Media Coverage

Janrain Identity Central Accelerates Implementation of Customer Identity and Access Management (CIAM) from Weeks to Minutes

Janrain , the company that pioneered the Customer Identity and Access Management (CIAM) category, announced Janrain Identity Central, which allows companies to provide comprehensive customer registration, authentication, single sign-on, preference and consent management, as well as self-service account recovery significantly faster, with less effort and at lower cost, while accommodating the largest and most sophisticated use cases within Global 1,000 enterprises. Janrain Identity Central allows: Developers to add Janrain’s full suite of centralized enterprise-grade...

Read More

Janrain unveils next-gen customer identity management as a service (IDaaS) offering

Janrain released Janrain Identity Central, which allows companies to provide customer registration, authentication, single sign-on, preference and consent management, as well as self-service account recovery while accommodating the use cases within Global 1,000 enterprises. Janrain Identity Central allows: Developers to add Janrain’s full suite of identity services to their applications in just minutes–new identity features can be activated centrally without any application code changes API-first, rapid development supporting Continuous Integration and Continuous...

Read More

Three factors marginalising the CISO role

Where organisations do have a chief information security officer (CISO), the role is typically being marginalised in comparison with other members of the C-suite, according to Jean-Christophe Gaillard , managing director of management consultancy firm Corix Partners. “What a CISO does varies enormously from one organisation to the next, but most are still doing a very technical job and dealing with incidents, so rarely do they have the time, inclination or profile to look at more transformational or strategic matters,” he told the KuppingerCole Cyber Security...

Read More

User behaviour analytics adding new insight

User behaviour provides the crucial link between security and identity management, according to Martin Kuppinger , founder and principal analyst at KuppingerCole. “ User behaviour analytics  [UBA] has reached a reasonable level of maturity, has a potentially high impact on improving security and is a very promising technology,” he told the opening session of the inaugural KuppingerCole Cyber Security Leadership Summit in Berlin. Instead of focusing only on what is happening in a network, UBA is about users and what they are doing, and analysing that to...

Read More

TechDemocracy announces IT risk management platform for Amazon Web Services

TechDemocracy , a market leader for IT risk management (ITRM) solutions, announced that its flagship platform, Intellicta , is now optimized for Amazon Web Services (AWS), letting boards of directors and senior management teams bridge the visibility gaps across their compliance, security, risk and governance functions, all while merging their enterprise security silos with AWS. Intellicta’s unique Digital Risk Management (DRM) Assurance framework offers the capability of getting a proactive and comprehensive view of the overall cybersecurity resilience and all-inclusive...

Read More

Zero-trust security not an off-the-shelf product

Many security suppliers are releasing products that are claimed to be based on the zero-trust security model, says Paul Simmonds , fellow analyst at KuppingerCole. “But ensure you select products with care,” he told the KuppingerCole Cyber Security Leadership Summit in Berlin. Simmonds warned security leaders to be wary of suppliers’ claims and check whether they are just jumping on the “buzzword bandwagon” and re-badging old products. To be able to discriminate between products, security leaders need to understand what zero trust is and...

Read More

Thycotic Releases Secret Server Cloud Fall Edition Amidst 240 Percent Year-Over-Year Sales Growth

Thycotic, provider of privileged account management (PAM) solutions for more than 10,000 organizations worldwide, today announced tremendous growth of its cloud business, led by 240 percent year-over-year sales growth for its PAM Software-as-a-Service offering, Secret Server Cloud. With the 10.5 release of Secret Server Cloud earlier this year , Thycotic became the leading fully-featured PAM solution available both on premise and in the cloud. This November, the company began the rollout of a new user interface and experience for Secret Server, debuting in this Fall Edition. This...

Read More

Axiomatics’ Måns Håkansson to Speak at Prestigious KuppingerCole Cyber Access Summit 2018

Axiomatics , the leader in externalized, fine-grained dynamic authorization, today announced that Måns Håkansson, solutions architect, will speak at two sessions at the KuppingerCole Cyber Access Summit (CAS) 2018, November 12-14, 2018 in Berlin. Axiomatics is also a sponsor and exhibitor, booth DP1, of this year’s event. CAS is Europe’s leading event for shaping the future of digital transformation. This year’s summit focuses on current topics and trends in the field of identity and access management (IAM). Attendees will learn more about the critical...

Read More

The importance of CIAM in today’s market

The need for Customer Identity and Access Management has never been so necessary. Digital identities are no longer merely extensions of our actual identity; it could be argued that in the digital age the two are now intertwined. With this new symbiosis comes greater cyber responsibilities, something businesses need to pay apt attention to. CIAM is all about deploying strong solutions that securely capture and manage consumer identities and profile data, as well as safely and responsibly controlling customers’ accessibility to applications and services. A strong CIAM solution...

Read More

Key elements to success in consumer identity management

The top thing to keep in mind when embarking on consumer identity projects is to ensure the signing up process is easy, according to John Tolbert, lead analyst at KuppingerCole. “Consumers or citizens just want to get things done and are not overly concerned about the identity piece, but they will abandon the sign-up process if they find it overly burdensome or if it asks for too much information,” he told Consumer Identity World Europe  in Amsterdam. Next, said Tolbert, it is a good idea to provide a choice of authentication methods that not only reduce...

Read More

New KuppingerCole Report Highlights the Importance of Securing DevOps and Agile IT Environments

KuppingerCole has just released a new report “ Security for DevOps and Agile IT: Preventing attacks in highly dynamic environments.”  Authored by Martin Kuppinger and published in October 2018, the report addresses many of the key topics that security practitioners, security leaders and development team leads exploring the need for increasing the security of DevOps environments likely need to address. Expanded Attack Surface Organizations are discovering that as the use and adoption of DevOps and Agile IT has increased, securing these environments has become...

Read More

Aim for long-term customer identity relationship

Customer identity and access management (CIAM) is “ customer relationship management on steroids”, but the long-term goal should be building and retaining trust, according to Matthias Reinwarth , lead advisor and senior analyst at KuppingerCole. “It is important to value customers and not to annoy because trust takes years to build, but can be broken in seconds and takes forever to repair,” he told the opening session of Consumer Identity World Europe  in Amsterdam. Businesses need to look beyond the technicalities of registration,...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]

News