Vendor Report: Aveksa

Report Details

Aveksa's claim is "Enterprise Access Governance". The company is one of several startups which provide a GRC platform to support requirements of what Kuppinger Cole calls IAM-GRC, e.g. the Identity and Access Management related aspects of GRC (Governance, Risk Management, and Compliance). Aveksa was founded in 2006, by an experienced team including several former executives from Netegrity, a market leader in identity and access management software that was acquired by CA in 2004. Aveksa has successfully managed to set up an impressive number of partnerships.
From an overall perspective, Aveksa appears as one of the interesting new vendors in the emerging IAM-GRC market segment. The company has an experienced management team and a broad set of partners. Like mentioned above, Aveksa is - like some other vendors - a potential target for acquisitions.
You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 05, 2009

Vendor Report: Aveksa

Aveksa's claim is "Enterprise Access Governance". The company is one of several startups which provide a GRC platform to support requirements of what Kuppinger Cole calls IAM-GRC, e.g. the Identity and Access Management related aspects of GRC (Governance, Risk Management, and…

€95.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00