cloud access...

lb80371

Leadership Brief

The Information Protection Life Cycle and Framework: Acquire...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev71313

Executive View

IRM-Prot-On

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection...

ev80311

Executive View

Micro Focus Access Manager

The Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the prod...

ev80400

Executive View

R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Mic...

ev80122

Executive View

CyberArk Privilege Cloud

Privileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transfor...

lb72580

Leadership Brief

Typical Risks and Pitfalls for IGA Projects

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effec...

wp80120

Whitepaper

AI, Machine learning and Privileged Access Management

Choosing a PAM solution has become a complex, and potentially time consuming, decision for modern organizations but one they must get right. If trends such as customer identities o...

ev80328

Executive View

iWelcome IDaaS and CIAM

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-us...

lc80127

Leadership Compass

Fraud Reduction Intelligence Platforms

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your need...

ev71550

Executive View

Microsoft Azure Active Directory

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage b...

ev71325

Executive View

Auth0 Authentication Service

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single iden...

ev71557

Executive View

IBM Privileged Identity Manager

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses...

lb80370

Leadership Brief

Introduction to the Information Protection Life Cycle and Fr...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

lb80292

Leadership Brief

Beyond Marketing: The Future of Customer Interaction

Customer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as...

ev71319

Executive View

SailPoint IdentityIQ

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...

bc80215

Buyer's Compass

API Management and Security

The complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you wi...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

ev80001

Executive View

Exabeam Security Management Platform

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrate...

an71603

Advisory Note

Blockchains and Cybersecurity: Augmenting Trust with Algori...

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvem...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

an70361

Advisory Note

Business Continuity in the age of Cyber Attacks

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter...

ev80391

Executive View

Informatica CLAIRE Engine

Intelligent data management allows enterprises to identify, understand, and act upon trends in enterprise data and metadata, and is an essential addition to the digitized organizat...

lb80008

Leadership Brief

Find Your Route from SIEM to SIP and SOAR

Security Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing nu...

lb80335

Leadership Brief

10 Top Trends in IAM

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...

lb80362

Leadership Brief

Explainable AI

One of the largest barriers to widespread machine learning (ML) adoption is its lack of explainability. Most ML models are not inherently explainable on a local level, meaning that...

mc80064

Market Compass

Decentralized Identity: Blockchain ID & Self-Sovereign Ident...

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...

ev80326

Executive View

Google's Cloud Identity

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...

lb80502

Leadership Brief

Cybersecurity Trends & Challenges 2020

2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyber...

an80237

Advisory Note

Cyber Risk – Choosing the Right Framework

As organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks...

lb80238

Leadership Brief

5G Impact on Organizations and Security

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This...

an71612

Advisory Note

The Disruptive Potential of Blockchains in IoT Security

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other d...

an71608

Advisory Note

Blockchain and Risk

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technolog...

ev72515

Executive View

IBM QRadar Security Intelligence Platform

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks...

ev71453

Executive View

Deep Identity

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process th...

lb80501

Leadership Brief

Leveraging Identity Fabrics on Your Way Towards Cloud Based...

Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...

ev71315

Executive View

Beta Systems Garancy Recertification Center

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enabl...

lb71411

Leadership Brief

Transforming IAM – not Panicking

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.

ev71332

Executive View

Microsoft Azure Blockchain Services

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template librar...

an71606

Advisory Note

The Blockchain and Life Management Platforms

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, a...

an71609

Advisory Note

The Impact of Blockchains on Business Process Management and...

Distributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimi...

wp80164

Whitepaper

Success in Digital Finance: Doing Digital Identities right f...

Success in Digital Finance is not a miracle, but a combination of having the right offerings and services, and delivering a seamless and modern digital experience to the customers....

ev71554

Executive View

Microsoft Advanced Threat Analytics

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious use...

ev71455

Executive View

VMware Identity Manager

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delive...

ev80192

Executive View

ESET Enterprise Inspector

Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows with future plans to cover Linux, and Mac clients, collecting and analyzin...

ev70813

Executive View

Salesforce Identity

Salesforce has been a pioneer in Software as a Service (SaaS) from the early days. Digital identity has been an integral part of the Salesforce platform. Salesforce Identity is an...

lb70340de

Leadership Brief

Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten

Mit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs z...

ev72516

Executive View

RSA NetWitness® Suite

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and...

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

mc70324

Market Compass

Web Application Firewalls

The KuppingerCole Market Compass provides an overview of the product or service offerings in a specific market segment. This Market Compass covers Web Application Firewall (WAF) so...

an72542

Advisory Note

Rising to the Security Challenge of Heavy Cloud Adoption

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or...

an71273

Advisory Note

Trends in Privileged Access Management for the Digital Enter...

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

lb80390

Leadership Brief

Assessing the Maturity of Core AI Disciplines

There are several disciplines that contribute to the Artificial Intelligence field: Natural Language Processing, Machine Learning, Machine Reasoning, and others. This Leadership Br...

an80289

Advisory Note

Why High-Profile Digital Transformation Initiatives Fail: Ho...

A growing number of organizations are adapting their products, processes and strategies to capitalize on the benefits of digital technology, but some high-profile Digital Transform...

ev80309

Executive View

Cleafy Advanced Threat Detection & Protection

Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection agai...

ev80174

Executive View

Callsign Intelligence Driven Authentication

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solution...

an80239

Advisory Note

KRIs and KPI for Cyber Security

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the...

ev71256

Executive View

Indeed AirKey Enterprise

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unif...

an71602

Advisory Note

Information Stewardship in the Age of Blockchain

Blockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent p...

ev80168

Executive View

Onegini Connect

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expan...

lb80336

Leadership Brief

Top Ten Trends in Cybersecurity

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the ye...

lb80353

Leadership Brief

Six Key Actions to Prepare for CCPA

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key a...

an72523

Advisory Note

KYC as an Enabler in the Financial Services Business Transfo...

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challen...

wp80163

Whitepaper

Healthcare IAM: Enhance the Clinical Workflow

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has u...

ev80290

Executive View

Informatica: Customer 360

When optimizing customer centricity and customer engagement, data is an important resource. To ensure an ideal customer experience, various challenges across the customer lifecycle...

ev80307

Executive View

Apigee Edge API Management Platform

Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to mon...

ev71510

Executive View

Avatier Identity Management Suite (AIMS)

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

ev72508

Executive View

Data Classification – Boldon James Solution

Data classification is a requirement of every security framework. More importantly it should be a key part of any organization’s control framework, by clearly informing the person...

lb80333

Leadership Brief

Robotic Process Automation

Robotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes...

ev80157

Executive View

Oracle Identity Governance

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identit...

ev80233

Executive View

Microsoft Azure AI Platform

The Microsoft Azure AI platform provides a comprehensive enterprise solution for designing and implementing customized AI solutions. The cloud and hybrid deployment options, modula...

ev80325

Executive View

Saviynt Security Manager for Enterprise IGA

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functio...

an71701

Advisory Note

Consumer Identity and Access Management for “Know Your Custo...

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide bet...

n72533

Executive View

Vaultive Cloud Data Security Platform

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is prot...

av72025

Advisory Note

Sustainable Infrastructures through IT Compliance

Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand complian...

ev80220

Executive View

AWS Security Analytics Solutions

AWS provides a comprehensive suite of services to monitor for threats, misconfigurations and compliance violations across its portfolio, with all security alerts aggregated, organi...

lb80383

Leadership Brief

IAM for Robotic Process Automation: How to avoid Security Ch...

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...

ev72532

Executive View

Skyhigh Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev71316

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...

ev80182

Executive View

F-Secure Rapid Detection & Response

Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security ana...

an70285

Advisory Note

Enterprise role management done right

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model r...

an71560

Advisory Note

Plant Automation Security

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system c...

ev70290

Executive View

SAP HANA Cloud Platform Identity Authentication and Provisio...

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....

ev71326

Executive View

Centrify Privilege Service

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.

ev72541

Executive View

Microsoft Enterprise Mobility + Security Suite

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecur...

ev72524

Executive View

AWS Lambda

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality...

lb80305

Leadership Brief

Radically Lean: NoOps and Serverless Computing

Computing is continually getting leaner and becoming more like a utility as it moves increasingly further away from on-premise physical hardware by abstracting IT environments away...

ev80276

Executive View

Informatica Data Privacy Management

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable...

wp72705

Whitepaper

Manage privileged access from everyone & everywhere. Underst...

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of thei...

ev72529

Executive View

CensorNet Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev70284

Executive View

Ping Identity’s PingFederate

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS ap...

ev80323

Executive View

PingAccess

With the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management,...

an70283

Advisory Note

Mobile Biometrics for Authentication and Authorization

Many new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobi...

ev72531

Executive View

NextLabs Data Centric Security in the Hybrid Cloud

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with ex...

lc70970

Leadership Compass

Database Security

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability...

wp70289

Whitepaper

Ping Identity solutions for Customer Identity and Access Man...

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...

ev72518

Executive View

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malw...

ev71255

Executive View

HexaTier Database Security and Compliance

HexaTier provides an all-in-one database security and compliance solution across multiple platforms with a strong focus on cloud environments and Database-as-a-Service products.

top