Vendor Report: Evidian
Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio.
Despite the breadth of their portfolio, Evidian isn’t usually recognized amongst the leading IAM ven-dors – which they should be. Evidian is at least amongst the best established and leading European IAM vendors. With their strengths in access management, E-SSO, and a consistent, integrated plat-form, Evidian provides an interesting approach to IAM with growing focus on supporting as well specific GRC requirements like policy management or role management.
Thus, Evidian shouldn’t be limited to an E-SSO vendor, where the company is rated amongst the leading-edge suppliers, but should be understood as IAM suite provider with a consistent, well-thought approach to manage identities and access consistently.
We recommend evaluating Evidian not only for E-SSO product selections but as well when choosing core solutions for IAM, including provisioning and web access management.
|Feb 05, 2009||
Vendor Report: Evidian
Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio. Despite the breadth of their portfolio, Evidian…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]
Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]