Article No. / Date
Articles
ev80418

Executive View

SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a...

bc80201

Buyer's Compass

Buyer’s Compass: Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners...

bc80200

Buyer's Compass

Privileged Access Management

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to admi...

ev80177

Executive View

Ilantus Compact Identity

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Managemen...

ev80310

Executive View

One Identity Manager

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experien...

ev80158

Executive View

Nexis Controle 3.4

Nexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a c...

wp80402

Whitepaper

Single Sign-On and Managed Access to all Applications from t...

With more and more organizations following a “cloud first” strategy, IT infrastructure and security services also must shift to the cloud, where increasingly more of the critical w...

ev71507

Executive View

PingAccess

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web...

ev80311

Executive View

Micro Focus Access Manager

The Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the prod...

ev71550

Executive View

Microsoft Azure Active Directory

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage b...

ev80315

Executive View

PlainID Policy Manager

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, syst...

ev71316

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federatio...

an70285

Advisory Note

Enterprise role management done right

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model r...

ev80323

Executive View

PingAccess

With the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management,...

wp70286

Whitepaper

Unified management and control of the digital workspace

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governa...

ev80112

Executive View

Sovrin Network Self-Sovereign Identity

Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship...

ev80028

Executive View

Identity Automation's RapidIdentity Solution

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standa...

ev80319

Executive View

ForgeRock Access Management

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication...

wp80135

Whitepaper

Modern B2B Identity Management

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Mana...

ev80167

Executive View

Atos DirX Access

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive su...

ev70930

Executive View

Forum Sentry API Security Gateway

Forum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by...

lc71139

Leadership Compass

Identity Provisioning

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT envi...

ev70323

Executive View

RSA SecurID® Access

RSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integra...

ev80219

Executive View

AWS Control Tower

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern i...

wp70225

Whitepaper

Orchestrated Identity for Meeting IAM & CIAM Requirements

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems...

ev80054

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...

ev79036

Executive View

Centrify Next-Gen Access Platform

Often, enterprise security is delivered as separate services such as Identity-as-a-Service (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Cen...

ev70851

Executive View

ViewDS Cobalt

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully acc...

ev80066

Executive View

AdNovum NEVIS Security Suite

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable mai...

ev79066

Executive View

IBM Security Access Manager (ISAM)

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access...

wp80155

Whitepaper

Oracle Identity Cloud Service: Identity for Business Applica...

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications ar...

lb80204

Leadership Brief

Identity Fabrics - Connecting Anyone to Every Service

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together an...

wp80194

Whitepaper

KRITIS - Kritische Infrastrukturen verstehen und schützen

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unter...

wp80065

Whitepaper

KRITIS – Understanding and protecting critical infrastructur...

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensiv...

ev79075

Executive View

Safe-T Software Defined Access

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications,...

ev79034

Executive View

CyberArk Privileged Session Manager for Cloud

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally...

ev80060

Executive View

WSO2 Identity Server

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of...

lc71147

Leadership Compass

Access Management and Federation

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms....

lc79014

Leadership Compass

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Con...

top