Vendor Report: RM5 Software

Report Details

RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second important feature is that RM5 Software from the very beginning has focused on supporting on-premise and SaaS deployments and on supporting external and internal applications, thus covering all variants of entitlement management.

RM5 Software is, from a KuppingerCole perspective, amongst the vendors which are definitely worth to look at. That is especially true for MSPs looking for technology to provide IAM in SaaS deployments and to optimally support the upcoming hybrid cloud environments. In that area, RM5 Software is well positioned and provides several innovative and rarely found features, especially in that combination.

Besides this, RM5 IdM should be included into evaluations when looking for tools to support consis-tent authorization strategies and the externalization of authentication and authorization from applications. With the strategy to support entitlement management at different levels, RM5 Software is definitely a very interesting vendor in that emerging market segment.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Apr 26, 2010

Vendor Report: RM5 Software

RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their…

€95.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00