Vendor Report: AlertEnterprise - 71048

Report Details

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 26, 2015

Vendor Report: AlertEnterprise - 71048

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

€495.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Executive View

Executive View: Indeed AirKey Enterprise - 71256

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure.

Executive View

Executive View: Auth0 Authentication Service - 71325

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are…

Executive View

Executive View: AdNovum Nevis Security Suite - 71094

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Executive View

Executive View: YubiKey by Yubico - 70842

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed…

Leadership Brief

Leadership Brief: Join the Dots: Operational Technology and Informational Technology - 72012

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.  

Executive View

Executive View: FIDO Alliance - 71504

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00