Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second important feature is that RM5 Software from the very beginning has focused on supporting on-premise and SaaS deployments and on supporting external and internal applications, thus covering all variants of entitlement management.
RM5 Software is, from a KuppingerCole perspective, amongst the vendors which are definitely worth to look at. That is especially true for MSPs looking for technology to provide IAM in SaaS deployments and to optimally support the upcoming hybrid cloud environments. In that area, RM5 Software is well positioned and provides several innovative and rarely found features, especially in that combination.
Besides this, RM5 IdM should be included into evaluations when looking for tools to support consis-tent authorization strategies and the externalization of authentication and authorization from applications. With the strategy to support entitlement management at different levels, RM5 Software is definitely a very interesting vendor in that emerging market segment.
|Apr 26, 2010||
Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Guest Author: Vinny Lingham, CEO, Civic Technologies Bitcoin. Blockchain. Crypto. Decentralization. Tokens. A lot of buzzwords have emerged alongside the rise of blockchain technology. Yet, there is often a lack of context about what those terms actually mean and the impact they will have. [...]
Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]