Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.
Language: English • Duration: 54:07 • Resolution: 1920x1080
Thales SafeNet Trusted Access Platform
Providers of Verified Identity
NRI SecureTechnologies: Uni-ID Libra 2.4
IaaS Tenant Security Controls
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity