KuppingerCole Report
Executive View
Tremolo Security - A Different Approach
It’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain us and restrict our agility in deploying identity management services.
Tremolo Security breaks the mold and asks us to focus on the task to be performed, and then to deploy an optimal solution.
Content of Figures
1 Introduction
It's fair to say that the identity and access management (IAM) market is mature. Most large organizations now have an IAM environment that manages on ...
Login Free 30-day Select Access Get full Access2 Product Description
Building on the extensive experience of its founders, Tremolo Security have taken a different approach to identity and access management. They are not ...
These equate to four main IAM functions:
-
Provisioning Typically a new user accesses the on-line service request page and requests access to ap ...
3 Strengths and Challenges
The OpenUnison IAM solution is built on the company founder’s long experience working in the identity and access management sector. It recognizes th ...
Login Free 30-day Select Access Get full Access