Product Report: EmpowerID - 71115

Report Details

EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG (Identity and Access Management/Governance) features.

EmpowerID in 2013 announced a new release that shows a respectable attempt to unify the approach to Identity and Access Management in a single tool. EmpowerID now offers User Management, Provisioning, Access Governance, Cloud Single Sign-On (SSO) and Access Management in one product. EmpowerID 2013 is workflow-based, highly configurable and customisable, while paying attention to the current issues in Identity & Access Management, such as Cloud services and the need for extreme scalability.

Overall, EmpowerID is a very interesting and innovative solution. The approach taken is a good choice for integrated IAM suites, but also when looking at various specific requirements. We recommend considering EmpowerID in product selections. A challenge is the still small partner ecosystem, with few partners as of now. We strongly encourage EmpowerID to grow their number of partners.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 23, 2014

Product Report: EmpowerID - 71115

EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG…

€495.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Leadership Compass

Leadership Compass: Access Governance & Intelligence - 71145

Leaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in…

Advisory Note

Architecture Blueprint: Access Governance and Privilege Management - 79045

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and…

Whitepaper

Whitepaper: Saviynt: IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud - 70364

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm…

Whitepaper

Point of View Paper: One Identity - The Journey to IAM Success - 70226

Identity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts…

Whitepaper

Whitepaper: Airlock: Meeting PSD2 Challenges with Ergon Airlock Suite - 70328

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. Ergon’s Airlock Suite provides foundational technical capabilities…

Leadership Compass

Leadership Compass: Identity Provisioning - 71139

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Executive View

Executive View: Atos DirX Identity - 71702

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of…

Executive View

Executive View: OpenIAM Identity and Access Management - 70337

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture…

Executive View

Executive View: Omada Identity Suite - 70301

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high…

Executive View

Executive View: Beta Systems Garancy IAM Suite - 71530

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00