Article No. / Date
Articles
ev80324

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...

ev80142

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...

ev80401

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

wp80130

Whitepaper

IAM: Globalization & Large-Scale Enterprise

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...

lb72001

Leadership Brief

The 5 Biggest IAM Myths

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...

ev70894

Executive View

One Identity Manager v7.0.1

One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...

ev80399

Executive View

Hitachi ID IAM Suite

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...

ev71319

Executive View

SailPoint IdentityIQ

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...

ev80166

Executive View

Atos DirX Identity

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...

lb80451

Leadership Brief

What to Consider When Evaluating Decentralized Identity?

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...

lb80335

Leadership Brief

10 Top Trends in IAM

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...

mc80064

Market Compass

Decentralized Identity: Blockchain ID & Self-Sovereign Ident...

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...

ev80326

Executive View

Google's Cloud Identity

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...

lb80501

Leadership Brief

Leveraging Identity Fabrics on Your Way Towards Cloud Based...

Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...

lb71411

Leadership Brief

Transforming IAM – not Panicking

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

an72523

Advisory Note

KYC as an Enabler in the Financial Services Business Transfo...

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challen...

ev71510

Executive View

Avatier Identity Management Suite (AIMS)

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

lb80383

Leadership Brief

IAM for Robotic Process Automation: How to avoid Security Ch...

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...

ev71316

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...

ev70290

Executive View

SAP HANA Cloud Platform Identity Authentication and Provisio...

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....

wp70289

Whitepaper

Ping Identity solutions for Customer Identity and Access Man...

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...

ev72543

Executive View

Hitachi ID Identity and Access Management Suite

Hitachi ID offers an all-in-one IAM package to address enterprise business requirements. With an emphasis on process automation and self-service, the Hitachi ID IAM Suite helps bu...

ev70297

Executive View

EmpowerID

EmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functi...

ev70294

Executive View

PingIdentity’s PingDirectory

PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...

ev72535

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

ev72535de

Executive View

Nexis Controle 3.0

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entwed...

ev70296

Executive View

ForgeRock Identity Platform

ForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and acc...

wp80165

Whitepaper

Digital Transformation for Business Enablement Requires a Mo...

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...

wp80170

Whitepaper

Modern Identity Fabrics: A Cornerstone of your Digital Stra...

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...

an70259

Advisory Note / Buyer's Guide

Buyer’s Guide: Consumer Identity and Access Management Solut...

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and require...

bc80050

Buyer's Compass

Decentralized Identity

Decentralized identity solutions - sometimes referred to as blockchain ID - are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and...

ev80028

Executive View

Identity Automation's RapidIdentity Solution

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...

ev71530

Buyer's Compass

Beta Systems Garancy IAM Suite

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong...

ev70358

Executive View

PlainID

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technolo...

ev80319

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...

wp80135

Whitepaper

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...

ab72550

Architecture Blueprint

Identity and Access Management

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...

ev79077

Executive View

Microsoft Azure Active Directory

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...

ev70275

Executive View

BeyondTrust PowerBroker PAM

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...

wp80123

Whitepaper

Privileged Access Management requirements for Small to Mediu...

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...

wp70225

Whitepaper

Orchestrated Identity for Meeting IAM & CIAM Requirements

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...

lb72548

Leadership Brief

How to set up your IAM organization

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...

wp70364

Whitepaper

IAM for the Hybrid Reality. Efficiently Managing On-Premise...

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...

wp80044

Whitepaper

Why modern Enterprise IAM must be rearchitected: Build your...

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...

ev70223

Executive View

Pirean Consumer IAM Platform

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...

an79045

Advisory Note / Architecture Blueprint

Aligning Access Governance and Privilege Management

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...

lc80061

Leadership Compass

Consumer Authentication

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...

ev79042

Executive View

One Identity Safeguard

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...

ev79057

Executive View

WidasConcepts cidaas

WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...

ev70851

Executive View

ViewDS Cobalt

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...

ev79047

Executive View

CA Privileged Acces Management Suite

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...

ev70872

Executive View

Evidian Identity & Access Management

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...

ev79048

Executive View

AWS Identity and Access Management

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...

ev79065

Executive View

IBM Cloud Identity

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...

lb80204

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...

ev80129

Executive View

Service Layers Managed IAM

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...

wp80029

Whitepaper

IAM for Healthcare: It’s time to act

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...

lc79016

Leadership Compass

IDaaS Access Management

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...

ev80052

Executive View

Ilantus Compact Identity

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev80060

Executive View

WSO2 Identity Server

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...

ev79070

Executive View

ManageEngine AD360

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

top