Vendor Report: Evidian
Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio.
Despite the breadth of their portfolio, Evidian isn’t usually recognized amongst the leading IAM ven-dors – which they should be. Evidian is at least amongst the best established and leading European IAM vendors. With their strengths in access management, E-SSO, and a consistent, integrated plat-form, Evidian provides an interesting approach to IAM with growing focus on supporting as well specific GRC requirements like policy management or role management.
Thus, Evidian shouldn’t be limited to an E-SSO vendor, where the company is rated amongst the leading-edge suppliers, but should be understood as IAM suite provider with a consistent, well-thought approach to manage identities and access consistently.
We recommend evaluating Evidian not only for E-SSO product selections but as well when choosing core solutions for IAM, including provisioning and web access management.
|Feb 05, 2009||
Vendor Report: Evidian
Evidian is a company mainly owned by Bull Group, a leading French IT company. The company pro-vides solutions for IAM with some GRC support and for IT Service Management, with IAM being the more important element in the overall portfolio. Despite the breadth of their portfolio, Evidian…
Latest Related Reports
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Recently, I came across a rather new and interesting standardization initiative, driven by the NSA (U.S. National Security Agency) and several industry organizations, both Cyber Defense software vendors and system integrators. OpenC2 names itself “a forum to promote global development and [...]
Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]