Article No. / Date
Articles
lc80488

Leadership Compass

Fraud Reduction Intelligence Platforms

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your need...

ev80546

Executive View

Nucleon Smart Endpoint

Nucleon Smart Endpoint is an Endpoint Protection Detection & Response (EPDR) solution for Windows and Linux. It takes a multi-layered Zero Trust approach to preventing malware exec...

mc71137

Market Compass

Data Governance Platforms

The KuppingerCole Market Compass Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets...

ev80414

Executive View

NEXIS 4

NEXIS 4 implements intelligent role and identity analytics together with strategic entitlement lifecycle management processes. As such, it provides the basis for dedicated, busines...

mc80337

Market Compass

Global IaaS Providers Tenant Security Controls

The KuppingerCole Market Compass reports provide an overview of vendors and their product or service offerings in a certain market segment. This Market Compass focusses on Infrastr...

mc80360

Market Compass

AI Service Clouds

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Artificial Intelligence (AI) S...

ev80555

Executive View

Logsign SOAR

Security Orchestration, Automation, and Response (SOAR) platforms are becoming essential components of security architectures in many organizations around the world. SOAR platforms...

ev80547

Executive View

Thales SafeNet Trusted Access Platform

Thales is a major player in the global aerospace, defense, and security arena. Thales has a respected line of products and services in cybersecurity and identity protection. Thales...

ev80544

Executive View

Strivacity Fusion

Strivacity Fusion is a multi-instance SaaS-based Consumer Identity and Access Management (CIAM) solution. Strivacity Fusion was built in the cloud using the modern micro-services a...

bc80792

Buyer's Compass

Providers of Verified Identity

It is no longer enough to create and secure user identities. Verifying that the identity does indeed describe the individual it was created for is a valuable capability in many use...

ev80153

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. NRI Sec...

bc80746

Buyer's Compass

IaaS Tenant Security Controls

IT Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer's Compass focusses on the capabilities IaaS services provide to manage...

bc71275

Buyer's Compass

Database and Big Data Security

As more and more companies are embracing digital transformation, the challenges of securely storing, processing, and exchanging digital data continue to multiply. This KuppingerCol...

ev80422

Executive View

Accenture Memority

Accenture Memority is an IDaaS solution supporting both Identity Lifecycle Management and Access Management use cases. It comes with full API support and positions itself as the fo...

bc80749

Buyer's Compass

IT Service Management

IT Service Management (ITSM) refers to comprehensive solutions that support IT management capabilities to help organizations to optimize the design, delivery, support, use and gove...

ev80438

Executive View

IBM Security Verify for CIAM

IBM Security Verify is an industry-leading Consumer Identity and Access Management (CIAM) solution that can satisfy both B2B and B2C requirements. Customers can choose to operate t...

ev80431

Executive View

Saviynt Enterprise Identity Cloud

Enterprise IT organizations need Identity solutions to protect data, applications, and third-party access to critical IT infrastructure and services. The Saviynt Enterprise Identit...

lc80514

Leadership Compass

Identity Fabrics

This report provides an overview of the market for Identity Fabrics, comprehensive IAM solutions built on a modern, modular architecture, and provides you with a compass to help yo...

ev80436

Executive View

Oracle Cloud Guard

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. CSPM (Cloud Security Posture M...

ev80538

Executive View

Cequence Security API Sentinel

API Sentinel is an API security product focusing on API inventory and usage monitoring, as well as identification, assessment, and mitigation of API-related security risks. As a pa...

lc80259

Leadership Compass

IT Service Management

This report provides an overview of the market for IT Service Management (ITSM) and provides you with a compass to help you to find the solution that best meets your needs. We exam...

wp80427

Whitepaper

RadiantOne: Identity Integration for Zero-Trust and Digital...

Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt ab...

mc80521

Market Compass

Providers of Verified Identity

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Providers of Verified Identity...

wp80404

Whitepaper

Identity for the Business: Identity Fabrics supporting the D...

Business is changing fundamentally. Digital Services are the new normal, both as autonomous business models and accompanying physical goods. The connected vehicle and the changes i...

ev80434

Executive View

Synacor Cloud ID

Synacor offers Cloud ID as a highly capable and scalable Consumer Identity and Access Management (CIAM) solution for the consumer services and media streaming market. Their platfor...

ev80540

Executive View

Oracle Data Safe

Oracle Data Safe is a cloud-based service that improves the security of Oracle databases on-premises and in the cloud by identifying risky configuration, users, and sensitive data,...

an80487

Buyer's Compass

Network Detection & Response (NDR)

Network Detection & Response (NDR) is the term for the tools that monitor networks for suspicious activities and threats and provide capabilities for alerting, intercepting, and pr...

ev80536

Executive View

Palo Alto Networks XSOAR

Security Orchestration, Automation and Response (SOAR) platforms are becoming essential components of security architectures in many organizations around the world. SOAR platforms...

ev80433

Executive View

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and pr...

ev80637

Executive View

Microsoft Cloud App Security

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

mc80208

Market Compass

Cloud-delivered Security

The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Se...

ev80539

Executive View

Cloudentity Authorization Control Plane

IT organizations often contend with information from multi-security services located on-premises, cloud, and even multi-cloud environments that can be inconsistent, increasing atta...

an80266

Advisory Note

Emerging Technologies Fostering Digital Business Innovation:...

The healthcare landscape has experienced unprecedented pressure and change, and there is a greater need than ever for the industry to make its full digital transformation. Technolo...

bc80214

Buyer's Compass

Unified Endpoint Management

Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with que...

lc80545de

Leadership Compass

Datenbank- und Big-Data-Sicherheit

Dieser Leadership Compass bietet einen Überblick über den Markt für Datenbank- und Big-Data-Sicherheitslösungen sowie einen Leitfaden und Empfehlungen für die Wahl von denjenigen P...

ev80543

Executive View

Cysiv SOCaaS

Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ing...

bc80756

Buyer's Compass

Security Orchestration, Automation and Response (SOAR)

Security Orchestration, Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole...

an71106

Advisory Note

Identity Authentication Standards

Authentication is a core component of Identity and Access Management (IAM) Solutions and central to the security and management of modern organizations. For many years, the industr...

wp80432de

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomo...

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben...

ev80537

Executive View

HID Global Authentication Platform

HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuan...

lc80355

Leadership Compass

Privileged Access Management for DevOps

Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to ad...

lc80062

Leadership Compass

Enterprise Authentication Solutions

This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We e...

wp80424

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Aut...

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex a...

ev79051

Executive View

BeyondTrust Endpoint Privilege Management

Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware,...

lc80257

Leadership Compass

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your comp...

bc80512

Buyer's Compass

Identity Governance & Administration (IGA)

Identity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intell...

mc80515

Market Compass

IGA Solutions for ServiceNow Infrastructures

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the market of IGA (Identity Govern...

mc80287

Market Compass

SOC as a Service

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as...

ev80396

Executive View

BMC Helix ITSM

BMC Helix ITSM is flexible, scalable and secure IT Service Management application built on top of a no-code platform enables organizations create their own custom apps. BMC Helix I...

wp80425

Whitepaper

Technical Approaches to Consent Management and Dynamic Acces...

Privacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from...

lc80294

Leadership Compass

Database and Big Data Security

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data prote...

wp80429

Whitepaper

Leveraging Your Organization's Expertise: Departmental IAM...

To benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and mai...

mc80475

Market Compass

Digital Workplace Delivery Platforms

The KuppingerCole Market Compass Workplace Delivery covers solutions that assist organizations in managing applications and data that end users access from a “single pane of glass...

ev80430

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...

ev80150

Executive View

SecurEnds Credential Entitlement Management

Due to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. Se...

ev80482

Executive View

Datamatics TruBot

Datamatics TruBot is a multi-skilled low-code Robotic Process Automation (RPA) solution for automating high volume repetitive tasks and processes. Datamatics currently provides RPA...

ev80151

Executive View

Simeio Identity Orchestrator

Simeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, custo...

ev80428

Executive View

Atos DirX Audit

DirX Audit is the Access Intelligence and Analytics solution within the Atos DirX portfolio. It provides insight not only in risks related to static entitlements, but also can anal...

ev80248

Executive View

Archer Integrated Risk Management

Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper...

an80279

Advisory Note

Redefining Access Governance: A broader perspective

Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory complianc...

ev80152

Executive View

Elastic Security

Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monit...

ev80330

Executive View

Ping Identity’s PingFederate

PingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and...

lc80040

Leadership Compass

CIAM Platforms

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Mana...

ev80055

Executive View

Cisco Zero Trust Security

Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional secu...

ev80395

Executive View

Cherwell ITSM

Cherwell ITSM is a comprehensive IT Service Management application that can be installed on premise or in the cloud and is built on top of the Cherwell CORE platform – a low-code,...

ev80146

Executive View

ARCON PAM SaaS

Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a...

ev80145

Executive View

BigID

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. Big...

ev80426

Executive View

Illusive Platform

Illusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture f...

an70946

Advisory Note

The Role of APIs for Business

An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accusto...

ev80229

Executive View

IBM QRadar Advisor with Watson

QRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dr...

wp80419de

Whitepaper

Geistiges Eigentum schützen und gleichzeitig geschäftliche A...

Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirts...

wp80138

Whitepaper

Privileged Access Management Solutions for Agile, Multi-Clou...

Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to...

ev80405

Executive View

Oracle APEX – Secure Low-Code Application Development Platfo...

Oracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, stor...

ev80149

Executive View

ideiio

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and...

lc70309

Leadership Compass

Enterprise Databases in the Cloud

This Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as da...

lc80016

Leadership Compass

Security Orchestration, Automation and Response (SOAR)

This report provides an overview of the SOAR market and provides you with a compass to help you to find the solution that best meets your needs. We examine the SOAR market segment,...

wp80419

Whitepaper

Protecting Intellectual Properties While Enabling Business A...

Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run in...

wp80403

Whitepaper

Safeguarding Your Most Valuable Data: Five Key Criteria to A...

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

ab72551

Architecture Blueprint

Architecting your Security Operations Centre

A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect...

ev80175

Executive View

Oxyliom Solutions GAÏA Advanced Identity Management

The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory complianc...

ev80148

Executive View

Commvault Complete™ Data Protection

Business continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support tod...

ev80522

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...

ev80420de

Executive View

R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz...

Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePo...

ev80416

Executive View

Fudo PAM by Fudo Security

Fudo Security’s PAM solution is the company’s primary product in the expanding PAM market. In the last few years PAM has evolved into a set of targeted technologies that addresses...

mc80079

Market Compass

Cloud Access Security Brokers

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broke...

lb72583

Leadership Brief

Working for the Business, not the Auditors

Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicab...

ev80421

Executive View

Atos DirX Directory

Atos DirX Directory is one of the few enterprise-grade directory services in the market, delivering a high-performance, high-scalability, high-availability, and high-secure impleme...

ev80420

Executive View

R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz...

Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms...

ev80418

Executive View

SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a...

bc80201

Buyer's Compass

Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...

lb80364

Leadership Brief

Status and Advantages of Small Data Machine Learning Paradig...

Consider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, so...

ev80144

Executive View

SecZetta Third-Party Identity Risk Solution

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-par...

ev80321

Executive View

IdentityIQ – SailPoint

IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, t...

ev80312

Executive View

CyberArk

Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation...

ev80141

Executive View

ManageEngine Log360

Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR function...

ev80143

Executive View

Radware Kubernetes WAF

Containerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers....

lb80393

Leadership Brief

The Role of AI in Modern Business Intelligence Platforms

Business intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expan...

lc80199

Leadership Compass

Privacy and Consent Management

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your ne...

lc80098

Leadership Compass

Access Governance & Intelligence

The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providin...

lb80262

Leadership Brief

Recommendations for aligning ITSM with IAM/IGA

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...

lb80376

Leadership Brief

The Information Protection Life Cycle and Framework: Deceive

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80413

Executive View

One Identity Active Roles

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong sup...

ev80173de

Executive View

Password Safe von MATESO

Password Safe von MATESO ist eine Lösung für das zentrale, unternehmensweite Management von Kennwörtern und anderen „Secrets“ und die Überwachung und Kontrolle von deren Nutzung. D...

bc80198

Buyer's Compass

Core Features of Privacy and Consent Management Solutions

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks suc...

ev80124fr

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droi...

ev80124de

Executive View

SailPoint Predictive Identity

SailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die...

ev80417

Executive View

Cygna Auditor Platform

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing a...

ev80415

Executive View

BioCatch

BioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which...

lb72012

Leadership Brief

Join the dots: Operational Technology and Informational Tech...

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technol...

lb72013

Leadership Brief

Information Rights Management – Ready for Prime Time?

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...

lb72017de

Leadership Brief

Prioritäten in der SAP-Sicherheit

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedro-hungsgrad be...

lb80344

Leadership Brief

Incident Response Management

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose n...

ev80291

Executive View

Adobe: Experience Cloud

When optimizing customer centricity and customer journeys across all touchpoints, automation is key. Various aspects have to be considered in order to create an individual and fit-...

lb80377

Leadership Brief

The Information Protection Life Cycle and Framework: Dispose

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

mc80508

Market Compass

Endpoint Protection, Detection, and Response

The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much i...

ev71531

Executive View

Centrify for Big Data

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.

an71601

Advisory Note

Blockchain Impact on the Financial Industry

The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within t...

ev71511

Executive View

Gurucul Predictive Risk Analytics

Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that...

ev80412

Executive View

Clear Skye IGA: IGA on the ServiceNow NOW platform

Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...

mc71165

Market Compass

IT-GRC Tools

The KuppingerCole Market Compass provides an overview of the product or service offerings in the IT-GRC Tools market. As organizations continue to embrace digital technologies, an...

ev80329

Executive View

Auth0 Platform

Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’...

lb80478

Leadership Brief

Wie wir Passwörter loswerden – Noch Heute

Die IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dies...

mc71144

Market Compass

Dynamic Authorization Management

The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Managem...

lb80476

Leadership Brief

Security Fabric: A Methodology for Architecting a Secure Fut...

Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is co...

ev71263

Executive View

Intralinks VIA®

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when acce...

ev80161

Executive View

NRI Secure Technologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure...

ev70842

Executive View

YubiKey by Yubico

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography wit...

ev80324

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...

lb80373

Leadership Brief

The Information Protection Life Cycle and Framework: Secure

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

ev80407

Executive View

CSI tools

CSI tools provide a suite of solutions for managing access entitlements and risk in SAP environments. The solution come with a modern, web-based user interface and dashboarding. Th...

lb71036

Leadership Brief

Enterprise Information Protection

The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and b...

lb80375

Leadership Brief

The Information Protection Life Cycle and Framework: Contain...

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. T...

bc80200

Buyer's Compass

Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

mc80217

Market Compass

Enterprise Information Protection

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers Enterprise Information Protection...

lc80126

Leadership Compass

Network Detection and Response

This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your...

lc70314

Leadership Compass

Unified Endpoint Management (UEM)

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We...

wp80510

Whitepaper

Fortgeschrittene Privileged Access Management Lösungen

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Sicherheit in jeder Organisation. Sich ändernde Geschäftspraktiken, agile Softwa...

ev80140

Executive View

ManageEngine PAM360

In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological chang...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80103

Executive View

Micro Focus Identity Governance

Identity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the mod...

ev80505

Executive View

IBM Watson OpenScale

IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deplo...

mc80384

Market Compass

Conversational AI Building Platforms

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platfor...

ev80506

Executive View

Omada Identity Suite

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automati...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

mc71176

Market Compass

Cloud Backup and Disaster Recovery

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers solutions that provide backup, re...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

ev80139de

Executive View

SentinelOne Singularity Platform

Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...

ev80139

Executive View

SentinelOne Singularity Platform

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...

ev80406

Executive View

Thycotic Access Controller

Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that add...

top