Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Report Details

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while meeting legal and security requirements.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 03, 2016

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while…

€190.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 72534

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: eperi Encryption Gateway - 70619

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible…

Executive View

Executive View: Vendor Overview CyberArk - 70280

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their…

Executive View

Executive View: EmpowerID - 70894

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Whitepaper

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand…

Executive View

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure…

Executive View

Executive View: CensorNet Cloud Security Platform - 72529

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Whitepaper

Whitepaper: Balabit - Privilege Management - 72705

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The Power of Utility in the Future of Marketing

Guest post by Christian Goy, Co-founder and Managing Director of Behavioral Science Lab In the future, marketing will be driven neither by demographics, on- or off-line behavioral identifiers or psychographics, but by understanding and fulfilling the individual utility expectations of the [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25 th , 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00