Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their attributes but on the authorizations or entitlements these users have in particular systems. The second important feature is that RM5 Software from the very beginning has focused on supporting on-premise and SaaS deployments and on supporting external and internal applications, thus covering all variants of entitlement management.
RM5 Software is, from a KuppingerCole perspective, amongst the vendors which are definitely worth to look at. That is especially true for MSPs looking for technology to provide IAM in SaaS deployments and to optimally support the upcoming hybrid cloud environments. In that area, RM5 Software is well positioned and provides several innovative and rarely found features, especially in that combination.
Besides this, RM5 IdM should be included into evaluations when looking for tools to support consis-tent authorization strategies and the externalization of authentication and authorization from applications. With the strategy to support entitlement management at different levels, RM5 Software is definitely a very interesting vendor in that emerging market segment.
|Apr 26, 2010||
Vendor Report: RM5 Software
RM5 Software is a Finnish software vendor which provides software for managing entitlements in applications for internal and external applications, provided on-premise or in SaaS deployment models. In contrast to identity provisioning products, the main focus is not on users and their…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Broadcom, after having denied the acquisition of Qualcomm earlier this year by Trump administration based on national security concerns, has decided to acquire CA Technologies showing one of the greatest shifts in an acquisition strategy from a semiconductor business to an IT Software [...]
Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]