English   Deutsch   Русский   中文    
Research
Executive View
Apr 27, 2015 by Martin Kuppinger
iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.
Executive View
Apr 27, 2015 by Martin Kuppinger
Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.
Executive View
Apr 23, 2015 by Alexei Balaganski
Avencis SSOX is an Enterprise Single Sign-On solution with a focus on flexible strong authentication and mobile device support. Combined with Avencis’ own IAM platform, it provides a foundation for a long-term Identity and Access Management strategy for any organization.
Executive View
Apr 22, 2015 by Martin Kuppinger
Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and external users to connect to internal, web-based applications.
Executive View
Apr 22, 2015 by Alexei Balaganski
AirWatch enterprise mobility management platform provides an integrated combination of technology, support and certification services to address every organization’s unique requirements for implementing a viable Bring Your Own Device strategy.
Blog
Apr 20, 2015 by Martin Kuppinger
A few weeks ago I read an article in Network World, entitled “A common theme in identity and access management failure: lack of Active Directory optimization”. Essentially, it is about the fact that Microsoft Active Directory (AD) commonly needs some redesign when starting an IAM...
Executive View (Français)
Apr 17, 2015 by Alexei Balaganski
Imprivata OneSign® est une solution de gestion d'authentification et d'accès intégrée fortement axée sur le secteur de la santé. Elle offre un accès rapide et sécurisé aux postes de travail, aux bureaux virtuels et aux applications en...
Executive View (Deutsch)
Apr 17, 2015 by Alexei Balaganski
Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und Active...
Executive View (Deutsch)
Apr 17, 2015 by Alexei Balaganski
Imprivata OneSign® ist eine integrierte Authentifizierungs- und Zugriffsmanagementlösung mit einem klaren Fokus auf das Gesundheitswesen. Sie bietet schnellen und sicheren Zugriff auf Workstations, Virtual Desktops und Anwendungen, indem sie die Vorteile der starken Authentifizierung...
Blog
Apr 13, 2015 by Alexei Balaganski
After a long list of high-profile security breaches that culminated in the widely publicized Sony Pictures Entertainment hack last November, everyone has gradually become used to this type of news. If anything, they only confirm the fact that security experts have known for years: the struggle...
 
Events & Podcasts
Congress
May 05 - 08, 2015 in Munich, Germany
European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
Congress
Nov 02 - 05, 2015 in Melbourne, Australia
Asia Pacific Identity, Cloud & Security Conference 2015 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar
Apr 28, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
In this webinar, KuppingerCole Senior Analyst Amar Singh and Thycotic CEO Jonathan Cogley will talk about essentials for the digital transformation of your enterprise: Managing your end user identities and offering end users self-service password reset abilities to increase help desk efficiency...
Webinar
Apr 30, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
Security and the Internet of Everything and Everyone from Industrial Control Systems, through wearable tech, to “smart” devices for home, office and car there is an explosion of “things” being added to the network. But not just things. Our corporate nets are adding partners and their employees,...
Webinar
May 19, 2015 10:00
Mit den jüngsten Sicherheitsvorfällen rücken Systemadministratoren und privilegierte Zugangsdaten weiter in das Zentrum des Interesses. Die nicht abreißenden Schlagzeilen über Fälle von Datendiebstahl bei Unternehmen und Behörden zeigen, dass es sich nicht um Einzelfälle handelt, sondern um ein...
Webinar
May 19, 2015 6:30am CET, 8:30am GST, 12:30pm SGT, 2:30pm AEST
Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.
Webinar
Jun 02, 2015 4:00pm CET, 10:00am EDT, 7:00am PDT
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing...
Podcast
Apr 24, 2015
The constantly accelerating pace of change in today's businesses and their requirements influence all types of organizations, their business and operational processes and the underlying IT. Keeping up to speed with agile, innovative businesses and their requirements increases the demand for...
Podcast
Apr 22, 2015
While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.
Podcast
Apr 22, 2015
Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of these...
Podcast
Apr 17, 2015
Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting lightweight RESTful APIs to expose their existing enterprise services and corporate data to external...
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Internet of Things
It is its scale and interoperability that fundamentally differentiate the Internet of Things from existing isolated networks of various embedded devices. And this scale is truly massive. Extrapolating the new fashion of making each and every device connected, it is estimated that by 2020, the number of “things” in the world will surpass 200 billion and the IoT market will be worth nearly $9 trillion.
KuppingerCole EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole