Executive View
WALLIX Bastion
WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and pr...
Whitepaper
Identity Governance Herausforderungen mit ForgeRock Autonomo...
Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben...
Leadership Compass
Privileged Access Management for DevOps
Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to ad...
Whitepaper
Overcoming Identity Governance Challenges with ForgeRock Aut...
Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex a...
Executive View
UNITY: IGA Modernization Framework by Persistent
Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity p...
Buyer's Compass
Buyer’s Compass: Access Management
Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...
Leadership Brief
Recommendations for aligning ITSM with IAM/IGA
The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those...
Leadership Brief
Information Rights Management – Ready for Prime Time?
Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source -...
Executive View
Clear Skye IGA: IGA on the ServiceNow NOW platform
Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the ga...
Executive View
Symantec Identity Governance and Administration
In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration...
Executive View
Hitachi ID Privileged Access Manager
Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identi...
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...
Executive View
Ilantus Compact Identity
IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...
Whitepaper
IAM: Globalization & Large-Scale Enterprise
Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true...
Leadership Brief
The 5 Biggest IAM Myths
Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or mi...
Executive View
One Identity Manager v7.0.1
One Identity Manager is a well-designed, well-integrated and complete Identity Management solution, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 b...
Executive View
Hitachi ID IAM Suite
Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governanc...
Executive View
SailPoint IdentityIQ
SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance,...
Executive View
Atos DirX Identity
Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Ac...
Leadership Brief
What to Consider When Evaluating Decentralized Identity?
Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership...
Leadership Brief
10 Top Trends in IAM
Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability...
Market Compass
Decentralized Identity: Blockchain ID & Self-Sovereign Ident...
The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically...
Executive View
Google's Cloud Identity
Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the grow...
Leadership Brief
Leveraging Identity Fabrics on Your Way Towards Cloud Based...
Traditional Enterprise Identity Management systems increasingly need to be reconsidered with regard to their operating expenses, but also their capabilities for modern digital serv...
Leadership Brief
Transforming IAM – not Panicking
Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM.
Executive View
PlainID Policy Manager
PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...
Advisory Note
KYC as an Enabler in the Financial Services Business Transfo...
The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challen...
Executive View
Avatier Identity Management Suite (AIMS)
AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.
Leadership Brief
IAM for Robotic Process Automation: How to avoid Security Ch...
Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software...
Executive View
ForgeRock Access Management
ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...
Executive View
SAP HANA Cloud Platform Identity Authentication and Provisio...
SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more....
Whitepaper
Ping Identity solutions for Customer Identity and Access Man...
Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solu...
Executive View
Hitachi ID Identity and Access Management Suite
Hitachi ID offers an all-in-one IAM package to address enterprise business requirements. With an emphasis on process automation and self-service, the Hitachi ID IAM Suite helps bu...
Executive View
EmpowerID
EmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functi...
Executive View
PingIdentity’s PingDirectory
PingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet...
Executive View
Nexis Controle 3.0
Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...
Executive View
Nexis Controle 3.0
Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entwed...
Executive View
ForgeRock Identity Platform
ForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and acc...
Whitepaper
Digital Transformation for Business Enablement Requires a Mo...
Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service...
Whitepaper
Modern Identity Fabrics: A Cornerstone of your Digital Stra...
Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide ide...
Buyer's Compass
Buyer’s Guide: Consumer Identity and Access Management Solut...
Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and require...
Buyer's Compass
Decentralized Identity
Decentralized identity solutions - sometimes referred to as blockchain ID - are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and...
Executive View
Identity Automation's RapidIdentity Solution
Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...
Buyer's Compass
Beta Systems Garancy IAM Suite
Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong...
Executive View
PlainID
PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technolo...
Executive View
ForgeRock Access Management
ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...
Whitepaper
Modern B2B Identity Management
With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...
Architecture Blueprint
Identity and Access Management
IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities lead to fundamental changes in IAM architectures. Th...
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly...
Executive View
BeyondTrust PowerBroker PAM
BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privi...
Whitepaper
Privileged Access Management requirements for Small to Mediu...
Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users...
Whitepaper
Orchestrated Identity for Meeting IAM & CIAM Requirements
Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...
Leadership Brief
How to set up your IAM organization
A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs...
Whitepaper
IAM for the Hybrid Reality. Efficiently Managing On-Premise...
Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service t...
Whitepaper
Why Modern Enterprise IAM Must Be Rearchitected: Build Your...
IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such arc...
Executive View
Pirean Consumer IAM Platform
In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single p...
Architecture Blueprint
Aligning Access Governance and Privilege Management
Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established gove...
Leadership Compass
Consumer Authentication
This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication pro...
Executive View
One Identity Safeguard
One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safegu...
Executive View
WidasConcepts cidaas
WidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innova...
Executive View
ViewDS Cobalt
ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...
Executive View
CA Privileged Acces Management Suite
CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The C...
Executive View
Evidian Identity & Access Management
With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements...
Executive View
AWS Identity and Access Management
AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now...
Executive View
IBM Cloud Identity
IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models...
Leadership Brief
Identity Fabrics - Connecting Anyone to Every Service
Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...
Executive View
Service Layers Managed IAM
Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, con...
Whitepaper
IAM for Healthcare: It’s time to act
Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adap...
Leadership Compass
IDaaS Access Management
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery...
Executive View
Ilantus Compact Identity
IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the...
Executive View
CyberArk Privileged Session Manager for Cloud
Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...
Executive View
WSO2 Identity Server
Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...
Executive View
ManageEngine AD360
ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that g...
Leadership Compass
Access Management and Federation
This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....
Leadership Compass
Privileged Access Management
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...