Advisory Note: Trends in Authentication and Authorization - 71043

Report Details

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 13, 2014

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

€995.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

Keyless Biometric Authentication

Keyless specializes in advanced authentication technologies to help customers increase authentication assurance and decrease risks of data leakage. Keyless delivers passwordless authentication utilizing state-of-the-art biometrics and innovative cryptography that improves enterprise and…

Buyer's Compass

Providers of Verified Identity

It is no longer enough to create and secure user identities. Verifying that the identity does indeed describe the individual it was created for is a valuable capability in many use cases, including authentication, remote onboarding, and enabling high value transactions. This Buyer's Compass…

Executive View

NRI SecureTechnologies: Uni-ID Libra 2.4

Consumer Identity and Access Management (CIAM) continues to be a growing market, offering a better user experience for the consumer and new challenges for the organization. NRI Secure's Uni-ID Libra, with a focus on the Japanese market, continues to provide innovative features within its…

Executive View

WALLIX Bastion

WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and privileged management for machines and applications. The product also provides detailed session recording,…

Whitepaper

Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigen

Die meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben sind komplex und schwerfällig. Bestehende IGA-Lösungen kommen dadurch an ihre Grenzen und werden als…

Whitepaper

Overcoming Identity Governance Challenges with ForgeRock Autonomous Identity

Most organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex and cumbersome. As a result, existing IGA solutions are faltering. Dynamic businesses require new approaches…

Leadership Compass

Privileged Access Management for DevOps

Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and…

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity provides the necessary migration framework to facilitate an IGA modernization transition.

Buyer's Compass

Access Management

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners and customers. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors,…

Leadership Brief

Recommendations for aligning ITSM with IAM/IGA

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those related to IAM/IGA. But this is a risky strategy from a maintenance and compliance point of view. This…