English   Deutsch   Русский   中文    

Reports

Filter
By type:

2014
Date Title Price
Aug 25, 2014 Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first foray into attribute-based access control and provided a “discrete” externalized authentication tool… €190.00
Aug 22, 2014 CA Technologies is a multinational publicly held software company headquartered in New York, USA. Founded in 1976 to develop and sell mainframe software, over the decades CA Technologies has grown significantly via a series of strategic acquisitions. Although it used to produce consumer… €190.00
Aug 18, 2014 In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT… €190.00
Aug 18, 2014 Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the database firewall component and the databases themselves. It also collects audit data from other sources… €190.00
Aug 14, 2014 In contrast to common application servers, WSO2 provides a more comprehensive platform, adding on the one hand features such as event processing and business rule management, but on the other hand also providing strong support for security features. The latter includes WSO2 API Manager,… €190.00
Aug 14, 2014 Druva’s approach to information protection is quite unique among traditional solutions, since instead of maintaining a centralized data storage and enabling secure access to it from outside, inSync maintains a centralized snapshot of data backed up from all endpoints and operates on… €190.00
Aug 04, 2014 The word risk is in common use and means different things to different people. This range of use of the word risk makes for potential misunderstandings. This is especially the case where IT related risks are being discussed in a business context. This report is intended to introduce IT… €190.00
Jul 24, 2014 BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States… €190.00
Jul 18, 2014 Symantec was founded in 1982 and has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides a wide range of software and services covering security, storage and systems management for IT… €190.00
Jul 17, 2014 Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market. €1295.00
Jul 15, 2014 The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity… €1295.00
Jul 14, 2014 Die Ergon Informatik AG ist ein in Zürich ansässiges Unternehmen. Neben einem großen Unternehmensbereich für Software-Individualentwicklungen ist Ergon schon seit vielen Jahren auch als Anbieter von Standard-Software am Markt präsent und hat eine signifikante Zahl… €190.00
Jul 14, 2014 Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single sign-on service for multiple devices and for cloud-based applications. The company is VC funded and has… €190.00
Jul 07, 2014 In a press release on June 26 th , the European Commission announced the publication of new guidelines “to help EU businesses use the Cloud”. These guidelines have been developed by a Cloud Select Industry Group as part of the Commission’s European Cloud… €190.00
Jul 07, 2014 There is a growing demand from organizations for tighter communication and collaboration with external parties and, in some cases, customers. At the same time the rapid growth of cloud services is driving the need for robust and flexible authentication solutions. As the network boundary… €190.00
Jul 01, 2014 Big Data is often characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. These properties are usually referred to as volume, velocity and variety. However there are two other important… €995.00
Jun 23, 2014 NetIQ is part of the Attachmate Group, which consists of a number of business units, including Novell and Attachmate. NetIQ is the entity, which now markets the former Novell Identity and Access Management products. The core product of NetIQ today is NetIQ Identity Manager, formerly known… €190.00
Jun 23, 2014 CA SiteMinder® in conjunction with CA SiteMinder® Federation provides secure single sign-on and access management to Web applications and Web services either on-premise, at a partner’s site or in the cloud, from a web browser or a mobile device. €190.00
Jun 23, 2014 EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG… €495.00
Jun 04, 2014 Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific… €495.00
Jun 04, 2014 Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail. However, statistics show that most… €190.00
Jun 04, 2014 Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network… €1295.00
Jun 03, 2014 Most organizations have Microsoft Active Directory in place. The Active Directory (AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange… €995.00
Jun 03, 2014 The Beta Systems Software AG (Beta Systems) SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different systems based on defined processes and… €190.00
Jun 03, 2014 Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen… €190.00
Jun 02, 2014 This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access… €995.00
May 26, 2014 EIC, the European Identity & Cloud Conference, took place for the 8 th time in Munich May 13 th to 16 th , 2014. The conference focuses on Information Security and Privacy. It covers a broad range of topics in four parallel tracks, complemented by parallel roundtables, pre-conference… free
May 13, 2014 Identity and Access Management (IAM) is in constant flux. The merging into IAM of Access Governance and Access Control is a relatively new phenomenon with a high rate of growth. Based on new offerings and changing demand, KuppingerCole predicts several major changes in that market. We… €995.00
May 13, 2014 Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more. €995.00
May 13, 2014 Organizations depend upon the IT systems and the information that they provide to operate and grow. However the information that they contain and the infrastructure upon which they depend is under attack. Statistics show that most data breaches are detected by agents outside of the… €995.00
May 13, 2014 How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected. €995.00
May 13, 2014 Cloud services are built using a technical architecture that may include both proprietary and standard protocols and interfaces. Many of these standard protocols and interfaces are already available and indeed form the basis of cloud connectivity. However the services themselves have… €190.00
May 07, 2014 Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On… €190.00
May 07, 2014 Omada, a Danish vendor, started as a provider of advanced Identity and Access Management solutions and services back in 2000. The core product of the company is its Omada Identity Suite. Omada focuses on adaptable business-centric and collaborative features such as workflows, attestation and… €190.00
May 06, 2014 Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On… €190.00
May 06, 2014 While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product… €495.00
May 02, 2014 There can be many reasons to why a business embarks on a journey to improve its Information Security. There is however one reason which consistently recurs: “Because the auditors says that we need to…” Regulatory requirements include penalties for non-compliance but… €995.00
Apr 25, 2014 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… €190.00
Apr 22, 2014 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking, to… €190.00
Apr 22, 2014 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… €190.00
Apr 10, 2014 Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts… €1295.00
Apr 08, 2014 Enterprise Key and Certificate Management (EKCM) is made up of two niche markets that are converging. This process still continues, and as with all major change of IT market segments, is driven by customer requirements. These customer requirements are driven by security and compliance… €1295.00
Apr 04, 2014 NextLabs is a US-based vendor with headquarters in San Mateo, CA, and a strong footprint as well in the APAC (Asia/Pacific) region. The company focuses on what they call “Information Risk Management”. In fact, the focus is more on Information Risk Mitigation, i.e. practical… €190.00
Apr 01, 2014 VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In… €495.00
Mar 20, 2014 The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity… €995.00
Mar 20, 2014 KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your… €995.00
Mar 14, 2014 Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal… €995.00
Mar 10, 2014 Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and… €995.00
Mar 10, 2014 Unlike the majority of their competitors, Venafi came from an ECM background to become a market leader in their field. Their main competition evolved from EKM devices and HSM manufacturers’ acquisition and consolidation of products. As a result Venafi has a well-developed software… €190.00
Mar 10, 2014 Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both… €190.00
Mar 06, 2014 Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway... €190.00
Mar 04, 2014 Smart information is big data analyzed to provide answers to business questions. SAP HANA is the new runtime backend for SAP Enterprise Applications. It provides high performance database through “in-memory” processing and storage and is especially suited for instant analytics… €190.00
Feb 27, 2014 Why Identity Federation, Cloud IAM, and API Management help organizations in meeting their business needs for agile business processes that connect the organization to their business partners and customers and manage access to Cloud applications. The need for a new organizational structure… €995.00
Feb 25, 2014 Secude is a Swiss-based vendor with a long history in Information Security. Among other accomplishments, they developed today’s SAP NetWeaver Single Sign-On product that then was acquired by SAP and became part of SAP’s own security portfolio... €190.00
Feb 24, 2014 A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining Access Governance and Dynamic Authorization Management. Providing connectivity to target systems… €495.00
Feb 20, 2014 CA Technologies is amongst the largest infrastructure software vendors worldwide. They offer a broad portfolio of products in the IAM market segment, including CA IdentityMinder™ (formerly CA Identity Manager) as their solution for Identity Provisioning. IdentityMinder™ is built… €495.00
Feb 19, 2014 Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance… €995.00
Feb 19, 2014 SAP HANA is the new runtime backend for SAP Enterprise Applications, and is especially suited for instant analytics on the data managed by the applications. This Executive View presents an overview on the security of SAP HANA and gives recommendations on how to address potential weaknesses... €190.00
Feb 14, 2014 Industry networks for secure collaboration are not a new thing. The evolution of these networks started back in the late ‘90s for some industries. While the initial focus sometimes was more about B2B marketplaces, enabling secure collaboration and managing the identities of the… €190.00
Feb 14, 2014 SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There… €190.00
Feb 13, 2014 Secure Information Sharing is the number one challenge these days in Information Security. Organizations on the one hand must enable flexible collaboration with business partners as part of their evolution towards agile, connected businesses. On the other hand, the increasing Information… €190.00
Feb 04, 2014 Akamai is a software platform, originally built on Linux, and able to run on commodity hardware. According to Akamai’s own metrics, at any one time between 15% and 30% of web traffic is going between Akamai servers. It is not a separate network, running as it does over the Internet… €495.00
Jan 28, 2014 Issues faced by CISOs when looking for Enterprise Key and Certificate Management systems, and how to address them. €995.00
Jan 27, 2014 The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of… €1295.00
Jan 22, 2014 This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly… €1295.00
Jan 10, 2014 Brainwave is a French vendor and their product Brainwave Identity GRC is focused on what they describe as identifying and mitigating the user risks. Compliance is an important driver for the acquisition of IAM technology and Brainwave Identity GRC is focused squarely on this need. It… €190.00

2013
Date Title Price
Dec 16, 2013 Recommendations for investing in Information Security in 2014. Predictions of the trends and hypes in Information Security in 2014. Advice on which of these trends and hypes to follow. free
Dec 13, 2013 Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service. €295.00
Dec 03, 2013 Information security in general and identity management in particular have become a critical, more and more sophisticated, and costly component for almost every online service. Developers must either invest a lot of effort to implement and maintain it or integrate a third party solution.… €190.00
Nov 11, 2013 Life Management Platforms (LMPs) combine personal data stores, personal cloud-based computing environments, and trust frameworks. They allow individuals managing their daily life in a secure, privacy-aware, and device-independent way. In contrast to pure personal data stores, they support… €495.00
Nov 11, 2013 CA Technologies acquired Eurekify, a leading provider of role mining and role engineering, in November 2008. Using that technology, CA Technologies has built the current product CA GovernanceMinder. The product is tightly integrated with CA IdentityMinder™, the Identity Provisioning… €295.00
Nov 05, 2013 Identity, Security, and Risk Management as part of a broad solution portfolio. Well thought out IAM and IAG Business Case solution instead of a purely technical one. Choice of on-premise or cloud-based platform allows complete solution for all size businesses... €295.00
Oct 31, 2013 Smart information is big data analyzed to provide answers to business questions. Oracle provides a range of integrated software and hardware tools needed to acquire and analyze big data into smart information. These tools have a particular focus on enterprise concerns including information… €190.00
Oct 28, 2013 This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report shows that there is a range of IaaS service providers with… €495.00
Oct 17, 2013 Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and… €190.00
Oct 14, 2013 Prepare your IT Organization for the major evolutions affecting every business. Become ready to deal with today’s and tomorrow’s approaches to Cloud Computing. Build a competitive on-premise IT if you still need on-premise IT (and most will). Stay in control of your Business… €995.00
Oct 14, 2013 EmpowerID was founded in 2005 and is based out of Dublin, Ohio. EmpowerID was previously known as a niche player, with products like the Active Directory (AD) Self-Service Suite, which provides web-based white pages and password reset for AD... €190.00
Oct 11, 2013 SafeNet’s Comprehensive data-centric security portfolio looks at business cases instead of solely technical solutions, and extends protection and ownership across the data lifecycle as it is stored, created, shared, accessed,and moved. The organisation looks forward to future-state virtual… €295.00
Oct 09, 2013 Despite being one of the more traditional and well-established areas of Identity and Access Management (IAM), and despite the fact there is still an obvious business benefit and quick-win potential in Enterprise Single Sign-On (E-SSO)  there are still many organizations that have not… €190.00
Oct 02, 2013 Recommendations for migrating from legacy Identity Provisioning to CA Technologies Identity Management and Access Governance solutions. Technical issues in migration, planning for migration, best practices, and potential benefits. €295.00
Oct 02, 2013 IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand.  IBM recently acquired SoftLayer Technologies Inc, and at the same time announced the formation of a… €190.00
Sep 27, 2013 With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that… €1295.00
Sep 10, 2013 The standard solution for managing Access and the related risks in SAP environments. Implement SoD controls, keep privileged users under control, and know what could happen in your SAP systems. €295.00
Aug 23, 2013 Securing your business against industrial espionage is about knowing your competitors and stopping your IP getting into their hands. In a Cloud environment you need to be considering all of the risks around Cloud provision, conflicts of interest, legal environments in remote locations, and… €495.00
Aug 23, 2013 One of the most important consequences of the ongoing trend of IT consumerization driven by growing adoption of mobile and cloud computing has been the exponential growth of the number of identities businesses and consumers have to deal with. Unfortunately, as the number of ways for… €190.00
Aug 16, 2013 Threats to critical National technical infrastructure such as Finance, Energy, Telecommunications and Government are a result of human nature, although difficult to treat in the abstract, technical controls can be applied to prevent, detect and resist attempts to subvert... €495.00
Aug 16, 2013 Ping Identity is a specialized vendor focusing on Identity Federation and related use cases. Ping calls this “Identity Bridges”. Their portfolio consists of two offerings: PingFederate is their enterprise solution for standards-based federated identity management; while PingOne… €190.00
Jul 30, 2013 There are various approaches to tackle the BYOD challenge, from MDM (Mobile Device Management) to specialized, secure apps - for instance for email - virtualization approaches on mobile devices, and network security. However, despite the vendor promises there is no single solution that… €190.00
Jul 22, 2013 Joyent offers a range of cloud services that are built on technology that Joyent has engineered rather than on generic virtualization technology. This is claimed to provide greater flexibility, resilience, and performance for cloud customers and their applications. This executive view… €190.00
Jul 19, 2013 KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Product Reports and KuppingerCole Vendor Reports... free
Jul 11, 2013 CloudSigma is a pure IaaS provider and the CloudSigma platform is built on the Linux KVM hypervisor. The CloudSigma platform provides a number of interesting features including persistent storage for each VM, disk encryption by default, and automatic redundancy and failover. This executive… €190.00
Jul 09, 2013 In April 2013 McAfee announced the addition of several products addressing Identity and Access Management to its Security Connected portfolio. The products that were previously developed and sold by Intel include McAfee Cloud Single Sign On and McAfee One Time Password. In addition to the… €190.00
Jul 03, 2013 Salesforce.com is best known as the provider of a cloud based CRM system.  Salesforce also provides a platform which can be used to develop and deploy cloud based applications.  This executive view provides an overview of this platform focused on the security and assurance aspects... €190.00
Jun 27, 2013 With the Expressway API Manager, Intel is attempting to define a new category of platform. It refers to this new platform as a “Composite Platform” designed to expose APIs to business partners and internal or external developers. The Expressway API Manager platform has a… €190.00
Jun 20, 2013 The HP Virtual Private Cloud Service offering from HP Enterprise Services is one of the members of the HP Converged Cloud Strategy within the HP Managed Cloud Service Offering family.  This provides everything needed to run applications and to access them securely over a network. … €190.00
Jun 13, 2013 Amazon Web Services (AWS) provides computing infrastructure that enables organizations to obtain computing power, storage, and other on-demand services in the cloud.  This executive view provides an overview of these services focused on their security and assurance aspects... €190.00
Jun 12, 2013 Detecting and managing covert attacks on IT systems is becoming a serious problem.  Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit crimes including data theft, denial of service and blackmail.  IBM Security… €190.00
Jun 11, 2013 Omada, a Danish vendor started as supplier of advanced Identity and Access Management capabilities in year 2000. Today Omada has, in addition to its IAM capabilities, established itself as a vendor for IAG (Identity and Access Governance), providing compliance, overview and control… €190.00
May 23, 2013 KuppingerCole has bestowed the KuppingerCole European Identity Awards since 2008 in recognition of excellent projects in the area of Identity and Access Management (IAM), GRC (Governance, Risk Management, and Compliance), and Cloud Security. This report gives a brief overview of the project… free
May 22, 2013 In April 2013 McAfee announced the addition of Identity and Access Management solutions to its Security Connected portfolio. The products that were previously developed and sold by Intel include McAfee Cloud Single Sign On and McAfee One Time Password. In addition to the products McAfee… €190.00
May 21, 2013 Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine neue, spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“,… €190.00
May 15, 2013 European Identity Award 2013 for „Best Innovation/New Standard in Information Security”: A new standard that rapidly gained momentum and plays a central role for future concepts of Identity Federation and Cloud Security. free
May 15, 2013 Special Award 2013 for „Bridging the organizational gap between Business and IT”: A project that was far above average when it comes to Business/IT Alignment, by successfully setting up a framework of guidelines and policies plus the required organizational entities and rolling… free
May 15, 2013 European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Holistic IAM/IAG approach following new architectural concepts and enabling Dynamic Authorization Management based on business rules. free
May 15, 2013 Special Award 2013 for „Rapid Re-Design and Re-Implementation of the Entire IAM”: Moving from a traditional, Active Directory-centric environment to full HR integration on a global scale and full support for automated provisioning, based on a clearly defined roadmap for further… free
May 15, 2013 European Identity Award 2013 in category „Best Access Governance and Intelligence Project”: Implementing cross-divisional SoD rules on a global scale at business level, with full integration into the existing Access Governance solution. free
May 14, 2013 Big Data is characterized by three properties: there is now an enormous quantity of data which exists in a wide variety of forms and is being generated very quickly. However, the term “Big Data” is as much a reflection of the limitations of the current technology as it is a… €495.00
May 14, 2013 Big Data provides many opportunities to solve emerging business challenges and Big Data technologies can create business value. However Big Data also creates security challenges that need to be considered by organizations adopting or using Big Data techniques and technologies. This paper… €190.00
May 13, 2013 As in the past years, KuppingerCole has worked out the Top Trends in IAM/IAG (Identity and Access Management/Governance), Cloud Computing, and Information Protection and Privacy. The most important trends are the massive increase in demand for support of the “Extended… free
May 13, 2013 Identity and Access Management (IAM) is a holistic approach to managing identities (both internal and external) and their access within an organisational framework. The key benefit to the business should be to enable people to do their jobs more effectively. If deployed correctly, IAM can… €495.00
May 13, 2013 The ready availability of cloud services has made it easy for employees and associates to obtain and use these services without consideration of the potential impact on the organization. Therefore, in order to ensure good governance over the use of cloud services, it is imperative that… €495.00
May 13, 2013 Most large organizations and a significant number of medium-sized organizations have heavily invested in IAM (Identity and Access Management) and IAG (Identity and Access Governance) during the past few years. Some projects went well; others did not deliver as expected. But even… €495.00
Apr 30, 2013 SAM Enterprise Identity Manager from Beta Systems Software AG (Beta Systems) belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different access control systems based on defined… €295.00
Apr 30, 2013 In 1999 Microsoft entered the Identity and Access Management space with the introduction of Active Directory in Windows NT and the purchase of Zoomit Via which was renamed to Microsoft Metadirectory Server (MMS). MMS was eventually retired and Microsoft re-wrote the system from ground up… €295.00
Apr 26, 2013 The ongoing trend of IT consumerization driven by growing adoption of mobile, social and cloud computing has made a profound impact on our society. It has brought many new challenges for both consumers and businesses, which are now struggling to adapt to the new demands for storing,… €295.00
Apr 26, 2013 ServiceMesh is a company out of Santa Monica, CA that fields a platform in the category of Enterprise Cloud Management, and places a heavy emphasis on policy-based cloud governance. This is a relatively new category and in particular the focus on “Enterprise Cloud Governance”… €190.00
Apr 25, 2013 Atos is one of the largest IT Service Providers worldwide, with more than 70.000 employees and global reach. Following the acquisition of Siemens IT Solutions and Services (SIS), the company changed its name from Atos Origin to just Atos. The company is listed on the Paris Stock Exchange.… €295.00
Apr 12, 2013 Information stewardship uses good governance techniques to implement information centric security for all of your data. Information Stewardship involves the business as well as the IT services group. It creates a culture where the people in the organization understand the sensitivity of… €295.00
Apr 09, 2013 Privilege Management - which, in the KuppingerCole nomenclature, also is called PxM for Privileged Access/Account/Identity/User Management- is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years,… €495.00
Mar 18, 2013 Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)… €495.00
Mar 08, 2013 Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few… €1295.00
Feb 27, 2013 The emerging API Economy is presenting significant challenges to all industry participants. When coupled with the Computing Troika—Cloud, Mobile, and Social computing—the API Economy is bringing about change in strategy requirements that have not ever been presented to… €295.00
Feb 26, 2013 Cloud computing is one of three dimensions in which organizations are moving towards an economy based upon the interconnection IT services. This idea is described in KuppingerCole Advisory Note 70532 “The Open API Economy”. This success of this economy and hence of cloud… €190.00
Feb 25, 2013 Loss and theft of Personally Identifiable Information (PII) from government, military and defense organizations continues to be a significant problem. Given the amount of attention to this area and the wealth of standards and technology available – why do these leaks still occur? This… €295.00
Feb 08, 2013 Oracle Audit Vault and Database Firewall is a new offering combining and enhancing two existing products: Oracle Audit Vault and Oracle Database Firewall. The product monitors Oracle databases and databases from other vendors. On the one hand it can detect and block threats while on the… €190.00
Jan 31, 2013 Vormetric provides a family of data security products—The Vormetric Data Security platform—that protects data across a variety of operating systems, databases, applications and storage architectures. Vormetric provides data security solutions that meet the requirements of the… €190.00
Jan 29, 2013 IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores, including data warehouses, big data environments, and file shares. IBM InfoSphere Guardium takes… €190.00
Jan 16, 2013 Thycotic Software is one of the vendors in the emerging Privilege Management market. Their core product is called Secret Server and supports managing secrets, especially, but not limited to, administrative and service account passwords. In contrast to other vendors in that segment,… €190.00
Jan 08, 2013 GreenSQL Unified Database Security is an integrated database security solution for MySQL, PostgreSQL, Microsoft SQL Server and Microsoft Windows Azure SQL databases aimed at small and medium businesses. Depending on the license, GreenSQL offers different packages such as Database Security… €190.00

2012
Date Title Price
Dec 13, 2012 As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding… €190.00
Dec 05, 2012 With IT organizations constantly facing the dichotomy of doing more with less, the need for products that are well integrated, efficient and cost effective is ever on the increase. KuppingerCole offers a model designed to help IT organizations manage this dichotomy by changing the… €295.00
Dec 05, 2012 MetricStream is a vendor in the GRC (Governance, Risk Management, Compliance) market. Within that market, MetricStream is positioned as an Enterprise GRC vendor with good support for IT GRC, providing solutions that cover business aspects as well as provide the technical integration to IT… €295.00
Nov 30, 2012 Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these… €495.00
Nov 16, 2012 The days when IT lived in an isolated silo within the enterprise and everything was managed from a technical perspective with only traditional computing devices are past. Today’s reality is about more users and new ways to interact with them (Social Computing), more devices (Mobile… €295.00
Nov 02, 2012 salesforce.com is one of the original enterprise cloud application vendors. Coupled with its flagship CRM solution, Salesforce is branching out its expertise into other areas of the cloud computing area. With the introduction of Salesforce Identity, the company is bringing its considerable… €190.00
Oct 19, 2012 The emerging API Economy is presenting significant challenges to all industry participants. When coupled with the Computing Troika—Cloud, Mobile, and Social computing—the API Economy is bringing about change in strategy requirements that have not ever been presented to… €295.00
Oct 17, 2012 This document adds to the KuppingerCole Advisory Notes #70,607 “Migration Options for your Legacy Provisioning” and #70,610 “Migration Options and Guidelines for Oracle Waveset Identity Manager”. It focuses on the Sun Identity Manager (SIM) product, now also known as… €295.00
Oct 16, 2012 On October 4th Microsoft announced the acquisition of Phonefactor, a provider of phone-based multifactor authentication. Microsoft informed us about this acquisition only in a blog post on their Windows Azure blog at the MSDN (Microsoft Developer Network) website . There is no official… €190.00
Oct 15, 2012 Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity… €1295.00
Oct 11, 2012 Novell was acquired by The Attachmate Group in April 2011. The portfolio of Novell has been distributed across three business units of the Attachmate Group. The SUSE portfolio of Linux solutions was made into a business unit that is now simply called SUSE. The Novell business unit will… €295.00
Oct 11, 2012 Novell was acquired by The Attachmate Group in April 2011. The portfolio of Novell has been distributed across three business units of the Attachmate Group.  The SUSE portfolio of Linux solutions was made into a business unit that is now simply called SUSE. The Novell business unit… €295.00
Oct 02, 2012 Can an organization trust an IT service provided through the Cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and Cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private Cloud.” The answer… €495.00
Sep 21, 2012 The nascent API Economy is rapidly maturing and is shaping up to be both promising and challenging. Meeting the challenges of The API Economy will be as important for customers as embracing the personal computer was in the 1980s or embracing the mobile and tablet trends are today.… €495.00
Sep 18, 2012 Atos ist einer der größten internationalen Anbieter von IT-Dienstleistungen mit mehr als 70.000 Mitarbeitern und einer globalen Präsenz. Das Unternehmen ist nach der Übernahme des Bereichs Siemens IT Solutions and Services (SIS) von Atos Origin in Atos umbenannt worden.… €295.00
Aug 28, 2012 Der SAM Enterprise Identity Manager der Beta Systems Software AG (Beta Systems) ist in der Kategorie der Enterprise Provisioning-Systeme mit integrierter Access Governance–Funktionalität einzuordnen. Die Kernfunktionalität ist der strukturierte, automatisierte und… €295.00
Aug 28, 2012 Die Beta Systems Software AG (Beta Systems) ist ein in Berlin ansässiger Anbieter von Standardsoftwareprodukten in den Bereichen IAM (Identity und Access Management), Access Governance, GRC (Governance, Risk Management, Compliance), Data Center Automation, Data Center Audit und… €295.00
Aug 22, 2012 Over the past few years, companies have started investing in Access Governance to better manage access certification, access analytics, and access requests. However that is not sufficient. It is, though, a big step forward for organizations which have not only installed a piece of software… €190.00
Aug 15, 2012 On August 10th, 2012, the University of Bochum (German Ruhr-Universität Bochum) published a research paper titled On breaking SAML: Be whoever you want to be . In that paper the authors provide an analysis of potential security weaknesses in SAML. They analyzed 11 out of 14 major SAML… €190.00
Aug 15, 2012 Recently Eran Hammer, one of the – until then – co-authors and editors of the OAuth 2.0 standard which is currently finalized by an IETF (Internet Engineering Task Force) working group, declared that he will withdraw his name from the specification of OAuth 2.0. He posted about… €190.00
Aug 09, 2012 A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to… €995.00
Jul 11, 2012 This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the principal information security risks associated with Cloud computing and how these risks can be… €995.00
Jul 11, 2012 CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM (Identity and Access Management). Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent… €295.00
Jun 28, 2012 Studie zum aktuellen Status der Umsetzung von Identity und Access Management sowie Identity und Access Governance in der Finanzindustrie in Deutschland und der Schweiz. Studie beauftragt von Beta Systems. Studie durchgeführt von KuppingerCole. free
May 09, 2012 The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread… €495.00
May 08, 2012 The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for providing a quick overview on the progress of organizations towards their goals. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to… €495.00
May 07, 2012 This document extends the Advisory Note #70,607 “Migration Options for your Legacy Provisioning” and focuses on Oracle's Waveset Identity Provisioning system which is also historically known as Sun Identity Management/Manager or, in short, SIM, which before the acquisition of… €495.00
Apr 30, 2012 Die Analyse der Sicherheit von Programmcode ist eines der bedeutendsten Geschäftsfelder im Bereich der sicheren Software-Entwicklung. Für alle gängigen Programmiersprachen gibt es recht reife Produkte und die wichtigsten Innovatoren wurden von den großen… €295.00
Apr 26, 2012 When looking at the topic of this research note, there are two major aspects to look at. One is about “critical infrastructures”; the other is about “the age of cyber attacks”. We’re looking at critical infrastructures in finance industry. However, this is at… €495.00
Apr 24, 2012 Welche Initiativen sollen 2012/2013 auf der Agenda von CIOs ganz oben stehen? Diese Advisory Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei… €495.00
Apr 20, 2012 As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of… free
Apr 19, 2012 Best New Standard 2012 in Category „Best Innovation/New Standard in Information Security”: Providing the Consumerization of SAML. Driving the adoption of federation and making this much simpler. free
Apr 19, 2012 Which initiatives should be top on the agenda of CIOs in 2012/2013? This Advisory note suggests answers to this question, based on the ongoing research of KuppingerCole. The report proposes three initiatives within six areas, which promise specific benefits for the future development of IT.… €495.00
Apr 18, 2012 Special Award 2012 for „Mobile Security”: Swisscom MobileID – secure and easy authentication using the mobile phone with minimal impact on hardware based on ETSI Mobile Signature Standard. free
Apr 18, 2012 Best Project 2012 in the Category „Best Cloud Security Project”: Implementing Federation quickly to support business requirements. Federation becoming a business enabling technology. Building the foundation for future business cases. Enabling secure access to Cloud applications. free
Apr 18, 2012 Best Project 2012 in Category „Best Access Governance and Intelligence Project”: Strategic IAM project adding centralized auditing across all IAM modules. Ready for further expansion of auditing in an IAM ecosystem in a highly security-sensitive environment, including… free
Apr 18, 2012 Best Project 2012 in Category „Best Identity and Access Management Project”: Enabling the hybrid Cloud in an audit-proof way. Based on a flexible, scalable, standards-based architecture. Supporting complex, dynamic approval workflows in a very large scale environment. free
Apr 13, 2012 Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Sun Microsystems by Oracle, of Novell by NetIQ, of Völcker by Quest Software and all the other acquisitions… €495.00
Apr 13, 2012 IAM (Identity and Access Management) and GRC (Governance, Risk Management, and Compliance) are two of the most important IT market segments these days. They are driven by various factors. One is increasing regulatory pressure. Companies need to manage their risks, including access risks to… €495.00
Apr 13, 2012 Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the… free
Apr 13, 2012 Privilege Management - which, in the KuppingerCole nomenclature, is called PxM - is the term used for technologies which help to audit and limit elevated rights and what can be done with shared accounts. During the last few years, PxM has become increasingly popular. Some vendors have… €495.00
Apr 13, 2012 This research note is one of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the varieties of Cloud services and delivery models, the principal risks associated with Cloud computing… €995.00
Mar 29, 2012 Code security analysis has become one of the most important business segments servicing the secure development of software. Products are pretty mature for every mainstream programming language, and large IT companies have acquired the major technology innovators in that segment. There… €295.00
Mar 27, 2012 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking to… €495.00
Mar 26, 2012 Oracle Database Firewall is part of Oracle’s defense in depth approach to security, providing a first line of defense for databases by analyzing database traffic before it reaches the database. Oracle Database Firewall expands Oracle’s solutions for heterogeneous databases,… €295.00
Jan 31, 2012 The Blackbird Management Suite is well architected and is designed to include high levels of integration with the existing support modules for Active Directory and the Windows Server File System. The administrative interface for Active Directory makes use of the Windows Snap-in architecture… €295.00
Jan 12, 2012 ClusterSeven Enterprise Spreadsheet Manager (ESM) is a so-called “End User Computing Governance and Data Intelligence” solution. End User Computing is characterized by business computing activities performed by End Users, typically executed in spread sheet applications such a MS… free

2011
Date Title Price
Dec 21, 2011 Kaspersky Endpoint Security and Kaspersky Security Center are two key components of Kaspersky Open Space Security – the integrated security suite from highly reputable security company Kaspersky Lab. Targeted primarily towards small and medium businesses, Kaspersky Open Space Security… €195.00
Dec 16, 2011 How the Open API Economy is increasing and changing the need for Identity Management. Baking an organization’s core competence into an Open API is an economic imperative. It’s clear that three main trends are driving technology in all areas. It goes without saying… €295.00
Dec 08, 2011 This document is an evaluation of Oracle’s platform for Cloud computing from an information security perspective. Oracle offers a comprehensive set of tools and technologies upon which to build Cloud services. These services which can be built range from IaaS (Infrastructure as a… €195.00
Dec 01, 2011 In 2010, Quest Software acquired the German software vendor Völcker Informatik AG, based in Berlin. Völcker had established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management… €195.00
Dec 01, 2011 This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse Query The Axiomatics Policy Management suite falls into the category of Dynamic Authorization… €195.00
Nov 24, 2011 GTB is a US-based vendor which delivers a suite of products focusing on the DLD and DLP issues, e.g. Data Loss Detection and Data Loss Prevention. The core product GTB Inspector acts as a content-aware reverse firewall which scans all outbound traffic and applies classification on these… free
Nov 16, 2011 Ilex is a French company founded back in 1989. The company, which started with security consulting services, has been offering IAM products for many years, focusing mainly on France and other French speaking countries, but now expanding to other regions. Ilex offers, besides a solution for… free
Nov 16, 2011 Fischer International differentiates itself from other vendors in the IAM market space especially through its strong focus on providing “Cloud Services” through a SaaS solution for the core functions of Identity Management. Unlike most others, Fischer International built its… €195.00
Nov 11, 2011 Courion provides identity management solutions since 1996, is well established in North America,. Although the company has traditionally not had a strong presence in Europe, several large accounts in Germany, Switzerland and the UK are using Courion’s products. This is about to… €195.00
Nov 02, 2011 Nervepoint Access Manager - Self-Service v0.5 is a free tool that provides self-service and password reset functionality as well as account unlock for Active Directory. The product is still deemed “beta” by Nervepoint Technologies, but the recently published v0.5 offers some… free
Oct 28, 2011 agileSI is a product which collects SAP security information and provides this information to Security Information and Event Management (SIEM) tools. The initial release supports ArcSight ESM, the market leader in the SIEM market. Beyond extracting the SAP security information, agileSI… €195.00
Oct 25, 2011 TITUS (www.titus.com) is a privately held company specializing in information classification and data security, including Data Loss Prevention (DLP). The product portfolio consists of several products sup-porting the information classification and some aspects of DLP requirements in… €195.00
Oct 21, 2011 SailPoint is one of the pioneers in the emerging market for Access Governance. The company was founded in 2005 by a group of executives with long experience in IAM (Identity and Access Management) as well as in the general IT market. SailPoint is a company that started focusing exclusively… €195.00
Oct 17, 2011 With DirX Identity, Siemens has been able to establish itself amongst the technically leading vendors in the area of enterprise provisioning. As part of the Atos Origin acquisition of Siemens IT Solutions and Services (SIS) on 1st July 2011, the entire DirX product portfolio has been passed… €195.00
Oct 13, 2011 Securant Technology was a visionary vendor which created the web access management niche in the mid 1990’s. When that company was acquired by RSA, its management team immediately began thinking about what would come next. From that brain-storming emerged Symplified. Symplified was… €195.00
Oct 06, 2011 Corporate IT environments are growing more complex every day. Not only do users within and outside the organization need to access sensitive information, they need to do so on the road and from a wide range of different devices. Identity & Access Management (IAM) is increasingly being… €195.00
Oct 06, 2011 In this second document from our series outlining KuppingerCole’s basic positions on key issues sur-rounding Digital Identity, Security and Infrastructure Management, we will explore the cornerstones of Identity & Access Management, which is mostly known by its abbreviation… €995.00
Oct 06, 2011 Cloud computing provides an opportunity for organizations to optimize the procurement of IT services from both internal and external suppliers. The Cloud is not a single model but covers a wide spectrum ranging from applications shared between multiple tenants to virtual servers used by a… €295.00
Sep 22, 2011 The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade there has been a tsunami of identity and access management technology designed to provide a solution to these needs. However many organizations… €295.00
Sep 14, 2011 CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM. Formerly known as Engiweb Security, the company was renamed following a management buy-out and operates today as an independent software vendor in their core market… €195.00
Aug 29, 2011 This document is an evaluation of Microsoft’s Windows Azure™ Cloud platform from a security perspective. This platform allows organizations to build Cloud applications which are then hosted in the worldwide network of Microsoft datacenters. It also allows organizations to host… €195.00
Aug 19, 2011 Pawaa is specialist on Enterprise Information Protection based in Bangalore, India, offering a number of products and modules for use cases such as integration with Google Docs, SAP Business Objects or as an online storage platform. free
Aug 15, 2011 Lieberman Software is an established vendor in the PxM (Privileged Access, Account, Identity, User Management) market, one of the fastest growing segments in the broader IAM and GRC market. The core product ERPM (Enterprise Random Password Manager) supports the management of all types of… €195.00
Aug 08, 2011 Siemens hat sich mit DirX Identity als einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning etablieren können. Im Rahmen der Übernahme von Siemens IT Solutions and Services (SIS) durch Atos Origin zum 1. 7.2011 ist das gesamte DirX-Produktportfolio an… €195.00
Aug 02, 2011 This research note is the first of series of documents describing KuppingerCole’s basic positions and providing insights into IT Service and Information Security Management. It describes the fundamental building blocks of, including what IT should be able to deliver to the business as… €995.00
Jul 12, 2011 Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)… €295.00
Jun 14, 2011 Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that… €295.00
Jun 10, 2011 As reported extensively in the media, hackers in march of this year successfully attacked the data center of EMC Corp’s RSA security division, obtaining copies of security information for RSA’s SecurID key fob system, a token-based mechanism for creating OTPs (One time… free
Jun 09, 2011 This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides… €195.00
Jun 09, 2011 IAM and GRC are two of today’s most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market… €95.00
Jun 08, 2011 Vasco is a vendor in the Authentication Management market which provides a number of differentiated solutions around strong authentication, electronic & digital signing. The vendor is well known for its broad range of hardware tokens for authentication & signatures and the… €95.00
Jun 08, 2011 BiTKOO is a privately held company that provides solutions for authorization/entitlement management in enterprise IT environments. The company was founded in 2006, starting with its product Keystone based on technology formerly developed for Walt Disney Company. BiTKOO has since broadened… €95.00
May 24, 2011 planningIT is a platform for Business IT Management developed and offered by the German software manufacturer alfabet. planningIT has a number of modules and capabilities, but in the context of this snapshot we will confine ourselves to examining the IT Risk Management module which allows… free
May 10, 2011 Welche Initiativen sollen 2011/2012 auf der Agenda von CIOs ganz oben stehen? Die Research Note liefert, basierend auf dem kontinuierlichen Research von KuppingerCole, Vorschläge für die Beantwortung dieser Frage. Im Report werden für sechs Themenfelder jeweils drei… €95.00
May 10, 2011 IAM and GRC are two of today's most important IT market segments. Increasing regulatory pressures, as well as the ability to execute, drive the evolution of these market segments. KuppingerCole has recently scrutinized these segments, looking at the expected changes related to market… €95.00
May 06, 2011 Siemens is one of the largest companies in the world. Siemens IT Solutions and Services (SIS), responsible for IT-products and services, is one of the different segments [referred to by Siemens as “sectors”] within the group. The established IAM and GRC products from Siemens are… €95.00
May 06, 2011 Application integration is a key requirement to support the business requirements for flexible business processes, spanning a variety of applications. With the cloud and an increasing number of SaaS services, e.g. applications hosted in the cloud, integration moves to a new level of… €95.00
May 06, 2011 The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The Cloud covers a wide spectrum from shared… €95.00
May 06, 2011 Entrust Identity Guard is a representative of the rather new market segment of Versatile Authentication Servers (VAS) and offers a single administration interface for managing up to twelve different authentication factors or authentication methods, respectively. The number of authentication… €95.00
May 04, 2011 Siemens ist eines der größten Unternehmen weltweit. Innerhalb des in verschiedene Segmente [Siemens spricht hier von Sektoren] gegliederten Konzerns gibt es den Bereich Siemens IT Solutions and Services (SIS), der für IT-Produkte und –Dienstleistungen zuständig… €95.00
May 03, 2011 SecurIT TrustBuilder is a Versatile Authentication Server (VAS) provided by the Belgian company SecurIT. The product started as add-on for IBM Tivoli Access Manager but right now works with a broad set of different tools. Beyond the versatility features, TrustBuilder now provides the… free
Apr 27, 2011 The market for Database Security involves a number of different technical solution approaches which are not covered by a single product, but instead require a set of different products and features in order to secure content in databases. As a result, there are many different solutions on… €95.00
Apr 27, 2011 Oracle Sun to Oracle Identity Upgrade program is an initiative aimed at informing Sun customers about the company’s future strategy for former Sun Identity and Access Management (IAM) products, and about their planned migration paths. This program is a follow-up to when Oracle which… free
Apr 13, 2011 Thales SafeSign is a set of stand-alone modules that comprises the full feature-set of so called Versatile Authentication Servers or Platforms (VAS or VAP). It can be deployed as authentication server for token and mobile based One Time Password (OTP), Challenge and Response, EMV/CAP and… free
Mar 25, 2011 Avatier is a vendor in the Identity and Access Management (IAM) market which provides an integrated set of tools to cover core requirements in that market. The AIMS (Avatier Identity Management Suite) supports features like role mining, password management and reset, user provisioning,… €95.00
Mar 24, 2011 Wie jedes Jahr haben die Analysten von KuppingerCole wieder die wichtigsten Trends im Markt für allgemeine IT, Cloud Computing, Governance, Risk Management und Compliance (GRC), Identity und Access Management (IAM) und Mobile Computing herausgearbeitet. An der Spitze dieser Listen steht… free
Mar 23, 2011 The Cloud allows the procurement of IT services from both internal and external suppliers to be opti-mized because the services are delivered through the Internet in a standard way.   The Cloud is not a single model but covers a wide spectrum from applications shared between… €95.00
Mar 15, 2011 Database Governance is the set of policies, procedures, practices and organizational structures ensuring the execution of database related activities in an organization according to defined strategies and controls. Database Governance is required to enforce Information Security for… €95.00
Mar 15, 2011 The Cloud is an environment which allows the delivery of IT services in a standardized way.   This standardization makes it possible to optimize the procurement of IT services from both external and internal providers.   The information security risks associated with… €95.00
Mar 07, 2011 As in the past years, KuppingerCole has worked out the Top Trends in IT in general, Cloud Computing, GRC (Governance, Risk Management and Compliance), IAM (Identity and Access Management) and Mobile Computing. The most important trends are, from our perspective, an increasing level of… free
Mar 05, 2011 Oracle Database Firewall is one of several Oracle offerings in the database security market. It complements other products such as Oracle Database Vault that offer protection within the database by providing protection by analyzing database traffic outside the database. Like few other… free
Feb 24, 2011 8MAN von protected-networks.com ist ein Access Control-Werkzeug, das derzeit Windows-Umgebungen mit dem Active Directory und File-Servern unterstützt. Eine Erweiterung auf weitere Zielsysteme ist in Vorbereitung. Das Produkt unterstützt die Analyse von Berechtigungen, die… €95.00
Feb 14, 2011 CA Service Catalog 12.6 is a comprehensive offering in the Service Management market, going well beyond traditional ITSM and specifically ITIL focused approaches, but also supporting these use cases. The real strength of the product lies in the fact that it acts as centralized instance… free
Feb 09, 2011 IBM Tivoli Live - service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management Database), and Asset Management. It is provided as a joint initiative of the IBM Tivoli product group and… free
Feb 09, 2011 HyTrust is a venture financed company founded in 2007. It is located in Mountain View, CA. The management is experienced, with a history at different leading vendors in the IT industry. The company has successfully built partnerships with several large players, including VMware, Cisco, and… free
Feb 04, 2011 SecureAuth is a single-product vendor. The product SecureAuth IEP is a platform for a strong two-factor authentication based on X.509v3 certificates for web-based applications, federated environ-ments based on SAML, and VPNs. It is deployed as appliance (hard or soft) and provided as well in… €95.00
Jan 25, 2011 Die Verwaltung privilegierter Nutzerkonten gehört nach Ansicht von KuppingerCole zu den größten Herausforderungen, denen sich die IT in den nächsten Jahren zu stellen hat. Sie setzt Lösungen voraus, die in der Lage sind alle (oder zumindest die wichtigsten) Aspekte… €95.00

2010
Date Title Price
Dec 22, 2010 From the KuppingerCole perspective it is mandatory to quickly address the PxM challenges which exist in any IT environment. This requires solutions which cover all (or at least most) of the different aspects of PxM in an integrated solution, for a heterogeneous environment. Cyber-Ark PIM… €95.00
Dec 21, 2010 Zscaler is an integrated SaaS solution for web and e-mail security offered by the US-based company of the same name. It provides a cloud platform for anti-malware and anti-spam protection, application control, and data loss prevention. What makes Zscaler stand out their competitors in… €95.00
Dec 06, 2010 Novell has a long history in the fields of identity and security. The company was one of the pioneers in network operating systems and the corresponding directory and security services. Over the year, it has continued to develop and expand its portfolio. Today, identity and security remain… €95.00
Nov 30, 2010 During September and October 2010 KuppingerCole conducted an independent survey of the status and plans for Virtualization Security amongst organizations. This survey shows that security is a key success factor to virtualization. Organizations transitioning to a virtualized or cloud IT… free
Nov 30, 2010 Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system… €95.00
Oct 12, 2010 Novell Identity Manager 4 is a family of products in the category of enterprise provisioning, allowing synchronizing and managing identities and entitlements, including strong policy and reporting features. Beyond the basic capabilities, Novell has added advanced role management and… €95.00
Sep 30, 2010 SECUDE ist ein Hersteller, der sich auf Sicherheitslösungen spezialisiert hat. Ein wesentlicher Teil des Lösungsportfolios ist im SAP-Umfeld angesiedelt. Dazu zählen neben dem neuen Produkt SECUDE Security Intelligence für SAP insbesondere Funktionen für die sichere… €95.00
Sep 30, 2010 SECUDE is a vendor specializing in security solutions mainly for SAP customers. In addition to their latest product, SECUDE Security Intelligence, the company’s portfolio includes a number of solutions providing authentication and communication within SAP environments. SECUDE… €95.00
Sep 28, 2010 CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity… €95.00
Sep 23, 2010 Novell hat eine sehr lange Historie im Bereich Identity und Security. Das Unternehmen hat mit Netzwerk-Betriebssystemen und den zugehörigen Verzeichnis- und Sicherheitsdiensten begonnen und zählt zu den Pionieren in diesem Markt. Über die Jahre wurde das Portfolio konsequent… €95.00
Sep 20, 2010 Quest Defender is an authentication platform solution that, unlike others in the market, offers true two-factor authentication supporting a wide range of tokens, thus providing strong authentication for a wide range of devices along with simplified token distribution. A special feature,… €95.00
Sep 20, 2010 Oracle Database Security is in fact not a single product but a set of products. It supports different features around securing content in databases. This report focuses mainly on Oracle Advanced Security and Oracle Database Vault but covers the other products as well. This is based on the… €95.00
Sep 17, 2010 The IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated, and traceable manner.… €95.00
Sep 16, 2010 Courion provides identity management solutions since 1996 and is well established in North America. The company has traditionally not had a focus on Europe, even though several large accounts in Switzerland and the UK are using Courion’s products. This is about to change: the company… €95.00
Aug 16, 2010 Der Quest Defender ist eine Lösung im wachsenden Markt für flexible Authentifizierungsplattformen. Im Gegensatz zu anderen Lösungen setzt der Quest Defender konsequent auf eine Zwei-Faktor-Authentifizierung. Dabei werden sehr viele unterschiedliche Tokens unterstützt, so… €95.00
Aug 09, 2010 The Beta Systems Software AG SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on defined processes and connectors to the target systems in a structured, automated,… €95.00
Aug 09, 2010 Adobe LiveCycle ES2 Rights Management ist ein Produkt, das von KuppingerCole der Kategorie Information Rights Management (IRM) zugeordnet wird. IRM ist aus Sicht von KuppingerCole eine der zentralen Funktionen für schlüssige, effiziente und durchgängige Konzepte der… €95.00
Jul 29, 2010 Desktop Virtualization and VDIs (Virtual Desktop Infrastructures) are key topics for many IT managers and decision makers. However, like with every hype topic, there are shortcomings. Investments in VDIs and Desktop Virtualization thus have to be done carefully, after weighing the… €195.00
Jul 05, 2010 Völcker Informatik AG based in Berlin has established itself in recent years as a provider of technically innovative solutions and a vendor to be reckoned with in the field of Identity and Access Management (IAM). In the process, the company has become highly visible in the… €95.00
Jul 02, 2010 This report covers vendors which are, from the KuppingerCole perspective, Hidden Gems in the mar-kets which we are analyzing. The “Hidden Gems” are vendors which are •    relatively small and •    innovative They might be established in… €195.00
May 21, 2010 Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity und Access Management-Markt etabliert. Dabei ist es dem Unternehmen auch gelungen, insbesondere im deutschsprachigen Markt, eine sehr hohe… €95.00
May 04, 2010 Mesaforte is a product of the Swiss firm wikima4. The product arose out of experiences from numerous projects. A series of customers has licensed it and it is being advanced within the scope of regular product development. By now, the solution, originally geared toward monitoring the… €95.00
May 03, 2010 By Victor Chang, Gary Wills and David De Roure This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. Using the Jericho Forum´s Cloud Cube Model (CCM), we classify cloud… €30.00
May 02, 2010 GRC stands for Governance, Risk Management, Compliance. It is used to describe Information Tech-nology which supports these specific business requirements. This report provides a segmentation of the overall GRC market with its different elements, from the C-level dashboards down to… €165.00
Apr 30, 2010 Passlogix is a software vendor which started in the field of E-SSO (Enterprise Single Sign-On) in 1996 and established itself as one of the leading vendors in that particular segment. The company has a significant direct and partner sales channel. In addition, Passlogix has built on the OEM… €95.00
Apr 29, 2010 Mesaforte ist ein Produkt des Schweizer Unternehmens wikima4. Das Produkt ist als Resultat von Erfahrungen aus zahlreichen Projekten entstanden, von einer Reihe von Kunden lizenziert und wird im Rahmen einer regulären Produktentwicklung vorangetrieben. Das ursprünglich auf die… €95.00
Apr 29, 2010 Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their… €95.00
Apr 28, 2010 As in the past years, Kuppinger Cole has worked out 10 Top Trends in IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance). These are complemented by 10 Top Trends in Cloud Computing. The most important trends are, from our perspective, an increasing level of… free
Apr 28, 2010 Wie jedes Jahr haben die Analysten von Kuppinger Cole wieder die zehn wichtigsten Trends im Markt für Identity und Access Management (IAM) sowie Governance, Risk Management und Compliance (GRC) herausgearbeitet. In diesem Jahr kommen erstmals die Top Ten Trends bei Cloud Computing… free
Apr 26, 2010 RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their… €95.00
Apr 26, 2010 Der Beta Systems Software AG SAM Enterprise Identity Manager ist in der Kategorie der Enterprise Provisioning-Systeme einzuordnen. Die Kernfunktionalität ist der strukturierte, automatisierte und nachvollziehbare Abgleich von Identitätsinformationen zwischen verschiedenen Systemen… €95.00
Apr 26, 2010 The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management of access controls, by using existing tools and manual requests to operators for platforms without… €95.00
Apr 15, 2010 The SAP BusinessObjects GRC Access Control (in short AC) solution is a powerful set of tools that help to automate risk analysis and mitigation for user and authorization management in SAP and non-SAP systems. It is a strong product for the SAP ABAP world, and is able to cover non-SAP… €95.00
Mar 30, 2010 Cyber-Ark has established itself as one of the leading vendors of Privileged Access Management (PAM) solutions and offers one of the most functionally comprehensive products in the market. In addition, Cyber-Ark is active in the field of secure file transfer for secure document handling. The… €95.00
Mar 23, 2010 Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changing information, and the abuse of IT systems for example in banking for illegal actions,… €165.00
Mar 15, 2010 Cyber-Ark hat sich als einer der führenden Anbieter im Bereich von Privileged Access Management (PAM) etabliert und dürfte derzeit die größte funktionale Breite im Markt aufweisen. Darüber hinaus bietet das Unternehmen Lösungen für den sicheren Transfer… €95.00
Mar 11, 2010 This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based XACML standard – Extensible Access Control Markup Language – to define authorisation… €95.00
Mar 08, 2010 For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought… €695.00

2009
Date Title Price
Dec 04, 2009 TESIS SYSware, part of the TESIS group, is a private company located in Munich. The group consists of three divisions that are involved in a variety of IT fields. TESIS SYSware’s (hereafter referred to as TESIS) core business is in IT security and identity management. They are a… €95.00
Nov 09, 2009 The two products discussed here, Quest Single Sign-On for SAP GUI and ABAP and Quest Single Sign-On for NetWeaver, are Quest’s offering in the market for Single Sign-On (SSO) between Active Directory-infrastructures and SAP-environments on the basis of Kerberos. Quest also offers a… €95.00
Oct 29, 2009 Amazon is widely known as online retailer, having expanded its bookstore business to many other areas over time. Some time ago Amazon has entered the Cloud Computing market. Amazon provides a broad set of services under their label Amazon Web Services (AWS), with the Amazon Elastic Compute… €95.00
Oct 07, 2009 Mit den beiden Produkten Quest Single Sign-On for SAP GUI and ABAP und Quest Single Sign-On for NetWeaver bietet Quest eine marktführende Lösung für das Single Sign-On zwischen Active Directory-Infrastrukturen und SAP-Umgebungen auf Basis von Kerberos an. Als Option für… €95.00
Oct 05, 2009 Governance, Risk & Compliance - these three terms, in short "GRC" are pretty widely used in these days. Unfortunately, there is great confusion in how this term is used. The reason for this confusion is with high probability the fact that it allows to sell pretty easily all… €195.00
Sep 29, 2009 This report explains XACML, an evolving standard in the field of access control. Access control in IT is of vital importance. Companies use access control technology to protect sensitive systems and information, and to keep assets safe. At the same time, compliance with external regulations… €165.00
Sep 23, 2009 Cloud Computing ist seit etwa zwei Jahren das Modewort schlechthin in der IT-Branche. Historisch geht Cloud Computing auf verschiedene Ansätze zur externen Bereitstellung von Anwendungen oder Speicherplatz, um die Unternehmens-IT zu entlasten oder sogar ganz zu ersetzen. ASP… €165.00
Aug 18, 2009 SAP Security is a wide field. Most SAP Technology Experts think that SAP Security is all about authorizations, user management, roles, profiles and all that highly complicated stuff. But it is like with protecting a house: if you only look at who has which keys for the doors, but forget to… €165.00
Aug 18, 2009 Citrix Systems (Citrix) is an established IT vendor which started with Terminal Server products in Windows environments, allowing users to access sessions which are running on a Windows Server remotely. Based on the success of these market-leading technology, Citrix has consequently… €95.00
Aug 18, 2009 Siemens hat sich mit der seit 2007 verfügbaren Version 8.0 von DirX Identity als einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning etablieren können. Mit der seit August 2009 erhältlichen Version 8.1 hat Siemens die Funktionalität… €95.00
Jul 16, 2009 SAP is the world’s leading vendor of enterprise business systems, with a core focus on ERP (Enterprise Resource Planning), but as well delivering application platforms for business processes and business intelligence solutions. Within the broad portfolio of SAP, the areas of GRC… €95.00
Jul 16, 2009 Quest’s ActiveRoles Server belongs to the category of Enterprise Provisioning products, but it is not a typical standard-issue provisioning solution. Instead, it is a tool for role-based administration of both Active Directory and a growing number of other system environments. As is… €95.00
Jul 15, 2009 Cloud Computing wird häufig als der Bezug von Diensten aus dem Internet gesehen. Diese Definition ist nach unserer Einschätzung nicht korrekt. Der wesentliche Aspekt des Cloud Computings liegt darin, IT als Services zu betrachten, die flexibel bezogen und konfektioniert werden… €165.00
May 26, 2009 Siemens managed to enter the web access management and identity federation market successfully by buying in and then significantly developing technology. Siemens DirX Access’ version 8.1 is a technically accomplished solution with a flexible and modular architecture concept. Siemens… €95.00
May 26, 2009 Siemens is one of the largest companies in the world. Siemens IT Solutions and Services (SIS), responsible for IT-products and services, is one of the different segments [Siemens refers to these as “sectors”] of the company group. The established IAM and GRC products from… €95.00
May 05, 2009 Aveksa's claim is "Enterprise Access Governance". The company is one of several startups which provide a GRC platform to support requirements of what Kuppinger Cole calls IAM-GRC, e.g. the Identity and Access Management related aspects of GRC (Governance, Risk Management, and… €95.00
May 05, 2009 Die Beta Systems Software AG ist ein in Berlin ansässiger Anbieter von Standardsoftwareprodukten. Das Unternehmen unterstützt die Bereiche Security (mit Fokus auf Identity und Access Management) und Compliance sowie Dokumentenverarbeitung, die Verarbeitung von großen… €95.00
May 05, 2009 On Monday the 23rd of March, Microsoft announced that it would - again - delay the launch of ILM 2, the "Identity Lifecycle Manager". The release was now pushed back one whole year, to give Microsoft more time to "validate ILM in long-running live deployments before… €95.00
May 05, 2009 Die vps ID Systeme GmbH (vps) ist eine 100%ige Tochtergesellschaft der börsennotierten Digital Identi-fication Solutions AG. Letztere ist wiederum aus dem Bereich Identifikations- und Sicherheitssysteme des KODAK-Konzerns entstanden und 2003 als unabhängiges Unternehmen… €95.00
May 05, 2009 About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it… €165.00
May 02, 2009 Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity und Access Management (IAM).Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service… €195.00
May 02, 2009 The term of “claims-based identity” and the idea overall of using the term “claim” in Identity and Access Management (IAM) has been introduced by Microsoft some two years ago but the concepts can be used in any environments and technologies can (and sometimes are)… €125.00
May 02, 2009 Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite… €95.00
May 02, 2009 Seit der Übernahme des norwegischen Herstellers MaXware durch SAP sind inzwischen rund zwei Jahre vergangen. Seit diesem Zeitpunkt hat sich SAP IM im Identity Management-Markt positioniert. Die von MaXware übernommenen Produkte wurden in dieser Zeit signifikant wei-terentwickelt.… €165.00
May 02, 2009 The news that Oracle will acquire Sun Microsystems has lead to some uncertainty at existing Oracle and Sun customersin the IAM and GRC market space. That uncertainty will exist for quite some time, given that the acquisition is not expected to close before the summer of 2009. Until that… €165.00
May 02, 2009 GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. Kuppinger Cole observes an trend towards tools which integrate analysis, attestation, authorization management, risk management, Segregation of Duties controls, and role management… €165.00
May 01, 2009 Der dänische Hersteller Omada hat sich in den vergangenen Jahren als wichtigster Technologiepartner von Microsoft im Umfeld von MIIS und Forefront Identity Manager positionieren können. Gemeinsam mit Microsoft wurden eine Reihe von großen Projekten gewonnen und zusammen mit… €95.00
May 01, 2009 Der Quest ActiveRoles Server ist der Produktkategorie Enterprise Provisioning zuzuordnen. Das Produkt ist dabei keine typische Provisioning-Lösung, sondern im Kern ein Werkzeug für die rollenbasierte Verwaltung von Active Directory-Umgebungen, das inzwischen auch eine zunehmende… €95.00
May 01, 2009 Siemens ist eines der größten Unternehmen weltweit. Innerhalb des in verschiedene Segmente [Siemens spricht hier von Sektoren] gegliederten Konzerns gibt es auch den Bereich Siemens IT Solutions and Services (SIS), der für IT-Produkte und –Dienstleistungen… €95.00
May 01, 2009 Die TESIS SYSware ist ein in München beheimatetes Unternehmen in Privatbesitz, das Teil der TESISGruppe ist. Diese Unternehmensgruppe besteht aus drei Teilunternehmen, die sich mit unterschiedlichen IT-Themenfeldern beschäftigen. Die TESIS SYSware (im Folgenden kurz als TESIS… €95.00
Apr 30, 2009 Mit dem Release 5.0 des Virtual Directory Server hat Radiant Logic seine Produktlinie in die VDS Proxy Edition und die VDS Context Edition aufgespaltet, um den spezifischen Anforderungen der Verzeichnisvirtualisierung besser entsprechen zu können. Viele der Anforderungen an Virtual… €95.00
Apr 30, 2009 SailPoint IdentityIQ ist eines der führenden Produkte im aufstrebenden Marktsegment der Identiy/Access-GRC-Plattformen, das leistungsstarke Funktionen in den Bereichen Attestierung, Audit, Analyse und Rollenverwaltung bietet – Letzteres wurde im aktuellen Release deutlich… €95.00
Mar 27, 2009 Die econet AG ist ein in München ansässiges Unternehmen, das 1994 gegründet wurde. Der Fokus des in Privatbesitz befindlichen Unternehmens liegt auf der Unterstützung von IT-Geschäftsprozessen und IT-Diensten. Der Ansatz zielt auf die Verbindung von Identity… €95.00
Mar 27, 2009 Siemens hat auf einer zugekauften und signifikant weiterentwickelten Technologiebasis den Einstieg in den Markt für Web Access Management und Identity Federation erfolgreich bewältigt. Mit der Version 8.1 von Siemens DirX Access wird eine technisch ausgereifte Lösung mit… €95.00
Mar 27, 2009 Engiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with operations as well in some other countries. Engiweb is a one-product company, entirely focusing on their… €95.00
Mar 27, 2009 IBM is amongst the vendors which have entered the IAM market early. Right now, IBM can deliver in most areas of the IAM market, with only few missing elements in their overall portfolio. In the GRC market, the current focus of IBM is more towards SIEM-related GRC issues and log analysis,… €95.00
Mar 04, 2009 Oracle has, largely through making acquisitions, transformed itself over the past few years into one of the leading suppliers in the IAM (Identity and Access Management) and GRC (Governance, Risk Management, Compliance) areas. Within these IT market segments, the Company is now in a… €95.00
Feb 20, 2009 SailPoint IdentityIQ is one of the leading products in the emerging market segment of Identity/Access-oriented GRC platforms, providing strong capabilities in the areas of attestation, auditing and analysis, and role management – the latter with significant improvements in the current… €95.00
Feb 20, 2009 Oracle hat sich in den vergangenen Jahren insbesondere durch Zukäufe zu einem der führenden Anbieter im Bereich IAM (Identity und Access Management) und GRC (Governance, Risk Management, Compliance) entwickelt. Das Unternehmen kann in diesen Segmenten des IT-Markts inzwischen… €95.00
Feb 09, 2009 The concept of Key Performance Indicators is well established at the corporate level, using scorecards as a tool for a quick overview on the progress of organizations. Key Risk Indicators add risk metrics to that view, relating the progress of indicators to changes in risks. The report… €165.00
Feb 05, 2009 Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio. Despite the breadth of their portfolio, Evidian… €95.00
Feb 05, 2009 BHOLD ist ein spezialisierter Anbieter, der sich auf das Enterprise Authorization Management, also die Verwaltung von Autorisierungen für den Zugriff auf IT-Systeme aus Business-Sicht, spezialisiert hat. Diese Funktion stellt eine der Kernfunktionen von generischen GRC-Anwendungen… €95.00
Feb 04, 2009 Entrust zählt zu den bekannten und etablierten Anbietern im Identity Management-Markt. Historisch hat sich das Unternehmen primär als Hersteller und Service-Anbieter im Bereich der Zertifikatsdienste und PKIs (Public Key Infrastructures) positioniert. Im Rahmen der… €95.00
Jan 26, 2009 With release 5.0 of Virtual Directory Server, Radiant Logic has split up its product line into VDS proxy edition and VDS context edition to cater better to the specific demands for directory virtualisation. Many virtual directory requirements arise out of specific deployment problems that… €95.00
Jan 23, 2009 Arcot Systems targets the authentication segment of the IAM market with focus on software-based strong authentication with support for versatile authentication and risk-based authentication. The companies’ revenue model is backed by well established hosted services for the financial… €95.00
Jan 23, 2009 Sun Identity Manager is one of the most well-known products in the Enterprise Provisioning market segment. The product has been continuously improved over the course of the last years, with significant changes especially within the last two releases (7.0 and 8.0). It supports all core… €95.00
Jan 20, 2009 ActivIdentity is a vendor for solutions around strong authentication, Enterprise Single Sign-On (E-SSO), device and credential management, and secure information transfer. The company has been founded in 1985 with headquarters in the US and in Suresnes, France. The company acts as a niche… €95.00
Jan 16, 2009 Enterprise Role Management describes an enterprise-wide approach for defining role models and roles for every type of system which requires roles, going beyond IAM and GRC requirements. Within that concept, there are typically three levels of roles, which we define as Business Roles,… €125.00
Jan 13, 2009 Quest Software has become, after a series of acquisitions, the leading vendor in the segment of Win-dows Management tools. Overall, Quest provides specialized tools to support IT operations in the areas of Windows Management, Application Management, Database Management, and Virtualization… €95.00

2008
Date Title Price
Nov 13, 2008 Lieberman Software is an established software vendor with focus on Add-ons for Windows manage-ment. The core focus is solutions for mass management and PAM (Privileged Account Management). Lieberman Software provides valuable tools for specific problems. These targeted add-ons are very… €95.00
Oct 29, 2008 Free teaser for the complete Identity Management Roadmap 2009 free
Oct 29, 2008 Die aktuellen Marktanalysen von Kuppinger Cole machen deutlich, dass sich das Rollenmanagement in den vergangenen drei Jahren zu einem Kernthema für das Identity und Access Management und das neu entstandene Marktsegment GRC (Governance, Risk Management, Compliance) entwickelt hat. In… €95.00
Oct 15, 2008 €695.00
Sep 24, 2008 €295.00
Sep 22, 2008 Symlabs has launched version 4.0 of its "Virtual Directory Server" and "LDAP Proxy" products in April 2008. Both products are essentially the same code base, but differ in bundled functionality. The LDAP Proxy offers load-balancing, routing and fail-over of directory… €95.00
Sep 16, 2008 Kuppinger Cole + Partner (KCP) hat als Ergebnis einerseits einer Ende 2007 durchgeführten Online-Befragung und zusätzlicher, im Zeitraum Dezember 2007 bis Juli 2008 durchgeführter persönlicher Interviews eine umfassende Studie zum Identity Management-Markt insbesondere… €195.00
Aug 26, 2008 Die Berliner Völcker Informatik AG hat sich in den vergangenen Jahren als ernst zu nehmender und technisch sehr innovativer Anbieter im Identity Management-Markt etabliert. Dabei ist es dem Unternehmen auch gelungen, insbesondere im deutschsprachigen Markt eine für einen… €95.00
Aug 12, 2008 CA hat mit seinem Identity Manager Release 12 ein Produkt aktualisiert, welches Funktionalitäten des eTrust Admin und des 2005 akquirierten Netegrity IdentityMinder Web umfasst. Durch die neuen Möglichkeiten der Administration und die stark anpassbaren Oberflächen kann sich… €95.00
Jul 23, 2008 Die OPENLiMiT Group ist ein junges, ehrgeiziges Unternehmen, dass sich vorgenommen hat, im Markt für so genannte Digitale Signaturen (auch „Zertifikate“ oder „eCarnets“) eine führende Rolle zu spielen. Während andere Anbieter ihre Produkte in der Regel… €95.00
Jun 23, 2008 Microsoft entered the market of Identity Management providers very late and at this stage adapted its portfolio of in-house tools for user account administration and access privileges to the challenges of managing customers' heterogeneous IT infrastructures. Since the strategists in Redmond… €95.00
May 07, 2008 Over the past 2 years the Danish software company Omada has reached the position as Microsoft's most important technology partner in the field of MIIS and ILM. In cooperation with Microsoft the vendor was able to win several major clients. €95.00
Apr 22, 2008 Eine gemeinsame Studie von KCP und Ernst & Young AG Wirtschaftsprüfungsgesellschaft Steuerberatungsgesellschaft Deutschland €295.00
Apr 19, 2008 Single Sign-On (SSO) ist eines der wichtigsten Felder im Identity Management. Durch eine vereinheitlichte Authentifizierung können eine Reihe von Business-Values erreicht werden, darunter reduzierte Risiken für Sicherheit und Compliance sowie niedrigere Service Desk-Kosten. €195.00
Apr 19, 2008 Der dänische Hersteller Omada hat sich in den vergangenen beiden Jahren als wichtigster Technologiepartner von Microsoft im Umfeld von MIIS und ILM positionieren können. Gemeinsam mit Microsoft wurden mehrere Großkunden gewonnen.  €95.00
Apr 19, 2008 GRC (Governance, Risk Management, Compliance) is amongst the most important emerging market segments in IT. KCP expects that there will be tools which integrate analysis, attestation, authorization management, risk management, and role management functionalities to provide an overall GRC… €165.00
Apr 14, 2008 Imprivata OneSign is a hardware-appliance-based solution for enterprise single sign-on, which supports mechanisms for strong authentication and convergence to physical access-control systems. The product holds an exceptional position in this market due to the chosen appliance approach. €95.00
Apr 06, 2008 Imprivata OneSign ist eine auf einer Hardware-Appliance basierende Lösung für Enterprise Single Sign-On, die Mechanismen für die starke Authentifizierung und die Konvergenz zu physischen Zugangskontrollsystemen unterstützt. Durch den gewählten Appliance-Ansatz nimmt… €95.00
Apr 01, 2008 Microsoft ist sehr spät in den Markt der Identity Management-Anbieter eingestiegen und hat in diesem Zuge sein Portfolio über die im Hause vorhandenen Werkzeuge zur Administration von Benutzerkonten und Zugriffsrechten an die Herausforderungen des Managements heterogener… €95.00
Mar 19, 2008 Citrix ist im Markt in erster Linie als Anbieter der Presentation Server-Produkte bekannt. Das Unternehmen hat aber in den vergangenen Jahren um diese Presentation Server herum kon-sequent ein ergänzendes Portfolio aufgebaut. Ein wichtiges Element dabei ist die Access Stra-tegy, unter… €95.00
Mar 12, 2008 Sun Microsystems ist einer der führenden Anbieter im Identity Management-Markt. Nach einer schwie-rigen Phase von Verlusten und sinkenden Umsätzen ist dem Unternehmen der Turnaround gelungen. Das spiegelt sich auch in deutlich verbesserten Produkten im Identity Management und der… €95.00
Mar 12, 2008 CA hat in den vergangenen Jahren eine Reihe größerer Akquisitionen von spezialisierten Herstellern durchgeführt und damit sein eigenes Portfolio an Produkten für das Identity und Access Management erweitert und abgerundet. CA bietet damit ein sehr breites Spektrum an… €95.00
Mar 06, 2008 Entrust zählt zu den bekannten und etablierten Anbietern im Identity Management-Markt. Historisch hat sich das Unternehmen primär als Hersteller und Service-Anbieter im Bereich der Zertifikatsdienste und PKIs (Public Key Infrastructures) positioniert. Im Rahmen der… €95.00

2007
Date Title Price
Dec 11, 2007 BHOLD is a specialized vendor focussing on Enterprise Authorization Management, i.e. the administration of authorizations to access IT systems from business level. In our opinion, this clearly defined and addressed orientation is responsible for BHOLD´s unique position in the market.… €95.00
Nov 12, 2007 Der Report analysiert die aktuell vorgestellte Identity Management-Strategie von SAP und bewertet diese. Dabei wird sowohl auf die technische Ebene als auch die Service-Orientierung und Business-Orientierung einschließlich der Verbindung zu GRC-Ansätzen eingegangen. Der Report… €165.00
Oct 24, 2007 BHOLD ist ein spezialisierter Anbieter, der sich auf das Enterprise Authorization Management, also die Verwaltung von Autorisierungen für den Zugriff auf IT-Systeme aus Business-Sicht, spezialisiert hat. Mit dieser konsequent umgesetzten Positionierung nimmt BHOLD nach unserer… €95.00
Oct 23, 2007 Anwendungssicherheitsinfrastrukturen oder Application Security Infrastructures werden die IT zukünftig immer stärker prägen. Sie sind das Bindeglied zwischen einer zentralisierten, stan-dardisierten IT-Infrastruktur mit Identitäts- und anderen Sicherheitsdiensten auf der… €165.00
Oct 09, 2007 Der Oracle Identity Manager ist die Lösung für das Enterprise Provisioning innerhalb des Oracle-Produktportfolios. Das Produkt zeichnet sich durch eine sehr große Leistungsfähigkeit und Flexibilität in den meisten Bereichen aus und zählt damit aus Sicht von… €95.00
Oct 09, 2007 Passlogix zählt zu den etablierten Anbietern im Enterprise Single Sign-On-Markt. Mit dem Kernprodukt v-GO SSO und ergänzenden Komponenten werden alle wichtigen Anforderungen im Bereich Single Sign-On abgedeckt. Die Lösung ist einfach zu implementieren und zu admi-nistrieren.… €95.00
Aug 08, 2007 Novell hat mit der Version 3.5 seines Identity Managers wieder eine Reihe neuer Funktionen implementiert und die kontinuierliche Entwicklung des Produkts fortgesetzt. Der Identity Manager 3.5 bleibt damit auch weiterhin eines der führenden Produkte im Enterprise Provisioning- Markt. €95.00
Aug 08, 2007 HP hat bereits vor einigen Jahren mit der Akquisition mehrerer Hersteller und Produkte im Bereich Identity und Access Management auf sich aufmerksam gemacht. Allerdings ist es dem Unternehmen im Anschluss zunächst nicht gelungen, größere Sichtbarkeit zu erlangen. Das hat… €95.00
Aug 08, 2007 SECUDE ist ein Spezialist im Bereich der IT-Sicherheitslösungen, dessen Zielsetzung es ist, alle Lösungen aus einer Hand anzubieten, um Informationen zu schützen. Mit Produkten in den Bereichen SAP-Sicherheit, Datenverschlüsselung, sichere Authentifizierung und… €95.00
Jul 25, 2007 Identity Management muss und wird sich von monolithischen, funktional orientierten Produkten in den kommenden Jahren in Richtung zu service-orientierten Ansätzen entwickeln. Dabei gibt es viele Facetten. Diese werden in diesem Report vorgestellt und bewertet. Insbesondere wird dabei… €95.00
Jul 25, 2007 Imprivata OneSign ist eine auf einer Hardware-Appliance basierende Lösung für Enterprise Single Sign-On, die Mechanismen für die starke Authentifizierung und die Konvergenz zu physischen Zugangskontrollsystemen unterstützt. Durch den gewählten Appliance-Ansatz… €95.00
Jul 10, 2007 Product Report Siemens DirX Identity 8 The report describes and analyzes the Siemens DirX Identity 8 product, an offering in the provisioning market segment. €95.00
Jul 10, 2007 Vendor Report Siemens Der Report beschreibt das Produktportfolio von Siemens im Bereich Identity Management und bewertet die Positionierung des Unternehmens in diesem Markt. €95.00
Jul 10, 2007 Vendor Report: Oracle Der Report beschreibt und bewertet das Identity Management-Angebot von Oracle und die Positionierung des Anbieters. €95.00
Jun 12, 2007 Die Völcker Informatik AG ist mit ihrem Produkt ActiveEntry 3.1 einer der interessantesten Anbieter im Provisioning-Markt. Darüber hinaus unterstützt das Produkt Rollenmanagement-Funktionen und liefert Auditing-Dienste. Das Konzept von ActiveEntry 3.1 unterscheidet sich stark… €95.00
Mar 16, 2007 Siemens ist mit der seit 2005 verfügbaren Version DirX Identity 7 einer der technisch führenden Anbieter im Bereich des Enterprise Provisioning geworden, auch wenn die Sichtbarkeit des Produkts am Markt größer hätte sein können. Technologisch war die Version 7… €95.00
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole