Media Coverage

Consumer Identity World Tour 2018 USA

Find the perfect Consumer Identity & Access Management (CIAM) Strategy for your Connected Customer Balancing User Experience, Privacy, and Security The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.  In a consumer-driven world, companies have the task to see things from the customer’s perspective. Customer experience is king...

Read More

5 key considerations for choosing an IaaS provider

Is it finally time to get that new car? Where are you spending the holidays this year? Who gets the last slice of pizza? You have enough difficult decisions in your life. Your choice of an infrastructure as a service (IaaS) provider shouldn’t be one of them. The decision you make for your cloud needs will have a profound outcome. It is not always an easy task to decide when you don’t know the measurable factors to compare. Luckily, the absence of those factors shouldn’t be a problem if you’re looking to invest in an IaaS solution. With the explosion of cloud...

Read More

Consumer Identity World USA 2018

Come listen to Rajiv Dholakia, the Nok Nok VP of Products and Business Development, speak about "Business Considerations for Deploying FIDO" during the FIDO Alliance Workshop in Seattle, WA.  Consumer Identity Workshop (CIW) is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.


Read More

SecureAuth + Core Security Named Leader in KuppingerCole Leadership Compass

Since SecureAuth and Core Security merged in September 2017, the company has been dedicated to secure the enterprise across all principal threat vectors with an identity-based approach to the attack lifecycle. We identified six pillars of intelligent identity and security that represent our culture and guide our decisions: Prevention, detection, response, discovery, remediation, and challenge. Two of those were Discovery, a compulsion to continuously ask “what if?” and drive innovation for our customers, and Challenge to “always be improving”. This week ...

Read More

Part 1 – Identity Assurance by Our Own Volition and Memory

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that we advocate is now acknowledged as a ‘Draft Proposal’ for OASIS Open Projects that OASIS has recently launched as a new standardization program. We have publicized an EPS draft specification there. The EPS is also among the topics to be discussed in Seattle (19-21/September) and Amsterdam (29-31/October) at KuppingerCole’s Consumer Identity World 2018 , Besides talking about the EPS as a speaker, the writer will also take part in...

Read More

Landing the Identity Governance ‘Triple Crown’

Innovation is ingrained in our DNA as we constantly look for new and interesting ways to help our customers solve their identity challenges. We spend a lot of time with our customers to better understand their needs so we can deliver the identity solutions they require to address the evolving identity landscape. This is a big reason that we consistently maintain a 95%+ renewal rating with our customers. We also spend a lot of time speaking with the industry analyst community, who spend time with customers, prospects and other vendors in our market.  One such firm, KuppingerCole,...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]

News