Reports

Reload reports without any filters applied

Selected Filter(s):

 All Reports
Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.

Architecture Blueprint

KuppingerCole Architecture Blueprints provide a detailed architectural perspective on a defined area. They illustrate the relevant technical components and their interplay, and they provide advice on how to build your own infrastructure for such area.

Buyer's Compass

KuppingerCole Buyer’s Compass is an instrument that delivers the key criteria to look at when choosing a service/product from a certain category. It lists the most relevant functional and non-functional requirements, lists questions to ask the vendors, and maps capabilities to the main use cases.

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.

Leadership Compass

KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.

Product Report

KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.

Survey

KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.

Vendor Report

KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.

 2019

top  

Date Title Price
Dec 02, 2019

Leadership Compass: API Management and Security - 70311

Alexei Balaganski

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements in the most efficient way. We examine the complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise and identify the vendors, their products,…

Nov 28, 2019

Whitepaper: Digital Transformation for Business Enablement Requires a Modern Identity Fabric - 80165

Martin Kuppinger

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything  to every digital service effectively, transformation initiatives will fail. Business can’t afford to implement these capabilities on a per service basis – this will increase cost, slow down time-to-market and lead to…

Nov 25, 2019

Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170

Martin Kuppinger

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide identity services that can be consumed by digital services. Focus is shifting from modern UIs for managing existing applications to APIs that provide the identity services. Modern Identity Fabrics must serve both…

Nov 22, 2019

Buyer's Compass: Blockchain ID - 80050

Anne Bailey

Blockchain identity solutions are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and gaining maturity, selecting a vendor to provide blockchain ID solutions should be done with care. This KuppingerCole Buyer’s Compass will equip you with key criteria and questions to help select an appropriate vendor.

Nov 21, 2019

Executive View: IBM Cloud Pak for Security - 80172

Martin Kuppinger

IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybrid and multi-cloud environments. It provides a consolidated view on security and threat information across a range of sources from IBM and other vendors. It supports federated search across that data, plus…

Nov 19, 2019

Executive View: Identity Automation’s RapidIdentity Solution - 80028

Martin Kuppinger

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standard IAM capabilities, RapidIdentity helps healthcare organizations access a unified solution instead of relying on disparate point solutions. RapidIdentity’s cohesive suite of tools reduces…

Nov 18, 2019

Leadership Brief: Top 3 Initiatives to Improve CX and Customer Journeys - 80293

Roland Bühler

When it comes to digital marketing, companies of all business sectors try to constantly improve customer experience (CX) and customer journeys. In many cases, there is a single focus on technological topics, such as machine learning or conversational interfaces. But, is technology the key to success? This leadership brief gives an overview of relevant topics regarding optimization of CX…

Nov 18, 2019

Executive View: IBM Decentralized Identity - 80099

Anne Bailey

The IBM Decentralized Identityplatform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized identity solution has prioritized interoperable protocols rooted in Hyperledger Indy and Aries to provide secure exchange of information. IBM’s decentralized identitysolution can help enterprises…

Nov 14, 2019

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Paul Fisher

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die…

Nov 13, 2019

Leadership Compass: Identity as a Service (IDaaS) IGA - 80051

Martin Kuppinger

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for traditional IGA use cases, helping IDaaS IGA to increasingly become the preferred choice of customers for IAM…

Nov 13, 2019

Executive View: ForgeRock Access Management - 80319

John Tolbert

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform.  It provides numerous authentication options, an intelligent adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards development, and that is reflected by…

Nov 11, 2019

Whitepaper: Modern B2B Identity Management - 80135

Richard Hill

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM) becomes a crucial consideration. IAM shares standard features that can be used in B2E or B2C use cases as well, but IAM in the B2B context has specific requirements that need to be addressed. B2B…

Nov 11, 2019

Architecture Blueprint: Identity and Access Management - 72550

Matthias Reinwarth

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities leads to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse and sometimes even conflicting. Organization demand for a blueprint to design and implement efficient and durable IAM architectures that meet current and…

Nov 08, 2019

Executive View: IBM MaaS360 with Watson - 79067

Warwick Ashford

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With an open platform for integration with existing apps and infrastructure, IBM MaaS360 is backed by around-the-clock customer support and services, and…

Nov 07, 2019

Leadership Compass: Infrastructure as a Service – Global Providers - 80035

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Nov 07, 2019

Whitepaper: Understanding Privileged Access Management - 80302

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more…

Nov 06, 2019

Buyer's Compass: Endpoint Detection & Response (EDR) - 80213

John Tolbert

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments.…

Nov 04, 2019

Executive View: Atos DirX Access - 80167

Martin Kuppinger

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User…

Oct 31, 2019

Executive View: Ping Identity Data Governance - 70295

Richard Hill

In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply with the growing number of privacy regulations. PingDataGovernance provides the capabilities to control how data is accessed from data stores as well as giving data protection at the API layer.

Oct 30, 2019

Executive View: One Identity Safeguard Suite - 80074

Paul Fisher

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation. One Identity Safeguard Suite is a PAM solution that uses a modular approach across password management, session management and privilege account analytics.

Oct 28, 2019

Executive View: Microsoft Azure Active Directory - 79077

Richard Hill

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD) provides Directory Services, Identity Federation, and Access Management from the cloud in a single…

Oct 25, 2019

Leadership Brief: Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits? - 80271

Anne Bailey

The conversation on artificial intelligence and machine learning is still largely driven by hype. But concrete business benefits exist for narrow AI solutions, and it is time to separate hype from reality. This leadership brief identifies the characteristics of successful AI use cases, provides examples across multiple industries and business departments, and provides recommendations on…

Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

Oct 24, 2019

Leadership Brief: Penetration Testing Done Right - 70359

Paul Simmonds

Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious actors; however, a penetration test is not a simple “off-the-shelf” test and needs careful design and planning.

Oct 23, 2019

Leadership Brief: Do I need Network Threat Detection & Response (NDTR)? - 80296

John Tolbert

NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reasons to consider NTDR, and some high-level evaluation criteria regarding NTDR products.

Oct 17, 2019

Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123

Paul Fisher

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no…

Oct 15, 2019

Executive View: Optimal IdM - Optimal Cloud - 80162

Richard Hill

For many organizations, the adoption of cloud services has become a strategic imperative which includes moving security services to the cloud as well. Optimal IdM provides a comprehensive identity management solution that provides federation, single sign-on, and strong two-factor authentication all within a private cloud.

Oct 09, 2019

Executive View: Curity Identity Server - 80159

John Tolbert

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to deploy necessary new features while shielding users from complexity.

Oct 08, 2019

Executive View: Devolutions PAM Solution - 80070

Martin Kuppinger

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced capabilities of the leading-edge PAM solutions are lacking, the product fits well to the target group…

Oct 07, 2019

Executive View: AWS Control Tower - 80219

Mike Small

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex.  One area of concern is managing administrative access – administration is an essential process, but the administrator accounts provide the keys to the kingdom. This report describes how AWS Control Tower helps to…

Sep 26, 2019

Leadership Compass: Consumer Authentication - 80061

John Tolbert

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions.

Sep 24, 2019

Executive View: Tremolo Security – A Different Approach - 80160

Graham Williamson

It’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain us and restrict our agility in deploying identity management services. Tremolo Security breaks the mold and asks us to focus on the task to be performed, and then to deploy an optimal solution.

Sep 20, 2019

Leadership Brief: Responding to Cyber Incidents - 80209

Mike Small

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question is not if your organization will suffer a cyber incident but when - and this makes it essential to…

Sep 18, 2019

Advisory Note: Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm? - 80301

Anne Bailey

Blockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from its fame before a firm can find an appropriate use case. This report deconstructs the main features that make blockchains unique from traditional database software and identify the ways that…

Sep 17, 2019

Executive View: Oracle Data Safe - 80076

Alexei Balaganski

Oracle Data Safe is a cloud-based service that improves Oracle database security by identifying risky configuration, users and sensitive data, which allows customers to closely monitor user activities and ensure data protection and compliance for their cloud databases.

Sep 17, 2019

Whitepaper: Ein schlanker Ansatz für Identity & Access Governance - 80107

Martin Kuppinger

Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die Ansätze zu Identity & Access Governance zu überprüfen und schlanke Konzepte umzusetzen, die Unternehmen helfen, sich effizient an die Vorschriften zu halten und gleichzeitig…

Sep 17, 2019

Whitepaper: A Lean Approach on Identity & Access Governance - 80048

Martin Kuppinger

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean concepts that help businesses to comply in an efficient manner, while also effectively mitigating business risks that derive from excessive…

Sep 17, 2019

Advisory Note: The Future of Cryptocurrencies - 80263

Anne Bailey

Cryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread adoption of cryptocurrencies, but also many challenges including data protection and tracking criminal activities. The relationship between government regulators, financial institutions, and…

Sep 13, 2019

Leadership Brief: PSD2: New business opportunities and risks - 80303

John Tolbert

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for consumers, and create new business opportunities in the financial sector. However, new opportunities also imply new risks.

Sep 12, 2019

Leadership Brief: Top Cyber Threats - 72574

Christopher Schuetze

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them.

Sep 11, 2019

Leadership Brief: How to set up your IAM organization - 72548

Christopher Schuetze

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs and IAM Security Officers are struggling to promote and develop the maturity of skills in the silos of technical identity management services. Adapting the structure of IAM organizations so that they are based…

Sep 11, 2019

Leadership Brief: How to get a Grip on OT Cybersecurity - 72573

Richard Hill

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT is inevitable, so get started now on getting a grip on your OT Cybersecurity.

Sep 10, 2019

Whitepaper: Why Modern Enterprise IAM Must Be Rearchitected: Build Your Case for Containerized IAM and IDaaS - 80044

Martin Kuppinger

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such architectures provide clear benefits when used for IAM, allowing customers to shift from lengthy deployments of complex IAM tools to an agile deployment and operations approach, based on continuous innovation.…

Sep 10, 2019

Executive View: Akamai Zero Trust Security - 80054

Alexei Balaganski

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud.

Sep 09, 2019

Executive View: Uniken REL-ID Security Platform - 80045

Roland Bühler

When it comes to omni-channel and multi-device marketing and commerce, authentication is an important topic. The challenge is to achieve both security and the user experience as part of an integrated customer journey. UNIKEN REL-ID is a security platform that addresses that challenge across various channels, including mobile, web, voice, and chat.

Sep 04, 2019

Executive View: AdNovum NEVIS Security Suite - 80066

John Tolbert

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Sep 03, 2019

Executive View: Oracle Identity Cloud Service - 80156

Mike Small

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications.  While this provides many benefits it also creates challenges around security and administration.  Managing identity and access in a consistent manner across all IT services, irrespective of how they are delivered, is key to meeting these challenges.  This report…

Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Sep 02, 2019

Executive View: IBM Cloud Identity - 79065

Paul Fisher

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. The promise of improved time-to-value proposition is prioritizing adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS to dominate new IAM purchases globally. This report is an…

Sep 02, 2019

Leadership Brief: Identity Fabrics - Connecting Anyone to Every Service - 80204

Matthias Reinwarth

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together and how value is delivered to customers. Ever-changing application and infrastructure architectures reflect the requirements of the evolving challenges that face companies, government agencies and educational…

Aug 30, 2019

Leadership Compass: Identity API Platforms - 79012

Richard Hill

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT environments seen today. This Leadership Compass will give you an overview and insights into the Identity API Platform market; providing you a compass to help you find the product that you need.

Aug 29, 2019

Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194

Matthias Reinwarth    Christopher Schuetze

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall oder ihre erhebliche Beeinträchtigung kann zu anhaltenden Versorgungsengpässen,…

Aug 29, 2019

Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065

Matthias Reinwarth    Christopher Schuetze

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic…

Aug 29, 2019

Executive View: Micro Focus® Data Protector - 80193

Mike Small

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which can be used to restore the service when needed. Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications and data protection solutions need…

Aug 29, 2019

Executive View: Service Layers Managed IAM - 80129

Martin Kuppinger

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, container-based deployments, and microservices architectures. It thus can be run and operated on various infrastructures. Service Layers provides full operations support across global regions. With this solutions,…

Aug 22, 2019

Whitepaper: Identitäten richtig handhaben - damit Ihre digitale Geschäftsstrategie erfolgreich wird - 80297

Martin Kuppinger

Registrierung und Authentifizierung sind die ersten Schritte, die erfolgen, wenn ein Nutzer Kunde digitaler Dienstleistungen werden möchte. Funktionieren diese Schritte nicht wie vom Nutzer erwartet, leidet die Akzeptanz solcher Dienste und damit ist der Erfolg digitaler Geschäftsstrategien in Gefahr. Identitäts-API-Plattformen helfen beim Aufbau von standardisierten…

Aug 20, 2019

Leadership Compass: IDaaS Access Management - 79016

Anmol Singh    Martin Kuppinger

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS AM to dominate new IAM purchases globally. This Leadership Compass…

Aug 14, 2019

Whitepaper: Privileged Access Governance - 80015

Anmol Singh

Privileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of privileged access necessary to support the decision-making process and comply with regulations. Besides providing support for managing lifecycle events of privileged accounts, PAG includes privileged access…

Aug 13, 2019

Leadership Brief: Access Reviews Done Right - 80195

Matthias Reinwarth

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always  only the minimum amount of access rights, which are necessary to perform associated tasks. In light of compliance, governance and the organizations's internal commitment to protecting itself from unwanted access, concepts…

Aug 12, 2019

Executive View: TrustBuilder Identity Hub - 80071

Martin Kuppinger

TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seamless application integration. Targetted mostly at B2B and B2E use-case requirements, TrustBuilder is building on additional features to address the consumer IAM requirements.

Aug 09, 2019

Executive View: ESET Endpoint Security - 80181

John Tolbert

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent malware detection tests. The product also is one of the top-performing, lowest impact endpoint security agents available in the market today.

Aug 07, 2019

Whitepaper: Do Identity Right – So Your Digital Business Strategy Succeeds - 80134

Martin Kuppinger

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptance of such services will suffer and the success of digital business strategies is at risk. Identity API Platforms help build a standardized approach for delivering unified identity services to businesses.…

Aug 07, 2019

Executive View: SAST SUITE Der Akquinet AG - 80191

Martin Kuppinger

Die heutigen SAP-Sicherheitsanforderungen gehen weit über die traditionellen Access Governance-Anforderungen an Benutzer, deren Zugriff und Rollen hinaus. akquinet bietet eine vollwertige Produktsuite für GRC (Governance, Risk & Compliance) und Sicherheit für SAP-Umgebungen. Die bereitgestellten Module decken ein breites Spektrum an Funktionen in dem sensiblen Bereich…

Aug 07, 2019

Executive View: SAST SUITE by akquinet AG - 80116

Martin Kuppinger

Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users and their access and roles. AKQUINET offers a full-featured product suite for GRC (Governance, Risk & Compliance) and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive area of SAP security and GRC.

Jul 31, 2019

Whitepaper: IAM for Healthcare: It’s time to act - 80029

Martin Kuppinger

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adapting to Digital Transformation. Comprehensive healthcare IAM, beyond pure SSO, helps Healthcare organizations to better cope with these challenges.

Jul 30, 2019

Executive View: Xton Technologies Access Manager - 80128

Martin Kuppinger

Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared account, session management and remote control access. Xton focuses on efficient implementation of these capabilities and is an interesting alternative to established players in the PAM market.

Jul 29, 2019

Executive View: Symphonic – Intelligent Authorization - 80154

Graham Williamson

There are several trends that continue to make the use of identity information for access control more complex. The prevalence of smartphones as the end-user client of choice, the increasing use of API channels needing access to corporate data and the increasingly complex hybrid cloud environment all serve to increase the complexity of managing authorized access to protected resources.…

Jul 26, 2019

Leadership Brief: The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) - 80186

John Tolbert

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at key features of each type of solution below.

Jul 26, 2019

Advisory Note: Protect Your Cloud Against Hacks and Industrial Espionage - 72570

John Tolbert

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence agencies use hacking techniques to steal data. Reduce the risk of falling victim to hackers and industrial espionage by implementing the proper security tools in your cloud-based environments.

Jul 26, 2019

Executive View: Radiflow SCADA Security Suite - 80053

Alexei Balaganski

Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligent detection of IT and OT-related cyberthreats, as well as proactive protection against any deviations from established security policies.

Jul 22, 2019

Leadership Brief: Do I Need Endpoint Detection & Response (EDR)? - 80187

John Tolbert

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly deploy, operate, and get value out of it? We’ll look at reasons to consider EDR or EDR as a managed service below.

Jul 09, 2019

Executive View: Kaspersky Endpoint Security for Business - 80180

John Tolbert

Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their Global Research and Analysis Team (GreAT). Kaspersky’s endpoint security product covers a wide variety of endpoint operating systems, and usually rate very highly in independent malware detection tests.

Jul 02, 2019

Whitepaper: ForgeRock Identity Platform for PSD2 & API Security - 80049

Richard Hill

The Revised Payment Service Directive (PSD2) promises to make the European Union (EU) cross-border transactions further transparent, faster and more secure while increasing competition and choice for consumers. To do so, Banks and other financial service providers must quickly make the necessary technical infrastructure changes to prepare for PSD2. The ForgeRock Identity Platform provides…

Jun 27, 2019

Leadership Compass: Database and Big Data Security - 79015

Alexei Balaganski

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies involved, vendor product and service functionality, relative market shares, and innovative approaches to…

Jun 12, 2019

Whitepaper: Radiant Logic and the Identity Integration Imperative - 80075

Martin Smith

Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now regulators have sharply increased the liability of enterprises for assuring that identity data is safeguarded, only accessed appropriately, and accurate. An integrated identity capability can be the key…

May 27, 2019

Executive View: Osirium Opus Privileged IT Process Automation - 79068

Martin Kuppinger

Osirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus allows for defining and managing granular tasks, that can be executed securely on the target systems. By doing so, the efficiency of service desks can increase significantly, while security risks are mitigated.

May 16, 2019

Whitepaper: The Dark Side of the API Economy - 80019

Alexei Balaganski

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Unfortunately, many organizations still lack competence in the field of API security and…

May 13, 2019

Executive View: Ideiio IGA - 80077

Anmol Singh

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfolio. ideiio, a spun out from IAM systems integrator ProofID, is a new vendor in the IGA space offering IGA functions targeted at mid-market customers to meet their basic IGA requirements with minimal effort…

May 09, 2019

Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105

Martin Kuppinger

As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in combination with other types of technologies. Blockchain ID and the related concept of Self Sovereign Identity (SSI) are gaining momentum, in areas such as KYC (Know Your Customer), Consumer Authentication, and…

May 08, 2019

Buyer’s Compass: Endpoint Protection - 80110

John Tolbert

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for endpoint protection.

May 08, 2019

Executive View: Wallix Bastion - 79053

Anmol Singh

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale…

May 07, 2019

Executive View: FIDO2 - 80059

John Tolbert

The FIDO® Alliance has released new authentication specifications that enhance security and privacy, standardize the authentication experience and underlying APIs, improve the usability, and extend the FIDO paradigm to more types of devices, platforms, and environments. With the publication of FIDO2 (comprised of FIDO’s CTAP and W3C’s WebAuthn specification), FIDO has more…

May 07, 2019

Executive View: Darktrace Enterprise Immune System - 80003

Alexei Balaganski

Darktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the whole corporate IT infrastructure, including physical and virtualized environments, industrial control networks, cloud infrastructures, and SaaS applications.

May 07, 2019

Buyer’s Compass: Consumer Identity and Access Management Solution - 80111

John Tolbert

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.

May 07, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für…

May 07, 2019

Whitepaper: Identity Governance. The Value of Leveraging IGA Functions from the Cloud - 80043

Martin Kuppinger

With IT functions gradually shifting to the cloud, it is time to rethink the way  supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are implemented. While solutions running on premises, but also supporting cloud services were the norm until now, running IGA as a service, with support for the hybrid reality of IT infrastructures…

May 06, 2019

Executive View: Exostar Supplier Risk Management - 79074

Martin Kuppinger

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply chain. By building on the capabilities of the Exostar Platform as an industry collaboration network, it enables re-use of supplier representations and certifications with multiple buyers, thus…

May 03, 2019

Leadership Brief: Artificial Intelligence in Cybersecurity - 70278

Alexei Balaganski

Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop millions of complex rules sounds amazing: instead, machine learning models are simply trained by feeding them with large amounts of carefully…

May 02, 2019

Executive View: One Identity Manager SAP Integration - 80073

Martin Kuppinger

One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The integration capabilities count amongst the leading-edge solutions in IGA (Identity Governance and Administration) products.

Apr 29, 2019

Executive View: Kleverware IAG - 80106

Martin Kuppinger

Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermöglicht die schnelle Implementierung von Berechtigungsprüfungen und -berichten und kann auf einfache Weise Berechtigungsdaten in heterogenen, komplexen IT-Landschaften,…

Apr 26, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security threats caused by  abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management…

Apr 18, 2019

Executive View: Ubisecure Identity Platform - 79072

John Tolbert

Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, innovative standards support, and the ability to leverage some bank and national IDs. RapidLEI provides a way to manage organizational identity.  

Apr 11, 2019

Leadership Brief: Data Security and Governance (DSG) for Big Data and BI Environments - 80109

Anmol Singh

Increased relevance of BigData and BI environments in supporting business decisions requires a broad set of data points to be collected throughout the lifetime of an application and users’ interaction with it. Security and risk management leaders must ensure that the risks emerging from the abundance and extensive use of this data are identified and that the right security and…

Apr 10, 2019

Leadership Brief: The Limits of AI in Marketing Automation - 79007

Roland Bühler

Artificial intelligence and machine learning are megatrends in marketing analytics and automation—it's often seen as the holy grail of digital marketing, as its possibilities seem to be endless. But are they? This leadership brief discusses typical limits and risks of ML-based marketing automation—and shows how to overcome or manage them.

Apr 09, 2019

Leadership Brief: Machine Learning, Marketing, and Privacy - 80032

Roland Bühler

Artificial intelligence and machine learning techniques are becoming more and more important for marketing. ML offers new possibilities to analyze customer data, enabling individual marketing measures to be delivered. Nevertheless, privacy is often a concern when it comes to ML. Furthermore, legislation based on GDPR has to be considered. This leadership brief gives an overview of the…

Apr 08, 2019

Leadership Brief: AI and Machine Learning – The Basics in a Nutshell - 80033

Roland Bühler

Artificial intelligence is becoming more and more important for various applications in almost all industrial sectors. This leadership brief gives a basic overview of the main principles of artificial intelligence (AI), with a strong focus on machine learning (ML). Typical use cases are illustrated based on some examples—with a marketing and identity management-oriented focus.

Apr 08, 2019

Executive View: ManageEngine AD360 - 79070

Martin Kuppinger

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that go beyond pure entitlement, by adding authentication features, UBA (User Behavior Analytics), and even Single Sign-On to several cloud services. However, the core of the product is supporting an efficient,…

Apr 08, 2019

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.2 - 79079

Richard Hill

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra provides the necessary components of a CIAM solution with a focus on the Japanese market.

Apr 08, 2019

Executive View: BigID - 80046

Richard Hill

With today's mounting regulations to protect sensitive customer data, organizations are faced with new requirements, challenges and compliance risks. BigID assist organizations with their data compliance requirements by helping them find, categorize and map their data at scale.

Apr 05, 2019

Leadership Brief: Marketing, IoT, and Privacy - 80034

Roland Bühler

The Internet of Things (IoT) is an IT megatrend. Apart from offering new possibilities and experiences to its users, IoT is highly interesting for marketers as it offers new ways to communicate with consumers and customers, leading to new possibilities in terms of analytics and consumer engagement as well. But what about privacy when IoT comes into play? This Leadership Brief gives an…

Apr 03, 2019

Executive View: Simeio IAM for SMB - 79071

John Tolbert

Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrators as well as security. The solution provides comprehensive user management via workflows, which are accessible via mobile devices.

Apr 03, 2019

Executive View: WSO2 Identity Server - 80060

Richard Hill

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of application and service APIs. WSO2 Identity Server provides a comprehensive and flexible solution for the modern enterprise.

Mar 28, 2019

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80036

Matthias Reinwarth

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft® SharePoint™, Office 365™) gespeichert sind durch Virtualisierung, Verschlüsselung und Datenfragmentierung. Sichere und benutzerfreundliche Zusammenarbeit an geschützten Dokumenten und transparente, datenzentrische Sicherheit…

Mar 28, 2019

Executive View: AWS Certificate and Key Management - 70365

Alexei Balaganski

A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory compliance across the whole cloud footprints.

Mar 25, 2019

Executive View: CyberArk Privileged Session Manager for Web - 79034

Anmol Singh

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and…

Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Anmol Singh

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a…

Mar 22, 2019

Executive View: Digital Shadows SearchLight™ - 79041

Matthias Reinwarth

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure.

Mar 20, 2019

Executive View: Amazon GuardDuty - 80005

Alexei Balaganski

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick and uncomplicated identification of suspicious activities and malicious behavior across AWS cloud accounts and workloads.

Mar 20, 2019

Executive View: Krontech SingleConnect - 80031

Anmol Singh

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges.

Mar 15, 2019

Executive View: Thycotic Privilege Manager - 80004

Anmol Singh

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a…

Mar 06, 2019

Executive View: Kleverware IAG - 80042

Martin Kuppinger

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rapidly implementing access reviews and entitlement reporting, and can easily collect and homogenize entitlement data across heterogeneous, complex IT landscapes, including SaaS services, business applications,…

Mar 05, 2019

Whitepaper: PATECCO Privileged Access Management Services - 80037

Matthias Reinwarth

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation.

Mar 05, 2019

Executive View: Thales Vormetric Application Crypto Suite - 79069

Martin Kuppinger

Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities, beyond just network and file-level encryption. Vormetric Application Crypto Suite from Thales eSecurity provides an integrated, easy-to-use set of services covering the needs for such environments.

Mar 01, 2019

Executive View: Ilantus Compact Identity - 80052

Anmol Singh

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the business. Ilantus Compact Identity is an entry level enterprise IDaaS offering targeted at SMB customers to jump start their IAM with minimal effort and investment.

Feb 26, 2019

Executive View: Veracode Application Security Platform - 79060

Alexei Balaganski

Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.

Feb 19, 2019

Executive View: Bromium Secure Platform 4.1 - 71309

Matthias Reinwarth

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user behavior monitoring and enhanced enterprise management capabilities.

Feb 14, 2019

Advisory Note: Maturity Level Matrix for Cyber Security - 72555

Mike Small

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

Feb 14, 2019

Architecture Blueprint: Hybrid Cloud Security - 72552

Mike Small

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and integrate security for the Hybrid Cloud.

Feb 14, 2019

Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80036

Matthias Reinwarth

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while enabling the safe and convenient cooperation with protected documents. Transparent, data-centric security for cloud, onpremises and hybrid storage environments.

Feb 12, 2019

Leadership Compass: Access Management and Federation - 71147

Richard Hill    Martin Kuppinger

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms. Your compass for finding the right path in the market.

Feb 11, 2019

Executive View: Hitachi ID Privileged Access Manager - 80030

Martin Kuppinger

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists.

Feb 11, 2019

Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. ForgeRock Identity Platform provides strong customer authentication capabilities that can help businesses meet the technical challenges posed by PSD2.

Feb 11, 2019

Executive View: Checkmarx Software Exposure Platform - 71512

Alexei Balaganski

Checkmarx Software Exposure Platform combines application security testing tools, managed services, and training in a single solution that enables developers to detect, prioritize and mitigate software-related risks at every stage of the development life cycle.    

Feb 06, 2019

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

Alexei Balaganski

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and…

Jan 31, 2019

Executive View: comforte AG SecurDPS Enterprise - 80007

Alexei Balaganski

comforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure security and compliance of sensitive data in mission-critical business applications.

Jan 30, 2019

Executive View: SAP Customer Data Cloud - 79001

John Tolbert

SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management.   Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identity, consent, profile management and marketing service functionality for enterprise customers.

Jan 24, 2019

Executive View: SSH.COM PrivX - 70302

Martin Kuppinger

SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments.

Jan 08, 2019

Executive View: Safe-T Software Defined Access - 79075

Martin Kuppinger

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is done by authenticating users prior to providing access. The solution supports a variety of use cases, including hybrid cloud deployments and access to cloud services such as Microsoft Office 365.…

Jan 04, 2019

Whitepaper: OneSpan Intelligent Adaptive Authentication - 80026

John Tolbert

Fraud reduction is a paramount concern in many industries today.  Finance, as well as healthcare and retail companies, are increasingly targeted by cybercriminals. New regulations in the financial industry are coming into force in many areas around the world. These regulations aim to improve security and reduce fraud. OneSpan Intelligent Adaptive Authentication provides strong and…

 2018

top  

Date Title Price
Dec 14, 2018

Leadership Compass: CIAM Platforms - 79059

John Tolbert

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

Dec 04, 2018

Executive View: VeriClouds Identity Threat Protection Platform - 79083

Mike Small

Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against the reuse of compromised credentials.  There are many approaches, products, and services around user authentication, however, the VeriClouds Identity Threat Protection Platform is unique in what it offers. 

Dec 04, 2018

Leadership Brief: What AI Can Do for You Today – and What Not - 79002

Mike Small

AI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This leadership brief describes the current state of AI technologies and recommends the areas where they can be applied today.

Nov 30, 2018

Whitepaper: Signicat: Balancing Security and Convenience: Identity Verification & Authentication made easy - 79081

Martin Kuppinger

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience and creating a seamless experience for customers is essential to keeping customers happy and minimizing churn rates: Identity Assurance done correctly is an essential step towards success in digital business.

Nov 29, 2018

Leadership Compass: Cloud Access Security Brokers - 70614

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Nov 28, 2018

Buyer's Guide: Marketing Automation Systems and GDPR Readiness - 80018

Roland Bühler

Marketing automation systems are key when it comes to digital or omni-channel marketing. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. It will also prepare your organization to conduct RFIs and RFPs to select the right marketing automation solution – in line with GDPR…

Nov 22, 2018

Executive View: Saviynt Identity Governance and Administration (IGA) - 70370

Richard Hill

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User Governance. The solution is designed to be deployed as a cloud, hybrid or on-premise solution. The Saviynt Security Manager helps customers demonstrate compliance using their access governance and risk…

Nov 13, 2018

Executive View: Sphere Identity Platform - 79052

Richard Hill

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support for B2B, but also economic incentives for both individuals and organizations through ease of use, privacy, and rewards for the individual, and reduced compliance risk, easy customer onboarding and integration…

Nov 09, 2018

Buyer’s Guide: Identity-as-a-Service (IDaaS) - 71526

Anmol Singh

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation…

Nov 06, 2018

Executive View: IBM Security Access Manager (ISAM) - 79066

Richard Hill

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access management and federation use cases, but it also provides Risk-Based Access Control and Mobile capabilities, as well as providing flexible deployment models.

Nov 06, 2018

Executive View: ThreatMetrix Digital Identity Network, powered by ThreatMetrix ID - 79049

John Tolbert

ThreatMetrix, a LexisNexis Risk Solutions Company, is a global fraud, identity and authentication company, helping customers deliver a unified experience  across their digital customer journey.  Built on a platform  providing a unified, global customer digitial identity, ThreatMetrix enables businesses to prevent fraud, reduce friction, and streamline the customer…

Nov 05, 2018

Executive View: AWS Identity and Access Management - 79048

Graham Williamson

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now provides easy-to-use facilities to allow customer to better leverage their identity management environment.

Nov 02, 2018

Executive View: Securonix Cloud SIEM and UEBA - 79035

Alexei Balaganski

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analytics offered as a fully managed Security Operations Platform in the cloud.

Oct 17, 2018

Executive View: Zscaler Security-as-a-Service Platform - 72505

Alexei Balaganski

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity, network transformation, public cloud connectivity, and secure access to on-premises and cloud services.

Oct 11, 2018

Executive View: FSP Identity Governance & Administration Suite ORG - 79050

Matthias Reinwarth

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer…

Oct 10, 2018

Whitepaper: SailPoint: Governance for all data: Get a grip on unstructured data - 79046

Martin Kuppinger

While many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they lack an integrated approach for governing access to unstructured data. However, for mitigating access risks to that data, expanding the aperture of identity governance programs is mandatory. This whitepaper…

Oct 10, 2018

Leadership Compass: Identity Governance & Administration - 71135

Anmol Singh    Martin Kuppinger

Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors providing mature capabilities around the core IGA functions. This Leadership Compass provides insights into the IGA market and presents an evaluation of vendors based on criteria important for successful IGA…

Oct 09, 2018

Leadership Compass: Cloud-based MFA Solutions - 70967

John Tolbert

This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) solutions and provides you with a compass to help you to find the service that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Cloud-based MFA solutions.

Oct 09, 2018

Leadership Brief: Mit den VAIT zu einer transparenteren Versicherungs-IT - 80388

Matthias Reinwarth

Mit dem im Juli 2018 final vorgelegten Dokument „Versicherungsaufsichtliche Anforderungen an die IT“ (VAIT) gibt die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) Versicherungsunternehmen konkretere Vorgaben für die Umsetzung ihrer Geschäftsprozesse mittels IT an die Hand. Diese stellen Herausforderungen dar, denen in betroffenen Unternehmen…

Sep 25, 2018

Advisory Note: GRC Reference Architecture - 72582

Mike Small

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals.  GRC is concerned with setting objectives, policies and controls and monitoring performance against these.  This report provides an architecture for the successful implementation of GRC within an organization.

Sep 19, 2018

Leadership Compass: Adaptive Authentication - 79011

John Tolbert

This report provides an overview of the market for on-premise Adaptive Authentication solutions and provides you with a compass to help you to find the product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing on-premise Adaptive Authentication solutions.

Sep 19, 2018

Whitepaper: Overcoming PSD2 Challenges with Onegini Connect - 79058

Richard Hill

Many changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential benefits for Third Party Providers (TPPs) and consumers.  Account Information Service Providers (AISP) and Payment Initiation Service Providers (PISP) functions have historically been performed by banks;…

Sep 19, 2018

Executive View: United Security Providers Secure Entry Server - 79040

Matthias Reinwarth

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and Identity Federation capabilities for complex use cases and hybrid on-premises and cloud solutions.

Sep 14, 2018

Executive View: Evidian Identity & Access Management - 70872

Richard Hill

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements by integrating Identity Governance and Administration, and Analytics & Intelligence into their IAM suite.

Sep 14, 2018

Executive View: ObserveIT Insider Threat Management - 79038

Alexei Balaganski

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and streamlined solution for detecting and mitigating various insider threats.

Sep 10, 2018

Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. RSA provides foundational technical capabilities in their SecurID, Adaptive Authentication, Web Threat Detection, and Archer products that can help businesses meet the…

Sep 06, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile…

Aug 23, 2018

Executive View: CA Privileged Access Management Suite - 79047

Anmol Singh

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control.

Aug 21, 2018

Executive View: TechDemocracy Intellicta - 70362

Matthias Reinwarth

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience and protection from cyber threats through the deployment of a standards-based risk governance framework.

Aug 21, 2018

Executive View: ViewDS Cobalt - 70851

Richard Hill

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully accessible via APIs, Cobalt is uniquely positioned to support the automation and integration requirements of today’s modern IT environment.

Aug 20, 2018

Executive View: Senrio Insight - 72525

Alexei Balaganski

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities.  

Aug 17, 2018

Executive View: WidasConcepts cidaas - 79057

John Tolbert

WidasConcepts offers a complete consumer identity and access management solution:  cidaas.  cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management.  It is based on a micro-services architecture which enables continuous deployment of service enhancements.

Aug 17, 2018

Executive View: CipherCloud CASB+ - 79037

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches…

Aug 15, 2018

Executive View: Semperis Directory Services Protector for Active Directory - 79054

Dan Blum

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product support change monitoring and rollback for a broad set of AD infrastructure objects.

Aug 09, 2018

Executive View: 1Kosmos BlockID - 79064

Martin Kuppinger

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and service providers. While there are still some challenges to solve, BlockID delivers on the promise of…

Aug 09, 2018

Advisory Note: Big Data Security, Governance, Stewardship - 72565

Mike Small

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data.  The analysis of this data can help organizations to improve their effectiveness and make better decisions.  However, there are concerns over the trustworthiness of the data as well as the ethics of its use.  This report describes how good Information Stewardship…

Aug 08, 2018

Executive View: MinerEye Data Tracker - 79063

Martin Kuppinger

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access control tools. It also provides deep insight into unstructured data based on sophisticated…

Aug 06, 2018

Executive View: StealthINTERCEPT® - 70367

Mike Small

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’…

Jul 31, 2018

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266

Martin Smith

NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product emphasizes security, leveraging the company’s expertise in managed SOC services and security software. The near-term product roadmap includes enhanced consent management and support for FIDO…

€190.00 *
Jul 27, 2018

Executive View: Centrify Next-Gen Access Platform - 79036

Richard Hill

Often, enterprise security is delivered as separate services such as Identity-as-aService (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Centrify converges these market segments into a single platform to deliver the next generation of access management.

Jul 20, 2018

Executive View: Deep Secure Content Threat Removal Platform - 79056

Martin Kuppinger

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious content and then creates new, clean data for onward delivery. In this way, it defeats zero-day attacks and prevents covert data loss, all transparent to end users.

Jul 19, 2018

Executive View: One Identity Safeguard - 79042

Martin Kuppinger

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market, delivering a comprehensive portfolio of Privilege Management capabilities.

Jul 17, 2018

Executive View: RSA® Identity Governance and Lifecycle - 71052

Martin Kuppinger

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal.

Jul 17, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization, integrated masking and automated self-service workflows, it significantly increases efficiency of agile development, data analytics, cloud migration, disaster recovery and other DataOps use cases.

Jun 22, 2018

Buyer's Guide: Hybrid Cloud Services - 72562

Mike Small

Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions to ask vendors, criteria to select your vendor, and the requirements for successful deployments. This report will prepare your organization to conduct RFIs and RFPs for IaaS as part of a Hybrid IT service…

Jun 05, 2018

Leadership Compass: Access Governance & Intelligence - 71145

Martin Kuppinger    Anmol Singh

Leaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Jun 05, 2018

Executive View: Varonis DatAdvantage - 79029

Martin Kuppinger

Getting a grip on your data is a bigger challenge than ever before. While solutions for central IT environments such as SAP are quite established, a significant portion of critical data resides in unstructured data stores such as file servers or collaboration services. This includes PII (think “GDPR”), but also blueprints, financial data, and more. It is essential having tools…

May 28, 2018

Executive View: Cayosoft Administrator v5 - 79000

Alexei Balaganski

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release adds new capabilities not available in native Microsoft tools, focusing on customers who have already completely moved to the cloud.

May 24, 2018

Executive View: Onegini Connect - 79031

John Tolbert

Onegini provides a compelling solution for Consumer Identity and Access Management (CIAM). Onegini is headquartered in Europe and has global ambitions. They have expertise in EU regulations such as GDPR and PSD2. They are positioning their product as a CIAM solution for financial, health care, and insurance industries with a strong mobile differentiator to enhance customer engagement.

May 18, 2018

Leadership Brief: Product Security as Your Biggest Challenge: Start Before It’s Too Late - 72011

Richard Hill

The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. Addressing these challenges early on in an IoT project can go a long way to lowering potential security risks in the field.

May 18, 2018

Whitepaper: Varonis - Daten kennen - 79028

Martin Kuppinger

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man versteht, wo die wirklich wertvollen Daten liegen und sich darauf fokussiert, diese Daten im Unternehmen optimal zu nutzen und sie gezielt zu schützen, statt mit breitflächigen…

May 16, 2018

Architecture Blueprint: Access Governance and Privilege Management - 79045

Matthias Reinwarth

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and privileged access. Thus, it substantially improves an organization's security posture.

May 11, 2018

Executive View: StealthDEFEND® - 70366

Mike Small

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. 

May 03, 2018

Executive View: Oracle Database Security Assessment - 70965

Alexei Balaganski

This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional database security solutions and the innovative Autonomous Database cloud platform.

May 03, 2018

Executive View: Pirean Consumer IAM Platform - 70223

Richard Hill

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single point of access and control that can meet these need with support for secure mobility and flexible workflows.

Apr 30, 2018

Executive View: Cleafy - 79030

Alexei Balaganski

Cleafy is an integrated real-time clientless threat detection and prevention platform for online services in highly regulated industries, providing protection against advanced targeted attacks for web applications and mobile apps.  

Apr 26, 2018

Executive View: RadiantOne Federated Identity Suite - 70845

Martin Smith

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important building block at the center of an integrated identity management capability.

Apr 19, 2018

Whitepaper: Saviynt: IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud - 70364

Richard Hill

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm shift, the customer needs, and a solution to help businesses move forward in this hybrid IT environment.

Apr 19, 2018

Executive View: ARCON Privilege Manager - 70950

Anmol Singh

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support the scalability and complexity requirements of large data centre deployments.

Apr 18, 2018

Executive View: inWebo 2FA Platform - 80386

John Tolbert

inWebo offers a cloud-based Two-Factor Authentication (2FA) solution, with some unique and proprietary authentication methods that can be less obtrusive and more user-friendly. The inWebo solution provides easy-to-deploy application plug-ins and SDKs for mobile authenticators.

Apr 18, 2018

Executive View: Micro Focus Privileged Account Manager - 71314

Martin Smith

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager.

Apr 16, 2018

Leadership Compass: Infrastructure as a Service – Global Providers - 70303

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Mar 28, 2018

Whitepaper: Pirean: Orchestrated Identity for Meeting IAM & CIAM Requirements -70225

John Tolbert

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today.  Consumer Identity and Access Management (CIAM) systems and services provide new technical capabilities for organizations to know their customers better.  Pirean’s solutions for IAM and CIAM can help companies deploy a single solution to meet both…

Mar 23, 2018

Executive View: Microsoft Azure Information Protection - 72540

Dan Blum

Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; integrates data protection capabilities throughout Microsoft’s Azure, Office, and Windows environments; and is gaining third party support from Adobe and data leakage prevention (DLP) vendors among others.…

Mar 21, 2018

Executive View: UNIFY Identity Broker - 70263

Richard Hill

With today's ever-growing IT requirements for integrations between identity sources, applications and services whether on-premise, the cloud, or hybrid environments, an advanced identity provider service is required to bridge these disparate technologies. UNIFY Solutions overcomes these challenges with their Identity Broker.

Mar 20, 2018

Leadership Brief: Securing PSD2 APIs - 72596

John Tolbert

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs) and Payment Initiation Service Providers (PISPs) to use.

Mar 20, 2018

Leadership Brief: Marketing Chatbots and GDPR - 79026

Roland Bühler

Chatbots are a recent trend in marketing automation, designed to enhance customers’ digital journeys and elicit more information from consumers. This report evaluates the impact of GDPR will have on the use of chatbots and provides an overview of topics to be considered in order to ensure compliance.

Mar 14, 2018

Advisory Note: Security Organization Governance and the Cloud - 72564

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.   This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

Mar 14, 2018

Leadership Brief: The Anti-Malware Requirement in PSD2 - 79027

John Tolbert

The Revised Payment Service Directive (PSD2) mandates thatservice providersevaluatetransaction requests for signs of malware infection. In order for transactions to be considered low-risk, there must be no signs of malware infection in any sessions of authentication events.

Mar 06, 2018

Excutive View: Axiomatics APS - 70346

Richard Hill

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently.

Feb 28, 2018

Excutive View: Imprivata - 71514

Martin Smith

On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from Caradigm. With that offering they are broadening their portfolio while remaining focused on the healthcare market segment.

Feb 28, 2018

Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368

Mike Small

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive Kontrollen, die sich mit den direkten geschäftlichen Vorteilen der Verarbeitung personenbezogener…

Feb 28, 2018

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

Mike Small

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly…

Feb 28, 2018

Advisory Note: Cloud Services and Security - 72561

Mike Small

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls that an organization should implement to manage these risks. 

Feb 13, 2018

Advisory Note: How to Assure Cloud Services - 72563

Mike Small

This report is one of a series of documents around the use of cloud services.  It identifies how standards as well as, independent certifications and attestations can be used to assure the security and compliance of cloud services.

Feb 13, 2018

Executive View: VMware AppDefense - 70840

Matthias Reinwarth

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized environments.

Feb 09, 2018

Point of View Paper: One Identity - The Journey to IAM Success - 70226

Martin Kuppinger

Identity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts are set up, modified, and retired in a timely, accurate, and secure manner. And for still others…

free
Feb 06, 2018

Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172

John Tolbert

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Anti-Malware solutions for enterprises.

Jan 24, 2018

Executive View: FSP Identity Governance & Administration Suite ORG - 70841

Martin Kuppinger    Matthias Reinwarth

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer…

€190.00 *
Jan 24, 2018

Executive View: Oracle Autonomous Database - 70964

Alexei Balaganski

Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provides unprecedented security, reliability and performance for enterprise data management in the cloud.

Jan 24, 2018

Executive View: RSA SecurID® Access - 70323

Martin Kuppinger

RSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integration to a large range of on-premises applications and cloud services. It supports context-aware authentication and uses machine learning to assess user risk and simplify the user experience.

Jan 17, 2018

Executive View: SAP HANA Platform Security - 70272

Mike Small

SAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It offers a high - performance database through in - memory processing and provides enterprise grade security features that cover  the  confi dentiality, integrity and availability of the data being held…

Jan 17, 2018

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen.

Jan 16, 2018

Executive View: Symantec CloudSOC™ - 70615

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches…

Jan 12, 2018

Executive View: Osirium: Privileged Access Management - 70836

Martin Kuppinger

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications.

Jan 12, 2018

Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222

Dan Blum

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a customer’s unique business, security, and compliance requirements.

Jan 09, 2018

Executive View: Thycotic Privilege Manager - 70221

Martin Kuppinger

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users.

€190.00 *

 2017

top  

Date Title Price
Dec 28, 2017

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms.

Dec 19, 2017

Executive View: Ilantus IDaaS Next - 70252

Martin Kuppinger

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting features and a well-thought-out roadmap for further evolution.  

Dec 13, 2017

Executive View: AlgoSec Security Management Suite - 70262

Alexei Balaganski

AlgoSec Security Management Suite ist eine hochautomatisierte und speziell für Unternehmen konzipierte integrierte Lösung zur Verwaltung von Netzwerksicherheitsrichtlinien und der Konnektivität von Geschäftsanwendungen für verschiedenste Geräte in heterogenen Umgebungen.

€190.00 *
Dec 07, 2017

Executive View: Duo Security - 71330

Richard Hill

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications they use. Duo Security goes beyond 2FA with adaptive authentication, endpoint visibility, mobile…

Nov 24, 2017

Executive View: ERPScan Smart Cybersecurity Platform for SAP - 72510

Matthias Reinwarth

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP that leverages machine learning. By addressing predictive, preventive, detective and responsive capabilities, and by leveraging vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all…

Nov 20, 2017

Whitepaper: Airlock: Meeting PSD2 Challenges with Ergon Airlock Suite - 70328

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. Ergon’s Airlock Suite provides foundational technical capabilities that can help businesses meet the challenges posed by PSD2. 

Nov 20, 2017

Executive View: Janrain Janrain Identity Cloud® - 70845

John Tolbert

Janrain provides a complete solution for Consumer Identity and Access Management (CIAM). Janrain is a pioneer in the field, creating the category of CIAM and developing the popular “ social login” authentication method .

Nov 16, 2017

Executive View: AlgoSec Security Management Suite - 70262

Alexei Balaganski

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across a wide range of devices in heterogeneous environments.    

Nov 14, 2017

Advisory Note: Maturity Level Matrix for GDPR Readiness - 72557

Matthias Reinwarth

KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and identifying specific measures in your GDPR compliance projects and programs.

Nov 09, 2017

Executive View: STEALTHbits® Products Overview - 70270

Mike Small

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access Management, and Threat Detection.

Nov 08, 2017

Leadership Compass: Identity Provisioning - 71139

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Nov 08, 2017

Executive View: Forum Sentry API Security Gateway - 70930

Alexei Balaganski

Forum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by design”, certified encryption, and support for a broad range of Web Services, B2B, Mobile, Cloud and IoT APIs and other protocols.

Nov 07, 2017

Executive View: ManageEngine Password Manager Pro - 70613

Martin Kuppinger

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management, Application-to-Application Privilege Management, or Session Management. The tool counts among the advanced, feature-rich…

Nov 06, 2017

Executive View: Atos DirX Identity - 71702

Martin Kuppinger

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of customization and added a modern, responsive user interface.

Nov 06, 2017

Executive View: BeyondTrust PowerBroker PAM - 70275

Martin Kuppinger

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker PAM delivers deep support for privilege management on…

Nov 02, 2017

Whitepaper: Airlock: Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Management! - 70327

Martin Kuppinger

Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogener Daten (Consent) und den Rechten der Betroffenen wie beispielsweise dem „Recht auf Vergessen“ in Verbindung gebracht. Die DSGVO sieht aber auch den angemessenen Schutz von personenbezogenen Daten…

Oct 24, 2017

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

Martin Kuppinger

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks remain at a high level – perimeter security in itself does not protect sufficiently anymore.…

Oct 24, 2017

Whitepaper: ForgeRock: The Effect of GDPR on Customer Relations - 73000

Martin Kuppinger

The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and prepare. Managing consumer identities consistently across all apps, portals, and services is essential. Identity Platforms provide the foundation for moving to a consistent management of consumer identities and…

Oct 18, 2017

Executive View: Entrust IdentityGuard for Enterprise - 71321

Mike Small

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and logical assets.

Oct 16, 2017

Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360

Matthias Reinwarth

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for practically every organization. Understanding the risk posture and providing transparency while aligning cyber security efforts with corporate strategies is a major challenge. The current lack of…

Oct 09, 2017

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

John Tolbert

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

Oct 05, 2017

Executive View: Ubisecure Identity Server - 70838

John Tolbert

Ubisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs.

€190.00 *
Oct 04, 2017

Executive View: Axiomatics Data Security - 70345

Alexei Balaganski

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules for access to corporate data.

Oct 02, 2017

Advisory Note: Redefining Access Governance - Beyond annual recertification - 72529

Matthias Reinwarth

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact…

€995.00 *
Sep 27, 2017

Executive View: OpenIAM Identity and Access Management - 70337

Martin Kuppinger

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture and exposes its capabilities through a consistent API layer, which makes it an interesting option…

Sep 26, 2017

Advisory Note: KRIs and KPI for Access Governance - 72559

Mike Small

This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then can be used in IT management and corporate management.

Sep 26, 2017

Executive View: PlainID - 70358

John Tolbert

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technology enables customers to easily externalize authorization decisions from applications, achieving higher efficiencies, more fine-grained access controls, and improved security.

Sep 15, 2017

Executive View: iWelcome IDaaS and CIAM - 70298

John Tolbert

iWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers with GDPR compliance, and as such as provides unparalleled consent management features.

Sep 13, 2017

Executive View: Omada Identity Suite - 70301

Martin Kuppinger

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high degree of automation in application onboarding.

Sep 13, 2017

Executive View: Beta Systems Garancy IAM Suite - 71530

Martin Kuppinger

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role management capabilities.

Sep 11, 2017

Executive View: TITUS Classification for Mobile - 71320

Martin Kuppinger

TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document storage on these devices. It integrates with a variety of other tools and services and is easy to use.

Sep 11, 2017

Executive View: VeriClouds CredVerify™ - 72567

Mike Small

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

€190.00 *
Sep 11, 2017

Buyer’s Guide: Consumer Identity and Access Management Solution - 70259

John Tolbert

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.

Sep 11, 2017

Executive View: IBM Security Identity Governance and Intelligence - 71113

Martin Kuppinger

A business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Providing connectivity to target systems based on direct connectors and via IBM Security Identity Manager.

Aug 21, 2017

Executive View: One Identity SafeGuard 2.0 - 71251

Martin Kuppinger

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities, and other features such as very strong workflow support.

€190.00 *
Aug 18, 2017

Executive View: SAP Fraud Management - 71182

Bruce Hughes

SAP Fraud Management leverages the power and speed of the SAP HANA platform to detect fraud earlier, improve the accuracy of detection and uses predictive analytics to adapt to changes in fraud patterns.

Aug 17, 2017

Leadership Compass: Cloud Access Security Brokers - 72534

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
Aug 17, 2017

Executive View: eperi Encryption Gateway - 70619

Alexei Balaganski

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data  encryption with out-of-the-box support for popular SaaS applications.

Aug 14, 2017

Executive View: SailPoint SecurityIQ - 70849

Martin Kuppinger

SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the broad support for unstructured data stores such as file servers, NAS devices, and SaaS data stores.

Aug 11, 2017

Buyer’s Guide: Ransomware Protection - 72599

John Tolbert

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for ransomware protection.

Aug 11, 2017

Advisory Note: Understanding and Countering Ransomware - 70947

Martin Kuppinger

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual users as well have been victims of ransomware. The purpose of this Advisory Note is to analyze the concept of ransomware, elaborate on its global reach and provide concrete advice on what to do…

Aug 11, 2017

Executive View: Thycotic Secret Server - 71060

Martin Kuppinger

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set.

Aug 09, 2017

Executive View: Auth0 Customer Identity Management - 71053

John Tolbert

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly customizable to meet a variety of business requirements.    

Aug 09, 2017

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

Martin Kuppinger

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients et aux consommateurs. Si la connaissance de ces derniers gagne globalement en pertinence, la majeure…

€900.00 *
Aug 09, 2017

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003

Martin Kuppinger

La « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité opérationnelle et l‘infrastructure informatique sous-jacente. L’infrastructure…

free
Aug 08, 2017

Leadership Brief: Lösungen für die Personalknappheit in Ihrem Cyber Defense Center - 70268

Martin Kuppinger

Ausreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den  IT - Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus drei Elementen: Ausbildung. Dienstleistungen. Werkzeuge.

Aug 08, 2017

Executive View: Deep Secure Content Threat Removal Platform - 71311

Martin Kuppinger

The Content Threat Removal  Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero - day attacks and prevents data loss, all transparent to end users.

€190.00 *
Aug 04, 2017

Leadership Brief: Schutz gegen Ransomware - 70336

John Tolbert

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

Aug 04, 2017

Leadership Brief: Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten - 70340

Mike Small

Mit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs zentrale Aktivitäten, die innerhalb der IT unternommen werden sollten, um auf die Erfüllung dieser Anforderungen vorbereitet zu sein.

free
Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei…

€1295.00 *
Aug 02, 2017

Executive View: Microsoft Azure Stack - 72592

Alexei Balaganski

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases.

Jul 28, 2017

Executive View: ForgeRock Identity Platform - 70296

Martin Kuppinger

ForgeRock Identity Platform delivers a common set of capabilities, as well as  good  integration for the various ForgeRock components. It provides a common layer  for identity and access management services that customers require when  building new consumer - facing business applications and services, including consumer and industrial IoT support, on their way to the…

Jul 27, 2017

Executive View: SecureAuth IdP - 71327

John Tolbert

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Jul 24, 2017

Executive View: Telekom Magenta Security - 70342

Martin Kuppinger

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für Unternehmen, wenn es um die  Unterstützung und insbesondere Managed Services im Bereich …

Jul 20, 2017

Executive View: Gigya Identity Enterprise - 70299

John Tolbert

Gigya provides a complete solution for  Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service  functionality for enterprise customers.

€190.00 *
Jul 17, 2017

Executive View: Signicat - 72537

Almir Kolari

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Jul 11, 2017

Executive View: IdentityX® from Daon - 71312

Alexei Balaganski

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk, reducing fraud and securing critical infrastructures.

Jul 11, 2017

Leadership Brief: Cloud Provider Codes of Conduct and GDPR - 70276

Mike Small

Codes of Conduct  can help organizations choose between suppliers.   This report  compares two recently announced codes for cloud service providers and how  these relate to GDPR .

Jul 07, 2017

Executive View: Nexis Controle 3.0 - 72535

Matthias Reinwarth

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entweder als eigenständige Lösung oder als ergänzende Komponente zu bestehenden Identity- und Access Management-Infrastrukturen. Die bessere Einbindung von bestehendem Wissen im…

Jul 04, 2017

Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E) - 70319

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market.

Jul 03, 2017

Executive View: Nexis Controle 3.0 - 72535

Matthias Reinwarth

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. The integration of corporate business expertise through targeted workflow and interaction approaches means a leap forward towards…

Jun 30, 2017

Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market.

Jun 29, 2017

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

Martin Kuppinger

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well for supporting the new business requirements on agility, innovativeness, and security. Identity…

free
Jun 29, 2017

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Martin Kuppinger

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most information still is held in on-premise systems. The combination of new regulations, such as the…

€900.00 *
Jun 29, 2017

Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549

John Tolbert

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.

free
Jun 21, 2017

GDPR and PSD2: Challenges and Opportunities for CIAM

John Tolbert

GDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations. This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst John Tolbert held on June 20, 2017 during the Cloud Identity Summit in Chicago.

free
Jun 20, 2017

Executive View: PingIdentity’s PingDirectory - 70294

John Tolbert

PingDirectory provides a flexible and scalable base for IAM and customer IAM.  With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs.

€190.00 *
Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that…

€1295.00 *
Jun 09, 2017

Leadership Compass: CIAM Platforms - 70305

John Tolbert

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

€1295.00 *
Jun 07, 2017

Advisory Note: Identity in IoT - 70282

John Tolbert

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding notions of digital identity has been problematic to date, but identity management solutions are on the horizon that will improve usability and security for IoT.

€995.00 *
May 31, 2017

Leadership Brief: Six Key Actions to Prepare for GDPR - 70340

Mike Small

From May 2018, when the upcoming EU GDPR (General Data Protection  Regulation) comes into force, the requirements for managing personal data will change. This report identifies six key actions that IT needs to take to prepare for  compliance.

May 30, 2017

Executive View: Salesforce Identity - 70813

John Tolbert

Salesforce has been a pioneer in Software as a Service (SaaS) from the early days.  Digital identity has been an integral part of the Salesforce platform.  Salesforce Identity is an enterprise class CIAM and IDaas solution.

€190.00 *
May 22, 2017

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Alexei Balaganski

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for incorporating interoperable and future-proof risk-based biometric authentication into mobile and web…

€190.00 *
May 15, 2017

Executive View: Symantec Advanced Threat Protection - 71155

Alexei Balaganski

Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint protection and threat intelligence technologies with advanced security analytics capabilities.

€190.00 *
May 02, 2017

Executive View: Vendor Overview CyberArk - 70280

Graham Williamson

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their credentials associated with users, applications, and other system assets across  an…

€190.00 *
Apr 28, 2017

Executive View: Securonix SNYPR - 70292

Alexei Balaganski

Securonix SNYPR is an open and modular next-generation security intelligence platform that combines log management, security information and event management, user and entity behavior analytics and fraud detection, serving as a foundation for a broad portfolio of specialized security analytics solutions.

€190.00 *
Apr 26, 2017

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Dan Blum

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained  authorization but break down in the face o f dynamic environments or complex access policies. A…

€995.00 *
Apr 21, 2017

Executive View: EmpowerID - 70297

John Tolbert

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

€190.00 *
Apr 19, 2017

Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811

John Tolbert

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies.

€190.00 *
Apr 13, 2017

Leadership Brief: Mobile Connect - 71518

John Tolbert

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

free
Apr 11, 2017

Leadership Brief: How to close the skill gap in your Cyber Defense Center - 72800

Martin Kuppinger

Getting sufficient and sufficiently skilled people for your Cyber Defense Center (or  your IT Security department) is tough. The answer to the skill gaps consists of  three elements: Education.  Services. Tools.

free
Apr 10, 2017

Executive View: Hitachi ID IAM Suite - 72543

John Tolbert

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and governance.

€190.00 *
Apr 05, 2017

Leadership Brief: Defending against ransomware - 70336

John Tolbert

Ransomware is an epidemic.  Prevention is the best strategy.  Don’t give up and pay the  ransom.

free
Mar 30, 2017

Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513

Graham Williamson

As a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over their intellectual property. Of late the company has developed a more diversified client base,…

€495.00 *
Mar 30, 2017

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

Paul Simmonds

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the firewall may have a part to play, by using it in a role where it is actually able to be effective.

€995.00 *
Mar 29, 2017

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Matthias Reinwarth

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all types of users, end user software and devices can foster efficiency, agility and security in many…

€295.00 *
Mar 29, 2017

Executive View: Ping Identity PingOne - 70288

John Tolbert

PingOne provides c loud - based Single Sign - On (SSO)  and Identity - as - a - Service  (IDaaS)  for employees, business partners, and  consumers . PingOne is a  key  component of PingIdentity’s Consumer Identity and Access Management SaaS  offering, supporting social logins, self - registration, and SSO to all popular SaaS  apps.

€190.00 *
Mar 21, 2017

Executive View: HexaTier Database Security and Compliance - 71255

Alexei Balaganski

HexaTier provides an all-in-one database security and compliance solution across  multiple platforms with a strong focus on  cloud environments and Database-as-a-Service products.

€190.00 *
Mar 20, 2017

Executive View: Cisco Advanced Malware Protection - 72518

Alexei Balaganski

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and continuous endpoint and network monitoring, AMP provides constant visibility and control across all environments before, during, and after a cyber-attack.

€190.00 *
Mar 20, 2017

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

John Tolbert

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty.  

€295.00 *
Mar 09, 2017

Leadership Compass: Database Security - 70970

Alexei Balaganski

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.

€1295.00 *
Mar 09, 2017

The Future of Banking: Management Summary - 74002

Martin Kuppinger

The Finance Industry is facing a profound change with the introduction of PSD2, an update to the 2007 EU Directive on Payment Services. The directive, which comes into force on January 13, 2018, continues Europe´s goal to modernize, unify and open its financial landscape. In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2, such as banks and…

free
Mar 03, 2017

Advisory Note: Mobile Biometrics for PSD2 - 71512

John Tolbert

Many new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial services industry under the Revised Payment Services Directive (PSD2). However, there are several…

€995.00 *
Mar 02, 2017

Survey: The Future of Banking - 74002

Martin Kuppinger

The Future of Banking: Innovation & Disruption in light of the revised European Payment Services Directive (PSD2) In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2. The primary focus of the survey was on Strong Customer Authentication, API Strategy and KYC & Customer Identity Management, in the context of the changing requirements imposed by…

€900.00 *
Feb 28, 2017

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Mike Small

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment.

€190.00 *
Feb 27, 2017

Leadership Brief: Securing PSD2 APIs - 72513

John Tolbert

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use.

free
Feb 17, 2017

Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283

John Tolbert

Many new biometric technologies and products have emerged in the last few years.  Biometrics have improved considerably, and are now increasingly integrated into smartphones.  Mobile biometric solutions offer not only multifactor and strong authentication possibilities, but also transactional authorization.  However, there are a number of challenges with biometric…

€995.00 *
Feb 16, 2017

Executive View: Ping Identity’s PingFederate - 70284

John Tolbert

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain.

€190.00 *
Feb 15, 2017

Executive View: CensorNet Cloud Security Platform - 72529

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve…

€190.00 *
Feb 08, 2017

Leadership Compass: Adaptive Authentication - 71173

John Tolbert

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

€1295.00 *
Feb 02, 2017

Whitepaper: Balabit - Privilege Management - 72705

Martin Kuppinger

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User Behavior Analytics are cornerstones of a modern SOC.

€295.00 *
Jan 30, 2017

Executive View: AWS Lambda - 72524

Alexei Balaganski

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the Amazon Cloud.

€190.00 *
Jan 30, 2017

Executive View: Microsoft Security Suite - 72541

Graham Williamson

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

€190.00 *
Jan 18, 2017

Executive View: Centrify Privilege Service - 71326

John Tolbert

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

€190.00 *
Jan 17, 2017

Executive View: RSA Identity Governance and Lifecycle - 72503

John Tolbert

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal.

€190.00 *
Jan 16, 2017

Executive View: Watchful Software RightsWatch - 70848

Dave Kearns

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and classified appropriately.

€190.00 *
Jan 13, 2017

Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290

John Tolbert

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more.  

€190.00 *
Jan 11, 2017

Advisory Note: Plant Automation Security - 71560

Graham Williamson

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are deploying communications paths to their ICSs and raising the risk profile of their organizations.

€995.00 *
Jan 10, 2017

Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536

Matthias Reinwarth

Achieving risk governance and resilience, while ensuring protection from Cyber risks by creating a standards-based process framework focusing on a risk based approach and implemented using a complementary software platform.

€190.00 *
Jan 05, 2017

Executive View: FSP Identity Governance and Administration Suite - 71324

Martin Kuppinger

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung.

€190.00 *

 2016

top  

Date Title Price
Dec 22, 2016

Advisory Note: Enterprise Role Management - 70285

Martin Kuppinger    Matthias Reinwarth

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the right data model, efficient processes and an adequate organization for implementing role management…

€995.00 *
Dec 21, 2016

Executive View: ForgeRock Access Management - 71316

John Tolbert

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system.  It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards development, and that is reflected by the multi-protocol support in ForgeRock Access Management. …

€190.00 *
Dec 19, 2016

Executive View: CipherCloud Trust Platform - 72530

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CipherCloud Trust Platform provides a valuable tool that organizations can use to improve governance…

€190.00 *
Dec 14, 2016

Executive View: Skyhigh Cloud Security Platform - 72532

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve…

€190.00 *
Nov 25, 2016

Advisory Note: Sustainable Infrastructures through IT Compliance - 72025

Matthias Reinwarth

Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand compliance as a strategic and future-oriented business objective, and embed IT Compliance and security into their organizational process framework and transform compliance expenses into strategic budgets.

€995.00 *
Nov 24, 2016

Executive View: Vaultive Cloud Data Security Platform - 72533

Mike Small

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor.  This makes it imperative that it is protected against risks of leakage and unauthorized disclosure.  Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting…

€190.00 *
Nov 23, 2016

Leadership Compass: CIAM Platforms - 71171

John Tolbert

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

€1295.00 *
Nov 22, 2016

Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701

John Tolbert

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect, store, and analyse data on consumers in order to create additional sales opportunities and increase…

€995.00 *
Nov 18, 2016

Executive View: Boldon James – Data Classification - 72508

Paul Simmonds

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that information should be handled. Only by providing clear, unambiguous guidance can information be…

€190.00 *
Nov 18, 2016

Executive View: Avatier Identity Management Suite - 71510

Dave Kearns

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

€190.00 *
Nov 17, 2016

KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001

Alexei Balaganski

Angesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen für Security Intelligence in Echtzeit (Real-time Security Intelligence) kombinieren Big Data und…

free
Nov 16, 2016

KuppingerCole and BARC Joint Study: Big Data and Information Security - 74001

Alexei Balaganski

As cyber-attacks are becoming increasingly advanced and persistent, and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cybersecurity strategies. The new Real-Time Security Intelligence solutions are combining Big Data and advanced analytics to correlate security events across multiple data sources, providing early detection…

free
Nov 10, 2016

Advisory Note: KYC as an Enabler in the Financial Services Business Transformation - 72523

Bruce Hughes

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change.  FSIs need to transform their business models to respond to today’s challenges and to position the business with the flexibility required to adapt to opportunities as the business landscape evolves. This report examines the issues and challenges FSIs face with market…

€995.00 *
Nov 09, 2016

Advisory Note: Information Stewardship in the Age of Blockchain - 71602

Karin Gräslund

Blockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent past. This report provides insights and a closer look at how blockchain technology is most probably improving the current state of Information Stewardship. It highlights the most relevant value proposition,…

€995.00 *
Nov 02, 2016

Executive View: Indeed AirKey Enterprise - 71256

Alexei Balaganski

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure.

€190.00 *
Oct 27, 2016

Executive View: Securonix Security Analytics Platform - 72507

Alexei Balaganski

Securonix Platform provides advanced security analytics technology for collecting, analyzing and visualizing a wide range of business and security information, converting it into actionable intelligence and serving as a basis for a broad portfolio of specialized security solutions.

€190.00 *
Oct 17, 2016

Executive View: Emerging Threat Intelligence Standards - 72528

Mike Small

Threat intelligence is a vital part of cyber-defence and cyber-incident response. To enable and automate the sharing threat intelligence, OASIS recently made available the specifications for STIX™, TAXII™ and CybOX™ as international open standards. This report provides an overview of these specifications and their application to Real Time Security Intelligence. 

€190.00 *
Oct 14, 2016

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Dan Blum

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling cloud adoption. This document provides guidance on how IT security leadership should deal with the…

€995.00 *
Sep 28, 2016

Executive View: Sophos Threat Intelligence - 71681

Mike Small

Sophos offers a range of security solutions as software, appliances and cloud services. These products exploit threat intelligence that is gathered by Sophos Labs, shared in real time between Sophos Next-Gen Firewall and Sophos Next-Gen Endpoint Protection, and integrated through Sophos Security Heartbeat. These products include the recently released Sophos Intercept X.

€190.00 *
Sep 27, 2016

Executive View: RSA NetWitness Suite - 72516

Alexei Balaganski

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and investigate sophisticated cyber-attacks. 

€190.00 *
Sep 26, 2016

Executive View: VMware Identity Manager - 71455

Martin Kuppinger

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications and provides contextual experience to VMware WorkspaceOne.

€190.00 *
Sep 01, 2016

Executive View: LogRhythm Security Intelligence Platform - 72517

Alexei Balaganski

LogRhythm provides a unified security intelligence platform combining next-generation SIEM, log management, network and endpoint monitoring and forensics with full threat lifecycle management and response orchestration.

€190.00 *
Aug 29, 2016

Executive View: Microsoft Advanced Threat Analytics - 71554

Alexei Balaganski

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious user and device activity within corporate networks.

€190.00 *
Aug 26, 2016

Advisory Note: The Impact of Blockchains on Business Process Management and Optimisation - 71609

Bruce Hughes

Distributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimisation) processes significantly. This report examines the role that blockchain-based technologies and IoT can play in streamlining and managing BPM/BPO. 

€995.00 *
Aug 25, 2016

Executive View: Ergon Airlock Suite - 72509

Martin Kuppinger

Ergon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management functions, especially for external users. 

€190.00 *
Aug 23, 2016

Leadership Compass: Cloud Access Security Brokers - 71138

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
Aug 17, 2016

Advisory Note: The Blockchain and Life Management Platforms - 71606

Ivan Niccolai

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data integrity. Even though there remain some requirements of LMPs that are not solvable with blockchains,…

€995.00 *
Aug 16, 2016

Executive View: Microsoft Azure Blockchain Services - 71332

Ivan Niccolai

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of preconfigured Virtual Machines, developer templates and artefacts, Microsoft Azure’s BaaS offering can significantly lower technical complexity barriers to the adoption of blockchain-powered…

€190.00 *
Aug 15, 2016

Leadership Brief: Transforming IAM – not Panicking - 71411

Mike Small

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

free
Aug 09, 2016

Executive View: Beta Systems Garancy Recertification Center - 71315

Christian Himmer

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive browser interface – optimized for usage on desktops, tablets and also on mobile devices.

€190.00 *
Jul 26, 2016

Executive View: Deep Identity - 71453

Graham Williamson

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open to abuse. Deep Identity has developed an easy-to-use solution that adopts a role-based provisioning…

€190.00 *
Jul 22, 2016

Executive View: IBM QRadar Security Intelligence Platform - 72515

Alexei Balaganski

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and breaches, forensic analysis and incident response, as well as automated regulatory compliance.

€190.00 *
Jul 21, 2016

Executive View: Sophos Protection for Amazon Web Services - 71680

Mike Small

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges.

€190.00 *
Jul 19, 2016

Advisory Note: Blockchains and Risk - 71608

Mike Small

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks associated with the use of this technology and recommends an approach to managing…

€995.00 *
Jul 18, 2016

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Ivan Niccolai

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity assurance of connected things, scalable management of connected devices, and secure information transmission.

€995.00 *
Jul 18, 2016

Advisory Note: Blockchains and Cybersecurity - 71603

Ivan Niccolai

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the merely distributed critical systems the internet depends on today, but we cannot yet completely replace trusted third parties and human judgement with algorithms.

€995.00 *
Jul 18, 2016

Executive View: SailPoint IdentityIQ - 71319

Christian Himmer

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance, and minimizes risk by applying controls across all IAM services geared towards business users. They expand their libary of connectors and extend their integration of Mobile Device Management tools and cloud…

€190.00 *
Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

Ivan Niccolai

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its fine-grained database privilege management capabilities and well-designed administrator endpoint monitoring.

€190.00 *
Jul 06, 2016

Executive View: Auth0 Authentication Service - 71325

Graham Williamson

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are multiple identity providers to accommodate and problems are compounded when members of the public are…

€190.00 *
Jul 05, 2016

Executive View: ForgeRock OpenIDM - 71317

Ivan Niccolai

ForgeRock OpenIDM is a standards- and platform-centric product which combines proven reliability with ForgeRock’s commitment to innovation. Given the growing importance of customer-centric identity management, OpenIDM’s focus on performance, flexibility and the management of not only people, but devices and things makes this product worthy of serious consideration for…

€190.00 *
Jul 04, 2016

Executive View: Microsoft Azure Active Directory - 71550

Martin Kuppinger

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

€190.00 *
Jul 04, 2016

Executive View: Protected Networks 8MAN - 71520

Martin Kuppinger

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende Identity Management-Lösungen sinnvoll ergänzen.

€190.00 *
Jun 28, 2016

Executive View: EmpowerID Office 365 Manager - 71322

Alexei Balaganski

EmpowerID Office 365 Manager is an Identity and Access Management solution for Office 365 providing single sign-on, user provisioning and administration, and access governance functions in a single integrated package.

€190.00 *
Jun 27, 2016

Executive View: ForgeRock Identity Gateway - 71318

Alexei Balaganski

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

€190.00 *
Jun 16, 2016

Executive View: AdNovum Nevis Security Suite - 71094

Matthias Reinwarth

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

€190.00 *
Jun 15, 2016

Executive View: Bomgar Privileged Access Management - 71307

Matthias Reinwarth

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise infrastructure like IAM, SIEM, ITSM and Change Management systems. 

€190.00 *
Jun 09, 2016

Executive View: Forum Systems Sentry and Identity Federation - 72511

Matthias Reinwarth

Sentry, Forum Systems flagship product, implements a wide range of features: support for a wide range of federation use case scenarios are complemented with API Gateway functionality and mature Web Access Management services.

€190.00 *
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Alexei Balaganski

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged Activity Monitoring, and User Behavior Analytics into an integrated real-time security intelligence…

€190.00 *
Jun 07, 2016

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

Mike Small

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Jun 02, 2016

Executive View: One Identity Manager v7.0.1 - 70894

Ivan Niccolai

One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the major release (v7), and adds a significant number of new features along with performance improvements thanks to its new modular architecture.

€190.00 *
May 24, 2016

Executive View: PingAccess - 71507

Ivan Niccolai

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web Access Management products with its ability to provide policy- and context-driven access control to traditional on-premise web applications and cloud applications, as well as to REST-based APIs.

€190.00 *
May 23, 2016

Executive View: Omada Identity Suite v11.1 - 70835

Ivan Niccolai

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

€190.00 *
May 20, 2016

Executive View: Universal SSH Key Manager - 71509

Alexei Balaganski

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

€190.00 *
May 20, 2016

Executive View: CA Privileged Access Manager - 71264

Ivan Niccolai

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications. 

€190.00 *
May 09, 2016

Leadership Brief: Cloud SSO is not sufficient: What else do you need? - 72007

Dave Kearns

Cloud-based identity services  have come a long way in the past several years, make sure you’re keeping up with what’s available and what you need. 

free
May 06, 2016

Leadership Brief: The 5 Biggest IAM Myths - 72001

Dave Kearns

Identity and Access Management (IAM) have been with us long enough to develop a strong history, but also a strong mythos, that is, a set of beliefs or assumptions which might or might not be correct – or which may have once been correct but are no longer.  

free
May 03, 2016

Executive View: Signicat Connect, Assure, Sign & Preserve - 72504

Martin Kuppinger

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. With these services, Signicat supports organizations in transforming paper-based processes to cloud-based services, while meeting legal and security requirements.

€190.00 *
May 03, 2016

Executive View: PointSharp Mobile Gateway - 71508

Alexei Balaganski

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

€190.00 *
May 03, 2016

Executive View: CyberArk Privileged Threat Analytics - 71540

Ivan Niccolai

CyberArk’s latest major release of Privileged Threat Analytics is a capable and focused solution for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements. With the addition of several key features, Privileged Threat Analytics now provides real-time network threat detection and automated response capabilities. 

€190.00 *
Apr 29, 2016

Executive View: Atos DirX Identity V8.5 - 70896

Ivan Niccolai

Atos DirX Identity encompasses a rich feature set for all areas of Identity Management and Governance. Its comprehensive business and process-driven approach includes very strong modelling capabilities of the organisational structure and user relationships thus providing the foundation for a business, rather than a technology-centric approach to identity management. 

€190.00 *
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

Ivan Niccolai

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker provides deep support for privilege management on…

€190.00 *
Apr 28, 2016

Executive View: Gigya Customer Identity Management Suite - 71529

Matthias Reinwarth

A feature-rich customer identity management platform providing strong analytics and tools for business-oriented decision-making processes while enabling compliance with legal and regulatory requirements and an adequately high level of security.

€190.00 *
Apr 28, 2016

Executive View: SAP Enterprise Threat Detection - 71181

Martin Kuppinger

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to threats is a must for protecting the core business systems.

€190.00 *
Apr 28, 2016

Executive View: Balabit Shell Control Box - 71570

Alexei Balaganski

Balabit Shell Control Box is a standalone appliance for controlling, monitoring and auditing privileged access to remote servers and network devices. Shell Control Box provides a transparent and quickly deployable PxM solution without the need to modify existing infrastructure or change business processes.

€190.00 *
Apr 21, 2016

Executive View: Balabit syslog-ng - 71571

Alexei Balaganski

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are relevant both as a complement to and a replacement for standard SIEM solutions.

€190.00 *
Apr 21, 2016

Executive View: Balabit Blindspotter - 71572

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00 *
Apr 19, 2016

Executive View: AirWatch Content Locker - 71505

Graham Williamson

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with intellectual property and sensitive information that must be shared between staff and business partners, a…

€190.00 *
Apr 12, 2016

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Matthias Reinwarth

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system development and delivery. It discusses why and how organisations should embed strong principles for…

€995.00 *
Mar 24, 2016

Executive View: Cayosoft Administrator - 72023

Alexei Balaganski

Cayosoft Administrator is an integrated solution for simplifying and automating management of Active Directory and Office 365 environments, including hybrid deployments. It replaces multiple native and legacy tools with a unified modern administrative console and a self-service web portal.

€190.00 *
Mar 24, 2016

Executive View: LSE LinOTP - 71452

Ivan Niccolai

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected resources.

€190.00 *
Mar 21, 2016

Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506

Matthias Reinwarth

Comprehensive framework for identity administration and governance in today's cloud-based, on-premises and hybrid infrastructures for both enterprise- and internet-scale environments.

€190.00 *
Mar 21, 2016

Leadership Compass: Access Management and Federation - 71102

Martin Kuppinger

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

€1295.00 *
Feb 29, 2016

Executive View: YubiKey by Yubico - 70842

Alexei Balaganski

YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of use and supporting a wide range of authentication methods and protocols, YubiKeys are widely deployed by both enterprises and consumer-oriented online services.

€190.00 *
Feb 24, 2016

Executive View: Lieberman Software Enterprise Random Password Manager - 70869

Ivan Niccolai

Lieberman Software Enterprise Random Password Manager is a solution for privileged credentials management and discovery. This product provides a strong and scalable solution which easily integrates with critical systems widely used in the enterprise to mitigate the risks associated with privileged credential management. 

€190.00 *
Feb 24, 2016

Executive View: Enforcive Cross Platform Compliance - 71257

Matthias Reinwarth

Mapping existing policies to system-specific checks and initiating mitigating measures in case of deviations are major challenges for organizations relying on the use of IT systems. Enforcive CPC as an IT-GRC solution provides template-based compliance checks, alerting mechanisms and adjustment of misconfiguration, to maintain compliance in heterogeneous IT landscapes.

€190.00 *
Feb 19, 2016

Executive View: Intralinks VIA® - 71263

Graham Williamson

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when accessed and modified externally. The Intralinks VIA product provides a powerful solution that balances the user experience with document security.

€190.00 *
Feb 09, 2016

Executive View: akquinet SAST GRC Suite - 70979

Matthias Reinwarth

Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users, their access and roles. akquinet offers a full-featured product suite for GRC and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive area of SAP security and GRC.

€190.00 *
Feb 04, 2016

Executive View: Gurucul Predictive Risk Analytics - 71511

Mike Small

Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management and the detection of cyber threats. Unlike other solutions that focus on network traffic or technical vulnerabilities this solution focuses on identity, access and user activity to detect and prioritize risk.  

€190.00 *
Jan 29, 2016

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

Wie können der Zugriff auf kritische Systeme und Geschäftsinformationen gesteuert und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglicht werden? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei unterstützt, ein für Ihre Bedürfnisse optimal geeignetes Privilege Management-Produkt zu finden.

€1295.00 *
Jan 28, 2016

Advisory Note: Blockchain Impact on the Financial Industry - 71601

Bruce Hughes

The Financial industry is estimated to spend over US$1bn on Blockchain projects over the next two years. This report provides an overview of impact Blockchain is having within the Financial Sector, the benefits that can be achieved, the challenges and the changes to expect from this emerging technology.

€995.00 *
Jan 25, 2016

Executive View: Intermedia AppID® Enterprise - 71522

Mike Small

Intermedia AppID® Enterprise is a cloud based identity management platform for web applications. This provides a solution to many of the security and compliance needs of the agile connected business. As well as adding value to the cloud and hosting services provided by Intermedia it is also of interest to organizations that use web applications from other providers.

€190.00 *
Jan 22, 2016

Executive View: Nexis contROLE - 71502

Matthias Reinwarth

Nexis contROLE bietet ein effizientes und komfortables Role Lifecycle Management in Kombination mit Role Analytics, entweder als Standalone-Lösung oder als Add-on zu vorhandenen Identity and Access Management-Infrastrukturen.

€190.00 *
Jan 20, 2016

Executive View: IBM Cloud Security Enforcer - 71523

Mike Small

IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention.

€190.00 *
Jan 20, 2016

Executive View: Centrify for Big Data - 71531

Mike Small

Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing.

€190.00 *
Jan 15, 2016

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Matthias Reinwarth

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise systems built in this heterogeneous manner is an important challenge that needs to be approached…

€190.00 *
Jan 13, 2016

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Matthias Reinwarth

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein angemessenes Sicherheitsniveau beizubehalten, ist eine ständige Herausforderung für ein Unternehmen…

free
Jan 13, 2016

Leadership Brief: Information Rights Management – Ready for Prime Time? - 72013

Bruce Hughes

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of sensitive or confidential information in a business-to-business model. Is it ready for prime time?

free
Jan 12, 2016

Leadership Brief: Join the Dots: Operational Technology and Informational Technology - 72012

Graham Williamson

One area of information technology that is typically ignored by IT departments and consultants is industrial control systems. This is unfortunate because these “operational technology” systems have much to benefit from interconnection with IT networks.  

free
Jan 04, 2016

Executive View: Nexis contROLE - 71502

Matthias Reinwarth

Nexis contROLE provides effective and convenient role lifecycle management combined with role analytics as either a stand-alone solution or as an add-on to existing Identity and Access Management infrastructures.

€190.00 *

 2015

top  

Date Title Price
Dec 10, 2015

Leadership Compass: Privilege Management - 71100

Martin Kuppinger    Amar Singh

How do you control access to your critical systems and business information while allowing secure and optimised to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that best meets your needs.

€1295.00 *
Dec 08, 2015

Executive View: FIDO Alliance - 71504

Mike Small

The FIDO® (Fast IDentity Online) Alliance is a non-profit organization with a mission to change the nature of online authentication.

€190.00 *
Nov 26, 2015

Advisory Note: Demystifying the Blockchain - 71555

Ivan Niccolai

Investigating current and future blockchain use cases as it evolves from a secure distributed ledger to a full compute platform.

free
Nov 18, 2015

Executive View: Knowledge Vault - 71412

Alexei Balaganski

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

€190.00 *
Nov 12, 2015

Leadership Brief: Privileged Account Management Considerations - 72016

Mike Small

Strong management of the use of the privileged accounts needed to manage IT infrastructure and applications is essential to protect against mistakes and misuse, as well as cyber-crime. 

free
Nov 04, 2015

Executive View: MobilityLab WorksPad - 71402

Alexei Balaganski

WorksPad is an integrated enterprise mobile workplace solution combining secure access to corporate file resources and e-mail with innovative collaboration functions.

€190.00 *
Oct 30, 2015

Executive View: NextLabs Rights Management Platform - 71272

Martin Kuppinger

Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting XACML as a standard, with outstanding support for PLM environments and engineeering data.

€190.00 *
Oct 30, 2015

Executive View: WSO2 App Manager - 71296

Alexei Balaganski

WSO2 App Manager is an Open Source solution for unified management of enterprise applications providing identity and access management, as well as complete lifecycle governance for mobile and web apps.

€190.00 *
Oct 26, 2015

Vendor Report: AlertEnterprise - 71048

Matthias Reinwarth

Integrating IT security, physical access security and Operational Technology security into one convergent solution concept.

€495.00 *
Oct 21, 2015

Executive View: Secure Islands IQProtector - 71297

Martin Kuppinger

Secure Islands IQProtector is a solution providing classification, encryption, usage rights management and enforcement, monitoring and analytics for information at the business, created by a wide variety of sources, both on-premise and in the cloud.  

€190.00 *
Oct 21, 2015

Executive View: AWS Directory Service and Identity and Access Management - 71450

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services: compute, storage, database, analytics, application, and deployment. This report provides an overview of AWS Directory Service and Identity and Access Management. 

€190.00 *
Oct 16, 2015

Executive View: Amazon API Gateway - 71451

Alexei Balaganski

Amazon API Gateway is a fully managed solution for publishing, maintaining and monitoring APIs. By providing tight integration with existing AWS cloud infrastructure, security and identity services, it enables exposing existing backend services or creating new ones quickly, without the need to manage resources or identities.

€190.00 *
Oct 16, 2015

Leadership Brief: Where to start investing for your Cyber Security Risk Management – It is not just your firewalls - 72002

Bruce Hughes

Cyber Security risk management needs to move up from the traditional IT areas of firewalls and anti-virus software management to the Executive and the Board level as the business risk of security failings in today’s information driven economy escalate. It is no longer just a technical issue.  Investment must be put into place to address this growing threat.

free
Oct 15, 2015

Executive View: Evidian Identity & Access Manager - 70871

Martin Kuppinger

Evidian Identity & Access Manager is an integrated solution for Identity Provisioning and Access Governance. It provides strong capabilities in these areas and excellent integration into the Evidian products such as Enterprise Single Sign-On.

€190.00 *
Oct 15, 2015

Executive View: AlienVault Unified Security Management (USM) Platform - 72520

Mike Small

AlienVault Unified Security Management (USM) platform provides a complete all in one security management solution for organizations with limited resources such as security staff, time and budget.

€190.00 *
Oct 09, 2015

Executive View: VMware Identity Manager - 71454

Martin Kuppinger

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications.

€190.00 *
Sep 22, 2015

Executive View: Waterfall Unidirectional Security Gateway - 71291

Alexei Balaganski

Waterfall Unidirectional Security Gateway technology combines specialized security hardware with a broad range of supported industrial protocols and applications to provide a level of network security unattainable by traditional firewalls.

€190.00 *
Sep 22, 2015

Leadership Brief: Breach and Incident Response & Employee Training - 71415

Bruce Hughes

From 2013 to 2014 data breaches nearly doubled. Well known consumer brands, financial institutions, retail chains and government agencies have all been affected. Organisations need to rethink or strengthen their data privacy strategies to cope with this rising threat. Lack of action and well thought out risk management and stakeholder management plans may subject your organisation to…

free
Sep 18, 2015

Advisory Note: Identity Information Quality - 70996

Matthias Reinwarth

Today’s diverse and rich identities are major assets for virtually every organization. Maintaining and ensuring an adequate level of Identity Information Quality is essential for leveraging identity information as the basis of operational and business processes.

€995.00 *
Sep 18, 2015

Executive View: BalaBit Blindspotter - 71202

Alexei Balaganski

Blindspotter is a real-time analytics solution, which identifies external and internal security threats by detecting anomalies in user behavior.

€190.00 *
Sep 15, 2015

Advisory Note: Turning inattention into intention - 71501

Scott David

How IoT will help drive the development of Life Management Platforms and affect your company’s future relationship with its customers.

€995.00 *
Sep 07, 2015

Executive View: Axiomatics – Beyond Database Security - 71270

Graham Williamson

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

€190.00 *
Sep 03, 2015

Leadership Brief: Prevent, Detect, Respond: the Changing Face of IAM - 71305

Mike Small

As well as providing the means to control and manage legitimate access, Identity and Access Management is now in the critical line of defense against cyber threats.

free
Sep 03, 2015

Leadership Brief: How to Justify your IAM Investments - 71410

Mike Small

IAM is an essential enabler for the agile business connected. Justifying investments in IAM needs to emphasize the business benefits like better agility, not just the IT process improvements.   

free
Sep 02, 2015

Advisory Note: Eight Fundamentals for Digital Risk Mitigation in the Age of Transformation - 71302

Martin Kuppinger

Digital Transformation is on its way. Unstoppable, inevitable, with increasing speed. Organizations have to react, in particular for avoiding unpredictable risks. Digital Risk Mitigation is a key success factor in the digital transformation of businesses.

€995.00 *
Sep 02, 2015

Executive View: Using Certification for Cloud Provider Selection - 71308

Mike Small

An overview of how to use certification to assist in selecting a cloud service provider. 

€190.00 *
Aug 28, 2015

Best Practice: European Identity Award 2015: Nantes University Hospital - 71402

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Aug 26, 2015

Executive View: BalaBit syslog-ng - 71201

Martin Kuppinger

The Balabit syslog-ng product family provides technologies that allow collecting, processing, and analyzing log events from a variety of different sources, going well beyond the standard syslog component. The products are both relevant as complement and replacement of standard SIEM solutions.

€190.00 *
Aug 19, 2015

Leadership Compass: Access Control/Governance für SAP-Umgebungen - 71104

Matthias Reinwarth    Martin Kuppinger

Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen signifikant verbessern, indem sie die richtigen Zugangskontrollkomponenten in ihre SAP-Infrastruktur…

€1295.00 *
Aug 19, 2015

Executive View: Zscaler Internet Security Platform - 71010

Alexei Balaganski

Zscaler is a unified Security-as-a-Service platform integrating various security services like web and mobile security, next generation firewall, data leakage prevention, advanced threat protection and bandwidth management in an entirely cloud-based solution without any on-premise hardware.

€190.00 *
Aug 13, 2015

Executive View: ForgeRock OpenAM - 71405

Martin Kuppinger

ForgeRock OpenAM provides a comprehensive offering for managing access, beyond traditional Web Access Management and Identity Federation, adding support also for e.g. connected things and a variety of other capabilities, providing high scalability supporting the requirements of the emerging field of Identity Relationship Management (IRM).

€190.00 *
Aug 13, 2015

Leadership Brief: CISO Security Essentials - 72018

Mike Small

Organizations are using the new technologies of cloud, social media and smart devices. The job of the CISO is to enable the organization to securely exploit these in an affordable way.  

free
Aug 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a tiempo real, y funciones avanzadas de protección frente a amenazas, en infraestructuras…

€190.00 *
Aug 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und -reaktion sowie fortgeschrittene Funktionen zum Schutz vor Bedrohungen in vorhandene Infrastrukturen…

€190.00 *
Aug 07, 2015

Leadership Brief: SAP Security Priorities - 72017

Matthias Reinwarth

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and governance challenge.

free
Aug 06, 2015

Advisory Note: Industrial Control Systems: Getting a Grip on OT Cyber Security - 71110

Graham Williamson

The time has come for a more inclusive approach to managing industrial control systems. The divide between Information Technology and Operational Technology is fading, to the benefit of the business.

€995.00 *
Aug 03, 2015

Executive View: FireHost Secure Virtual Private Cloud – Security and Assurance - 71284

Mike Small

An overview of FireHost Secure Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Jul 28, 2015

Executive View: Virtustream IaaS – Security and Assurance - 71285

Mike Small

An overview of the Virtustream Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Jul 23, 2015

Executive View: Unify Identity Broker V5.0 - 71300

Graham Williamson

In today’s environment, with so many demands on identity information, an advanced identity provider service is required that can integrate disparate technology and bridge mature identity management environments to the new requirements of Cloud services, mobile device management and the Internet of things.

€190.00 *
Jul 22, 2015

Best Practice: European Identity Award 2015: dm-drogerie markt - 71400

Dave Kearns

The European Identity Award 2015 for “Best IAM Project”: a strong example of an IAM solution encompassing not only the employees of the organization and its HQ, but also supporting a decentralized organization as well as the extended enterprise.

free
Jul 22, 2015

Leadership Compass: Secure Information Sharing - 72014

Graham Williamson

In approaching the selection of a vendor for the provision of secure information sharing solution it is important to take an information lifecycle approach whereby the processes around data generation, its transformation and classification, as well as data storage and data destruction, are well defined. This requires policy to be established to advise on the proper location of records,…

€1295.00 *
Jul 20, 2015

Executive View: neXus Dynamic Identity Platform - 70861

Alexei Balaganski

neXus Dynamic Identity Platform is a complete identity lifecycle solution that unifies physical and digital access for a broad range of supported identity types, authentication standards, and communication protocols.

€190.00 *
Jul 13, 2015

Leadership Compass: Access Control / Governance for SAP environments - 71104

Matthias Reinwarth    Martin Kuppinger

This report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate compliance with applicable laws and regulations. This report provides you with a compass to help you…

€1295.00 *
Jul 10, 2015

Leadership Compass: API Security Management - 70958

Alexei Balaganski

This report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This Leadership Compass helps you find the best solution that addresses your requirements, while maintaining the…

€1295.00 *
Jul 09, 2015

Executive View: HP Helion Managed Virtual Private Cloud – Security and Assurance - 71288

Mike Small

This report provides an overview of HP Helion Managed Virtual Private Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Jul 01, 2015

Executive View: VMWare vCloud® Air™ – Security and Assurance - 71286

Mike Small

This report provides an overview of VMWare vCloud Air Infrastructure as a Service together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer.

€190.00 *
Jun 17, 2015

Best Practice: European Identity Award 2015: NORD/LB - 71401

Matthias Reinwarth

EIC Award 2015 for Best Access Governance / Access Intelligence Project: Implementation of a large-scale, state-of-the-art Access Management and Access Governance project improving the bank’s compliance and efficiency while transitioning to “IAM as a Service” as a modern Business Process Outsourcing model. 

free
Jun 01, 2015

Executive View: Axiomatics Policy Management Suite - 70895

Graham Williamson

An enterprise-grade policy administration tool for managing access control policies in the Axiomatics product suite.

€190.00 *
May 29, 2015

Executive View: Oracle Privileged Account Manager - 71057

Alexei Balaganski

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity Governance suite.

€190.00 *
May 29, 2015

Leadership Brief: Rethink your organization chart for the Digital Transformation - 72010

Matthias Reinwarth

Integrate Digital Business Strategy and Information Risk Management into your organization for IT and business. Create a new type of collaborative organization, enabling the sustainable and risk-driven development of strategies for the Digital Enterprise.

free
May 26, 2015

Advisory Note: EIC 2015 Trends and Hot Topics - 71301

10 Information Security topics that were central at European Identity & Cloud Conference 2015

free
May 26, 2015

Executive View: ITMC IDM365 - 71289

Martin Kuppinger

ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The product works in a task-centric way with a modern UI, backed by ITMC’s long experience in implementing IAM&IAG in an efficient way.

€190.00 *
May 26, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT bietet eine umfassende Lösung für die Überwachung von Nutzeraktivitäten innerhalb des gesamten Unternehmens. Das Produkt arbeitet hauptsächlich mithilfe von Agenten, die auf einer Vielzahl von Plattformen bereitgestellt werden können. Es ermöglicht eine detaillierte Analyse des Nutzerverhaltens und das Eingreifen in Live-Sessions.

€190.00 *
May 26, 2015

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Martin Kuppinger

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung.

€190.00 *
May 19, 2015

Leadership Brief: Facing the Future: Identity Opportunities for Telcos - 71287

David Goodman

Telco operators are encountering challenges and opportunities that are shaping the future direction of communications.  Faced with the erosion of revenues from the rapid encroachment of the OTT (over-the-top) players into their traditional market strongholds, operators are realising that data represents their most significant asset to provide added value to their customers in the…

free
May 12, 2015

Executive View: Onapsis Security Platform - 71290

Alexei Balaganski

Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection functionality into existing risk and incident management infrastructures.

€190.00 *
May 11, 2015

Executive View: GlobalSign - 71051

Dave Kearns

GlobalSign, one of the world’s biggest certificate authorities, and a leading provider of identity services, recently acquired Ubisecure, a Finnish privately held software development company specializing in Identity and Access Management (IAM) solutions. Ubisecure’s leading IAM solutions coupled with GlobalSign’s authentication expertise and world-wide reach create a…

€190.00 *
May 06, 2015

Executive View: Forum Sentry API Gateway - 71204

Alexei Balaganski

Forum Sentry API Gateway is an integrated solution for API and service security, access management and threat protection with a strong focus on “security by design”, certified encryption, and comprehensive support for API formats and protocols.

€190.00 *
May 05, 2015

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

Martin Kuppinger    Dave Kearns

Recommendations for investing in Information Security in 2015 and beyond. Predictions of the trends and hypes in Information Security in 2015. Advice on which of these trends and hypes to follow.

€995.00 *
Apr 30, 2015

Executive View: Seclore FileSecure - 71295

Martin Kuppinger

Seclore with its FileSecure product provides an offering in the emerging market for Secure Information Sharing. Seclore FileSecure allows securely sharing and tracking documents within and beyond the organization, with a specific emphasis on securely sharing information in external collaboration.

€190.00 *
Apr 30, 2015

Executive View: Identity Automation RapidIdentity - 71203

Martin Kuppinger

Identity Automation’s RapidIdentity is a streamlined solution covering key functions of Identity and Access Management & Governance in an integrated offering. A particular strength is the strong out-of-the-box support for common requirements in that area.

€190.00 *
Apr 30, 2015

Executive View: ObserveIT User Activity Monitoring - 71258

Martin Kuppinger

ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on agents that can be deployed across a variety of platforms. It provides detailed user behavior analysis and live session response.

€190.00 *
Apr 28, 2015

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Martin Kuppinger

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access controls into a single solution.

€190.00 *
Apr 27, 2015

Executive View: iWelcome Identity & Access Management as a Service - 71205

Martin Kuppinger

iWelcome delivers Identity and Access Management as a Service. The company, based in the Netherlands, runs all services from data centers located within the EU and covers a broad set of features for both managing identity and access for cloud and on-premise services.

€190.00 *
Apr 27, 2015

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Martin Kuppinger

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

€190.00 *
Apr 23, 2015

Executive View: Avencis SSOX - 71065

Alexei Balaganski

Avencis SSOX is an Enterprise Single Sign-On solution with a focus on flexible strong authentication and mobile device support. Combined with Avencis’ own IAM platform, it provides a foundation for a long-term Identity and Access Management strategy for any organization.

€190.00 *
Apr 22, 2015

Executive View: Dell One Identity Cloud Access Manager - 71250

Martin Kuppinger

Dell One Identity Cloud Access Manager is an on-premise solution for Identity Federation and Web Access Management, enabling both business users to seamlessly access cloud services and external users to connect to internal, web-based applications.

€190.00 *
Apr 22, 2015

Executive View: AirWatch and Bring Your Own Device (BYOD) - 71259

Alexei Balaganski

AirWatch enterprise mobility management platform provides an integrated combination of technology, support and certification services to address every organization’s unique requirements for implementing a viable Bring Your Own Device strategy.

€190.00 *
Apr 17, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® est une solution de gestion d'authentification et d'accès intégrée fortement axée sur le secteur de la santé. Elle offre un accès rapide et sécurisé aux postes de travail, aux bureaux virtuels et aux applications en combinant une authentification forte avec l'identification unique pour les entreprises…

€190.00 *
Apr 17, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und Active Directory.

€190.00 *
Apr 17, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® ist eine integrierte Authentifizierungs- und Zugriffsmanagementlösung mit einem klaren Fokus auf das Gesundheitswesen. Sie bietet schnellen und sicheren Zugriff auf Workstations, Virtual Desktops und Anwendungen, indem sie die Vorteile der starken Authentifizierung mit Enterprise Single Sign-on vereint.

€190.00 *
Apr 09, 2015

Executive View: Microsoft Azure – Security and Assurance - 71282

Mike Small

This report provides an overview of the Microsoft Azure cloud services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Apr 08, 2015

Leadership Brief: 10 Security Mistakes That Every CISO Must Avoid - 72000

Amar Singh

As businesses both small or large become increasingly dependent on cyber space, errors and slip-ups in managing its security can have significant, sometimes destructive, consequences. In the past mistakes could be overlooked but today they could get you fired. 

free
Apr 02, 2015

Executive View: AWS – Security and Assurance - 71280

Mike Small

Amazon Web Services (AWS) offers a broad set of over 40 services including compute, storage, database, analytics, application, and deployment. This report provides an overview of the security and assurance aspects of these services.

€190.00 *
Apr 01, 2015

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

Matthias Reinwarth

ERPScan Security Monitoring Suite for SAP is an enterprise level solution for SAP security. By addressing vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all relevant aspects of enterprise SAP deployments.

€190.00 *
Mar 30, 2015

Executive View: IBM SoftLayer – Security and Assurance - 71281

Mike Small

IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide “bare metal” access to computing resources resulting in high performance. This report provides an overview of the security and assurance aspects of these services.

€195.00 *
Mar 30, 2015

Advisory Note: Top Cyber Threats - 71032

Amar Singh

Cyber threats are leaving large and well established businesses exposed to significant business risks, such as damage to brand and reputation, and large financial fines. This document discusses the most critical threats and the tactical countermeasures that can help organisations understand and counter these threats.  

€995.00 *
Mar 27, 2015

Executive View: Rackspace Managed Cloud Hosting – Security and Assurance - 71283

Mike Small

This report provides an overview of Rackspace Managed Cloud Hosting services together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

€190.00 *
Mar 27, 2015

Executive View: Prot-On - 71268

Martin Kuppinger

A solução Prot-On para o Compartilhamento Seguro de Informações (Secure Information Sharing) fornece uma solução importante para a proteção de arquivos de dados não estruturados localmente, compartilhados com parceiros e armazenados em nuvem.

€190.00 *
Mar 26, 2015

Leadership Compass: Infrastructure as a Service - 70959

Mike Small

This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources that the customer can use over a network to run software and to store data. This report provides you with a compass to help you to find the IaaS service that best meets your needs.

€1295.00 *
Mar 23, 2015

Executive View: Imprivata OneSign - 70915

Alexei Balaganski

Imprivata OneSign® is an integrated authentication and access management solution with a strong focus on the healthcare industry. It provides fast and secure access to workstations, virtual desktops and applications by combining strong authentication with enterprise single sign-on.

€190.00 *
Mar 19, 2015

Executive View: Wallix AdminBastion - 71266

Matthias Reinwarth

Wallix AdminBastion (WAB) is a single access web portal for multi-bastion and/or multi-tenant organizations. It includes user and session management, password management and built-in access request and approval capabilities. It provides Single-Sign-On to connected systems, session auditing and recording, real-time supervision, analytics and scheduled reports.

€190.00 *
Mar 18, 2015

Leadership Brief: Alternatives to complex role projects and resource-consuming recertification - 72009

Matthias Reinwarth

Enterprise Role Management and Access Governance are at the core of today's IAM systems to achieve efficient administration processes and compliance with regulatory requirements. Costly processes for the design and maintenance of large role-based projects and for extensive annual recertification campaigns demand a next generation approach to Access Governance.

free
Mar 18, 2015

Leadership Brief: Your customer identities: How to do them right - 72006

Matthias Reinwarth

Digital business strategies require up-to-date and reliable customer identities. They are essential to target your marketing, to adjust the design of your products and services, to increase your earnings and to create long-term relationships with your customers.

free
Mar 17, 2015

Executive View: CA Privileged Identity Manager - 71059

Alexei Balaganski

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

€190.00 *
Mar 17, 2015

Executive View: Oracle Database Vault - 70899

Rob Newby

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database environment which can be used to protect application data from unauthorized access.  Oracle Database Vault comes pre-installed by default with Oracle Database 12c. 

€190.00 *
Mar 13, 2015

Leadership Brief: Security standards a CISO/CIRO should be aware of - 72003

Mike Small

Standards are the distilled wisdom of people with expertise in their subject matter.  A CISO should know which standards are relevant to the organization and choose which should be used internally and by external product and service providers.

free
Mar 13, 2015

Leadership Brief: Monetizing the Digital Transformation - 72015

Martin Kuppinger

The Digital Transformation of business is on its way. However, success in monetizing the Digital Transformation will not be based merely on selling things. It also requires a change in business models. 

free
Mar 12, 2015

Executive View: Prot-On - 71268

Martin Kuppinger

The Prot-On solution for Secure Information Sharing provides an important solution for the protection of unstructured data files on premise, shared with partners, and held in the cloud.  

€190.00 *
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Alexei Balaganski

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

€190.00 *
Mar 04, 2015

Executive View: Covertix SmartCipher™ - 71267

Mike Small

The Covertix SmartCipher™ Product Suite provides an important solution for the protection of unstructured data files on premise, shared with partners and held in the cloud...

€190.00 *
Mar 03, 2015

Executive View: SecureAuth IdP - 70844

Dave Kearns

SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing on both internal and external users that want to access to both on-premise and cloud services...

€190.00 *
Feb 23, 2015

Executive View: RSA Archer GRC - 70888

Matthias Reinwarth

RSA Archer by RSA, The Security Division of EMC is a full-featured GRC-framework providing an enterprise-wide, systemic approach to implementing Governance, Compliance and Risk Management. With its platform approach it can be continuously adapted to maturing GRC-strategies towards risk-orientated business processes...

€190.00 *
Feb 23, 2015

Executive View: TITUS Classification Suite - 70951

Graham Williamson

Sharing information securely is becoming increasingly important within companies, be it to protect intellectual properly, meet regulatory requirements for privacy or simply to avoid embarrassing leaks of proprietary information. While it is easy to stop access to documents and files, it is much harder to manage sharing such information. Shared Information Security is a topic within Cyber…

€190.00 *
Feb 23, 2015

Advisory Note: ABAC done right - 71134

Graham Williamson

There is an increasing number of documents purporting to advise on how to migrate to an Attribute-Based Access Control environment. The real requirement is for Adaptive Policy-based Access Management. Here are some tips...

€995.00 *
Feb 20, 2015

Studie zu digitalen Risiken und Sicherheitsbewusstsein - 71252

Martin Kuppinger

In einer weltweiten Online-Studie befragte KuppingerCole Experten aus dem Bereich der Informationssicherheit zu ihrer derzeitigen Wahrnehmung von digitalen Risiken und Sicherheit. Die Studie weist auf eine signifikant gestiegene Wahrnehmung beider Bedrohungen, d.h. von potenziellen Angriffen und Risiken, hin.

free
Feb 13, 2015

Executive View: ARCOS Privileged Identity Management Suite - 71028

Alexei Balaganski

ARCON is a privately held technology company established in 2006 in London with research & development headquartered in Mumbai, India. Originally founded as a provider of enterprise risk solutions, the company has expanded its portfolio over the years and currently offers products for automated risk control, real-time risk assessment and privileged identity management. ARCON…

€190.00 *
Feb 05, 2015

Digital Risk and Security Awareness Survey - 71252

Martin Kuppinger

A survey on the awareness of digital risks and security risks run and compiled by KuppingerCole. Providing insight into the current perception of digital and security risks, complemented with analysis and recommendations by KuppingerCole.

free
Jan 30, 2015

Executive View: SAP Cloud Identity Service - 71180

Martin Kuppinger

SAP Cloud User and Access Management solution for simple onboarding of external users in B2B and B2C scenarios and for managing access of all types of users to cloud services, run on the SAP HANA platform.

€190.00 *
Jan 29, 2015

Advisory Note: Enterprise Big Data IAM – Challenges and Opportunities - 71207

David Goodman

The problem of enterprises grappling with large multiple data and information systems is nothing new. What has changed are the internal and external market expectations, the new technology choices and the constraints and opportunities provided by emerging regulations. Take a deep breath and really get to grips with what is needed and what is achievable.

€995.00 *
Jan 27, 2015

Executive View: NetIQ Access Manager - 71054

Alexei Balaganski

NetIQ Access Manager is an example of an integrated Access Management and Identity Federation solution. In fact, NetIQ has been the first vendor to combine federation functionality with web access management features, thus providing a completely integrated solution based on a solid consistent architecture. Initially released in 2006, the product includes Single Sign-On for web…

€190.00 *
Jan 26, 2015

Executive View: i-Sprint AccessMatrix Universal Sign-On - 71064

Alexei Balaganski

i-Sprint Innovations is a vendor of Identity, Credentials and Access Management solutions based in Singapore. Established in 2000, i-Sprint is focusing on providing solutions for financial industry and other high security environments. Since 2011, the company is a wholly owned subsidiary of Automated Systems Holdings Ltd. Backed by Chinese investors, i-Sprint has a significant presence,…

€190.00 *
Jan 22, 2015

Advisory Note: Software Defined Infrastructures - 71111

Rob Newby

Enabling development speed and agility also brings heightened risk to the business. Risks can be greatly reduced by applying appropriate controls, and business benefits increased by leveraging SDI. 

€995.00 *
Jan 21, 2015

Advisory Note: Your Business is Moving to the Cloud - 71156

Graham Williamson

Take a pro-active rather that re-active approach to the adoption of Cloud services. Plan your move to the Cloud taking a strategic view of your requirements, processes and deployment options. Make the Cloud perform for you - not the other way around. The question posed in the title of this Advisory Note is rhetorical. The move to the Cloud is inevitable and to be embraced, not only for…

€995.00 *
Jan 19, 2015

Executive View: BalaBit Shell Control Box - 71123

Alexei Balaganski

BalaBit IT Security wurde im Jahr 2000 in Ungarn gegründet. Ihr erstes Produkt war eine Application Layer Firewall Suite mit der Bezeichnung Zorp. Seitdem hat BalaBit sich zu einer internationalen Holding mit Sitz in Luxemburg entwickelt und verfügt über Vertriebsstellen in mehreren Ländern Europas, den Vereinigten Staaten und Russland sowie über ein großes…

€190.00 *
Jan 16, 2015

Advisory Note: Redefining Access Governance - 71185

Matthias Reinwarth

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact…

€995.00 *
Jan 12, 2015

Executive View: Centrify Identity Service - 71186

Martin Kuppinger

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and cloud-based applications, as well as management for Mac and mobile devices and their apps. The company is VC funded and has raised significant funding from a number of leading investment companies. The company…

€190.00 *
Jan 06, 2015

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

Graham Williamson

There are three major trends driving the adoption of Gateway solutions: Proliferation of inter-connected devices, The need for “bring-your-own-device” (BYOD) support and Migration to Cloud services. The economic imperative to move our databases and applications to the Cloud is strong, but we need the tools to ensure we can protect our resources in the Cloud better than we can…

€190.00 *

 2014

top  

Date Title Price
Dec 09, 2014

Executive View: Courion Access Governance/Risk Products - 71046

Dave Kearns

The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market segments in that broader IAM/IAG market.Over the past few years, the field of Access Intelligence,…

€190.00 *
Nov 28, 2014

Executive View: CyberArk Privileged Threat Analytics - 70859

Martin Kuppinger

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem waren diese Technologien noch bis vor kurzem außerhalb von IT-Abteilungen nahezu unbekannt. Aber…

€190.00 *
Nov 17, 2014

Advisory Note: Security and the Internet of Everything and Everyone - 71152

Mike Small

The vision for the Internet of Everything and Everyone is for more than just an Internet of Things; it makes bold promises for the individual as well as for businesses. However the realization of this vision is based on existing systems and infrastructure which contain known weaknesses.

€995.00 *
Nov 06, 2014

Leadership Compass: IAM/IAG Suites - 71105

Martin Kuppinger

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management. Your compass for finding the right path in the market.

€1295.00 *
Oct 24, 2014

Executive View: SAP Audit Management - 71162

Martin Kuppinger

Audits are a must for any organization. The massively growing number of ever-tighter regulations in the past years and the overall growing relevance and enforcement of Corporate Governance and, as part of it, Risk Management, has led to an increase in both the number and complexity of audits. These audits affect all areas of an organization, in particular the business departments and IT.…

€190.00 *
Oct 13, 2014

Advisory Note: Security Organization, Governance, and the Cloud - 71151

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.  This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

€995.00 *
Oct 13, 2014

Advisory Note: Maturity Level Matrixes for Identity and Access Management/Governance - 70738

Amar Singh

KuppingerCole Maturity Level Matrixes for the major market segments within IAM (Identity and Access Management) and IAG (Identity and Access Governance). Foundation for rating the current state of your IAM/IAG projects and programs.

€995.00 *
Oct 09, 2014

Leadership Compass: Access Governance - 70948

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.

€1295.00 *
Oct 08, 2014

Executive View: Okta Cloud IAM Platform - 70887

<