Buyer’s Guide: Consumer Identity and Access Management Solution - 70259

Report Details

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.


Date Title Price
Sep 11, 2017

Buyer’s Guide: Consumer Identity and Access Management Solution - 70259

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs…

€995.00 Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: Janrain Suite - 70845

Janrain provides a complete solution for Consumer Identity and Access Management (CIAM). Janrain is a pioneer in the field, creating the category of CIAM and developing the popular “ social login” authentication method .

Advisory Note

Advisory Note: Maturity Level Matrix for GDPR Readiness - 72557

KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and identifying specific measures in your GDPR compliance projects and programs.

Executive View

Executive View: Ubisecure Identity Server - 70838

Ubisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs.

Executive View

Executive View: iWelcome IDaaS and CIAM - 70298

iWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers with GDPR compliance, and as such as provides unparalleled consent management features.

Executive View

Executive View: Auth0 Customer Identity Management - 71053

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly…

Executive View

Executive View: SecureAuth IdP - 71327

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Executive View

Executive View: Gigya Identity Enterprise - 70299

Gigya provides a complete solution for  Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service  functionality for enterprise customers.

Survey

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well…

Survey

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Not Just Another Buzzword: Cyber Risk Governance

Today, companies are increasingly operating on the basis of IT systems and are thus dependant on them. Cyber risks must therefore be understood as business risks. The detection and prevention of cyber security threats and appropriate responses to them are among the most important activities to [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00