Vendor Report: Courion
Courion’s flagship products are its identity access management suite that also includes many GRC (governance, risk-management and compliance) features. In fact, Courion’s product strategy is epitomized through its aptly named “Access Assurance” suite of products. Having organically grown its product portfolio from a traditional provisioning solution to a fully fledged access governance solution, Courion has a very homogenous, well integrated set of products. This is in stark contrast to the “mix and match” of some other vendors who have acquired multiple companies with their respective products and have sometimes struggled to integrate those products into a homogenous platform.
While speaking with Courion’s customers and the company itself, we have noticed a very loyal customer base, and a flexible product platform that is fairly simple to deploy – in comparison to other competing products. Courion is working with Integrators and partners, but also offers implementation services as part of its professional services arm. In this perspective, Courion differs from the norm by offering fixed-price implementations for its provisioning and role management products.
|Sep 16, 2010||
Vendor Report: Courion
Courion provides identity management solutions since 1996 and is well established in North America. The company has traditionally not had a focus on Europe, even though several large accounts in Switzerland and the UK are using Courion’s products. This is about to change: the company…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]
Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]