Executive View: EmpowerID - 70894

Report Details

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.


Date Title Price
Apr 21, 2017

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

€190.00 Get Access

Latest Related Reports

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their…

Advisory Note

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained …

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Executive View

Executive View: Hitachi ID IAM Suite - 72543

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and…

Advisory Note

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Executive View

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure…

Executive View

Executive View: Ping Identity’s PingFederate - 70284

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain.

Executive View

Executive View: CensorNet Cloud Security Platform - 72529

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00