Buyer’s Guide: Identity-as-a-Service (IDaaS)

Report Details

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation and modify it as necessary to meet specific business requirements.


Date Title Price
Nov 09, 2018

Buyer’s Guide: Identity-as-a-Service (IDaaS)

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes.…

€995.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

Executive View: ViewDS Cobalt - 70851

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully accessible via APIs, Cobalt is uniquely positioned to support the automation and integration requirements of…

Executive View

Executive View: Pirean Consumer IAM Platform - 70223

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single point of access and control that can meet these need with support for secure mobility and flexible workflows.

Whitepaper

Whitepaper: Pirean: Orchestrated Identity for Meeting IAM & CIAM Requirements -70225

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today.  Consumer Identity and Access Management (CIAM) systems and services provide new technical capabilities for organizations to know their customers better. …

Executive View

Executive View: UNIFY Identity Broker - 70263

With today's ever-growing IT requirements for integrations between identity sources, applications and services whether on-premise, the cloud, or hybrid environments, an advanced identity provider service is required to bridge these disparate technologies. UNIFY Solutions overcomes these…

Executive View

Executive View: Ilantus IDaaS Next - 70252

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting…

Leadership Compass

Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E) - 70319

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other…

Leadership Compass

Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the…

Executive View

Executive View: PingIdentity’s PingDirectory - 70294

PingDirectory provides a flexible and scalable base for IAM and customer IAM.  With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs.

Executive View

Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Cross-Border Verification with LIGHTest

Cross-Border Verification with LIGHTest

LIGHTest leverages on existing infrastructures to verify electronic transactions. This ability is especially useful for transactions that are not created in the same trust scheme or country as the entity validating the transaction. This is mainly because creating new infrastructure takes time, money and possibly other unforeseen costs. This post shows an example of how to use LIGHTest in practice. Let us assume there are two businesses that are working together for the first time, one from [...]

Latest Insights

Hot Topics

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00