Vendor Report: Courion
Courion’s flagship products are its identity access management suite that also includes many GRC (governance, risk-management and compliance) features. In fact, Courion’s product strategy is epitomized through its aptly named “Access Assurance” suite of products. Having organically grown its product portfolio from a traditional provisioning solution to a fully fledged access governance solution, Courion has a very homogenous, well integrated set of products. This is in stark contrast to the “mix and match” of some other vendors who have acquired multiple companies with their respective products and have sometimes struggled to integrate those products into a homogenous platform.
While speaking with Courion’s customers and the company itself, we have noticed a very loyal customer base, and a flexible product platform that is fairly simple to deploy – in comparison to other competing products. Courion is working with Integrators and partners, but also offers implementation services as part of its professional services arm. In this perspective, Courion differs from the norm by offering fixed-price implementations for its provisioning and role management products.
|Sep 16, 2010||
Vendor Report: Courion
Courion provides identity management solutions since 1996 and is well established in North America. The company has traditionally not had a focus on Europe, even though several large accounts in Switzerland and the UK are using Courion’s products. This is about to change: the company…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]