- Home
- Reports
Reports
Reload reports without any filters applied- Identity
- Security
- Governance
- Compliance
- Data & Analytics
-
IT
Strategy - Marketing
-
Artificial
Intelligence - Industries
- Roles
Selected Filter(s):
All Reports
Advisory Note
KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
Architecture Blueprint
KuppingerCole Architecture Blueprints provide a detailed architectural perspective on a defined area. They illustrate the relevant technical components and their interplay, and they provide advice on how to build your own infrastructure for such area.
Buyer's Compass
KuppingerCole Buyer’s Compass is an instrument that delivers the key criteria to look at when choosing a service/product from a certain category. It lists the most relevant functional and non-functional requirements, lists questions to ask the vendors, and maps capabilities to the main use cases.
Executive View
KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Leadership Brief
KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.
Leadership Compass
KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.
Market Compass
KuppingerCole Market Compass is a tool which provides an overview of a particular IT market segment. It is the compass which assists you in identifying the vendors and products/services in a particular market segment which you should consider for product decisions.
Product Report
KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.
Survey
KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.
Vendor Report
KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.
Whitepaper
KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.
KuppingerCole Architecture Blueprints provide a detailed architectural perspective on a defined area. They illustrate the relevant technical components and their interplay, and they provide advice on how to build your own infrastructure for such area.
KuppingerCole Buyer’s Compass is an instrument that delivers the key criteria to look at when choosing a service/product from a certain category. It lists the most relevant functional and non-functional requirements, lists questions to ask the vendors, and maps capabilities to the main use cases.
KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.
KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.
KuppingerCole Market Compass is a tool which provides an overview of a particular IT market segment. It is the compass which assists you in identifying the vendors and products/services in a particular market segment which you should consider for product decisions.
KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.
KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.
KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.
KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.
-
All
Reports -
Advisory
Note -
Architecture
Blueprint -
Buyer's
Compass -
Executive
View -
Leadership
Brief -
Leadership
Compass -
Market
Compass -
Product
Report - Survey
-
Vendor
Report - Whitepaper
2021
Date | Title | Price |
---|---|---|
Mar 04, 2021 |
Cloudentity Authorization Control PlaneRichard HillIT organizations often contend with information from multi-security services located on-premises, cloud, and even multi-cloud environments that can be inconsistent, increasing attack risks if not adequately addressed. Cloudentity Authorization Control Plane offers a contextual dynamic authorization solution that protects APIs intelligently and automatically. |
![]() |
Mar 02, 2021 |
Emerging Technologies Fostering Digital Business Innovation: HealthcareAnne BaileyThe healthcare landscape has experienced unprecedented pressure and change, and there is a greater need than ever for the industry to make its full digital transformation. Technologies like artificial intelligence (AI), blockchain, IoT, and digital identity will be both enablers and drivers of digital transformation. This Advisory Note will delve into more detail on the current trends in… |
![]() |
Feb 25, 2021 |
Buyer’s Compass: Unified Endpoint ManagementRichard HillUnified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will help prepare your organization to conduct RFIs and RFPs for Unified Endpoint Management. |
![]() |
Feb 25, 2021 |
Datenbank- und Big-Data-SicherheitAlexei BalaganskiDieser Leadership Compass bietet einen Überblick über den Markt für Datenbank- und Big-Data-Sicherheitslösungen sowie einen Leitfaden und Empfehlungen für die Wahl von denjenigen Produkten zum Schutz und zur Verwaltung vertraulicher Daten, die Ihre Anforderungen am besten erfüllen. Wir betrachten das breite Spektrum der beteiligten Technologien, die Produkt-… |
![]() |
Feb 23, 2021 |
Cysiv SOCaaSWarwick AshfordCysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ingests telemetry from any source that generates logs. |
![]() |
Feb 18, 2021 |
Buyer’s Compass: SOARJohn TolbertSecurity Orchestration Automation & Response (SOAR) refers to comprehensive solutions with capabilities that support a range of security tools and data sources. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will help prepare your organization to conduct… |
![]() |
Feb 16, 2021 |
Identity Governance Herausforderungen mit ForgeRock Autonomous Identity bewältigenMartin KuppingerDie meisten Organisationen sehen den Vorteil von Identity Governance und Administration (IGA), erkennen jedoch, dass es in der Praxis Herausforderungen hat, denn bestimmte Aufgaben sind komplex und schwerfällig. Bestehende IGA-Lösungen kommen dadurch an ihre Grenzen und werden als unzureichend empfunden. Unternehmen benötigen neue, dynamischere Ansätze mit einem hohen… |
![]() |
Feb 11, 2021 |
Overcoming Identity Governance Challenges with ForgeRock Autonomous IdentityMartin KuppingerMost organizations see the value of identity governance and administration (IGA). However, they recognize that it has its challenges in practice, with certain tasks being complex and cumbersome. As a result, existing IGA solutions are faltering. Dynamic businesses require new approaches with a high degree of automation. Artificial intelligence (AI) and machine learning (ML) bear the… |
![]() |
Feb 11, 2021 |
HID Global Authentication PlatformJohn TolbertHID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuance, biometric authentication, and mobile/remote identity proofing. HID Global’s Authentication Platform combines each of these elements into a packaged service that is suitable for B2B, B2C, B2E, and G2C… |
![]() |
Feb 11, 2021 |
Privileged Access Management for DevOpsPaul FisherPrivileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more… |
![]() |
Feb 09, 2021 |
Enterprise Authentication SolutionsJohn TolbertThis report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the Enterprise Authentication market segment, product/service functionality, relative market share, and innovative approaches to providing modern solutions in this space. |
![]() |
Feb 04, 2021 |
BeyondTrust Endpoint Privilege ManagementPaul FisherPrivileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware, malware, phishing, and data leaks. No longer a tool for protecting admin accounts, privilege management now extends across the entire organization, from on-premises and cloud infrastructure to every user, no… |
![]() |
Feb 02, 2021 |
Access ManagementRichard HillThis Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market. |
![]() |
Feb 01, 2021 |
Identity Governance & Administration (IGA)Richard HillIdentity Governance and Administration (IGA) refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets that are now commonly aided by intelligent features. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful on-premises IGA deployments. This document… |
![]() |
Jan 26, 2021 |
SOC as a ServiceWarwick AshfordThe KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market that has emerged and continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a… |
![]() |
Jan 21, 2021 |
BMC Helix ITSMWarwick AshfordBMC Helix ITSM is flexible, scalable and secure IT Service Management application built on top of a no-code platform enables organizations create their own custom apps. BMC Helix ITSM can be deployed on-prem, in the cloud, and a combination of the two. It is also available as a managed service. |
![]() |
Jan 21, 2021 |
Technical Approaches to Consent Management and Dynamic Access Management: Ping IdentityJohn Tolbert Anne BaileyPrivacy regulations are changing the way organizations handle personal information. GDPR was not the first and will not be the last to require data handlers to collect consent from users. Many Consumer Identity platforms have added in consent management features, and specialty Privacy and Consent Management solutions are available to address these evolving business scenarios. In this… |
![]() |
Jan 19, 2021 |
Database and Big Data SecurityAlexei BalaganskiThis Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies involved, vendor product and service functionality, relative market shares, and innovative approaches to… |
![]() |
Jan 19, 2021 |
Leveraging Your Organization's Expertise: Departmental IAM Services for the BusinessMatthias ReinwarthTo benefit from existing domain know-how within an organization, it is becoming increasingly important to involve different business stakeholders in administration, review, and maintenance processes. Dedicated, specialized and lean IAM services are a sustainable and efficient approach to achieve this while facilitating a continuous and future-oriented development of modern identity and… |
![]() |
Jan 15, 2021 |
Digital Workplace Delivery PlatformsPaul FisherThe KuppingerCole Market Compass Workplace Delivery covers solutions that assist organizations in managing applications and data that end users access from a “single pane of glass” interface. These can run on existing PC workstations and remote devices including smartphones and tablets. As part of digital transformation these solutions should improve productivity, increase… |
![]() |
Jan 14, 2021 |
SAP Enterprise Threat DetectionMartin KuppingerIn these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP S/4HANA. Identifying, analyzing, and responding to threats that occur within the application layer is a must for protecting the core business systems. |
![]() |
Jan 14, 2021 |
SecurEnds Credential Entitlement ManagementRichard HillDue to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. SecurEnds Credential Entitlement Management (CEM) simplifies user entitlement activities through automation and insightful analytics, giving organizations control of their user access governance. |
![]() |
2020
Date | Title | Price |
---|---|---|
Dec 17, 2020 |
Datamatics TruBotWarwick AshfordDatamatics TruBot is a multi-skilled low-code Robotic Process Automation (RPA) solution for automating high volume repetitive tasks and processes. Datamatics currently provides RPA solutions mainly to the banking, healthcare, insurance, manufacturing, and logistics industries. |
![]() |
Dec 15, 2020 |
Simeio Identity OrchestratorMartin KuppingerSimeio Identity Orchestrator (IO) is a solution that helps integrate and orchestrate other IAM solutions, while also adding a series of own capabilities. Utilizing Simeio IO, customers can converge existing IAM siloed solutions, that can then be operated by Simeio as an MSP or as an IDaaS. Simeio IO can allow customers to connect and direct their existing IAM infrastructure in a modern… |
![]() |
Dec 10, 2020 |
Archer Integrated Risk ManagementPaul FisherToday’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the mature Archer Suite which offers a comprehensive range of solutions and features to assist in managing GRC activities for different types of organizations. |
![]() |
Dec 01, 2020 |
Redefining Access Governance: A broader perspectiveWarwick AshfordTraditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory compliance requirements. A new risk-based and policy-based approach is needed to reduce the cost, effort, and complexity of overseeing and enforcing access entitlements, including access reviews and recertification. |
![]() |
Dec 01, 2020 |
Elastic SecurityAlexei BalaganskiElastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monitoring to help analysts prevent, detect, and respond to cyber threats more efficiently. |
![]() |
Nov 26, 2020 |
Ping Identity’s PingFederateChristopher SchuetzePingFederate is among the leading-edge solutions that support identity federation standards. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premises or in the cloud and is easy for administrators to install and maintain. |
![]() |
Nov 24, 2020 |
CIAM PlatformsJohn TolbertThis report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions. |
![]() |
Nov 24, 2020 |
Cisco Zero Trust SecurityAlexei BalaganskiCisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional security products to ensure complete visibility, protection, and compliance throughout the whole enterprise. |
![]() |
Nov 10, 2020 |
Cherwell ITSMWarwick AshfordCherwell ITSM is a comprehensive IT Service Management application that can be installed on premise or in the cloud and is built on top of the Cherwell CORE platform – a low-code, configuration file driven service management platform that enables rapid customization, automation, orchestration, integration and extensibility. |
![]() |
Nov 03, 2020 |
ARCON PAM SaaSPaul FisherPrivileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a world where access to privileged accounts is changing. Organizations need PAM solutions that fulfill security requirements but also deliver convenience, rapid deployment, and cost efficiency. Therefore, PAM… |
![]() |
Nov 03, 2020 |
BigIDRichard HillIn today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables organizations to take action on that data to meet privacy, security, and governance requirements by finding, categorizing, analyzing, and correlating their data at scale. |
![]() |
Oct 29, 2020 |
Illusive PlatformAlexei BalaganskiIllusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture from the attacker’s viewpoint and helps deal with cyberattacks before, during, and after they happen. |
![]() |
Oct 29, 2020 |
The Role of APIs for BusinessPaul FisherAn Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as booking a hotel room or in car navigation, would not be possible. In recent years, API proliferation has grown exponentially, and they increasingly being used by companies and organisations to… |
![]() |
Oct 27, 2020 |
IBM QRadar Advisor with WatsonAlexei BalaganskiQRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dramatically improving analyst productivity and enabling quick response to cyberthreats. |
![]() |
Oct 22, 2020 |
Security Orchestration Automation and Response (SOAR)John TolbertThis report provides an overview of the SOAR market and provides you with a compass to help you to find the solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative market share, and innovative approaches to providing SOAR solutions. |
![]() |
Oct 22, 2020 |
Privileged Access Management solutions for Agile, multi-cloud and DevOps environmentsPaul FisherPrivileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But changing business practices and upgrades to IT including cloud and other trends has meant that users of privileged accounts have become more numerous and widespread.… |
![]() |
Oct 21, 2020 |
Protecting Intellectual Properties while enabling business agility with R&S®Trusted Gate by Rohde & Schwarz CybersecurityMartin KuppingerMany industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run industrial espionage – such as e.g. Life Sciences, Pharma, or BioTech – must enable information protection while enabling business agility. They need to define their Information Protection Lifecycle… |
![]() |
Oct 21, 2020 |
ideiioRichard HillIdentity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and ensure compliance with applicable laws and regulations. ideiio focuses on providing a straightforward and easy way to deploy and use IGA in organizations regardless of its size. |
![]() |
Oct 21, 2020 |
Oracle APEX – secure low-code application development platformAlexei BalaganskiOracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, storing their data securely in the Oracle Autonomous Database. |
![]() |
Oct 21, 2020 |
Enterprise Databases in the CloudAlexei BalaganskiThis Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as data processing and analytics at scale. We examine both the portfolios of large cloud service providers and innovative modern managed database offerings to provide you the guidance and recommendations for finding… |
![]() |
Oct 13, 2020 |
Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider SecurityAlexei BalaganskiThis whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects. |
![]() |
Oct 08, 2020 |
Architecting your Security Operations CentrePaul SimmondsA security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and systems. Architecting your SOC properly in terms of technology, processes, people and a close coupling with the organisation is critical if you are to achieve value from implementing a SOC within… |
![]() |
Oct 06, 2020 |
Commvault Complete™ Data ProtectionMike SmallBusiness continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support today’s multi-cloud hybrid IT environment. This report describes how Commvault Complete™ Data Protection meets these challenges. |
![]() |
Oct 06, 2020 |
UNITY: IGA Modernization Framework by PersistentRichard HillInevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity provides the necessary migration framework to facilitate an IGA modernization transition. |
![]() |
Oct 06, 2020 |
R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz CybersecurityMatthias ReinwarthRohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePoint-Plattformen für Organisationen in verschiedenen Ländern und Regionen unter Gewährleistung der Konformität zu unterschiedlichen Gesetzen und Vorschriften. Rohde &… |
![]() |
Oct 06, 2020 |
Oxyliom Solutions GAÏA Advanced Identity ManagementMartin Kuppinger Warwick AshfordThe GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory compliance and a modern digital experience, especially in highly regulated industries such as the financial sector. |
![]() |
Sep 23, 2020 |
Cloud Access Security BrokersMike SmallThe KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker) solutions that help to secure the organizational use of cloud services. |
![]() |
Sep 17, 2020 |
Fudo PAM by Fudo SecurityPaul FisherFudo Security’s PAM solution is the company’s primary product in the expanding PAM market. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are creating new demands and innovative PAM… |
![]() |
Sep 15, 2020 |
Working for the Business, not the AuditorsMatthias ReinwarthForward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicable policies, regulations and laws is the basis for consistently and competitively enabling and sustainably operating digital business. |
![]() |
Sep 15, 2020 |
Atos DirX DirectoryMartin KuppingerAtos DirX Directory is one of the few enterprise-grade directory services in the market, delivering a high-performance, high-scalability, high-availability, and high-secure implementation that is required by many of today’s large-scale use cases in the Digital Transformation. Atos DirX Directory builds on a purpose-built and optimized data layer and delivers comprehensive support… |
![]() |
Sep 15, 2020 |
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz CybersecurityMatthias ReinwarthRohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms for organizations spanning countries and regions with different laws and regulatory requirements. Rohde & Schwarz Cybersecurity utilizes globally distributed, efficient and secure infrastructure with… |
![]() |
Sep 08, 2020 |
SAP Cloud Identity Access GovernanceMartin KuppingerSAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a range of on-premises services. It covers areas such as Access Analytics, Role Management, Access Requests, Access Reviews, and Privileged Access Management for these environments. SAP Cloud IAG can run… |
![]() |
Sep 08, 2020 |
Buyer’s Compass: Access ManagementRichard HillAccess Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners and customers. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. This document will help… |
![]() |
Sep 04, 2020 |
Status and Advantages of Small Data Machine Learning ParadigmsAnne BaileyConsider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, some technological approaches to get there, why you should still be cautious of Small Data, and recommendations on applying this practically. |
![]() |
Aug 31, 2020 |
IdentityIQ – SailPointGraham WilliamsonIdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces manual intervention and improves accuracy of user entitlements. The latest release adds cloud access management capability allowing entitlements in DevOps environments to be monitored and managed. |
![]() |
Aug 28, 2020 |
SecZetta Third-Party Identity Risk SolutionPaul FisherManaging third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-party identities puts an extra strain on existing IAM tools but management solutions that provide added functionality for non-employee identities are now available. SecZetta has streamlined existing solutions to… |
![]() |
Aug 28, 2020 |
CyberArkChristopher SchuetzePrivileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and industrial change. The CyberArk Core Privileged Access Security solution is designed to secure and protect privileged accounts and credentials within cloud and hybrid infrastructures. It is part of a suite… |
![]() |
Aug 28, 2020 |
Micro Focus Identity GovernanceGraham WilliamsonIdentity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the modern enterprise. As business systems become increasingly demanding of identity management environments, Micro Focus continues to extend its Identity Governance product, improving the user interface, automating… |
![]() |
Aug 27, 2020 |
Privileged Access ManagementPaul FisherPrivileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, agile software development and digital transformation has meant that users of privileged accounts have become more numerous… |
![]() |
Aug 27, 2020 |
ManageEngine Log360Alexei BalaganskiLog360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR functionality, it offers a convenient and affordable one-stop solution for security analytics and threat remediation across on-prem and cloud. |
![]() |
Aug 27, 2020 |
Radware Kubernetes WAFRichard HillContainerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers. The Radware Kubernetes WAF meets the unique requirements of the Kubernetes environment to protect its containerized applications and data. |
![]() |
Aug 25, 2020 |
The Role of AI in Modern Business Intelligence PlatformsAnne BaileyBusiness intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expand on the volume of data analysis and the degree of control a business user has over the process. This Leadership Brief presents the several roles that artificial intelligence plays in BI, and what your… |
![]() |
Aug 25, 2020 |
Privacy and Consent ManagementAnne BaileyThis report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing solutions that enable you to collect and manage consent in a compliant and… |
![]() |
Aug 20, 2020 |
Access Governance & IntelligenceRichard HillThe Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providing you a compass to help you find the products that can meet the criteria necessary for successful AG deployments. |
![]() |
Aug 18, 2020 |
Recommendations for aligning ITSM with IAM/IGAWarwick AshfordThe versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those related to IAM/IGA. But this is a risky strategy from a maintenance and compliance point of view. This Leadership Brief outlines the key reasons for aligning ITSM with IAM/IGA systems, and how this is best achieved. |
![]() |
Aug 18, 2020 |
The Information Protection Life Cycle and Framework: DeceiveJohn TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the seventh in the series introducing the… |
![]() |
Aug 18, 2020 |
One Identity Active RolesMartin KuppingerOne Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong support for managing Exchange Servers and Office 365, but also Identity Lifecycle Management that supports a range of non-Windows and SaaS applications. |
![]() |
Aug 18, 2020 |
Password Safe von MATESOMartin KuppingerPassword Safe von MATESO ist eine Lösung für das zentrale, unternehmensweite Management von Kennwörtern und anderen „Secrets“ und die Überwachung und Kontrolle von deren Nutzung. Das Produkt unterstützt alle wesentlichen Funktionen in diesem Bereich wie die automatische Rotation von Kennwörtern und die Übergabe von Kennwörtern im… |
![]() |
Aug 13, 2020 |
Buyer’s Compass: Core Features of Privacy and Consent Management SolutionsAnne BaileyBuilding a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks such as helping organizations collect and manage consent signals provided by end-users, managing cookies and trackers, and providing measurement of an organization’s journey towards privacy compliance. To… |
![]() |
Aug 13, 2020 |
SailPoint Predictive IdentityMartin KuppingerSailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droits d'accès avec des recommandations de validation ou de révocation et l'optimisation automatisée des modèles d'accès. Cette solution améliore… |
![]() |
Aug 13, 2020 |
SailPoint Predictive IdentityMartin KuppingerSailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die Genehmigung oder den Widerruf von Berechtigungen während der Berechtigungsprüfung und die automatische Optimierung von Zugriffsberechtigungsmodellen. Die Lösung bietet im Vergleich zu… |
![]() |
Aug 11, 2020 |
Cygna Auditor PlatformMartin KuppingerThe Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing analytics and alerting on these events. It incorporates the former BeyondTrust Auditor Suite. The Cygna Auditor Platform is a solution targeted on administrators of Microsoft Windows-centric environments, but… |
![]() |
Aug 06, 2020 |
BioCatchJohn TolbertBioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which are used by fraud analysts and operations teams to determine appropriate actions in response to indicators. BioCatch utilizes industry-leading passive biometrics for not only user behavioral analysis but also… |
![]() |
Aug 03, 2020 |
Incident Response ManagementChristopher SchuetzeThe probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for IT staff. All organizations must invest in an Incident Response Management plan. Preparation is essential and ensuring that everyone knows what to do can significantly reduce the impact… |
![]() |
Aug 03, 2020 |
Adobe: Experience CloudRoland BühlerWhen optimizing customer centricity and customer journeys across all touchpoints, automation is key. Various aspects have to be considered in order to create an individual and fit-for-purpose customer experience. Adobe’s Experience Cloud consists of various applications and services that cover many marketing-related areas, such as advertising, touchpoint management, personalization,… |
![]() |
Jul 30, 2020 |
The Information Protection Life Cycle and Framework: DisposeJohn TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the final in the series introducing the… |
![]() |
Jul 30, 2020 |
Endpoint Protection, Detection, and ResponseJohn TolbertThe KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space continues to see much innovation and some consolidation. The formerly separate products Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) are increasingly coming together in the marketplace. |
![]() |
Jul 23, 2020 |
Clear Skye IGA: IGA on the ServiceNow NOW platformMartin KuppingerClear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the gap between ITSM and IGA allowing for fast and efficient implementation of IGA capabilities for organizations already using ServiceNow. |
![]() |
Jul 16, 2020 |
Auth0 PlatformRichard HillAuth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’s platform solutions are highly customizable to meet a variety of business requirements with a developer-centric focus. |
![]() |
Jul 15, 2020 |
Wie wir Passwörter loswerden – Noch HeuteWarwick AshfordDie IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dieser Leadership Brief befasst sich damit, wie Organisationen ihre allgemeine Sicherheit verbessern können, indem sie sich über die Abhängigkeit von Passwörtern im Klaren werden… |
![]() |
Jul 14, 2020 |
Dynamic Authorization ManagementGraham WilliamsonThe KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Management market and provides a comparison of the main product offerings. Dynamic Authorization externalizes access control decisions to a centrally-managed authorization service that evaluates access policies in… |
![]() |
Jul 09, 2020 |
Security Fabric: A Methodology for Architecting a Secure FutureChristopher SchuetzeWork from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up the architecture with the concept of a Security Fabric helps to structure, to optimize and to… |
![]() |
Jul 09, 2020 |
NRI Secure Technologies: Uni-ID Libra 2.4Richard HillConsumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra continues to innovate and provide the necessary components of a CIAM solution with a focus on the Japanese market. |
![]() |
Jul 02, 2020 |
Symantec Identity Governance and AdministrationMike SmallIn the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration includes two core elements of IAM - Identity Provisioning and Access Governance - that are essential to enabling and securing digital transformation. This report describes how Symantec Identity… |
![]() |
Jul 02, 2020 |
The Information Protection Life Cycle and Framework: SecureJohn TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the fourth in the series introducing the… |
![]() |
Jun 26, 2020 |
Leadership Brief: Enterprise Information Protection - 71036Anne BaileyThe perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and business devices by employees, and mass remote work further exacerbates this trend. Advanced methods for the protection of sensitive data are necessary. This Leadership Brief is an overview of the role that… |
![]() |
Jun 25, 2020 |
Executive View: CSI tools - 80407Martin KuppingerCSI tools provide a suite of solutions for managing access entitlements and risk in SAP environments. The solution come with a modern, web-based user interface and dashboarding. They deliver in-depth insight and support for managing entitlements at all levels and across all applications within common SAP environments. |
![]() |
Jun 25, 2020 |
Leadership Brief: The Information Protection Life Cycle and Framework: Contain and Recover - 80375John TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the sixth in the series introducing the… |
![]() |
Jun 18, 2020 |
Market Compass: Enterprise Information Protection - 80217Anne BaileyThe KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers Enterprise Information Protection solutions. Because the perimeter of the corporation has changed to include personal and business devices, mass remote work, and increased collaboration, advanced methods for the protection of sensitive… |
![]() |
Jun 10, 2020 |
Leadership Compass: Network Detection and Response - 80126John TolbertThis report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing NDR solutions. |
![]() |
Jun 04, 2020 |
Leadership Compass: Unified Endpoint Management (UEM) - 70314Richard HillThis report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing UEM solutions. |
![]() |
Jun 02, 2020 |
Executive View: ManageEngine PAM360 - 80140Paul FisherIn the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are putting new demands on PAM and vendors are responding to this challenge by adding new functionalities and capabilities to their solutions. This… |
![]() |
Jun 02, 2020 |
Executive View: Hitachi ID Privileged Access Manager - 80142Paul FisherHitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identity Manager and Password Manager products. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid… |
![]() |
Jun 02, 2020 |
Leadership Brief: The Information Protection Life Cycle and Framework: Monitor and Detect - 80374John TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the fifth in the series introducing the… |
![]() |
May 28, 2020 |
Executive View: IBM Watson OpenScale - 80505Anne BaileyIBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deployment, and model lifecycle management make Watson OpenScale a strong choice for enterprises. |
![]() |
May 28, 2020 |
Market Compass: Conversational AI Building Platforms - 80384Roland BühlerThe KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platforms with a focus on chatbot solutions. Such solutions are a common trend in marketing, sales, service management, human resources, and many other use cases. |
![]() |
May 26, 2020 |
Executive View: Omada Identity Suite - 80506Richard HillModern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing insight into access risks. Omada Identity Suite not only supports this with Access Governance and Identity Provisioning but also takes it a step further by giving an IGA best practices framework… |
![]() |
May 22, 2020 |
Market Compass: Cloud Backup and Disaster Recovery - 71176Mike SmallThe KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers solutions that provide backup, restore and disaster recovery of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations. |
![]() |
May 22, 2020 |
Executive View: Microsoft Azure Active Directory - 80401Richard HillFrom small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD) provides Directory Services, Identity Federation, and Access Management from the cloud in a single… |
![]() |
May 19, 2020 |
Executive View: Ilantus Compact Identity - 80177Martin KuppingerIAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Management. Deployment is shifting towards flexible models supporting a range of deployment options, including IDaaS (Identity as a Service). Ilantus Compact Identity is an IAM offering targeting businesses that are… |
![]() |
May 19, 2020 |
Executive View: SentinelOne Singularity Platform - 80139Alexei BalaganskiDie integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe Einblicke und konsistenten Schutz für On-Premises-Endgeräte, virtualisierte Umgebungen und Cloud-Workloads. |
![]() |
May 19, 2020 |
Executive View: SentinelOne Singularity Platform - 80139Alexei BalaganskiSentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consistent endpoint security across on-premises devices, virtualized environments and cloud workloads. |
![]() |
May 18, 2020 |
Executive View: Thycotic Access Controller - 80406Paul FisherThycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are putting new demands on PAM. Against this… |
![]() |
May 14, 2020 |
Executive View: Symantec Privileged Access Manager - 80331Mike SmallPrivileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. This report describes how Symantec Privileged Access Management meets these challenges. |
![]() |
May 14, 2020 |
Executive View: Nexis Controle 3.4 - 80158Matthias ReinwarthNexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. |
![]() |
May 14, 2020 |
Executive View: One Identity Manager - 80310Christopher SchuetzeOne Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experience, rapid customization and easy deployment. One Identity Manager is offering a rich toolset and framework to connect various target systems to its identity and access management solution. |
![]() |
May 14, 2020 |
How to Get Rid of Passwords - TodayWarwick AshfordThe IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This leadership brief looks how organizations can improve overall security by addressing their reliance on passwords and prepare to move to alternative authentication methods. |
![]() |
May 14, 2020 |
Leadership Compass: Access Control Tools for SAP Environments - 80104Martin KuppingerThis report provides an overview of the market for Access Control Tools for SAP Environments and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing solutions that increase security in SAP Environments by restricting access,… |
![]() |
May 12, 2020 |
Whitepaper: IAM: Globalization & Large-Scale Enterprise - 80130Warwick AshfordIdentity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true for multinational companies that must comply with an ever-increasing number of security and privacy regulations. Service Layers delivers a managed IAM service using a scalable, customizable, component-based… |
![]() |
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Paul FisherPrivileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more… |
![]() |
Apr 30, 2020 |
Leadership Compass: Identity Governance & Administration (IGA) - 80063Martin Kuppinger Richard HillThe Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for… |
![]() |
Apr 30, 2020 |
Executive View: SailPoint Predictive Identity - 80124Martin KuppingerSailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitlements during access review, and automated optimization of access models, amongst others. The solution provides significant improvements in user experience of IGA, compared to traditional IGA approaches, while also… |
![]() |
Apr 23, 2020 |
Executive View: IBM Watson - 80232Anne BaileyIBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilities quickly. The comprehensive attention to data management, analytics, model training, deployment, and lifecycle management make the portfolio of IBM Watson products a strong choice for enterprises. |
![]() |
Apr 23, 2020 |
Leadership Brief: Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery - 80223Paul FisherCentralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks or unexpected disruption. |
![]() |
Apr 21, 2020 |
Executive View: Soterion for SAP - 80113Martin KuppingerSoterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both on premises solution and in an as-a-service model. Soterion has put specific emphasis on delivering a solution for GRC and access control in SAP environments that is easy-to-use, coming with a… |
![]() |
Apr 21, 2020 |
Whitepaper: Fast Access Management in the Hybrid Cloud for SMBs - 80137Paul FisherMoving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud services that are used on-demand but discarded when no longer needed, finding a scalable solution without big IT projects and costs, and managing administrative access with limited resources. At the same time,… |
![]() |
Apr 16, 2020 |
Executive View: Hitachi ID IAM Suite - 80399Richard HillEnterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governance capabilities. Hitachi ID offers a well-integrated all-in-one IAM package that can meet these enterprise business requirements. |
![]() |
Apr 16, 2020 |
Executive View: Sophos Intercept X - 80227Warwick AshfordSophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced detection for all types of threats, especially ransomware, fileless/in-memory malware and malware that exploits unknown vulnerabilities in operating systems and application software. Sophos Intercept X also… |
![]() |
Apr 14, 2020 |
Whitepaper: Enhanced Privilege Access Management Solutions - 80176Paul FisherPrivileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development and digital transformation has meant that PAM solutions need an enhanced set of features to reduce the risk of privileged accounts being hijacked in this more challenging operating environment. |
![]() |
Apr 09, 2020 |
Executive View: Indeed Certificate Manager - 80178Alexei BalaganskiIndeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote management capabilities help reduce management costs, improve productivity, and strengthen your company’s overall security and compliance posture. |
![]() |
Apr 09, 2020 |
Leadership Brief: Managing Non-Human Identities - 80278Warwick AshfordAs digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. This Leadership Brief looks the importance of managing non-human and human identities in the same way, and how to approach achieving that. |
![]() |
Apr 07, 2020 |
Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Utilities & Energy - 80265Anne BaileyThe energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids are a more efficient offering for energy management, and new business models beyond the prosumer will require the partnership of different actors in the industry. Emerging technologies like artificial… |
![]() |
Apr 03, 2020 |
Leadership Brief: The Information Protection Life Cycle and Framework: Control Access - 80372John TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the third in the series introducing the… |
![]() |
Apr 03, 2020 |
Executive View: Vectra Cognito - 80230Warwick AshfordVectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing enterprise network traffic on premise and in the cloud to detect and respond to malicious activity by adversaries, with threat investigation and threat hunting capability. |
![]() |
Apr 03, 2020 |
Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80400deMatthias ReinwarthTransparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds und Kollaborationswerkzeugen (z.B. Microsoft Office 365, SharePoint, Teams) gespeichert sind. Virtualisierung, Verschlüsselung und Aufteilung von Daten, um eine sichere und bequeme… |
![]() |
Mar 31, 2020 |
Leadership Brief: The Information Protection Life Cycle and Framework: Acquire and Assess - 80371John TolbertThe modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the second in the series introducing the… |
![]() |
Mar 26, 2020 |
Executive View: IRM-Prot-On - 71313Anne BaileySharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Groupo CMC is a strong provider of enterprise information protection services. The solution enables document and file protection, permissions management, and information classification. |
![]() |
Mar 26, 2020 |
Executive View: Micro Focus Access Manager - 80311Graham WilliamsonThe Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the product, leveraging new technology and remaining responsive to client requirements for an agile and comprehensive solution to their access control requirements. Micro Focus Access Manager is a solution well-suited… |
![]() |
Mar 26, 2020 |
Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80400Matthias ReinwarthTransparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office 365, SharePoint, Teams). Virtualization, encryption and fragmentation of data enabling secure and convenient collaboration for multi cloud, on-premises and hybrid storage environments and true data… |
![]() |
Mar 26, 2020 |
Executive View: CyberArk Privilege Cloud - 80122Paul FisherPrivileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation and industrial change. CyberArk Privilege Cloud is an as-a-service solution designed to protect and control privileged access across on-premises, cloud and hybrid infrastructures. It is part of a suite of… |
![]() |
Mar 24, 2020 |
Leadership Brief: Typical Risks and Pitfalls for IGA Projects - 72580Warwick AshfordAs the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effective Identity Governance & Administration (IGA) capability has never been greater. This leadership brief outlines common risks and pitfalls of enterprise IGA projects and how they can be avoided. |
![]() |
Mar 24, 2020 |
Whitepaper: AI, Machine learning and Privileged Access Management - 80120Paul FisherChoosing a PAM solution has become a complex, and potentially time consuming, decision for modern organizations but one they must get right. If trends such as customer identities or privileged accounts used by DevOps are to be managed securely, then the final purchasing decision rests on carefully selecting solutions with the right feature sets. New technologies such as machine learning… |
![]() |
Mar 24, 2020 |
Executive View: iWelcome IDaaS and CIAM - 80328John TolbertiWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-users as well as app developers. As an EU-based company, iWelcome strives to fulfill regional requirements such as interoperability with various national IDs and GDPR compliance, and as such provides… |
![]() |
Mar 19, 2020 |
Leadership Brief: Introduction to the Information Protection Life Cycle and Framework - 80370John Tolbert |
![]() |
Mar 19, 2020 |
Leadership Compass: Fraud Reduction Intelligence Platforms - 80127John TolbertThis report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Fraud Reduction Intelligence Platform solutions. |
![]() |
Mar 17, 2020 |
Leadership Brief: Beyond Marketing: The Future of Customer Interaction - 80292Roland BühlerCustomer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as marketing, sales, service, support, and consultancy are part of customer experience (CX). Furthermore, technological aspects shape the future of customer interaction: artificial intelligence and the… |
![]() |
Mar 16, 2020 |
Buyer's Compass: API Management and Security - 80215Alexei BalaganskiThe complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for implementing consistent governance and security along the whole API lifecycle. |
![]() |
Mar 12, 2020 |
Executive View: Exabeam Security Management Platform - 80001Alexei BalaganskiExabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrated orchestration and automation capabilities to improve analysts’ productivity. It can augment an existing SIEM or completely replace it. |
![]() |
Mar 10, 2020 |
Executive View: Atos DirX Identity - 80166Martin KuppingerAtos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of customization and added a modern, responsive user interface together with RESTful interfaces. |
![]() |
Mar 05, 2020 |
Leadership Brief: What to Consider When Evaluating Decentralized Identity? - 80451Anne BaileyDecentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership Brief guides you through the critical aspects of decentralized identity solutions that are relevant to enterprise adoption. |
![]() |
Mar 05, 2020 |
Executive View: Informatica CLAIRE Engine - 80391Anne BaileyIntelligent data management allows enterprises to identify, understand, and act upon trends in enterprise data and metadata, and is an essential addition to the digitized organization’s toolkit. Informatica’s CLAIRE is a AI and machine learning engine which powers its intelligent data platform that is built into Informatica’s data management products, and is a strong… |
![]() |
Mar 05, 2020 |
Leadership Brief: Find Your Route from SIEM to SIP and SOAR - 80008Alexei BalaganskiSecurity Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing number and sophistication of cyber threats, even the largest security operations centers built around them fail to respond to attacks in time. Are SIEMs a thing of the past already? This Leadership Brief… |
![]() |
Mar 04, 2020 |
Advisory Note: Business Continuity in the age of Cyber Attacks - 70361Warwick AshfordBusiness continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach. This leadership brief identifies why there needs to be closer alignment and integration between business continuity and cyber security teams, and provides recommendations on how to achieve this… |
![]() |
Mar 03, 2020 |
Leadership Brief: 10 Top Trends in IAM - 80335Warwick AshfordDigital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability to manage identities effectively in a rapidly changing business, regulatory and IT environment. This Leadership Brief looks at the main trends to help businesses evolve their Identity and Access Management (IAM)… |
![]() |
Feb 28, 2020 |
Market Compass: Decentralized Identity: Blockchain ID & Self-Sovereign Identity Solutions - 80064Anne BaileyThe KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment. This Market Compass covers decentralized identity, specifically Blockchain Identity and Self-Sovereign Identity (SSI) solutions. This is a very dynamic space filled with visionary and innovative vendors that are applying decentralized identity to real enterprise use… |
![]() |
Feb 26, 2020 |
Leadership Brief: Explainable AI - 80362Anne BaileyOne of the largest barriers to widespread machine learning (ML) adoption is its lack of explainability. Most ML models are not inherently explainable on a local level, meaning that the model cannot provide any reasoning to support individual decisions. The academic and private sectors are very active in developing solutions to the explainability issue, and this Leadership Brief introduces… |
![]() |
Feb 26, 2020 |
Advisory Note: Trends in Privileged Access Management for the Digital Enterprise - 71273Paul FisherPrivileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, agile software development and digital transformation has meant that privileged accounts have become more numerous and… |
![]() |
Feb 26, 2020 |
Executive View: Google's Cloud Identity - 80326Paul FisherIdentity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based applications in the enterprise. Google’s Cloud Identity provides access to many popular cloud applications and offers some endpoint management features. |
![]() |
Feb 26, 2020 |
Leadership Brief: Cybersecurity Trends & Challenges 2020 - 80502Christopher Schuetze2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyberattacks will continue to increase in frequency and perhaps severity, and the cyber risks to hyperconnected businesses will continue to grow. With everything and everyone being connected, the attack surface is… |
![]() |
Feb 26, 2020 |
Advisory Note: Cyber Risk – Choosing the Right Framework - 80237Mike SmallAs organizations undergo Digital Transformation the business impact of cyber risks increases. It is essential that organizations manage these risks. There are several frameworks that organizations could adopt to help them to manage these risks, but they need guidance to choose which is right for them. This report describes the main cyber risk management frameworks and… |
![]() |
Feb 24, 2020 |
Leadership Brief: 5G Impact on Organizations and Security - 80238Mike Small5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains what it is and its likely impact on organizations and their security. |
![]() |
Feb 18, 2020 |
Leadership Brief: Leveraging Identity Fabrics on your way towards cloud based IAM - 80501Matthias Reinwarth |
![]() |
Feb 13, 2020 |
Whitepaper: Success in Digital Finance: Doing Digital Identities right for a positive Digital Experience - 80164Martin KuppingerSuccess in Digital Finance is not a miracle, but a combination of having the right offerings and services, and delivering a seamless and modern digital experience to the customers. Digital Identities take a central role in such digital experience, from the identity verification and digital onboarding process to recurring authentication and efficient processes based on “electronic… |
![]() |
Feb 13, 2020 |
Executive View: ESET Enterprise Inspector - 80192John TolbertEnterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows with future plans to cover Linux, and Mac clients, collecting and analyzing information to help security analysts determine if malicious activities have occurred. The solution also allows for pre-configured remediation actions to be executed when certain conditions are met. |
![]() |
Feb 12, 2020 |
Market Compass: Web Application Firewalls - 70324Richard HillThe KuppingerCole Market Compass provides an overview of the product or service offerings in a specific market segment. This Market Compass covers Web Application Firewall (WAF) solutions that span the spectrum of on-premises, cloud, and hybrid IT delivery models. |
![]() |
Feb 11, 2020 |
Executive View: PlainID Policy Manager - 80315Alexei BalaganskiPlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access across all identities, systems, and applications with the help of centrally managed business-focused policies. |
![]() |
Jan 31, 2020 |
Executive View: PingAccess - 80323Richard HillWith the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management, whether on-premises or in the cloud. Combining PingFederate with PingAccess offers a complete Web Access Management solution. |
![]() |
Jan 31, 2020 |
Leadership Brief: Assessing the Maturity of Core AI Disciplines - 80390Anne BaileyThere are several disciplines that contribute to the Artificial Intelligence field: Natural Language Processing, Machine Learning, Machine Reasoning, and others. This Leadership Brief addresses their varying maturity levels for enterprise use. |
![]() |
Jan 30, 2020 |
Advisory Note: Why High-Profile Digital Transformation Initiatives Fail: How to do better - 80289Warwick AshfordA growing number of organizations are adapting their products, processes and strategies to capitalize on the benefits of digital technology, but some high-profile Digital Transformation (DX) initiatives have failed despite heavy investments. This Advisory Note looks at some of the main reasons DX initiatives fail and provides recommendations for avoiding these common pitfalls to ensure DX… |
![]() |
Jan 30, 2020 |
Advisory Note: KRIs and KPI for Cyber Security - 80239Mike SmallThis report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then can be used in IT management and corporate management. |
![]() |
Jan 29, 2020 |
Executive View: Cleafy Advanced Threat Detection & Protection - 80309Alexei BalaganskiCleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection against advanced targeted attacks for unmanaged endpoints, it can prevent payment fraud, transaction tampering, credential theft, and other risks. |
![]() |
Jan 27, 2020 |
Executive View: Callsign Intelligence Driven Authentication - 80174Martin KuppingerCallsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solutions, all capabilities are tightly integrated. The platform uses AI/ML for risk analysis and supports passive and continuous authentication. It is feature-rich and easy to use, with flexible support for creating,… |
![]() |
Jan 23, 2020 |
Executive View: Onegini Connect - 80168John TolbertOnegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expanding across Europe, and has global ambitions. They have expertise in EU regulations such as GDPR, PSD2 and other industry-specific regulations. They are positioning their product as a CIAM solution for… |
![]() |
Jan 23, 2020 |
Leadership Brief: Six Key Actions to Prepare for CCPA - 80353Mike SmallFrom January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed. This report identifies six key actions that IT needs to take to prepare for compliance. |
![]() |
Jan 23, 2020 |
Leadership Brief: Top Ten Trends in Cybersecurity - 80336Paul FisherThis report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the years ahead. |
![]() |
Jan 22, 2020 |
Whitepaper: Healthcare IAM: Enhance the Clinical Workflow - 80163Martin SmithThe Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has unique challenges because clinical operations depend on continual access to customers’ most sensitive personal information and require life-or-death decisions on a daily basis. This environment demands… |
![]() |
Jan 21, 2020 |
Executive View: Informatica: Customer 360 - 80290Roland BühlerWhen optimizing customer centricity and customer engagement, data is an important resource. To ensure an ideal customer experience, various challenges across the customer lifecycle must be solved. Informatica’s Customer 360 solution is designed to manage data across the entire customer lifecycle in a highly flexible way to meet various customer scenarios. |
![]() |
Jan 20, 2020 |
Executive View: Apigee Edge API Management Platform - 80307Alexei BalaganskiApigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to monitoring and securing live endpoints – everything is managed centrally across on-premises, cloud-based and hybrid environments. |
![]() |
Jan 17, 2020 |
Leadership Brief: Robotic Process Automation - 80333Warwick AshfordRobotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes by implementing (software) “robots” to perform these tasks instead of humans. This leadership brief looks at the most appropriate applications of RPA and the biggest potential business benefits. |
![]() |
Jan 16, 2020 |
Executive View: Oracle Identity Governance - 80157Richard HillAs the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identity Governance (OIG) addresses compliance at scale within the more modern cloud environments. |
![]() |
Jan 15, 2020 |
Executive View: Microsoft Azure AI Platform - 80233Anne BaileyThe Microsoft Azure AI platform provides a comprehensive enterprise solution for designing and implementing customized AI solutions. The cloud and hybrid deployment options, modular AI services, and management tools make the platform a strong choice for an AI-on-demand solution. |
![]() |
Jan 15, 2020 |
Executive View: Saviynt Security Manager for Enterprise IGA - 80325Richard HillSaviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functionality. Designed to be deployed as a cloud, hybrid, or on-premise solution, the Saviynt Security Manager for Enterprise IGA helps customers demonstrate assured compliance using their access governance and risk… |
![]() |
Jan 14, 2020 |
Executive View: AWS Security Analytics Solutions - 80220Alexei BalaganskiAWS provides a comprehensive suite of services to monitor for threats, misconfigurations and compliance violations across its portfolio, with all security alerts aggregated, organized and prioritized within AWS Security Hub – an extensible cloud security and compliance management platform. |
![]() |
Jan 13, 2020 |
Leadership Brief: IAM for Robotic Process Automation: How to Avoid Security Challenges - 80383Martin KuppingerRobotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software) “robots” that perform these tasks instead of humans. Such software robots must have a digital identity, and the access rights of these robots must be kept under control for enforcing the… |
![]() |
Jan 10, 2020 |
Executive View: F-Secure Rapid Detection & Response - 80182John TolbertRapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security analysts determine if malicious activities have occurred. The solution also allows for pre-configured remediation actions to be executed when certain conditions are met and offers F-Secure expert… |
![]() |
Jan 06, 2020 |
Leadership Brief: Radically Lean: NoOps and Serverless Computing - 80305Warwick AshfordComputing is continually getting leaner and becoming more like a utility as it moves increasingly further away from on-premise physical hardware by abstracting IT environments away from the underlying infrastructure. This trend towards NoOps computing that eliminates the need for operational teams to manage software and infrastructure has seen the introduction of Virtual Machines,… |
![]() |
Jan 06, 2020 |
Executive View: Informatica Data Privacy Management - 80276Warwick AshfordInformatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable businesses to get the most out of company data and digital transformation processes without exposing the enterprise to increased risk. Data Privacy Management includes tools to identify and monitor sensitive… |
![]() |
2019
Date | Title | Price |
---|---|---|
Dec 19, 2019 |
Executive View: Sovrin Network Self-Sovereign Identity - 80112Anne BaileyExpectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship to personal customer data in the wake of GDPR and CCPA. Self-Sovereign Identity (SSI) from the Sovrin Network allows enterprises to streamline their collection of identity information, sign-on options for… |
![]() |
Dec 18, 2019 |
Leadership Brief: Optimizing your Cybersecurity Spending - 80260Christopher SchuetzePrioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attacks and data breaches. In order to invest sensibly, companies must be aware of the challenges and trends. This Leadership Brief describes a few top-level challenges and recommendations when planning your 2020… |
![]() |
Dec 16, 2019 |
Leadership Brief: Distributed Decentralized AI: Create, Share, Scale, Monetize - 80272Anne BaileyUsing artificial intelligence services in combination can offer heightened results, whether it be in accuracy, robustness, customization, or geographical spread. Distributed, decentralized AI is a dynamic research space that is rapidly producing enterprise solutions. However, there are a variety of methods, environmental drivers, and use cases associated with decentralized AI. This… |
![]() |
Dec 16, 2019 |
Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Finance Industry - 80264Anne BaileyThe relative success of FinTechFinTechs drives the conversation surrounding finance and emerging technologies, and their products are capturing the hearts and minds of consumers. But despite the disruptive reputation of AI, blockchain, and IoT, FinTechs are not competing in a dramatically different way than legacy financial institutions. FinTechs provide the same services, but choose to… |
![]() |
Dec 13, 2019 |
Leadership Brief: AI in the Legal Industry: The Basics in a Nutshell - 80269Anne BaileyArtificial Intelligence (AI) applications in the legal industry already range from naissent to mature. However, the legal implications of such applications and trends in global regulation should be considered when assessing the suitability of any AI application. This leadership brief offers an overview of the current state of AI in the legal industry. |
![]() |
Dec 11, 2019 |
Advisory Note: Future of Identity Management - 71303Warwick AshfordDigital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to manage identities effectively and efficiently in a rapidly changing business, regulatory and IT environment. This Advisory Note looks at the main trends and challenges to help businesses… |
![]() |
Dec 11, 2019 |
Whitepaper: CCPA: The Need for Data-Centric Security - 80136Martin KuppingerCCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take appropriate action to comply with CCPA. While handling consent and opt-outs are at the forefront, successful mitigation of risks starts with data-centric security – it is about understanding… |
![]() |
Dec 10, 2019 |
Executive View: Axiomatics APS - 80314Richard HillAxiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently both on-premises and in the cloud. |
![]() |
Dec 02, 2019 |
Leadership Compass: API Management and Security - 70311Alexei BalaganskiThis Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements in the most efficient way. We examine the complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise and identify the vendors, their products,… |
![]() |
Nov 28, 2019 |
Whitepaper: Digital Transformation for Business Enablement Requires a Modern Identity Fabric - 80165Martin KuppingerDigital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything to every digital service effectively, transformation initiatives will fail. Business can’t afford to implement these capabilities on a per service basis – this will increase cost, slow down time-to-market and lead to… |
![]() |
Nov 25, 2019 |
Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170Martin KuppingerDigital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide identity services that can be consumed by digital services. Focus is shifting from modern UIs for managing existing applications to APIs that provide the identity services. Modern Identity Fabrics must serve both… |
![]() |
Nov 22, 2019 |
Buyer's Compass: Decentralized Identity - 80050Anne BaileyBlockchain identity solutions are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and gaining maturity, selecting a vendor to provide blockchain ID solutions should be done with care. This KuppingerCole Buyer’s Compass will equip you with key criteria and questions to help select an appropriate vendor. |
![]() |
Nov 21, 2019 |
Executive View: IBM Cloud Pak for Security - 80172Martin KuppingerIBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybrid and multi-cloud environments. It provides a consolidated view on security and threat information across a range of sources from IBM and other vendors. It supports federated search across that data, plus… |
![]() |
Nov 19, 2019 |
Executive View: Identity Automation’s RapidIdentity Solution - 80028Martin KuppingerIdentity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standard IAM capabilities, RapidIdentity helps healthcare organizations access a unified solution instead of relying on disparate point solutions. RapidIdentity’s cohesive suite of tools reduces… |
![]() |
Nov 18, 2019 |
Leadership Brief: Top 3 Initiatives to Improve CX and Customer Journeys - 80293Roland BühlerWhen it comes to digital marketing, companies of all business sectors try to constantly improve customer experience (CX) and customer journeys. In many cases, there is a single focus on technological topics, such as machine learning or conversational interfaces. But, is technology the key to success? This leadership brief gives an overview of relevant topics regarding optimization of CX… |
![]() |
Nov 18, 2019 |
Executive View: IBM Decentralized Identity - 80099Anne BaileyThe IBM Decentralized Identityplatform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized identity solution has prioritized interoperable protocols rooted in Hyperledger Indy and Aries to provide secure exchange of information. IBM’s decentralized identitysolution can help enterprises… |
![]() |
Nov 14, 2019 |
Whitepaper: Grundlagen des Privileged Access Managements - 80332Paul FisherPrivileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die… |
![]() |
Nov 13, 2019 |
Leadership Compass: Identity as a Service (IDaaS) IGA - 80051Martin KuppingerAn emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for traditional IGA use cases, helping IDaaS IGA to increasingly become the preferred choice of customers for IAM… |
![]() |
Nov 13, 2019 |
Executive View: ForgeRock Access Management - 80319John TolbertForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform. It provides numerous authentication options, an intelligent adaptive risk engine, identity federation, and advanced policy-based authorization capabilities. ForgeRock supports open standards development, and that is reflected by… |
![]() |
Nov 11, 2019 |
Whitepaper: Modern B2B Identity Management - 80135Richard HillWith Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM) becomes a crucial consideration. IAM shares standard features that can be used in B2E or B2C use cases as well, but IAM in the B2B context has specific requirements that need to be addressed. B2B… |
![]() |
Nov 11, 2019 |
Architecture Blueprint: Identity and Access Management - 72550Matthias ReinwarthIAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities leads to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse and sometimes even conflicting. Organization demand for a blueprint to design and implement efficient and durable IAM architectures that meet current and… |
![]() |
Nov 08, 2019 |
Executive View: IBM MaaS360 with Watson - 79067Warwick AshfordIBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With an open platform for integration with existing apps and infrastructure, IBM MaaS360 is backed by around-the-clock customer support and services, and… |
![]() |
Nov 07, 2019 |
Leadership Compass: Infrastructure as a Service – Global Providers - 80035Mike SmallThe KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance. |
![]() |
Nov 07, 2019 |
Whitepaper: Understanding Privileged Access Management - 80302Paul FisherPrivileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more… |
![]() |
Nov 06, 2019 |
Buyer's Compass: Endpoint Detection & Response (EDR) - 80213John TolbertData loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments.… |
![]() |
Nov 04, 2019 |
Executive View: Atos DirX Access - 80167Martin KuppingerAtos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User… |
![]() |
Oct 31, 2019 |
Executive View: Ping Identity Data Governance - 70295Richard HillIn the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply with the growing number of privacy regulations. PingDataGovernance provides the capabilities to control how data is accessed from data stores as well as giving data protection at the API layer. |
![]() |
Oct 30, 2019 |
Executive View: One Identity Safeguard Suite - 80074Paul FisherPrivileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation. One Identity Safeguard Suite is a PAM solution that uses a modular approach across password management, session management and privilege account analytics. |
![]() |
Oct 28, 2019 |
Executive View: Microsoft Azure Active Directory - 79077Richard HillFrom small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD) provides Directory Services, Identity Federation, and Access Management from the cloud in a single… |
![]() |
Oct 25, 2019 |
Leadership Brief: Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits? - 80271Anne BaileyThe conversation on artificial intelligence and machine learning is still largely driven by hype. But concrete business benefits exist for narrow AI solutions, and it is time to separate hype from reality. This leadership brief identifies the characteristics of successful AI use cases, provides examples across multiple industries and business departments, and provides recommendations on… |
![]() |
Oct 25, 2019 |
Leadership Brief: Defending Against Ransomware - 80235John TolbertRansomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom. |
![]() |
Oct 24, 2019 |
Leadership Brief: Penetration Testing Done Right - 70359Paul SimmondsPenetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious actors; however, a penetration test is not a simple “off-the-shelf” test and needs careful design and planning. |
![]() |
Oct 23, 2019 |
Leadership Brief: Do I need Network Threat Detection & Response (NDTR)? - 80296John TolbertNTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reasons to consider NTDR, and some high-level evaluation criteria regarding NTDR products. |
![]() |
Oct 17, 2019 |
Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123Paul FisherPrivileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no… |
![]() |
Oct 15, 2019 |
Executive View: Optimal IdM - Optimal Cloud - 80162Richard HillFor many organizations, the adoption of cloud services has become a strategic imperative which includes moving security services to the cloud as well. Optimal IdM provides a comprehensive identity management solution that provides federation, single sign-on, and strong two-factor authentication all within a private cloud. |
![]() |
Oct 09, 2019 |
Executive View: Curity Identity Server - 80159John TolbertCurity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to deploy necessary new features while shielding users from complexity. |
![]() |
Oct 08, 2019 |
Executive View: Devolutions PAM Solution - 80070Martin KuppingerDevolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced capabilities of the leading-edge PAM solutions are lacking, the product fits well to the target group… |
![]() |
Oct 07, 2019 |
Executive View: AWS Control Tower - 80219Mike SmallManaging access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex. One area of concern is managing administrative access – administration is an essential process, but the administrator accounts provide the keys to the kingdom. This report describes how AWS Control Tower helps to… |
![]() |
Sep 26, 2019 |
Leadership Compass: Consumer Authentication - 80061John TolbertThis report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions. |
![]() |
Sep 24, 2019 |
Executive View: Tremolo Security – A Different Approach - 80160Graham WilliamsonIt’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain us and restrict our agility in deploying identity management services. Tremolo Security breaks the mold and asks us to focus on the task to be performed, and then to deploy an optimal solution. |
![]() |
Sep 20, 2019 |
Leadership Brief: Responding to Cyber Incidents - 80209Mike SmallThe overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question is not if your organization will suffer a cyber incident but when - and this makes it essential to… |
![]() |
Sep 18, 2019 |
Advisory Note: Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm? - 80301Anne BaileyBlockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from its fame before a firm can find an appropriate use case. This report deconstructs the main features that make blockchains unique from traditional database software and identify the ways that… |
![]() |
Sep 17, 2019 |
Executive View: Oracle Data Safe - 80076Alexei BalaganskiOracle Data Safe is a cloud-based service that improves Oracle database security by identifying risky configuration, users and sensitive data, which allows customers to closely monitor user activities and ensure data protection and compliance for their cloud databases. |
![]() |
Sep 17, 2019 |
Whitepaper: Ein schlanker Ansatz für Identity & Access Governance - 80107Martin KuppingerIdentity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die Ansätze zu Identity & Access Governance zu überprüfen und schlanke Konzepte umzusetzen, die Unternehmen helfen, sich effizient an die Vorschriften zu halten und gleichzeitig… |
![]() |
Sep 17, 2019 |
Whitepaper: A Lean Approach on Identity & Access Governance - 80048Martin KuppingerIdentity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean concepts that help businesses to comply in an efficient manner, while also effectively mitigating business risks that derive from excessive… |
![]() |
Sep 17, 2019 |
Advisory Note: The Future of Cryptocurrencies - 80263Anne BaileyCryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread adoption of cryptocurrencies, but also many challenges including data protection and tracking criminal activities. The relationship between government regulators, financial institutions, and… |
![]() |
Sep 13, 2019 |
Leadership Brief: PSD2: New business opportunities and risks - 80303John TolbertThe Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for consumers, and create new business opportunities in the financial sector. However, new opportunities also imply new risks. |
![]() |
Sep 12, 2019 |
Leadership Brief: Top Cyber Threats - 72574Christopher SchuetzeThe way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them. |
![]() |
Sep 11, 2019 |
Leadership Brief: How to set up your IAM organization - 72548Christopher SchuetzeA technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs and IAM Security Officers are struggling to promote and develop the maturity of skills in the silos of technical identity management services. Adapting the structure of IAM organizations so that they are based… |
![]() |
Sep 11, 2019 |
Leadership Brief: How to get a Grip on OT Cybersecurity - 72573Richard HillWith the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT is inevitable, so get started now on getting a grip on your OT Cybersecurity. |
![]() |
Sep 10, 2019 |
Whitepaper: Why Modern Enterprise IAM Must Be Rearchitected: Build Your Case for Containerized IAM and IDaaS - 80044Martin KuppingerIT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such architectures provide clear benefits when used for IAM, allowing customers to shift from lengthy deployments of complex IAM tools to an agile deployment and operations approach, based on continuous innovation.… |
![]() |
Sep 10, 2019 |
Executive View: Akamai Zero Trust Security - 80054Alexei BalaganskiAkamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud. |
![]() |
Sep 09, 2019 |
Executive View: Uniken REL-ID Security Platform - 80045Roland BühlerWhen it comes to omni-channel and multi-device marketing and commerce, authentication is an important topic. The challenge is to achieve both security and the user experience as part of an integrated customer journey. UNIKEN REL-ID is a security platform that addresses that challenge across various channels, including mobile, web, voice, and chat. |
![]() |
Sep 04, 2019 |
Executive View: AdNovum NEVIS Security Suite - 80066John TolbertA solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications. |
![]() |
Sep 03, 2019 |
Executive View: Oracle Identity Cloud Service - 80156Mike SmallMost organizations now have a hybrid IT environment with a cloud first approach to choosing new applications. While this provides many benefits it also creates challenges around security and administration. Managing identity and access in a consistent manner across all IT services, irrespective of how they are delivered, is key to meeting these challenges. This report… |
![]() |
Sep 02, 2019 |
Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155Martin KuppingerToday, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a… |
![]() |
Sep 02, 2019 |
Executive View: IBM Cloud Identity - 79065Paul FisherIDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. The promise of improved time-to-value proposition is prioritizing adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS to dominate new IAM purchases globally. This report is an… |
![]() |
Sep 02, 2019 |
Leadership Brief: Identity Fabrics - Connecting Anyone to Every Service - 80204Matthias ReinwarthDigital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together and how value is delivered to customers. Ever-changing application and infrastructure architectures reflect the requirements of the evolving challenges that face companies, government agencies and educational… |
![]() |
Aug 30, 2019 |
Leadership Compass: Identity API Platforms - 79012Richard HillIdentity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT environments seen today. This Leadership Compass will give you an overview and insights into the Identity API Platform market; providing you a compass to help you find the product that you need. |
![]() |
Aug 29, 2019 |
Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194Matthias Reinwarth Christopher SchuetzeOrganisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall oder ihre erhebliche Beeinträchtigung kann zu anhaltenden Versorgungsengpässen,… |
![]() |
Aug 29, 2019 |
Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065Matthias Reinwarth Christopher SchuetzeOrganizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic… |
![]() |
Aug 29, 2019 |
Executive View: Micro Focus® Data Protector - 80193Mike SmallEnsuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which can be used to restore the service when needed. Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications and data protection solutions need… |
![]() |
Aug 29, 2019 |
Executive View: Service Layers Managed IAM - 80129Martin KuppingerService Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, container-based deployments, and microservices architectures. It thus can be run and operated on various infrastructures. Service Layers provides full operations support across global regions. With this solutions,… |
![]() |
Aug 22, 2019 |
Whitepaper: Identitäten richtig handhaben - damit Ihre digitale Geschäftsstrategie erfolgreich wird - 80297Martin KuppingerRegistrierung und Authentifizierung sind die ersten Schritte, die erfolgen, wenn ein Nutzer Kunde digitaler Dienstleistungen werden möchte. Funktionieren diese Schritte nicht wie vom Nutzer erwartet, leidet die Akzeptanz solcher Dienste und damit ist der Erfolg digitaler Geschäftsstrategien in Gefahr. Identitäts-API-Plattformen helfen beim Aufbau von standardisierten… |
![]() |
Aug 20, 2019 |
Leadership Compass: IDaaS Access Management - 79016Anmol Singh Martin KuppingerA fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS AM to dominate new IAM purchases globally. This Leadership Compass… |
![]() |
Aug 14, 2019 |
Whitepaper: Privileged Access Governance - 80015Anmol SinghPrivileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of privileged access necessary to support the decision-making process and comply with regulations. Besides providing support for managing lifecycle events of privileged accounts, PAG includes privileged access… |
![]() |
Aug 13, 2019 |
Leadership Brief: Access Reviews Done Right - 80195Matthias ReinwarthAccess reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always only the minimum amount of access rights, which are necessary to perform associated tasks. In light of compliance, governance and the organizations's internal commitment to protecting itself from unwanted access, concepts… |
![]() |
Aug 12, 2019 |
Executive View: TrustBuilder Identity Hub - 80071Martin KuppingerTrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seamless application integration. Targetted mostly at B2B and B2E use-case requirements, TrustBuilder is building on additional features to address the consumer IAM requirements. |
![]() |
Aug 09, 2019 |
Executive View: ESET Endpoint Security - 80181John TolbertESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent malware detection tests. The product also is one of the top-performing, lowest impact endpoint security agents available in the market today. |
![]() |
Aug 07, 2019 |
Whitepaper: Do Identity Right – So Your Digital Business Strategy Succeeds - 80134Martin KuppingerRegistration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptance of such services will suffer and the success of digital business strategies is at risk. Identity API Platforms help build a standardized approach for delivering unified identity services to businesses.… |
![]() |
Aug 07, 2019 |
Executive View: SAST SUITE Der Akquinet AG - 80191Martin KuppingerDie heutigen SAP-Sicherheitsanforderungen gehen weit über die traditionellen Access Governance-Anforderungen an Benutzer, deren Zugriff und Rollen hinaus. akquinet bietet eine vollwertige Produktsuite für GRC (Governance, Risk & Compliance) und Sicherheit für SAP-Umgebungen. Die bereitgestellten Module decken ein breites Spektrum an Funktionen in dem sensiblen Bereich… |
![]() |
Aug 07, 2019 |
Executive View: SAST SUITE by akquinet AG - 80116Martin KuppingerToday’s SAP security requirements go far beyond traditional Access Governance needs regarding users and their access and roles. AKQUINET offers a full-featured product suite for GRC (Governance, Risk & Compliance) and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive area of SAP security and GRC. |
![]() |
Jul 31, 2019 |
Whitepaper: IAM for Healthcare: It’s time to act - 80029Martin KuppingerHealthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adapting to Digital Transformation. Comprehensive healthcare IAM, beyond pure SSO, helps Healthcare organizations to better cope with these challenges. |
![]() |
Jul 30, 2019 |
Executive View: Xton Technologies Access Manager - 80128Martin KuppingerXton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared account, session management and remote control access. Xton focuses on efficient implementation of these capabilities and is an interesting alternative to established players in the PAM market. |
![]() |
Jul 29, 2019 |
Executive View: Symphonic – Intelligent Authorization - 80154Graham WilliamsonThere are several trends that continue to make the use of identity information for access control more complex. The prevalence of smartphones as the end-user client of choice, the increasing use of API channels needing access to corporate data and the increasingly complex hybrid cloud environment all serve to increase the complexity of managing authorized access to protected resources.… |
![]() |
Jul 26, 2019 |
Leadership Brief: The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) - 80186John TolbertEndpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at key features of each type of solution below. |
![]() |
Jul 26, 2019 |
Advisory Note: Protect Your Cloud Against Hacks and Industrial Espionage - 72570John TolbertHacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence agencies use hacking techniques to steal data. Reduce the risk of falling victim to hackers and industrial espionage by implementing the proper security tools in your cloud-based environments. |
![]() |
Jul 26, 2019 |
Executive View: Radiflow SCADA Security Suite - 80053Alexei BalaganskiRadiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligent detection of IT and OT-related cyberthreats, as well as proactive protection against any deviations from established security policies. |
![]() |
Jul 22, 2019 |
Leadership Brief: Do I Need Endpoint Detection & Response (EDR)? - 80187John TolbertEDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly deploy, operate, and get value out of it? We’ll look at reasons to consider EDR or EDR as a managed service below. |
![]() |
Jul 09, 2019 |
Executive View: Kaspersky Endpoint Security for Business - 80180John TolbertKaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their Global Research and Analysis Team (GreAT). Kaspersky’s endpoint security product covers a wide variety of endpoint operating systems, and usually rate very highly in independent malware detection tests. |
![]() |
Jul 02, 2019 |
Whitepaper: ForgeRock Identity Platform for PSD2 & API Security - 80049Richard HillThe Revised Payment Service Directive (PSD2) promises to make the European Union (EU) cross-border transactions further transparent, faster and more secure while increasing competition and choice for consumers. To do so, Banks and other financial service providers must quickly make the necessary technical infrastructure changes to prepare for PSD2. The ForgeRock Identity Platform provides… |
![]() |
Jun 27, 2019 |
Leadership Compass: Database and Big Data Security - 79015Alexei BalaganskiThis Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies involved, vendor product and service functionality, relative market shares, and innovative approaches to… |
![]() |
Jun 12, 2019 |
Whitepaper: Radiant Logic and the Identity Integration Imperative - 80075Martin SmithDigital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now regulators have sharply increased the liability of enterprises for assuring that identity data is safeguarded, only accessed appropriately, and accurate. An integrated identity capability can be the key… |
![]() |
May 27, 2019 |
Executive View: Osirium Opus Privileged IT Process Automation - 79068Martin KuppingerOsirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus allows for defining and managing granular tasks, that can be executed securely on the target systems. By doing so, the efficiency of service desks can increase significantly, while security risks are mitigated. |
![]() |
May 16, 2019 |
Whitepaper: The Dark Side of the API Economy - 80019Alexei BalaganskiApplication Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Unfortunately, many organizations still lack competence in the field of API security and… |
![]() |
May 13, 2019 |
Executive View: Ideiio IGA - 80077Anmol SinghIdentity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfolio. ideiio, a spun out from IAM systems integrator ProofID, is a new vendor in the IGA space offering IGA functions targeted at mid-market customers to meet their basic IGA requirements with minimal effort… |
![]() |
May 09, 2019 |
Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105Martin KuppingerAs the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in combination with other types of technologies. Blockchain ID and the related concept of Self Sovereign Identity (SSI) are gaining momentum, in areas such as KYC (Know Your Customer), Consumer Authentication, and… |
![]() |
May 08, 2019 |
Buyer’s Compass: Endpoint Protection - 80110John TolbertMalware remains a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for endpoint protection. |
![]() |
May 08, 2019 |
Executive View: Wallix Bastion - 79053Anmol SinghThe WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale… |
![]() |
May 07, 2019 |
Executive View: FIDO2 - 80059John TolbertThe FIDO® Alliance has released new authentication specifications that enhance security and privacy, standardize the authentication experience and underlying APIs, improve the usability, and extend the FIDO paradigm to more types of devices, platforms, and environments. With the publication of FIDO2 (comprised of FIDO’s CTAP and W3C’s WebAuthn specification), FIDO has more… |
![]() |
May 07, 2019 |
Executive View: Darktrace Enterprise Immune System - 80003Alexei BalaganskiDarktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the whole corporate IT infrastructure, including physical and virtualized environments, industrial control networks, cloud infrastructures, and SaaS applications. |
![]() |
May 07, 2019 |
Buyer’s Compass: Consumer Identity and Access Management Solution - 80111John TolbertConsumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization. |
![]() |
May 07, 2019 |
Executive View: BeyondTrust Password Safe - 80067Anmol SinghBeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für… |
![]() |
May 07, 2019 |
Whitepaper: Identity Governance. The Value of Leveraging IGA Functions from the Cloud - 80043Martin KuppingerWith IT functions gradually shifting to the cloud, it is time to rethink the way supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are implemented. While solutions running on premises, but also supporting cloud services were the norm until now, running IGA as a service, with support for the hybrid reality of IT infrastructures… |
![]() |
May 06, 2019 |
Executive View: Exostar Supplier Risk Management - 79074Martin KuppingerExostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply chain. By building on the capabilities of the Exostar Platform as an industry collaboration network, it enables re-use of supplier representations and certifications with multiple buyers, thus… |
![]() |
May 03, 2019 |
Leadership Brief: Artificial Intelligence in Cybersecurity - 70278Alexei BalaganskiArtificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop millions of complex rules sounds amazing: instead, machine learning models are simply trained by feeding them with large amounts of carefully… |
![]() |
May 02, 2019 |
Executive View: One Identity Manager SAP Integration - 80073Martin KuppingerOne Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The integration capabilities count amongst the leading-edge solutions in IGA (Identity Governance and Administration) products. |
![]() |
Apr 29, 2019 |
Executive View: Kleverware IAG - 80106Martin KuppingerKleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermöglicht die schnelle Implementierung von Berechtigungsprüfungen und -berichten und kann auf einfache Weise Berechtigungsdaten in heterogenen, komplexen IT-Landschaften,… |
![]() |
Apr 26, 2019 |
Executive View: BeyondTrust Password Safe - 80067Anmol SinghBeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for detection and mitigation of security threats caused by abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management… |
![]() |
Apr 18, 2019 |
Executive View: Ubisecure Identity Platform - 79072John TolbertUbisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, innovative standards support, and the ability to leverage some bank and national IDs. RapidLEI provides a way to manage organizational identity. |
![]() |
Apr 11, 2019 |
Leadership Brief: Data Security and Governance (DSG) for Big Data and BI Environments - 80109Anmol SinghIncreased relevance of BigData and BI environments in supporting business decisions requires a broad set of data points to be collected throughout the lifetime of an application and users’ interaction with it. Security and risk management leaders must ensure that the risks emerging from the abundance and extensive use of this data are identified and that the right security and… |
![]() |
Apr 10, 2019 |
Leadership Brief: The Limits of AI in Marketing Automation - 79007Roland BühlerArtificial intelligence and machine learning are megatrends in marketing analytics and automation—it's often seen as the holy grail of digital marketing, as its possibilities seem to be endless. But are they? This leadership brief discusses typical limits and risks of ML-based marketing automation—and shows how to overcome or manage them. |
![]() |
Apr 09, 2019 |
Leadership Brief: Machine Learning, Marketing, and Privacy - 80032Roland BühlerArtificial intelligence and machine learning techniques are becoming more and more important for marketing. ML offers new possibilities to analyze customer data, enabling individual marketing measures to be delivered. Nevertheless, privacy is often a concern when it comes to ML. Furthermore, legislation based on GDPR has to be considered. This leadership brief gives an overview of the… |
![]() |
Apr 08, 2019 |
Leadership Brief: AI and Machine Learning – The Basics in a Nutshell - 80033Roland BühlerArtificial intelligence is becoming more and more important for various applications in almost all industrial sectors. This leadership brief gives a basic overview of the main principles of artificial intelligence (AI), with a strong focus on machine learning (ML). Typical use cases are illustrated based on some examples—with a marketing and identity management-oriented focus. |
![]() |
Apr 08, 2019 |
Executive View: ManageEngine AD360 - 79070Martin KuppingerManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that go beyond pure entitlement, by adding authentication features, UBA (User Behavior Analytics), and even Single Sign-On to several cloud services. However, the core of the product is supporting an efficient,… |
![]() |
Apr 08, 2019 |
Executive View: NRI SecureTechnologies: Uni-ID Libra 2.2 - 79079Richard HillConsumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra provides the necessary components of a CIAM solution with a focus on the Japanese market. |
![]() |
Apr 08, 2019 |
Executive View: BigID - 80046Richard HillWith today's mounting regulations to protect sensitive customer data, organizations are faced with new requirements, challenges and compliance risks. BigID assist organizations with their data compliance requirements by helping them find, categorize and map their data at scale. |
![]() |
Apr 05, 2019 |
Leadership Brief: Marketing, IoT, and Privacy - 80034Roland BühlerThe Internet of Things (IoT) is an IT megatrend. Apart from offering new possibilities and experiences to its users, IoT is highly interesting for marketers as it offers new ways to communicate with consumers and customers, leading to new possibilities in terms of analytics and consumer engagement as well. But what about privacy when IoT comes into play? This Leadership Brief gives an… |
![]() |
Apr 03, 2019 |
Executive View: Simeio IAM for SMB - 79071John TolbertSimeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrators as well as security. The solution provides comprehensive user management via workflows, which are accessible via mobile devices. |
![]() |
Apr 03, 2019 |
Executive View: WSO2 Identity Server - 80060Richard HillIdentity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of application and service APIs. WSO2 Identity Server provides a comprehensive and flexible solution for the modern enterprise. |
![]() |
Mar 28, 2019 |
Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80036Matthias ReinwarthVerlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft® SharePoint™, Office 365™) gespeichert sind durch Virtualisierung, Verschlüsselung und Datenfragmentierung. Sichere und benutzerfreundliche Zusammenarbeit an geschützten Dokumenten und transparente, datenzentrische Sicherheit… |
![]() |
Mar 28, 2019 |
Executive View: AWS Certificate and Key Management - 70365Alexei BalaganskiA suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory compliance across the whole cloud footprints. |
![]() |
Mar 25, 2019 |
Executive View: CyberArk Privileged Session Manager for Web - 79034Anmol SinghSecuring and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and… |
![]() |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Anmol SinghPrivileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a… |
![]() |
Mar 22, 2019 |
Executive View: Digital Shadows SearchLight™ - 79041Matthias ReinwarthDigital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure. |
![]() |
Mar 20, 2019 |
Executive View: Amazon GuardDuty - 80005Alexei BalaganskiAmazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick and uncomplicated identification of suspicious activities and malicious behavior across AWS cloud accounts and workloads. |
![]() |
Mar 20, 2019 |
Executive View: Krontech SingleConnect - 80031Anmol SinghKrontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges. |
![]() |
Mar 15, 2019 |
Executive View: Thycotic Privilege Manager - 80004Anmol SinghBesides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a… |
![]() |
Mar 06, 2019 |
Executive View: Kleverware IAG - 80042Martin KuppingerKleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rapidly implementing access reviews and entitlement reporting, and can easily collect and homogenize entitlement data across heterogeneous, complex IT landscapes, including SaaS services, business applications,… |
![]() |
Mar 05, 2019 |
Whitepaper: PATECCO Privileged Access Management Services - 80037Matthias ReinwarthPrivilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation. |
![]() |
Mar 05, 2019 |
Executive View: Thales Vormetric Application Crypto Suite - 79069Martin KuppingerEncryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities, beyond just network and file-level encryption. Vormetric Application Crypto Suite from Thales eSecurity provides an integrated, easy-to-use set of services covering the needs for such environments. |
![]() |
Mar 01, 2019 |
Executive View: Ilantus Compact Identity - 80052Anmol SinghIDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the business. Ilantus Compact Identity is an entry level enterprise IDaaS offering targeted at SMB customers to jump start their IAM with minimal effort and investment. |
![]() |
Feb 26, 2019 |
Executive View: Veracode Application Security Platform - 79060Alexei BalaganskiVeracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle. |
![]() |
Feb 19, 2019 |
Executive View: Bromium Secure Platform 4.1 - 71309Matthias ReinwarthWindows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user behavior monitoring and enhanced enterprise management capabilities. |
![]() |
Feb 14, 2019 |
Advisory Note: Maturity Level Matrix for Cyber Security - 72555Mike SmallKuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs. |
![]() |
Feb 14, 2019 |
Architecture Blueprint: Hybrid Cloud Security - 72552Mike SmallOrganizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and integrate security for the Hybrid Cloud. |
![]() |
Feb 14, 2019 |
Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80036Matthias ReinwarthReliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while enabling the safe and convenient cooperation with protected documents. Transparent, data-centric security for cloud, onpremises and hybrid storage environments. |
![]() |
Feb 12, 2019 |
Leadership Compass: Access Management and Federation - 71147Richard Hill Martin KuppingerThis Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms. Your compass for finding the right path in the market. |
![]() |
Feb 11, 2019 |
Executive View: Hitachi ID Privileged Access Manager - 80030Martin KuppingerHitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists. |
![]() |
Feb 11, 2019 |
Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080John TolbertThe Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service providers must quickly prepare for PSD2. ForgeRock Identity Platform provides strong customer authentication capabilities that can help businesses meet the technical challenges posed by PSD2. |
![]() |
Feb 11, 2019 |
Executive View: Checkmarx Software Exposure Platform - 71512Alexei BalaganskiCheckmarx Software Exposure Platform combines application security testing tools, managed services, and training in a single solution that enables developers to detect, prioritize and mitigate software-related risks at every stage of the development life cycle. |
![]() |
Feb 06, 2019 |
Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017Alexei BalaganskiAs businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and… |
![]() |
Jan 31, 2019 |
Executive View: comforte AG SecurDPS Enterprise - 80007Alexei Balaganskicomforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure security and compliance of sensitive data in mission-critical business applications. |
![]() |
Jan 30, 2019 |
Executive View: SAP Customer Data Cloud - 79001John TolbertSAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management. Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identity, consent, profile management and marketing service functionality for enterprise customers. |
![]() |
Jan 24, 2019 |
Executive View: SSH.COM PrivX - 70302Martin KuppingerSSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments. |
![]() |
Jan 08, 2019 |
Executive View: Safe-T Software Defined Access - 79075Martin KuppingerSafe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is done by authenticating users prior to providing access. The solution supports a variety of use cases, including hybrid cloud deployments and access to cloud services such as Microsoft Office 365.… |
![]() |
Jan 04, 2019 |
Whitepaper: OneSpan Intelligent Adaptive Authentication - 80026John TolbertFraud reduction is a paramount concern in many industries today. Finance, as well as healthcare and retail companies, are increasingly targeted by cybercriminals. New regulations in the financial industry are coming into force in many areas around the world. These regulations aim to improve security and reduce fraud. OneSpan Intelligent Adaptive Authentication provides strong and… |
![]() |
2018
Date | Title | Price |
---|---|---|
Dec 14, 2018 |
Leadership Compass: CIAM Platforms - 79059John TolbertThis report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions. |
![]() |
Dec 04, 2018 |
Executive View: VeriClouds Identity Threat Protection Platform - 79083Mike SmallSecurely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against the reuse of compromised credentials. There are many approaches, products, and services around user authentication, however, the VeriClouds Identity Threat Protection Platform is unique in what it offers. |
![]() |
Dec 04, 2018 |
Leadership Brief: What AI Can Do for You Today – and What Not - 79002Mike SmallAI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This leadership brief describes the current state of AI technologies and recommends the areas where they can be applied today. |
![]() |
Nov 30, 2018 |
Whitepaper: Signicat: Balancing Security and Convenience: Identity Verification & Authentication made easy - 79081Martin KuppingerIdentity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience and creating a seamless experience for customers is essential to keeping customers happy and minimizing churn rates: Identity Assurance done correctly is an essential step towards success in digital business. |
![]() |
Nov 29, 2018 |
Leadership Compass: Cloud Access Security Brokers - 70614Mike SmallHow do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need. |
![]() |
Nov 28, 2018 |
Buyer's Guide: Marketing Automation Systems and GDPR Readiness - 80018Roland BühlerMarketing automation systems are key when it comes to digital or omni-channel marketing. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. It will also prepare your organization to conduct RFIs and RFPs to select the right marketing automation solution – in line with GDPR… |
![]() |
Nov 22, 2018 |
Executive View: Saviynt Identity Governance and Administration (IGA) - 70370Richard HillSaviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User Governance. The solution is designed to be deployed as a cloud, hybrid or on-premise solution. The Saviynt Security Manager helps customers demonstrate compliance using their access governance and risk… |
![]() |
Nov 13, 2018 |
Executive View: Sphere Identity Platform - 79052Richard HillAny Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support for B2B, but also economic incentives for both individuals and organizations through ease of use, privacy, and rewards for the individual, and reduced compliance risk, easy customer onboarding and integration… |
![]() |
Nov 09, 2018 |
Buyer’s Guide: Identity-as-a-Service (IDaaS) - 71526Anmol SinghOrganizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation… |
![]() |
Nov 06, 2018 |
Executive View: IBM Security Access Manager (ISAM) - 79066Richard HillAs IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access management and federation use cases, but it also provides Risk-Based Access Control and Mobile capabilities, as well as providing flexible deployment models. |
![]() |
Nov 06, 2018 |
Executive View: ThreatMetrix Digital Identity Network, powered by ThreatMetrix ID - 79049John TolbertThreatMetrix, a LexisNexis Risk Solutions Company, is a global fraud, identity and authentication company, helping customers deliver a unified experience across their digital customer journey. Built on a platform providing a unified, global customer digitial identity, ThreatMetrix enables businesses to prevent fraud, reduce friction, and streamline the customer… |
![]() |
Nov 05, 2018 |
Executive View: AWS Identity and Access Management - 79048Graham WilliamsonAWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now provides easy-to-use facilities to allow customer to better leverage their identity management environment. |
![]() |
Nov 02, 2018 |
Executive View: Securonix Cloud SIEM and UEBA - 79035Alexei BalaganskiSecuronix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analytics offered as a fully managed Security Operations Platform in the cloud. |
![]() |
Oct 17, 2018 |
Executive View: Zscaler Security-as-a-Service Platform - 72505Alexei BalaganskiZscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity, network transformation, public cloud connectivity, and secure access to on-premises and cloud services. |
![]() |
Oct 11, 2018 |
Executive View: FSP Identity Governance & Administration Suite ORG - 79050Matthias ReinwarthDie FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer… |
![]() |
Oct 10, 2018 |
Whitepaper: SailPoint: Governance for all data: Get a grip on unstructured data - 79046Martin KuppingerWhile many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they lack an integrated approach for governing access to unstructured data. However, for mitigating access risks to that data, expanding the aperture of identity governance programs is mandatory. This whitepaper… |
![]() |
Oct 10, 2018 |
Leadership Compass: Identity Governance & Administration - 71135Anmol Singh Martin KuppingerBacked by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors providing mature capabilities around the core IGA functions. This Leadership Compass provides insights into the IGA market and presents an evaluation of vendors based on criteria important for successful IGA… |
![]() |
Oct 09, 2018 |
Leadership Compass: Cloud-based MFA Solutions - 70967John TolbertThis report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) solutions and provides you with a compass to help you to find the service that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Cloud-based MFA solutions. |
![]() |
Oct 09, 2018 |
Leadership Brief: Mit den VAIT zu einer transparenteren Versicherungs-IT - 80388Matthias ReinwarthMit dem im Juli 2018 final vorgelegten Dokument „Versicherungsaufsichtliche Anforderungen an die IT“ (VAIT) gibt die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) Versicherungsunternehmen konkretere Vorgaben für die Umsetzung ihrer Geschäftsprozesse mittels IT an die Hand. Diese stellen Herausforderungen dar, denen in betroffenen Unternehmen… |
![]() |
Sep 25, 2018 |
Advisory Note: GRC Reference Architecture - 72582Mike SmallGRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals. GRC is concerned with setting objectives, policies and controls and monitoring performance against these. This report provides an architecture for the successful implementation of GRC within an organization. |
![]() |
Sep 19, 2018 |
Leadership Compass: Adaptive Authentication - 79011John TolbertThis report provides an overview of the market for on-premise Adaptive Authentication solutions and provides you with a compass to help you to find the product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing on-premise Adaptive Authentication solutions. |
![]() |
Sep 19, 2018 |
Whitepaper: Overcoming PSD2 Challenges with Onegini Connect - 79058Richard HillMany changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential benefits for Third Party Providers (TPPs) and consumers. Account Information Service Providers (AISP) and Payment Initiation Service Providers (PISP) functions have historically been performed by banks;… |
![]() |
Sep 19, 2018 |
Executive View: United Security Providers Secure Entry Server - 79040Matthias ReinwarthUnited Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and Identity Federation capabilities for complex use cases and hybrid on-premises and cloud solutions. |
![]() |
Sep 14, 2018 |
Executive View: Evidian Identity & Access Management - 70872Richard HillWith the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements by integrating Identity Governance and Administration, and Analytics & Intelligence into their IAM suite. |
![]() |
Sep 14, 2018 |
Executive View: ObserveIT Insider Threat Management - 79038Alexei BalaganskiObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and streamlined solution for detecting and mitigating various insider threats. |
![]() |
Sep 10, 2018 |
Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062John TolbertThe Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service providers must quickly prepare for PSD2. RSA provides foundational technical capabilities in their SecurID, Adaptive Authentication, Web Threat Detection, and Archer products that can help businesses meet the… |
![]() |
Sep 06, 2018 |
Executive View: Delphix Dynamic Data Platform - 79010Alexei BalaganskiDie Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile… |
![]() |
Aug 23, 2018 |
Executive View: CA Privileged Access Management Suite - 79047Anmol SinghCA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control. |
![]() |
Aug 21, 2018 |
Executive View: TechDemocracy Intellicta - 70362Matthias ReinwarthA software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience and protection from cyber threats through the deployment of a standards-based risk governance framework. |
![]() |
Aug 21, 2018 |
Executive View: ViewDS Cobalt - 70851Richard HillViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully accessible via APIs, Cobalt is uniquely positioned to support the automation and integration requirements of today’s modern IT environment. |
![]() |
Aug 20, 2018 |
Executive View: Senrio Insight - 72525Alexei BalaganskiSenrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities. |
![]() |
Aug 17, 2018 |
Executive View: WidasConcepts cidaas - 79057John TolbertWidasConcepts offers a complete consumer identity and access management solution: cidaas. cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management. It is based on a micro-services architecture which enables continuous deployment of service enhancements. |
![]() |
Aug 17, 2018 |
Executive View: CipherCloud CASB+ - 79037Mike SmallMany organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches… |
![]() |
Aug 15, 2018 |
Executive View: Semperis Directory Services Protector for Active Directory - 79054Dan BlumActive Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product support change monitoring and rollback for a broad set of AD infrastructure objects. |
![]() |
Aug 09, 2018 |
Executive View: 1Kosmos BlockID - 79064Martin Kuppinger1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and service providers. While there are still some challenges to solve, BlockID delivers on the promise of… |
![]() |
Aug 09, 2018 |
Advisory Note: Big Data Security, Governance, Stewardship - 72565Mike SmallAn ever-increasing number of devices, sensors and people are connected to the global internet and generate data. The analysis of this data can help organizations to improve their effectiveness and make better decisions. However, there are concerns over the trustworthiness of the data as well as the ethics of its use. This report describes how good Information Stewardship… |
![]() |
Aug 08, 2018 |
Executive View: MinerEye Data Tracker - 79063Martin KuppingerMinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access control tools. It also provides deep insight into unstructured data based on sophisticated… |
![]() |
Aug 06, 2018 |
Executive View: StealthINTERCEPT® - 70367Mike SmallCyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data. This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’… |
![]() |
Jul 31, 2018 |
Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266Martin SmithNRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product emphasizes security, leveraging the company’s expertise in managed SOC services and security software. The near-term product roadmap includes enhanced consent management and support for FIDO… |
€190.00 *
![]() |
Jul 27, 2018 |
Executive View: Centrify Next-Gen Access Platform - 79036Richard HillOften, enterprise security is delivered as separate services such as Identity-as-aService (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Centrify converges these market segments into a single platform to deliver the next generation of access management. |
![]() |
Jul 20, 2018 |
Executive View: Deep Secure Content Threat Removal Platform - 79056Martin KuppingerThe Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious content and then creates new, clean data for onward delivery. In this way, it defeats zero-day attacks and prevents covert data loss, all transparent to end users. |
![]() |
Jul 19, 2018 |
Executive View: One Identity Safeguard - 79042Martin KuppingerOne Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market, delivering a comprehensive portfolio of Privilege Management capabilities. |
![]() |
Jul 17, 2018 |
Executive View: RSA® Identity Governance and Lifecycle - 71052Martin KuppingerRSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal. |
![]() |
Jul 17, 2018 |
Executive View: Delphix Dynamic Data Platform - 79010Alexei BalaganskiDelphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization, integrated masking and automated self-service workflows, it significantly increases efficiency of agile development, data analytics, cloud migration, disaster recovery and other DataOps use cases. |
![]() |
Jun 22, 2018 |
Buyer's Guide: Hybrid Cloud Services - 72562Mike SmallOrganizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions to ask vendors, criteria to select your vendor, and the requirements for successful deployments. This report will prepare your organization to conduct RFIs and RFPs for IaaS as part of a Hybrid IT service… |
![]() |
Jun 05, 2018 |
Leadership Compass: Access Governance & Intelligence - 71145Martin Kuppinger Anmol SinghLeaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market. |
![]() |
Jun 05, 2018 |
Executive View: Varonis DatAdvantage - 79029Martin KuppingerGetting a grip on your data is a bigger challenge than ever before. While solutions for central IT environments such as SAP are quite established, a significant portion of critical data resides in unstructured data stores such as file servers or collaboration services. This includes PII (think “GDPR”), but also blueprints, financial data, and more. It is essential having tools… |
![]() |
May 28, 2018 |
Executive View: Cayosoft Administrator v5 - 79000Alexei BalaganskiCayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release adds new capabilities not available in native Microsoft tools, focusing on customers who have already completely moved to the cloud. |
![]() |
May 24, 2018 |
Executive View: Onegini Connect - 79031John TolbertOnegini provides a compelling solution for Consumer Identity and Access Management (CIAM). Onegini is headquartered in Europe and has global ambitions. They have expertise in EU regulations such as GDPR and PSD2. They are positioning their product as a CIAM solution for financial, health care, and insurance industries with a strong mobile differentiator to enhance customer engagement. |
![]() |
May 18, 2018 |
Leadership Brief: Product Security as Your Biggest Challenge: Start Before It’s Too Late - 72011Richard HillThe Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. Addressing these challenges early on in an IoT project can go a long way to lowering potential security risks in the field. |
![]() |
May 18, 2018 |
Whitepaper: Varonis - Daten kennen - 79028Martin KuppingerNeue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man versteht, wo die wirklich wertvollen Daten liegen und sich darauf fokussiert, diese Daten im Unternehmen optimal zu nutzen und sie gezielt zu schützen, statt mit breitflächigen… |
![]() |
May 16, 2018 |
Architecture Blueprint: Access Governance and Privilege Management - 79045Matthias ReinwarthWell-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and privileged access. Thus, it substantially improves an organization's security posture. |
![]() |
May 11, 2018 |
Executive View: StealthDEFEND® - 70366Mike SmallCyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. |
![]() |
May 03, 2018 |
Executive View: Oracle Database Security Assessment - 70965Alexei BalaganskiThis report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional database security solutions and the innovative Autonomous Database cloud platform. |
![]() |
May 03, 2018 |
Executive View: Pirean Consumer IAM Platform - 70223Richard HillIn today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single point of access and control that can meet these need with support for secure mobility and flexible workflows. |
![]() |
Apr 30, 2018 |
Executive View: Cleafy - 79030Alexei BalaganskiCleafy is an integrated real-time clientless threat detection and prevention platform for online services in highly regulated industries, providing protection against advanced targeted attacks for web applications and mobile apps. |
![]() |
Apr 26, 2018 |
Executive View: RadiantOne Federated Identity Suite - 70845Martin SmithRadiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important building block at the center of an integrated identity management capability. |
![]() |
Apr 19, 2018 |
Whitepaper: Saviynt: IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud - 70364Richard HillMost organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm shift, the customer needs, and a solution to help businesses move forward in this hybrid IT environment. |
![]() |
Apr 19, 2018 |
Executive View: ARCON Privilege Manager - 70950Anmol SinghARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support the scalability and complexity requirements of large data centre deployments. |
![]() |
Apr 18, 2018 |
Executive View: inWebo 2FA Platform - 80386John TolbertinWebo offers a cloud-based Two-Factor Authentication (2FA) solution, with some unique and proprietary authentication methods that can be less obtrusive and more user-friendly. The inWebo solution provides easy-to-deploy application plug-ins and SDKs for mobile authenticators. |
![]() |
Apr 18, 2018 |
Executive View: Micro Focus Privileged Account Manager - 71314Martin SmithWith massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager. |
![]() |
Apr 16, 2018 |
Leadership Compass: Infrastructure as a Service – Global Providers - 70303Mike SmallThe KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance. |
![]() |
Mar 28, 2018 |
Whitepaper: Pirean: Orchestrated Identity for Meeting IAM & CIAM Requirements -70225John TolbertIdentity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today. Consumer Identity and Access Management (CIAM) systems and services provide new technical capabilities for organizations to know their customers better. Pirean’s solutions for IAM and CIAM can help companies deploy a single solution to meet both… |
![]() |
Mar 23, 2018 |
Executive View: Microsoft Azure Information Protection - 72540Dan BlumMicrosoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; integrates data protection capabilities throughout Microsoft’s Azure, Office, and Windows environments; and is gaining third party support from Adobe and data leakage prevention (DLP) vendors among others.… |
![]() |
Mar 21, 2018 |
Executive View: UNIFY Identity Broker - 70263Richard HillWith today's ever-growing IT requirements for integrations between identity sources, applications and services whether on-premise, the cloud, or hybrid environments, an advanced identity provider service is required to bridge these disparate technologies. UNIFY Solutions overcomes these challenges with their Identity Broker. |
![]() |
Mar 20, 2018 |
Leadership Brief: Securing PSD2 APIs - 72596John TolbertThe Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs) and Payment Initiation Service Providers (PISPs) to use. |
![]() |
Mar 20, 2018 |
Leadership Brief: Marketing Chatbots and GDPR - 79026Roland BühlerChatbots are a recent trend in marketing automation, designed to enhance customers’ digital journeys and elicit more information from consumers. This report evaluates the impact of GDPR will have on the use of chatbots and provides an overview of topics to be considered in order to ensure compliance. |
![]() |
Mar 14, 2018 |
Advisory Note: Security Organization Governance and the Cloud - 72564Mike SmallThe cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost. This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives. |
![]() |
Mar 14, 2018 |
Leadership Brief: The Anti-Malware Requirement in PSD2 - 79027John TolbertThe Revised Payment Service Directive (PSD2) mandates thatservice providersevaluatetransaction requests for signs of malware infection. In order for transactions to be considered low-risk, there must be no signs of malware infection in any sessions of authentication events. |
![]() |
Mar 06, 2018 |
Executive View: Axiomatics APS - 70346Richard HillAxiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently. |
![]() |
Feb 28, 2018 |
Excutive View: Imprivata - 71514Martin SmithOn October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from Caradigm. With that offering they are broadening their portfolio while remaining focused on the healthcare market segment. |
![]() |
Feb 28, 2018 |
Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368Mike SmallMit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive Kontrollen, die sich mit den direkten geschäftlichen Vorteilen der Verarbeitung personenbezogener… |
![]() |
Feb 28, 2018 |
Whitepaper: Meeting GDPR Challenges with Delphix - 70368Mike SmallGDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance. Compliance requires costly controls that can be justified for processing of PII with direct business benefits. However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly… |
![]() |
Feb 28, 2018 |
Advisory Note: Cloud Services and Security - 72561Mike SmallThis report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls that an organization should implement to manage these risks. |
![]() |
Feb 13, 2018 |
Advisory Note: How to Assure Cloud Services - 72563Mike SmallThis report is one of a series of documents around the use of cloud services. It identifies how standards as well as, independent certifications and attestations can be used to assure the security and compliance of cloud services. |
![]() |
Feb 13, 2018 |
Executive View: VMware AppDefense - 70840Matthias ReinwarthFully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized environments. |
![]() |
Feb 09, 2018 |
Point of View Paper: One Identity - The Journey to IAM Success - 70226Martin KuppingerIdentity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts are set up, modified, and retired in a timely, accurate, and secure manner. And for still others… |
free |
Feb 06, 2018 |
Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172John TolbertThis report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Anti-Malware solutions for enterprises. |
![]() |
Jan 24, 2018 |
Executive View: FSP Identity Governance & Administration Suite ORG - 70841Martin Kuppinger Matthias ReinwarthDie FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer… |
€190.00 *
![]() |
Jan 24, 2018 |
Executive View: Oracle Autonomous Database - 70964Alexei BalaganskiOracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provides unprecedented security, reliability and performance for enterprise data management in the cloud. |
![]() |
Jan 24, 2018 |
Executive View: RSA SecurID® Access - 70323Martin KuppingerRSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integration to a large range of on-premises applications and cloud services. It supports context-aware authentication and uses machine learning to assess user risk and simplify the user experience. |
![]() |
Jan 17, 2018 |
Executive View: SAP HANA Platform Security - 70272Mike SmallSAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It offers a high - performance database through in - memory processing and provides enterprise grade security features that cover the confi dentiality, integrity and availability of the data being held… |
![]() |
Jan 17, 2018 |
Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363Martin KuppingerPowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen. |
![]() |
Jan 16, 2018 |
Executive View: Symantec CloudSOC™ - 70615Mike SmallMany organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches… |
![]() |
Jan 12, 2018 |
Executive View: Osirium: Privileged Access Management - 70836Martin KuppingerOsirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications. |
![]() |
Jan 12, 2018 |
Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222Dan BlumAn enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a customer’s unique business, security, and compliance requirements. |
![]() |
Jan 09, 2018 |
Executive View: Thycotic Privilege Manager - 70221Martin KuppingerThycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users. |
€190.00 *
![]() |
2017
Date | Title | Price |
---|---|---|
Dec 28, 2017 |
Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363Martin KuppingerBeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms. |
![]() |
Dec 19, 2017 |
Executive View: Ilantus IDaaS Next - 70252Martin KuppingerIlantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting features and a well-thought-out roadmap for further evolution. |
![]() |
Dec 13, 2017 |
Executive View: AlgoSec Security Management Suite - 70262Alexei BalaganskiAlgoSec Security Management Suite ist eine hochautomatisierte und speziell für Unternehmen konzipierte integrierte Lösung zur Verwaltung von Netzwerksicherheitsrichtlinien und der Konnektivität von Geschäftsanwendungen für verschiedenste Geräte in heterogenen Umgebungen. |
€190.00 *
![]() |
Dec 07, 2017 |
Executive View: Duo Security - 71330Richard HillDuo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications they use. Duo Security goes beyond 2FA with adaptive authentication, endpoint visibility, mobile… |
![]() |
Nov 24, 2017 |
Executive View: ERPScan Smart Cybersecurity Platform for SAP - 72510Matthias ReinwarthERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP that leverages machine learning. By addressing predictive, preventive, detective and responsive capabilities, and by leveraging vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all… |
![]() |
Nov 20, 2017 |
Whitepaper: Airlock: Meeting PSD2 Challenges with Ergon Airlock Suite - 70328John TolbertThe Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe. Banks and other financial service providers must quickly prepare for PSD2. Ergon’s Airlock Suite provides foundational technical capabilities that can help businesses meet the challenges posed by PSD2. |
![]() |
Nov 20, 2017 |
Executive View: Janrain Janrain Identity Cloud® - 70845John TolbertJanrain provides a complete solution for Consumer Identity and Access Management (CIAM). Janrain is a pioneer in the field, creating the category of CIAM and developing the popular “ social login” authentication method . |
![]() |
Nov 16, 2017 |
Executive View: AlgoSec Security Management Suite - 70262Alexei BalaganskiAlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across a wide range of devices in heterogeneous environments. |
![]() |
Nov 14, 2017 |
Advisory Note: Maturity Level Matrix for GDPR Readiness - 72557Matthias ReinwarthKuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and identifying specific measures in your GDPR compliance projects and programs. |
![]() |
Nov 09, 2017 |
Executive View: STEALTHbits® Products Overview - 70270Mike SmallSecurely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access Management, and Threat Detection. |
![]() |
Nov 08, 2017 |
Leadership Compass: Identity Provisioning - 71139Martin KuppingerLeaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market. |
![]() |
Nov 08, 2017 |
Executive View: Forum Sentry API Security Gateway - 70930Alexei BalaganskiForum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by design”, certified encryption, and support for a broad range of Web Services, B2B, Mobile, Cloud and IoT APIs and other protocols. |
![]() |
Nov 07, 2017 |
Executive View: ManageEngine Password Manager Pro - 70613Martin KuppingerManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management, Application-to-Application Privilege Management, or Session Management. The tool counts among the advanced, feature-rich… |
![]() |
Nov 06, 2017 |
Executive View: Atos DirX Identity - 71702Martin KuppingerAtos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of customization and added a modern, responsive user interface. |
![]() |
Nov 06, 2017 |
Executive View: BeyondTrust PowerBroker PAM - 70275Martin KuppingerBeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker PAM delivers deep support for privilege management on… |
![]() |
Nov 02, 2017 |
Whitepaper: Airlock: Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Management! - 70327Martin KuppingerDie DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogener Daten (Consent) und den Rechten der Betroffenen wie beispielsweise dem „Recht auf Vergessen“ in Verbindung gebracht. Die DSGVO sieht aber auch den angemessenen Schutz von personenbezogenen Daten… |
![]() |
Oct 24, 2017 |
Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613Martin KuppingerAll organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks remain at a high level – perimeter security in itself does not protect sufficiently anymore.… |
![]() |
Oct 24, 2017 |
Whitepaper: ForgeRock: The Effect of GDPR on Customer Relations - 73000Martin KuppingerThe upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and prepare. Managing consumer identities consistently across all apps, portals, and services is essential. Identity Platforms provide the foundation for moving to a consistent management of consumer identities and… |
![]() |
Oct 18, 2017 |
Executive View: Entrust IdentityGuard for Enterprise - 71321Mike SmallSecurely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and logical assets. |
![]() |
Oct 16, 2017 |
Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360Matthias ReinwarthThe ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for practically every organization. Understanding the risk posture and providing transparency while aligning cyber security efforts with corporate strategies is a major challenge. The current lack of… |
![]() |
Oct 09, 2017 |
Leadership Brief: Why Adaptive Authentication Is A Must - 72008John TolbertAdaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems. |
![]() |
Oct 05, 2017 |
Executive View: Ubisecure Identity Server - 70838John TolbertUbisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs. |
€190.00 *
![]() |
Oct 04, 2017 |
Executive View: Axiomatics Data Security - 70345Alexei BalaganskiAxiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules for access to corporate data. |
![]() |
Oct 02, 2017 |
Advisory Note: Redefining Access Governance - Beyond annual recertification - 72579Matthias ReinwarthImprove your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact… |
€995.00 *
![]() |
Sep 27, 2017 |
Executive View: OpenIAM Identity and Access Management - 70337Martin KuppingerOpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture and exposes its capabilities through a consistent API layer, which makes it an interesting option… |
![]() |
Sep 26, 2017 |
Advisory Note: KRIs and KPI for Access Governance - 72559Mike SmallThis report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then can be used in IT management and corporate management. |
![]() |
Sep 26, 2017 |
Executive View: PlainID - 70358John TolbertPlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technology enables customers to easily externalize authorization decisions from applications, achieving higher efficiencies, more fine-grained access controls, and improved security. |
![]() |
Sep 15, 2017 |
Executive View: iWelcome IDaaS and CIAM - 70298John TolbertiWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers with GDPR compliance, and as such as provides unparalleled consent management features. |
![]() |
Sep 13, 2017 |
Executive View: Omada Identity Suite - 70301Martin KuppingerOmada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high degree of automation in application onboarding. |
![]() |
Sep 13, 2017 |
Executive View: Beta Systems Garancy IAM Suite - 71530Martin KuppingerBeta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role management capabilities. |
![]() |
Sep 11, 2017 |
Executive View: TITUS Classification for Mobile - 71320Martin KuppingerTITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document storage on these devices. It integrates with a variety of other tools and services and is easy to use. |
![]() |
Sep 11, 2017 |
Executive View: VeriClouds CredVerify™ - 72567Mike SmallSecurely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance. There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers. |
€190.00 *
![]() |
Sep 11, 2017 |
Buyer’s Guide: Consumer Identity and Access Management Solution - 70259John TolbertConsumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization. |
![]() |
Sep 11, 2017 |
Executive View: IBM Security Identity Governance and Intelligence - 71113Martin KuppingerA business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Providing connectivity to target systems based on direct connectors and via IBM Security Identity Manager. |
![]() |
Aug 21, 2017 |
Executive View: One Identity SafeGuard 2.0 - 71251Martin KuppingerOne Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities, and other features such as very strong workflow support. |
€190.00 *
![]() |
Aug 18, 2017 |
Executive View: SAP Fraud Management - 71182Bruce HughesSAP Fraud Management leverages the power and speed of the SAP HANA platform to detect fraud earlier, improve the accuracy of detection and uses predictive analytics to adapt to changes in fraud patterns. |
![]() |
Aug 17, 2017 |
Leadership Compass: Cloud Access Security Brokers - 72534Mike SmallHow do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need. |
€1295.00 * |
Aug 17, 2017 |
Executive View: eperi Encryption Gateway - 70619Alexei Balaganskieperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data encryption with out-of-the-box support for popular SaaS applications. |
![]() |
Aug 14, 2017 |
Executive View: SailPoint SecurityIQ - 70849Martin KuppingerSailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the broad support for unstructured data stores such as file servers, NAS devices, and SaaS data stores. |
![]() |
Aug 11, 2017 |
Buyer’s Guide: Ransomware Protection - 72599John TolbertRansomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for ransomware protection. |
![]() |
Aug 11, 2017 |
Advisory Note: Understanding and Countering Ransomware - 70947Martin KuppingerRansomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual users as well have been victims of ransomware. The purpose of this Advisory Note is to analyze the concept of ransomware, elaborate on its global reach and provide concrete advice on what to do… |
![]() |
Aug 11, 2017 |
Executive View: Thycotic Secret Server - 71060Martin KuppingerThycotic Secret Server is a mature enterprise - class offering for Privilege Management, supporting the key areas of the market such as Shared Account and Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set. |
![]() |
Aug 09, 2017 |
Executive View: Auth0 Customer Identity Management - 71053John TolbertAuth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly customizable to meet a variety of business requirements. |
![]() |
Aug 09, 2017 |
L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003Martin KuppingerÀ l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients et aux consommateurs. Si la connaissance de ces derniers gagne globalement en pertinence, la majeure… |
€900.00 *
![]() |
Aug 09, 2017 |
L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003Martin KuppingerLa « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité opérationnelle et l‘infrastructure informatique sous-jacente. L’infrastructure… |
free |
Aug 08, 2017 |
Leadership Brief: Lösungen für die Personalknappheit in Ihrem Cyber Defense Center - 70268Martin KuppingerAusreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den IT - Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus drei Elementen: Ausbildung. Dienstleistungen. Werkzeuge. |
![]() |
Aug 08, 2017 |
Executive View: Deep Secure Content Threat Removal Platform - 71311Martin KuppingerThe Content Threat Removal Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero - day attacks and prevents data loss, all transparent to end users. |
€190.00 *
![]() |
Aug 04, 2017 |
Leadership Brief: Schutz gegen Ransomware - 70336John TolbertRansomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld. |
![]() |
Aug 04, 2017 |
Leadership Brief: Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten - 70340Mike SmallMit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs zentrale Aktivitäten, die innerhalb der IT unternommen werden sollten, um auf die Erfüllung dieser Anforderungen vorbereitet zu sein. |
![]() |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Martin KuppingerDie führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei… |
€1295.00 * |
Aug 02, 2017 |
Executive View: Microsoft Azure Stack - 72592Alexei BalaganskiMicrosoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases. |
![]() |
Jul 28, 2017 |
Executive View: ForgeRock Identity Platform - 70296Martin KuppingerForgeRock Identity Platform delivers a common set of capabilities, as well as good integration for the various ForgeRock components. It provides a common layer for identity and access management services that customers require when building new consumer - facing business applications and services, including consumer and industrial IoT support, on their way to the… |
![]() |
Jul 27, 2017 |
Executive View: SecureAuth IdP - 71327John TolbertSecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service. |
![]() |
Jul 24, 2017 |
Executive View: Telekom Magenta Security - 70342Martin KuppingerUnter der Bezeichnung Magenta Security werden alle Angebote für Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und zählt damit zu den ersten Adressen für Unternehmen, wenn es um die Unterstützung und insbesondere Managed Services im Bereich … |
![]() |
Jul 20, 2017 |
Executive View: Gigya Identity Enterprise - 70299John TolbertGigya provides a complete solution for Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service functionality for enterprise customers. |
€190.00 *
![]() |
Jul 17, 2017 |
Executive View: Signicat - 72537Almir KolariSignicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements. |
![]() |
Jul 11, 2017 |
Executive View: IdentityX® from Daon - 71312Alexei BalaganskiDaon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk, reducing fraud and securing critical infrastructures. |
![]() |
Jul 11, 2017 |
Leadership Brief: Cloud Provider Codes of Conduct and GDPR - 70276Mike SmallCodes of Conduct can help organizations choose between suppliers. This report compares two recently announced codes for cloud service providers and how these relate to GDPR . |
![]() |
Jul 07, 2017 |
Executive View: Nexis Controle 3.0 - 72535Matthias ReinwarthNexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entweder als eigenständige Lösung oder als ergänzende Komponente zu bestehenden Identity- und Access Management-Infrastrukturen. Die bessere Einbindung von bestehendem Wissen im… |
![]() |
Jul 04, 2017 |
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E) - 70319Martin KuppingerLeaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market. |
![]() |
Jul 03, 2017 |
Executive View: Nexis Controle 3.0 - 72535Matthias ReinwarthNexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. The integration of corporate business expertise through targeted workflow and interaction approaches means a leap forward towards… |
![]() |
Jun 30, 2017 |
Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141Martin KuppingerLeaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market. |
![]() |
Jun 29, 2017 |
State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003Martin KuppingerThe „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well for supporting the new business requirements on agility, innovativeness, and security. Identity… |
free |
Jun 29, 2017 |
Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003Martin KuppingerOrganizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most information still is held in on-premise systems. The combination of new regulations, such as the… |
€900.00 *
![]() |
Jun 29, 2017 |
Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549John TolbertEnterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance. |
![]() |
Jun 21, 2017 |
GDPR and PSD2: Challenges and Opportunities for CIAMJohn TolbertGDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations. This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst John Tolbert held on June 20, 2017 during the Cloud Identity Summit in Chicago. |
free |
Jun 20, 2017 |
Executive View: PingIdentity’s PingDirectory - 70294John TolbertPingDirectory provides a flexible and scalable base for IAM and customer IAM. With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs. |
![]() |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Martin KuppingerLeaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that… |
€1295.00 * |
Jun 09, 2017 |
Leadership Compass: CIAM Platforms - 70305John TolbertThis report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions. |
€1295.00 * |
Jun 07, 2017 |
Advisory Note: Identity in IoT - 70282John TolbertThe Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding notions of digital identity has been problematic to date, but identity management solutions are on the horizon that will improve usability and security for IoT. |
![]() |
May 31, 2017 |
Leadership Brief: Six Key Actions to Prepare for GDPR - 70340Mike SmallFrom May 2018, when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. This report identifies six key actions that IT needs to take to prepare for compliance. |
![]() |
May 30, 2017 |
Executive View: Salesforce Identity - 70813John TolbertSalesforce has been a pioneer in Software as a Service (SaaS) from the early days. Digital identity has been an integral part of the Salesforce platform. Salesforce Identity is an enterprise class CIAM and IDaas solution. |
![]() |
May 22, 2017 |
Executive View: Nok Nok Labs S3 Authentication Suite - 71261Alexei BalaganskiNok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for incorporating interoperable and future-proof risk-based biometric authentication into mobile and web… |
![]() |
May 15, 2017 |
Executive View: Symantec Advanced Threat Protection - 71155Alexei BalaganskiSymantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint protection and threat intelligence technologies with advanced security analytics capabilities. |
![]() |
May 02, 2017 |
Executive View: Vendor Overview CyberArk - 70280Graham WilliamsonCyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged accounts and their credentials associated with users, applications, and other system assets across an… |
![]() |
Apr 28, 2017 |
Executive View: Securonix SNYPR - 70292Alexei BalaganskiSecuronix SNYPR is an open and modular next-generation security intelligence platform that combines log management, security information and event management, user and entity behavior analytics and fraud detection, serving as a foundation for a broad portfolio of specialized security analytics solutions. |
€190.00 *
![]() |
Apr 26, 2017 |
Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611Dan BlumMastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained authorization but break down in the face o f dynamic environments or complex access policies. A… |
![]() |
Apr 21, 2017 |
Executive View: EmpowerID - 70297John TolbertEmpowerID provides a complete solution for IAM, CIAM, and Adaptive Authentication. With a highly customizable workflow and authorization engine, EmpowerID delivers advanced functionality for enterprise and government customers. |
![]() |
Apr 19, 2017 |
Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811John TolbertManaging mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies. |
![]() |
Apr 13, 2017 |
Leadership Brief: Mobile Connect - 71518John TolbertStrong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2). |
![]() |
Apr 11, 2017 |
Leadership Brief: How to close the skill gap in your Cyber Defense Center - 72800Martin KuppingerGetting sufficient and sufficiently skilled people for your Cyber Defense Center (or your IT Security department) is tough. The answer to the skill gaps consists of three elements: Education. Services. Tools. |
![]() |
Apr 10, 2017 |
Executive View: Hitachi ID IAM Suite - 72543John TolbertHitachi ID offers an all - in - one IAM package to address enterprise business requirements. With an emphasis on process automation and self - service, the Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and governance. |
![]() |
Apr 05, 2017 |
Leadership Brief: Defending against ransomware - 70336John TolbertRansomware is an epidemic. Prevention is the best strategy. Don’t give up and pay the ransom. |
![]() |
Mar 30, 2017 |
Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513Graham WilliamsonAs a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over their intellectual property. Of late the company has developed a more diversified client base,… |
€495.00 *
![]() |
Mar 30, 2017 |
Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163Paul SimmondsThe firewall is dead – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the firewall may have a part to play, by using it in a role where it is actually able to be effective. |
![]() |
Mar 29, 2017 |
Whitepaper: VMWare: Unified management and control of the digital workspace - 70286Matthias ReinwarthIdentity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many… |
![]() |
Mar 29, 2017 |
Executive View: Ping Identity PingOne - 70288John TolbertPingOne provides c loud - based Single Sign - On (SSO) and Identity - as - a - Service (IDaaS) for employees, business partners, and consumers . PingOne is a key component of PingIdentity’s Consumer Identity and Access Management SaaS offering, supporting social logins, self - registration, and SSO to all popular SaaS apps. |
![]() |
Mar 21, 2017 |
Executive View: HexaTier Database Security and Compliance - 71255Alexei BalaganskiHexaTier provides an all-in-one database security and compliance solution across multiple platforms with a strong focus on cloud environments and Database-as-a-Service products. |
![]() |
Mar 20, 2017 |
Executive View: Cisco Advanced Malware Protection - 72518Alexei BalaganskiCisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and continuous endpoint and network monitoring, AMP provides constant visibility and control across all environments before, during, and after a cyber-attack. |
![]() |
Mar 20, 2017 |
Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289John TolbertCustomer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. |
![]() |
Mar 09, 2017 |
Leadership Compass: Database Security - 70970Alexei BalaganskiDatabase security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data. |
![]() |
Mar 09, 2017 |
The Future of Banking: Management Summary - 74002Martin KuppingerThe Finance Industry is facing a profound change with the introduction of PSD2, an update to the 2007 EU Directive on Payment Services. The directive, which comes into force on January 13, 2018, continues Europe´s goal to modernize, unify and open its financial landscape. In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2, such as banks and… |
free |
Mar 03, 2017 |
Advisory Note: Mobile Biometrics for PSD2 - 72512John TolbertMany new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial services industry under the Revised Payment Services Directive (PSD2). However, there are several… |
€995.00 *
![]() |
Mar 02, 2017 |
Survey: The Future of Banking - 74002Martin KuppingerThe Future of Banking: Innovation & Disruption in light of the revised European Payment Services Directive (PSD2) In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2. The primary focus of the survey was on Strong Customer Authentication, API Strategy and KYC & Customer Identity Management, in the context of the changing requirements imposed by… |
€900.00 *
![]() |
Feb 28, 2017 |
Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531Mike SmallOrganizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment. |
![]() |
Feb 27, 2017 |
Leadership Brief: Securing PSD2 APIs - 72513John TolbertThe Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use. |
free |
Feb 17, 2017 |
Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283John TolbertMany new biometric technologies and products have emerged in the last few years. Biometrics have improved considerably, and are now increasingly integrated into smartphones. Mobile biometric solutions offer not only multifactor and strong authentication possibilities, but also transactional authorization. However, there are a number of challenges with biometric… |
![]() |
Feb 16, 2017 |
Executive View: Ping Identity’s PingFederate - 70284John TolbertPingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain. |
![]() |
Feb 15, 2017 |
Executive View: CensorNet Cloud Security Platform - 72529Mike SmallMany organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve… |
![]() |
Feb 08, 2017 |
Leadership Compass: Adaptive Authentication - 71173John TolbertLeaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market. |
€1295.00 * |
Feb 02, 2017 |
Whitepaper: Balabit - Privilege Management - 72705Martin KuppingerPrivileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User Behavior Analytics are cornerstones of a modern SOC. |
![]() |
Jan 30, 2017 |
Executive View: AWS Lambda - 72524Alexei BalaganskiAWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the Amazon Cloud. |
![]() |
Jan 30, 2017 |
Executive View: Microsoft Security Suite - 72541Graham WilliamsonA comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved. |
![]() |
Jan 18, 2017 |
Executive View: Centrify Privilege Service - 71326John TolbertCentrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise. |
![]() |
Jan 17, 2017 |
Executive View: RSA Identity Governance and Lifecycle - 72503John TolbertRSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal. |
€190.00 *
![]() |
Jan 16, 2017 |
Executive View: Watchful Software RightsWatch - 70848Dave KearnsRightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and classified appropriately. |
€190.00 *
![]() |
Jan 13, 2017 |
Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290John TolbertSAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more. |
![]() |
Jan 11, 2017 |
Advisory Note: Plant Automation Security - 71560Graham WilliamsonIndustrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are deploying communications paths to their ICSs and raising the risk profile of their organizations. |
![]() |
Jan 10, 2017 |
Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536Matthias ReinwarthAchieving risk governance and resilience, while ensuring protection from Cyber risks by creating a standards-based process framework focusing on a risk based approach and implemented using a complementary software platform. |
€190.00 *
![]() |
Jan 05, 2017 |
Executive View: FSP Identity Governance and Administration Suite - 71324Martin KuppingerDie FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung. |
€190.00 *
![]() |
2016
Date | Title | Price |
---|---|---|
Dec 22, 2016 |
Advisory Note: Enterprise Role Management - 70285Martin Kuppinger Matthias ReinwarthRole-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the right data model, efficient processes and an adequate organization for implementing role management… |
![]() |
Dec 21, 2016 |
Executive View: ForgeRock Access Management - 71316John TolbertForgeRock Access Management is a full-feature Identity and Access Management (IAM) system. It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities. ForgeRock supports open standards development, and that is reflected by the multi-protocol support in ForgeRock Access Management. … |
![]() |
Dec 19, 2016 |
Executive View: CipherCloud Trust Platform - 72530Mike SmallMany organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CipherCloud Trust Platform provides a valuable tool that organizations can use to improve governance… |
€190.00 *
![]() |
Dec 14, 2016 |
Executive View: Skyhigh Cloud Security Platform - 72532Mike SmallMany organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve… |
![]() |
Nov 25, 2016 |
Advisory Note: Sustainable Infrastructures through IT Compliance - 72025Matthias ReinwarthWell-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand compliance as a strategic and future-oriented business objective, and embed IT Compliance and security into their organizational process framework and transform compliance expenses into strategic budgets.
|
![]() |
Nov 24, 2016 |
Executive View: Vaultive Cloud Data Security Platform - 72533Mike SmallThe data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is protected against risks of leakage and unauthorized disclosure. Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting… |
![]() |
Nov 23, 2016 |
Leadership Compass: CIAM Platforms - 71171John TolbertLeaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms. Your compass for finding the right path in the market. |
€1295.00 * |
Nov 22, 2016 |
Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701John TolbertConsumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect, store, and analyse data on consumers in order to create additional sales opportunities and increase… |
![]() |
Nov 18, 2016 |
Executive View: Boldon James – Data Classification - 72508Paul SimmondsData classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that information should be handled. Only by providing clear, unambiguous guidance can information be… |
![]() |
Nov 18, 2016 |
Executive View: Avatier Identity Management Suite - 71510Dave KearnsAIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security. |
![]() |
Nov 17, 2016 |
KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001Alexei BalaganskiAngesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen für Security Intelligence in Echtzeit (Real-time Security Intelligence) kombinieren Big Data und… |
free |
Nov 16, 2016 |
KuppingerCole and BARC Joint Study: Big Data and Information Security - 74001Alexei BalaganskiAs cyber-attacks are becoming increasingly advanced and persistent, and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cybersecurity strategies. The new Real-Time Security Intelligence solutions are combining Big Data and advanced analytics to correlate security events across multiple data sources, providing early detection… |
free |
Nov 10, 2016 |
Advisory Note: KYC as an Enabler in the Financial Services Business Transformation - 72523Bruce HughesThe Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change. FSIs need to transform their business models to respond to today’s challenges and to position the business with the flexibility required to adapt to opportunities as the business landscape evolves. This report examines the issues and challenges FSIs face with market… |
![]() |
Nov 09, 2016 |
Advisory Note: Information Stewardship in the Age of Blockchain - 71602Karin GräslundBlockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent past. This report provides insights and a closer look at how blockchain technology is most probably improving the current state of Information Stewardship. It highlights the most relevant value proposition,… |
![]() |
Nov 02, 2016 |
Executive View: Indeed AirKey Enterprise - 71256Alexei BalaganskiAirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure. |
![]() |
Oct 27, 2016 |
Executive View: Securonix Security Analytics Platform - 72507Alexei BalaganskiSecuronix Platform provides advanced security analytics technology for collecting, analyzing and visualizing a wide range of business and security information, converting it into actionable intelligence and serving as a basis for a broad portfolio of specialized security solutions. |
€190.00 *
![]() |
Oct 17, 2016 |
Executive View: Emerging Threat Intelligence Standards - 72528Mike SmallThreat intelligence is a vital part of cyber-defence and cyber-incident response. To enable and automate the sharing threat intelligence, OASIS recently made available the specifications for STIX™, TAXII™ and CybOX™ as international open standards. This report provides an overview of these specifications and their application to Real Time Security Intelligence. |
€190.00 *
![]() |
Oct 14, 2016 |
Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542Dan BlumMany enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling cloud adoption. This document provides guidance on how IT security leadership should deal with the… |
![]() |
Sep 28, 2016 |
Executive View: Sophos Threat Intelligence - 71681Mike SmallSophos offers a range of security solutions as software, appliances and cloud services. These products exploit threat intelligence that is gathered by Sophos Labs, shared in real time between Sophos Next-Gen Firewall and Sophos Next-Gen Endpoint Protection, and integrated through Sophos Security Heartbeat. These products include the recently released Sophos Intercept X. |
€190.00 *
![]() |
Sep 27, 2016 |
Executive View: RSA NetWitness Suite - 72516Alexei BalaganskiRSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and investigate sophisticated cyber-attacks. |
![]() |
Sep 26, 2016 |
Executive View: VMware Identity Manager - 71455Martin KuppingerVMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications and provides contextual experience to VMware WorkspaceOne. |
![]() |
Sep 01, 2016 |
Executive View: LogRhythm Security Intelligence Platform - 72517Alexei BalaganskiLogRhythm provides a unified security intelligence platform combining next-generation SIEM, log management, network and endpoint monitoring and forensics with full threat lifecycle management and response orchestration. |
€190.00 *
![]() |
Aug 29, 2016 |
Executive View: Microsoft Advanced Threat Analytics - 71554Alexei BalaganskiMicrosoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious user and device activity within corporate networks. |
![]() |
Aug 26, 2016 |
Advisory Note: The Impact of Blockchains on Business Process Management and Optimisation - 71609Bruce HughesDistributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimisation) processes significantly. This report examines the role that blockchain-based technologies and IoT can play in streamlining and managing BPM/BPO. |
![]() |
Aug 25, 2016 |
Executive View: Ergon Airlock Suite - 72509Martin KuppingerErgon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management functions, especially for external users. |
€190.00 *
![]() |
Aug 23, 2016 |
Leadership Compass: Cloud Access Security Brokers - 71138Mike SmallHow do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need. |
€1295.00 * |
Aug 17, 2016 |
Advisory Note: The Blockchain and Life Management Platforms - 71606Ivan NiccolaiThe core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data integrity. Even though there remain some requirements of LMPs that are not solvable with blockchains,… |
![]() |
Aug 16, 2016 |
Executive View: Microsoft Azure Blockchain Services - 71332Ivan NiccolaiAzure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of preconfigured Virtual Machines, developer templates and artefacts, Microsoft Azure’s BaaS offering can significantly lower technical complexity barriers to the adoption of blockchain-powered… |
![]() |
Aug 15, 2016 |
Leadership Brief: Transforming IAM – not Panicking - 71411Mike SmallMany organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. |
![]() |
Aug 09, 2016 |
Executive View: Beta Systems Garancy Recertification Center - 71315Christian HimmerWith the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive browser interface – optimized for usage on desktops, tablets and also on mobile devices. |
![]() |
Jul 26, 2016 |
Executive View: Deep Identity - 71453Graham WilliamsonManaging provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open to abuse. Deep Identity has developed an easy-to-use solution that adopts a role-based provisioning… |
![]() |
Jul 22, 2016 |
Executive View: IBM QRadar Security Intelligence Platform - 72515Alexei BalaganskiIBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and breaches, forensic analysis and incident response, as well as automated regulatory compliance. |
![]() |
Jul 21, 2016 |
Executive View: Sophos Protection for Amazon Web Services - 71680Mike SmallSophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges. |
€190.00 *
![]() |
Jul 19, 2016 |
Advisory Note: Blockchains and Risk - 71608Mike SmallA blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks associated with the use of this technology and recommends an approach to managing… |
![]() |
Jul 18, 2016 |
Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612Ivan NiccolaiBlockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity assurance of connected things, scalable management of connected devices, and secure information transmission. |