Vendor Report: Arcot Systems

Report Details

Arcot Systems targets the authentication segment of the IAM market with focus on software-based strong authentication with support for versatile authentication and risk-based authentication. The companies’ revenue model is backed by well established hosted services for the financial industry, mainly in providing cardholder authentication to credit card companies.

The company provides several leading-edge solutions in the areas of risk-based authentication, web-based versatile authentication, and soft tokens. There is a significant potential to enter the enterprise IT market especially with low-footprint strong authentication solutions and for the upcoming approaches of context-based authentication.  In August of 2008 Arcot expanded its reach into this market by executing a deal with CA under which CA resells and supports Arcot’s authentication solutions.

We recommend analyzing the potential of Arcot Systems’ solutions as well in their classical use cases within the secure online business markets as within the enterprise IT market.

 

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 23, 2009

Vendor Report: Arcot Systems

Arcot Systems targets the authentication segment of the IAM market with focus on software-based strong authentication with support for versatile authentication and risk-based authentication. The companies’ revenue model is backed by well established hosted services for the financial…

€95.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00