Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second important feature is that RM5 Software from the very beginning has focused on supporting on-premise and SaaS deployments and on supporting external and internal applications, thus covering all variants of entitlement management.
RM5 Software is, from a KuppingerCole perspective, amongst the vendors which are definitely worth to look at. That is especially true for MSPs looking for technology to provide IAM in SaaS deployments and to optimally support the upcoming hybrid cloud environments. In that area, RM5 Software is well positioned and provides several innovative and rarely found features, especially in that combination.
Besides this, RM5 IdM should be included into evaluations when looking for tools to support consis-tent authorization strategies and the externalization of authentication and authorization from applications. With the strategy to support entitlement management at different levels, RM5 Software is definitely a very interesting vendor in that emerging market segment.
|Apr 26, 2010||
Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]