Reports

Reload reports without any filters applied

Selected Filter(s):

 All Reports
Advisory Note

KuppingerCole’s Advisory Notes are short reports that present information about a specific topic, company, or product. Advisory Notes are published on a regular basis and are aimed at the management of a company. An Advisory Note gives usage recommendations and helps decision makers solve specific problems.

Architecture Blueprint

KuppingerCole Architecture Blueprints provide a detailed architectural perspective on a defined area. They illustrate the relevant technical components and their interplay, and they provide advice on how to build your own infrastructure for such area.

Buyer's Compass

KuppingerCole Buyer’s Compass is an instrument that delivers the key criteria to look at when choosing a service/product from a certain category. It lists the most relevant functional and non-functional requirements, lists questions to ask the vendors, and maps capabilities to the main use cases.

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.

Leadership Brief

KuppingerCole’s Leadership Brief provides condensed research and advice for executives and decision makers in organizations. These two-page documents cover business challenges and advise on how to address them, focusing on the key issues and allowing decision makers to quickly identify the right solutions.

Leadership Compass

KuppingerCole’s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that segment. It is the compass that assists decision makers in identifying the right vendors and products for their projects.

Market Compass

KuppingerCole Market Compass is a tool which provides an overview of a particular IT market segment. It is the compass which assists you in identifying the vendors and products/services in a particular market segment which you should consider for product decisions.

Product Report

KuppingerCole’s Product Report is a report written by one of KC’s analysts about a special client product. In a Product Report an analyst describes the company and its product in a detailed way and looks closely at different aspects of the product to give end users an extensive expert reference.

Survey

KuppingerCole’s Surveys present the results of a predetermined set of questions that are given to a special target group. Surveys are published on a regular basis or due to assignment through a partner.

Vendor Report

KuppingerCole’s Vendor Report is a report written by one of KC’s Analysts about a specific company. In a vendor report an analyst describes the company and its whole product range in detailto give end users an extensive expert reference about the company as a vendor.

Whitepaper

KuppingerCole’s Whitepaper is a report written by one of KC’s analysts that informs readers about a specific, usually complex issue. A whitepaper is meant to help readers understand an issue, solve a problem, or make a decision.

 2020

top  

Date Title Price
Dec 01, 2020

Elastic Security

Alexei Balaganski

Elastic Security is a security platform built on top of the Elastic Stack. It combines security information and event management, threat hunting, endpoint security, and cloud monitoring to help analysts prevent, detect, and respond to cyber threats more efficiently.

Nov 26, 2020

Ping Identity’s PingFederate

Christopher Schuetze

PingFederate is among the leading-edge solutions that support identity federation standards.  PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications.  PingFederate works both on-premises or in the cloud and is easy for administrators to install and maintain.

Nov 24, 2020

CIAM Platforms

John Tolbert

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

Nov 24, 2020

Cisco Zero Trust Security

Alexei Balaganski

Cisco’s approach towards Zero Trust combines several foundational access policy solutions for securing your workforce, workloads and workspace with a broad range of additional security products to ensure complete visibility, protection, and compliance throughout the whole enterprise.

Nov 10, 2020

Cherwell ITSM

Warwick Ashford

Cherwell ITSM is a comprehensive IT Service Management application that can be installed on premise or in the cloud and is built on top of the Cherwell CORE platform – a  low-code, configuration file driven service management platform that enables rapid customization, automation, orchestration, integration and extensibility.

Nov 03, 2020

ARCON PAM SaaS

Paul Fisher

Privileged Access Management (PAM) must evolve if it is to meet the demands of different types of organizations and IT architecture. A one size fits all approach does not work in a world where access to privileged accounts is changing. Organizations need PAM solutions that fulfill security requirements but also deliver convenience, rapid deployment, and cost efficiency. Therefore, PAM…

Nov 03, 2020

BigID

Richard Hill

In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables organizations to take action on that data to meet privacy, security, and governance requirements by finding, categorizing, analyzing, and correlating their data at scale.

Oct 29, 2020

Illusive Platform

Alexei Balaganski

Illusive Networks’ distributed deception platform is a highly scalable, intelligence-driven security solution that offers unprecedented visibility into corporate security posture from the attacker’s viewpoint and helps deal with cyberattacks before, during, and after they happen.

Oct 29, 2020

The Role of APIs for Business

Paul Fisher

An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as booking a hotel room or in car navigation, would not be possible. In recent years, API proliferation has grown exponentially, and they increasingly being used by companies and organisations to…

Oct 27, 2020

IBM QRadar Advisor with Watson

Alexei Balaganski

QRadar Advisor with Watson integrates the QRadar Security Analytics Platform with Watson’s cognitive AI to perform fully automated forensic investigations of security incidents, dramatically improving analyst productivity and enabling quick response to cyberthreats.

Oct 22, 2020

Security Orchestration Automation and Response (SOAR)

John Tolbert

This report provides an overview of the SOAR market and provides you with a compass to help you to find the solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative market share, and innovative approaches to providing SOAR solutions.

Oct 22, 2020

Privileged Access Management solutions for Agile, multi-cloud and DevOps environments

Paul Fisher

Privileged Access Management (PAM) is an important area of risk management and security for any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But changing business practices and upgrades to IT including cloud and other trends has meant that users of privileged accounts have become more numerous and widespread.…

Oct 21, 2020

Protecting Intellectual Properties while enabling business agility with R&S®Trusted Gate by Rohde & Schwarz Cybersecurity

Martin Kuppinger

Many industries, specifically the ones that on one hand must collaborate and share information and on the other hand have to deal with highly sensitive information and state-run industrial espionage – such as e.g. Life Sciences, Pharma, or BioTech – must enable information protection while enabling business agility. They need to define their Information Protection Lifecycle…

Oct 21, 2020

ideiio

Richard Hill

Identity Governance & Administration (IGA) is not only for large enterprises but organizations of all sizes to reduce the risk of user access to applications, systems, and data and ensure compliance with applicable laws and regulations. ideiio focuses on providing a straightforward and easy way to deploy and use IGA in organizations regardless of its size.

Oct 21, 2020

Oracle APEX – secure low-code application development platform

Alexei Balaganski

Oracle Application Express (APEX) is a low-code development platform that allows business users with limited IT skills to design and maintain scalable enterprise applications, storing their data securely in the Oracle Autonomous Database. 

Oct 21, 2020

Enterprise Databases in the Cloud

Alexei Balaganski

This Leadership Compass provides an overview of the enterprise databases offered primarily as managed services to enable modern cloud-native application architectures as well as data processing and analytics at scale. We examine both the portfolios of large cloud service providers and innovative modern managed database offerings to provide you the guidance and recommendations for finding…

Oct 13, 2020

Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security

Alexei Balaganski

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

Oct 08, 2020

Architecting your Security Operations Centre

Paul Simmonds

A security operations centre (SOC) is a dedicated team, usually operating 24x365, to detect and respond to cybersecurity incidents within your organisation that potentially affect your people and systems. Architecting your SOC properly in terms of technology, processes, people and a close coupling with the organisation is critical if you are to achieve value from implementing a SOC within…

Oct 06, 2020

Commvault Complete™ Data Protection

Mike Small

Business continuity planning is essential to the digital transformation process. This requires the use of data backup products and disaster recovery services which must support today’s multi-cloud hybrid IT environment. This report describes how Commvault Complete™ Data Protection meets these challenges.

Oct 06, 2020

UNITY: IGA Modernization Framework by Persistent

Richard Hill

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity provides the necessary migration framework to facilitate an IGA modernization transition.

Oct 06, 2020

R&S®Trusted Gate - Secure Glocalization von Rohde & Schwarz Cybersecurity

Matthias Reinwarth

Rohde & Schwarz Cybersecurity ermöglicht eine zuverlässige Verarbeitung regulierter und sensibler Informationen für die Zusammenarbeit und zum Dateiaustausch in gemeinsamen SharePoint-Plattformen für Organisationen in verschiedenen Ländern und Regionen unter Gewährleistung der Konformität zu unterschiedlichen Gesetzen und Vorschriften. Rohde &…

Oct 06, 2020

Oxyliom Solutions GAÏA Advanced Identity Management

Martin Kuppinger    Warwick Ashford

The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by Oxyliom Solutions integrates the key elements of identity management required for regulatory compliance and a modern digital experience, especially in highly regulated industries such as the financial sector.

Sep 23, 2020

Cloud Access Security Brokers

Mike Small

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers CASB (Cloud Access Security Broker) solutions that help to secure the organizational use of cloud services.

Sep 17, 2020

Fudo PAM by Fudo Security

Paul Fisher

Fudo Security’s PAM solution is the company’s primary product in the expanding PAM market. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are creating new demands and innovative PAM…

Sep 15, 2020

Working for the Business, not the Auditors

Matthias Reinwarth

Forward-thinking companies no longer see cybersecurity, governance, compliance and privacy as something they are just forced to do. Instead, a comprehensive alignment with applicable policies, regulations and laws is the basis for consistently and competitively enabling and sustainably operating digital business.

Sep 15, 2020

Atos DirX Directory

Martin Kuppinger

Atos DirX Directory is one of the few enterprise-grade directory services in the market, delivering a high-performance, high-scalability, high-availability, and high-secure implementation that is required by many of today’s large-scale use cases in the Digital Transformation. Atos DirX Directory builds on a purpose-built and optimized data layer and delivers comprehensive support…

Sep 15, 2020

R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity

Matthias Reinwarth

Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms for organizations spanning countries and regions with different laws and regulatory requirements. Rohde & Schwarz Cybersecurity utilizes globally distributed, efficient and secure infrastructure with…

Sep 08, 2020

SAP Cloud Identity Access Governance

Martin Kuppinger

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a range of on-premises services. It covers areas such as Access Analytics, Role Management, Access Requests, Access Reviews, and Privileged Access Management for these environments. SAP Cloud IAG can run…

Sep 08, 2020

Buyer’s Compass: Access Management

Richard Hill

Access Management capabilities are well-established in the broader scope of IAM and are continuing to gain attraction due to emerging requirements for integrating business partners and customers. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. This document will help…

Sep 04, 2020

Status and Advantages of Small Data Machine Learning Paradigms

Anne Bailey

Consider the relationship between Machine Learning (ML) and data consumption – is more always better? This Leadership Brief discusses the possible benefits of Small Data for ML, some technological approaches to get there, why you should still be cautious of Small Data, and recommendations on applying this practically.

Aug 31, 2020

IdentityIQ – SailPoint

Graham Williamson

IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces manual intervention and improves accuracy of user entitlements. The latest release adds cloud access management capability allowing entitlements in DevOps environments to be monitored and managed.

Aug 28, 2020

SecZetta Third-Party Identity Risk Solution

Paul Fisher

Managing third party identities has become an important issue for companies when they open their infrastructures to non-employees from partners and vendors. The influx of third-party identities puts an extra strain on existing IAM tools but management solutions that provide added functionality for non-employee identities are now available. SecZetta has streamlined existing solutions to…

Aug 28, 2020

CyberArk

Christopher Schuetze

Privileged Access Management (PAM) has evolved into a set of technologies that address some of today's most critical areas of cybersecurity in the context of digital transformation and industrial change. The CyberArk Core Privileged Access Security solution is designed to secure and protect privileged accounts and credentials within cloud and hybrid infrastructures. It is part of a suite…

Aug 28, 2020

Micro Focus Identity Governance

Graham Williamson

Identity Governance is a mature Identity Governance and Administration (IGA) solution that is undergoing extensive development to meet the identity services requirements of the modern enterprise. As business systems become increasingly demanding of identity management environments, Micro Focus continues to extend its Identity Governance product, improving the user interface, automating…

Aug 27, 2020

Privileged Access Management

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, agile software development and digital transformation has meant that users of privileged accounts have become more numerous…

Aug 27, 2020

ManageEngine Log360

Alexei Balaganski

Log360 from ManageEngine is a tightly integrated suite of log management and network security analytics tools. Complementing SIEM capabilities with EDR, DLP, and even SOAR functionality, it offers a convenient and affordable one-stop solution for security analytics and threat remediation across on-prem and cloud.

Aug 27, 2020

Radware Kubernetes WAF

Richard Hill

Containerized microservices are gaining momentum in IT organizations today, requiring tools such as Kubernetes for automating the orchestration and management of those containers. The Radware Kubernetes WAF meets the unique requirements of the Kubernetes environment to protect its containerized applications and data.

Aug 25, 2020

The Role of AI in Modern Business Intelligence Platforms

Anne Bailey

Business intelligence (BI) platforms have become essential for enterprises with an exponential increase in data generation and usage. The next generation of BI platforms will expand on the volume of data analysis and the degree of control a business user has over the process. This Leadership Brief presents the several roles that artificial intelligence plays in BI, and what your…

Aug 25, 2020

Privacy and Consent Management

Anne Bailey

This report provides an overview of the market for Privacy and Consent Management platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing solutions that enable you to collect and manage consent in a compliant and…

Aug 20, 2020

Access Governance & Intelligence

Richard Hill

The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providing you a compass to help you find the products that can meet the criteria necessary for successful AG deployments.

Aug 18, 2020

Recommendations for aligning ITSM with IAM/IGA

Warwick Ashford

The versatility of modern IT Service Management systems (ITSM) is leading many organizations to configure these systems to deal with all employee service requests, including those related to IAM/IGA. But this is a risky strategy from a maintenance and compliance point of view. This Leadership Brief outlines the key reasons for aligning ITSM with IAM/IGA systems, and how this is best achieved.

Aug 18, 2020

The Information Protection Life Cycle and Framework: Deceive

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the seventh in the series introducing the…

Aug 18, 2020

One Identity Active Roles

Martin Kuppinger

One Identity Active Roles is a powerful tool for integrated management of both on-premises Microsoft Active Directory and Microsoft Azure Active Directory. It comes with strong support for managing Exchange Servers and Office 365, but also Identity Lifecycle Management that supports a range of non-Windows and SaaS applications.

Aug 18, 2020

Password Safe von MATESO

Martin Kuppinger

Password Safe von MATESO ist eine Lösung für das zentrale, unternehmensweite Management von Kennwörtern und anderen „Secrets“ und die Überwachung und Kontrolle von deren Nutzung. Das Produkt unterstützt alle wesentlichen Funktionen in diesem Bereich wie die automatische Rotation von Kennwörtern und die Übergabe von Kennwörtern im…

Aug 13, 2020

Buyer’s Compass: Core Features of Privacy and Consent Management Solutions

Anne Bailey

Building a trust-filled and transparent relationship with end-users depends now more than ever on Privacy and Consent Management solutions. These services accomplish many tasks such as helping organizations collect and manage consent signals provided by end-users, managing cookies and trackers, and providing measurement of an organization’s journey towards privacy compliance. To…

Aug 13, 2020

SailPoint Predictive Identity

Martin Kuppinger

SailPoint Predictive Identity est une plate-forme SaaS qui ajoute à l’IGA des capacités reposant sur l'IA . Cela concerne notamment l'analyse des risques d'accès, l'examen des droits d'accès avec des recommandations de validation ou de révocation et l'optimisation automatisée des modèles d'accès. Cette solution améliore…

Aug 13, 2020

SailPoint Predictive Identity

Martin Kuppinger

SailPoint Predictive Identity ist eine SaaS-Plattform, die IGA um KI-basierte Funktionen erweitert. Dazu gehören unter anderem die Analyse von Zugriffsrisiken, Empfehlungen für die Genehmigung oder den Widerruf von Berechtigungen während der Berechtigungsprüfung und die automatische Optimierung von Zugriffsberechtigungsmodellen. Die Lösung bietet im Vergleich zu…

Aug 11, 2020

Cygna Auditor Platform

Martin Kuppinger

The Cygna Auditor Platform is a unified environment for collecting events from Active Directory, Azure AD, Windows Servers, Microsoft 365, and some other platforms, and providing analytics and alerting on these events. It incorporates the former BeyondTrust Auditor Suite. The Cygna Auditor Platform is a solution targeted on administrators of Microsoft Windows-centric environments, but…

Aug 06, 2020

BioCatch

John Tolbert

BioCatch is an innovative Fraud Reduction Intelligence Platform (FRIP). Their three-part solution in this space consists of Policy Manager, Case Manager, and Analyst Station, which are used by fraud analysts and operations teams to determine appropriate actions in response to indicators. BioCatch utilizes industry-leading passive biometrics for not only user behavioral analysis but also…

Aug 03, 2020

Incident Response Management

Christopher Schuetze

The probability of becoming a victim of a data breach is now higher than ever. The hyperconnected world and the ever-increasing complexity of modern IT systems and processes pose new challenges for IT staff.  All organizations must invest in an Incident Response Management plan. Preparation is essential and ensuring that everyone knows what to do can significantly reduce the impact…

Aug 03, 2020

Adobe: Experience Cloud

Roland Bühler

When optimizing customer centricity and customer journeys across all touchpoints, automation is key. Various aspects have to be considered in order to create an individual and fit-for-purpose customer experience. Adobe’s Experience Cloud consists of various applications and services that cover many marketing-related areas, such as advertising, touchpoint management, personalization,…

Jul 30, 2020

The Information Protection Life Cycle and Framework: Dispose

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the final in the series introducing the…

Jul 30, 2020

Endpoint Protection, Detection, and Response

John Tolbert

The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response.  The Endpoint Security space continues to see much innovation and some consolidation. The formerly separate products Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) are increasingly coming together in the marketplace.

Jul 23, 2020

Clear Skye IGA: IGA on the ServiceNow NOW platform

Martin Kuppinger

Clear Skye IGA differs from common IGA implementations by running on the ServiceNow NOW platform and providing full integration into ServiceNow capabilities. It thus bridges the gap between ITSM and IGA allowing for fast and efficient implementation of IGA capabilities for organizations already using ServiceNow.

Jul 16, 2020

Auth0 Platform

Richard Hill

Auth0 provides a flexible platform that can be used for Consumer Identity and Access Management (CIAM), Business-to-Employee (B2E), and Business-to-Business (B2B) use cases. Auth0’s platform solutions are highly customizable to meet a variety of business requirements with a developer-centric focus.

Jul 15, 2020

Wie wir Passwörter loswerden – Noch Heute

Warwick Ashford

Die IT-Sicherheits-Community ist sich schon lange einig, dass Passwörter ein Problem sind, weil sie einfach zu entwenden und im Endeffekt anfällig für menschliche Fehler sind. Dieser Leadership Brief befasst sich damit, wie Organisationen ihre allgemeine Sicherheit verbessern können, indem sie sich über die Abhängigkeit von Passwörtern im Klaren werden…

Jul 14, 2020

Dynamic Authorization Management

Graham Williamson

The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Management market and provides a comparison of the main product offerings. Dynamic Authorization externalizes access control decisions to a centrally-managed authorization service that evaluates access policies in…

Jul 09, 2020

Security Fabric: A Methodology for Architecting a Secure Future

Christopher Schuetze

Work from home, bring your own device, a professional cyber-crime industry, IoT & OT. We all have to face these challenges while fullfilling a zoo of endless requirements. It is complex to keep the overview and the flexibility in our IT security services and the used toolset. Setting up the architecture with the concept of a Security Fabric helps to structure, to optimize and to…

Jul 09, 2020

NRI Secure Technologies: Uni-ID Libra 2.4

Richard Hill

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra continues to innovate and provide the necessary components of a CIAM solution with a focus on the Japanese market.

Jul 02, 2020

Symantec Identity Governance and Administration

Mike Small

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets.  Identity Governance and Administration includes two core elements of IAM - Identity Provisioning and Access Governance - that are essential to enabling and securing digital transformation.  This report describes how Symantec Identity…

Jul 02, 2020

The Information Protection Life Cycle and Framework: Secure

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the fourth in the series introducing the…

Jun 26, 2020

Leadership Brief: Enterprise Information Protection - 71036

Anne Bailey

The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and business devices by employees, and mass remote work further exacerbates this trend. Advanced methods for the protection of sensitive data are necessary. This Leadership Brief is an overview of the role that…

Jun 25, 2020

Executive View: CSI tools - 80407

Martin Kuppinger

CSI tools provide a suite of solutions for managing access entitlements and risk in SAP environments. The solution come with a modern, web-based user interface and dashboarding. They deliver in-depth insight and support for managing entitlements at all levels and across all applications within common SAP environments.

Jun 25, 2020

Leadership Brief: The Information Protection Life Cycle and Framework: Contain and Recover - 80375

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the sixth in the series introducing the…

Jun 18, 2020

Market Compass: Enterprise Information Protection - 80217

Anne Bailey

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers Enterprise Information Protection solutions. Because the perimeter of the corporation has changed to include personal and business devices, mass remote work, and increased collaboration, advanced methods for the protection of sensitive…

Jun 10, 2020

Leadership Compass: Network Detection and Response - 80126

John Tolbert

This report provides an overview of the market for Network Detection and Response tools (NDR) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing NDR solutions.

Jun 04, 2020

Leadership Compass: Unified Endpoint Management (UEM) - 70314

Richard Hill

This report provides an overview of the market for Unified Endpoint Management (UEM) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing UEM solutions.

Jun 02, 2020

Executive View: ManageEngine PAM360 - 80140

Paul Fisher

In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are putting new demands on PAM and vendors are responding to this challenge by adding new functionalities and capabilities to their solutions. This…

Jun 02, 2020

Executive View: Hitachi ID Privileged Access Manager - 80142

Paul Fisher

Hitachi ID is a global IAM software provider. It offers Hitachi ID Privileged Access Manager (HiPAM) as its primary offering for the PAM market, along with the complementary Identity Manager and Password Manager products. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid…

Jun 02, 2020

Leadership Brief: The Information Protection Life Cycle and Framework: Monitor and Detect - 80374

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the fifth in the series introducing the…

May 28, 2020

Executive View: IBM Watson OpenScale - 80505

Anne Bailey

IBM Watson OpenScale a solution to enable the responsible monitoring and management of AI projects. The comprehensive attention to data management, analytics, model training, deployment, and model lifecycle management make Watson OpenScale a strong choice for enterprises.

May 28, 2020

Market Compass: Conversational AI Building Platforms - 80384

Roland Bühler

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers conversational AI building platforms with a focus on chatbot solutions. Such solutions are a common trend in marketing, sales, service management, human resources, and many other use cases.

May 26, 2020

Executive View: Omada Identity Suite - 80506

Richard Hill

Modern Identity Governance and Administration (IGA) solutions need to take traditional IGA further to meet today's customer requirements such as entitlement and onboarding automation or providing insight into access risks. Omada Identity Suite not only supports this with Access Governance and Identity Provisioning but also takes it a step further by giving an IGA best practices framework…

May 22, 2020

Market Compass: Cloud Backup and Disaster Recovery - 71176

Mike Small

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers solutions that provide backup, restore and disaster recovery of IT service data into the cloud in the context of the hybrid IT service delivery environment that is now commonly found in medium to large organizations.

May 22, 2020

Executive View: Microsoft Azure Active Directory - 80401

Richard Hill

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD) provides Directory Services, Identity Federation, and Access Management from the cloud in a single…

May 19, 2020

Executive View: Ilantus Compact Identity - 80177

Martin Kuppinger

IAM is a complex challenge for businesses, comprising of various capabilities such as IGA (Identity Governance & Administration), Access Management, and Privileged Access Management. Deployment is shifting towards flexible models supporting a range of deployment options, including IDaaS (Identity as a Service). Ilantus Compact Identity is an IAM offering targeting businesses that are…

May 19, 2020

Executive View: SentinelOne Singularity Platform - 80139

Alexei Balaganski

Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe Einblicke und konsistenten Schutz für On-Premises-Endgeräte, virtualisierte Umgebungen und Cloud-Workloads.

May 19, 2020

Executive View: SentinelOne Singularity Platform - 80139

Alexei Balaganski

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consistent endpoint security across on-premises devices, virtualized environments and cloud workloads.

May 18, 2020

Executive View: Thycotic Access Controller - 80406

Paul Fisher

Thycotic is one of the world’s leading providers of Privileged Access Management (PAM) solutions. In the last few years PAM has evolved into a set of targeted technologies that addresses some of the most urgent areas of business security in a period of rapid technological change. Digital transformation, Cloud, and Hybrid IT environments are putting new demands on PAM. Against this…

May 14, 2020

Executive View: Symantec Privileged Access Manager - 80331

Mike Small

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. This report describes how Symantec Privileged Access Management meets these challenges.

May 14, 2020

Executive View: Nexis Controle 3.4 - 80158

Matthias Reinwarth

Nexis Controle 3.4 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures.

May 14, 2020

Executive View: One Identity Manager - 80310

Christopher Schuetze

One Identity Manager is one of the leading Identity and Access Governance (IAG) solutions. It builds on a sophisticated, consistent concept which allows for intuitive user experience, rapid customization and easy deployment. One Identity Manager is offering a rich toolset and framework to connect various target systems to its identity and access management solution.

May 14, 2020

How to Get Rid of Passwords - Today

Warwick Ashford

The IT security community has long recognized that passwords are a problem because they are easily cracked or compromised and are ultimately susceptible to human failings. This leadership brief looks how organizations can improve overall security by addressing their reliance on passwords and prepare to move to alternative authentication methods.

May 14, 2020

Leadership Compass: Access Control Tools for SAP Environments - 80104

Martin Kuppinger

This report provides an overview of the market for Access Control Tools for SAP Environments and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing solutions that increase security in SAP Environments by restricting access,…

May 12, 2020

Whitepaper: IAM: Globalization & Large-Scale Enterprise - 80130

Warwick Ashford

Identity and Access Management (IAM) has never been more important or challenging in the face of a rapidly changing business, regulatory and IT environment. This is especially true for multinational companies that must comply with an ever-increasing number of security and privacy regulations. Service Layers delivers a managed IAM service using a scalable, customizable, component-based…

May 12, 2020

Leadership Compass: Privileged Access Management - 80088

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more…

Apr 30, 2020

Leadership Compass: Identity Governance & Administration (IGA) - 80063

Martin Kuppinger    Richard Hill

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for…

Apr 30, 2020

Executive View: SailPoint Predictive Identity - 80124

Martin Kuppinger

SailPoint Predictive Identity is a SaaS platform that adds AI-based capabilities to IGA. These include analysis of access risks, recommendations for approving or revoking entitlements during access review, and automated optimization of access models, amongst others. The solution provides significant improvements in user experience of IGA, compared to traditional IGA approaches, while also…

Apr 23, 2020

Executive View: IBM Watson - 80232

Anne Bailey

IBM Watson is a computing platform that aims to meet the AI needs of any organization – those that wish to develop projects themselves, or those who wish to gain standard capabilities quickly. The comprehensive attention to data management, analytics, model training, deployment, and lifecycle management make the portfolio of IBM Watson products a strong choice for enterprises.

Apr 23, 2020

Leadership Brief: Mitigating Availability & Security Risks in Centralized Digital Workplace Delivery - 80223

Paul Fisher

Centralizing delivery of digital workplaces can bring cost, efficiency and productivity rewards but security and risk management must be baked in if availability is not compromised by cyber attacks or unexpected disruption.

Apr 21, 2020

Executive View: Soterion for SAP - 80113

Martin Kuppinger

Soterion for SAP is a GRC (Governance, Risk & Compliance) solution targeted at SAP environments and delivering major capabilities in that space. The solution is available as both on premises solution and in an as-a-service model. Soterion has put specific emphasis on delivering a solution for GRC and access control in SAP environments that is easy-to-use, coming with a…

Apr 21, 2020

Whitepaper: Fast Access Management in the Hybrid Cloud for SMBs - 80137

Paul Fisher

Moving to the cloud sets new challenges for managing access to critical IT environments for small and medium-size businesses (SMBs). These include managing access to multi-cloud services that are used on-demand but discarded when no longer needed, finding a scalable solution without big IT projects and costs, and managing administrative access with limited resources. At the same time,…

Apr 16, 2020

Executive View: Hitachi ID IAM Suite - 80399

Richard Hill

Enterprise IAM suites today need to meet an ever-growing list of IT requirements, which includes process automation, self-service, and identity-related administration and governance capabilities. Hitachi ID offers a well-integrated all-in-one IAM package that can meet these enterprise business requirements.

Apr 16, 2020

Executive View: Sophos Intercept X - 80227

Warwick Ashford

Sophos Intercept X is an endpoint security solution that is powered by a deep learning neural network, anti-exploit techniques, and anti-ransomware technology to provide advanced detection for all types of threats, especially ransomware, fileless/in-memory malware and malware that exploits unknown vulnerabilities in operating systems and application software. Sophos Intercept X also…

Apr 14, 2020

Whitepaper: Enhanced Privilege Access Management Solutions - 80176

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Changing business practices, agile software development and digital transformation has meant that PAM solutions need an enhanced set of features to reduce the risk of privileged accounts being hijacked in this more challenging operating environment.

Apr 09, 2020

Executive View: Indeed Certificate Manager - 80178

Alexei Balaganski

Indeed Certificate Manager is a platform for centralized management of enterprise public key infrastructures. Its modular, hardware-agnostic architecture and innovative remote management capabilities help reduce management costs, improve productivity, and strengthen your company’s overall security and compliance posture.

Apr 09, 2020

Leadership Brief: Managing Non-Human Identities - 80278

Warwick Ashford

As digital transformation gains momentum, new types of digital identity are emerging and growing rapidly. Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. This Leadership Brief looks the importance of managing non-human and human identities in the same way, and how to approach achieving that.

Apr 07, 2020

Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Utilities & Energy - 80265

Anne Bailey

The energy and utilities sector will need to adapt to new industry trends of digitalization, decentralization, and the advent of a new type of consumer: the prosumer. Smart grids are a more efficient offering for energy management, and new business models beyond the prosumer will require the partnership of different actors in the industry. Emerging technologies like artificial…

Apr 03, 2020

Leadership Brief: The Information Protection Life Cycle and Framework: Control Access - 80372

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the third in the series introducing the…

Apr 03, 2020

Executive View: Vectra Cognito - 80230

Warwick Ashford

Vectra Cognito is a Network Detection and Response (NDR) platform supported by threat research and Artificial Intelligence (AI) in the form machine learning (ML) and Deep Learning for analyzing enterprise network traffic on premise and in the cloud to detect and respond to malicious activity by adversaries, with threat investigation and threat hunting capability.

Apr 03, 2020

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80400de

Matthias Reinwarth

Transparente, datenzentrische Sicherheit in nicht vertrauenswürdigen Infrastrukturen. Zuverlässige Kontrolle und Überwachung von sensiblen Informationen, die in öffentlichen Clouds und Kollaborationswerkzeugen (z.B. Microsoft Office 365, SharePoint, Teams) gespeichert sind. Virtualisierung, Verschlüsselung und Aufteilung von Daten, um eine sichere und bequeme…

Mar 31, 2020

Leadership Brief: The Information Protection Life Cycle and Framework: Acquire and Assess - 80371

John Tolbert

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the second in the series introducing the…

Mar 26, 2020

Executive View: IRM-Prot-On - 71313

Anne Bailey

Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Groupo CMC is a strong provider of enterprise information protection services. The solution enables document and file protection, permissions management, and information classification.

Mar 26, 2020

Executive View: Micro Focus Access Manager - 80311

Graham Williamson

The Micro Focus Access Manager counts amongst the established and mature solutions for Web Access Management and Identity Federation. Micro Focus is continuously improving the product, leveraging new technology and remaining responsive to client requirements for an agile and comprehensive solution to their access control requirements. Micro Focus Access Manager is a solution well-suited…

Mar 26, 2020

Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80400

Matthias Reinwarth

Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office 365, SharePoint, Teams). Virtualization, encryption and fragmentation of data enabling secure and convenient collaboration for multi cloud, on-premises and hybrid storage environments and true data…

Mar 26, 2020

Executive View: CyberArk Privilege Cloud - 80122

Paul Fisher

Privileged Access Management (PAM) has evolved into a set of technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation and industrial change. CyberArk Privilege Cloud is an as-a-service solution designed to protect and control privileged access across on-premises, cloud and hybrid infrastructures. It is part of a suite of…

Mar 24, 2020

Leadership Brief: Typical Risks and Pitfalls for IGA Projects - 72580

Warwick Ashford

As the number and types of digital identities proliferate in the digital era and the number of data protection regulations around the world continues to grow, the need for an effective Identity Governance & Administration (IGA) capability has never been greater. This leadership brief outlines common risks and pitfalls of enterprise IGA projects and how they can be avoided.

Mar 24, 2020

Whitepaper: AI, Machine learning and Privileged Access Management - 80120

Paul Fisher

Choosing a PAM solution has become a complex, and potentially time consuming, decision for modern organizations but one they must get right. If trends such as customer identities or privileged accounts used by DevOps are to be managed securely, then the final purchasing decision rests on carefully selecting solutions with the right feature sets. New technologies such as machine learning…

Mar 24, 2020

Executive View: iWelcome IDaaS and CIAM - 80328

John Tolbert

iWelcome provides a mature Identity-as-a-Service platform with extensive support for B2C (Customer Identity & Access Management – CIAM) and B2B use cases with interfaces for end-users as well as app developers. As an EU-based company, iWelcome strives to fulfill regional requirements such as interoperability with various national IDs and GDPR compliance, and as such provides…

Mar 19, 2020

Leadership Brief: Introduction to the Information Protection Life Cycle and Framework - 80370

John Tolbert
Mar 19, 2020

Leadership Compass: Fraud Reduction Intelligence Platforms - 80127

John Tolbert

This report provides an overview of the market for Fraud Reduction Intelligence Platforms and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Fraud Reduction Intelligence Platform solutions.

Mar 17, 2020

Leadership Brief: Beyond Marketing: The Future of Customer Interaction - 80292

Roland Bühler

Customer interaction is much more than marketing—it comprises all touchpoints during the customer journey. And the borders are becoming more and more blurry as many areas, such as marketing, sales, service, support, and consultancy are part of customer experience (CX). Furthermore, technological aspects shape the future of customer interaction: artificial intelligence and the…

Mar 16, 2020

Buyer's Compass: API Management and Security - 80215

Alexei Balaganski

The complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for implementing consistent governance and security along the whole API lifecycle.

Mar 12, 2020

Executive View: Exabeam Security Management Platform - 80001

Alexei Balaganski

Exabeam is a highly modular platform for collecting, storing, managing and correlating security events across multiple IT systems, both on-premises and in the cloud, with integrated orchestration and automation capabilities to improve analysts’ productivity. It can augment an existing SIEM or completely replace it.

Mar 10, 2020

Executive View: Atos DirX Identity - 80166

Martin Kuppinger

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong risk-based Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of customization and added a modern, responsive user interface together with RESTful interfaces.

Mar 05, 2020

Leadership Brief: What to Consider When Evaluating Decentralized Identity? - 80451

Anne Bailey

Decentralized identity solutions that meet a range of enterprise use cases are on the market. Being a discerning consumer means knowing the right questions to ask. This Leadership Brief guides you through the critical aspects of decentralized identity solutions that are relevant to enterprise adoption.

Mar 05, 2020

Executive View: Informatica CLAIRE Engine - 80391

Anne Bailey

Intelligent data management allows enterprises to identify, understand, and act upon trends in enterprise data and metadata, and is an essential addition to the digitized organization’s toolkit. Informatica’s CLAIRE is a AI and machine learning engine which powers its intelligent data platform that is built into Informatica’s data management products, and is a strong…

Mar 05, 2020

Leadership Brief: Find Your Route from SIEM to SIP and SOAR - 80008

Alexei Balaganski

Security Information and Event Management (SIEM) platforms have been a key part of many enterprises’ cybersecurity infrastructures for over a decade. However, facing the growing number and sophistication of cyber threats, even the largest security operations centers built around them fail to respond to attacks in time. Are SIEMs a thing of the past already? This Leadership Brief…

Mar 04, 2020

Advisory Note: Business Continuity in the age of Cyber Attacks - 70361

Warwick Ashford

Business continuity and cyber security remain largely in separate siloes. But changes in the IT and cyber threat landscapes mean there is an urgent need for organizations to alter their approach. This leadership brief identifies why there needs to be closer alignment and integration between business continuity and cyber security teams, and provides recommendations on how to achieve this…

Mar 03, 2020

Leadership Brief: 10 Top Trends in IAM - 80335

Warwick Ashford

Digital identities are at the core of Digital Transformation, Information Security and Privacy. It has never been more important for enterprises to ensure they have the capability to manage identities effectively in a rapidly changing business, regulatory and IT environment. This Leadership Brief looks at the main trends to help businesses evolve their Identity and Access Management (IAM)…

Feb 28, 2020

Market Compass: Decentralized Identity: Blockchain ID & Self-Sovereign Identity Solutions - 80064

Anne Bailey

The KuppingerCole Market Compass provides an overview of product or service offerings in a certain market segment.  This Market Compass covers decentralized identity, specifically Blockchain Identity and Self-Sovereign Identity (SSI) solutions. This is a very dynamic space filled with visionary and innovative vendors that are applying decentralized identity to real enterprise use…

Feb 26, 2020

Leadership Brief: Explainable AI - 80362

Anne Bailey

One of the largest barriers to widespread machine learning (ML) adoption is its lack of explainability. Most ML models are not inherently explainable on a local level, meaning that the model cannot provide any reasoning to support individual decisions. The academic and private sectors are very active in developing solutions to the explainability issue, and this Leadership Brief introduces…

Feb 26, 2020

Advisory Note: Trends in Privileged Access Management for the Digital Enterprise - 71273

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, agile software development and digital transformation has meant that privileged accounts have become more numerous and…

Feb 26, 2020

Executive View: Google's Cloud Identity - 80326

Paul Fisher

Identity as a Service (IDaaS) is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud based IAM services to support the growth in cloud-based applications in the enterprise. Google’s Cloud Identity provides access to many popular cloud applications and offers some endpoint management features.

Feb 26, 2020

Leadership Brief: Cybersecurity Trends & Challenges 2020 - 80502

Christopher Schuetze

2019 already has been a challenging year in cybersecurity. There have (again) been many severe cyberattacks and breaches, and there is no hope that this might change in 2020. Cyberattacks will continue to increase in frequency and perhaps severity, and the cyber risks to hyperconnected businesses will continue to grow. With everything and everyone being connected, the attack surface is…

Feb 26, 2020

Advisory Note: Cyber Risk – Choosing the Right Framework - 80237

Mike Small

As organizations undergo Digital Transformation the business impact of cyber risks increases.  It is essential that organizations manage these risks.  There are several frameworks that organizations could adopt to help them to manage these risks, but they need guidance to choose which is right for them.  This report describes the main cyber risk management frameworks and…

Feb 24, 2020

Leadership Brief: 5G Impact on Organizations and Security - 80238

Mike Small

5G is the next generation of cellular mobile communications. It will provide the capacity and connectivity required to industrialize IoT, Smart Cities and Smart Manufacturing. This report explains what it is and its likely impact on organizations and their security.

Feb 18, 2020

Leadership Brief: Leveraging Identity Fabrics on your way towards cloud based IAM - 80501

Matthias Reinwarth
Feb 13, 2020

Whitepaper: Success in Digital Finance: Doing Digital Identities right for a positive Digital Experience - 80164

Martin Kuppinger

Success in Digital Finance is not a miracle, but a combination of having the right offerings and services, and delivering a seamless and modern digital experience to the customers. Digital Identities take a central role in such digital experience, from the identity verification and digital onboarding process to recurring authentication and efficient processes based on “electronic…

Feb 13, 2020

Executive View: ESET Enterprise Inspector - 80192

John Tolbert

Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows with future plans to cover Linux, and Mac clients, collecting and analyzing information to help security analysts determine if malicious activities have occurred. The solution also allows for pre-configured remediation actions to be executed when certain conditions are met.

Feb 12, 2020

Market Compass: Web Application Firewalls - 70324

Richard Hill

The KuppingerCole Market Compass provides an overview of the product or service offerings in a specific market segment. This Market Compass covers Web Application Firewall (WAF) solutions that span the spectrum of on-premises, cloud, and hybrid IT delivery models.

Feb 11, 2020

Executive View: PlainID Policy Manager - 80315

Alexei Balaganski

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access  across  all identities, systems, and applications with the help of centrally managed business-focused policies.

Jan 31, 2020

Executive View: PingAccess - 80323

Richard Hill

With the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management, whether on-premises or in the cloud. Combining PingFederate with PingAccess offers a complete Web Access Management solution.

Jan 31, 2020

Leadership Brief: Assessing the Maturity of Core AI Disciplines - 80390

Anne Bailey

There are several disciplines that contribute to the Artificial Intelligence field: Natural Language Processing, Machine Learning, Machine Reasoning, and others. This Leadership Brief addresses their varying maturity levels for enterprise use.

Jan 30, 2020

Advisory Note: Why High-Profile Digital Transformation Initiatives Fail: How to do better - 80289

Warwick Ashford

A growing number of organizations are adapting their products, processes and strategies to capitalize on the benefits of digital technology, but some high-profile Digital Transformation (DX) initiatives have failed despite heavy investments. This Advisory Note looks at some of the main reasons DX initiatives fail and provides recommendations for avoiding these common pitfalls to ensure DX…

Jan 30, 2020

Advisory Note: KRIs and KPI for Cyber Security - 80239

Mike Small

This report provides selected Key Risk Indicators (KRI) for the area of Cyber security. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then can be used in IT management and corporate management. 

Jan 29, 2020

Executive View: Cleafy Advanced Threat Detection & Protection - 80309

Alexei Balaganski

Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection against advanced targeted attacks for unmanaged endpoints, it can prevent payment fraud, transaction tampering, credential theft, and other risks.

Jan 27, 2020

Executive View: Callsign Intelligence Driven Authentication - 80174

Martin Kuppinger

Callsign is a provider of an identity platform that integrates consumer onboarding, authentication, and fraud management in a well-thought-out manner. In contrast to other solutions, all capabilities are tightly integrated. The platform uses AI/ML for risk analysis and supports passive and continuous authentication. It is feature-rich and easy to use, with flexible support for creating,…

Jan 23, 2020

Executive View: Onegini Connect - 80168

John Tolbert

Onegini provides a compelling no-code cloud-delivered solution for Consumer Identity and Access Management (CIAM) and B2B IAM. Onegini is headquartered in the Netherlands, is expanding across Europe, and has global ambitions. They have expertise in EU regulations such as GDPR, PSD2 and other industry-specific regulations. They are positioning their product as a CIAM solution for…

Jan 23, 2020

Leadership Brief: Six Key Actions to Prepare for CCPA - 80353

Mike Small

From January 1st, 2020, when the California Consumer Privacy Act (CCPA) came into force, the requirements for managing personal data have changed.  This report identifies six key actions that IT needs to take to prepare for compliance.

Jan 23, 2020

Leadership Brief: Top Ten Trends in Cybersecurity - 80336

Paul Fisher

This report outlines 10 important trends and technologies in cybersecurity that KuppingerCole believes will shape security policies and solutions choice for organisations in the years ahead. 

Jan 22, 2020

Whitepaper: Healthcare IAM: Enhance the Clinical Workflow - 80163

Martin Smith

The Healthcare sector faces the common challenges of all businesses today: digital transformation, cyber-security, and increasingly stringent regulations. But Healthcare also has unique challenges because clinical operations depend on continual access to customers’ most sensitive personal information and require life-or-death decisions on a daily basis. This environment demands…

Jan 21, 2020

Executive View: Informatica: Customer 360 - 80290

Roland Bühler

When optimizing customer centricity and customer engagement, data is an important resource. To ensure an ideal customer experience, various challenges across the customer lifecycle must be solved. Informatica’s Customer 360 solution is designed to manage data across the entire customer lifecycle in a highly flexible way to meet various customer scenarios.

Jan 20, 2020

Executive View: Apigee Edge API Management Platform - 80307

Alexei Balaganski

Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to monitoring and securing live endpoints – everything is managed centrally across on-premises, cloud-based and hybrid environments.

Jan 17, 2020

Leadership Brief: Robotic Process Automation - 80333

Warwick Ashford

Robotic Process Automation (RPA) is a type of automation technology with the potential to transform the way businesses operate by automating manual tasks within business processes by implementing (software) “robots” to perform these tasks instead of humans. This leadership brief looks at the most appropriate applications of RPA and the biggest potential business benefits.

Jan 16, 2020

Executive View: Oracle Identity Governance - 80157

Richard Hill

As the market, technology, and regulation forces change, Oracle offers a comprehensive Identity Governance solution that can meet the ever evolving enterprise needs. Oracle Identity Governance (OIG) addresses compliance at scale within the more modern cloud environments.

Jan 15, 2020

Executive View: Microsoft Azure AI Platform - 80233

Anne Bailey

The Microsoft Azure AI platform provides a comprehensive enterprise solution for designing and implementing customized AI solutions. The cloud and hybrid deployment options, modular AI services, and management tools make the platform a strong choice for an AI-on-demand solution.

Jan 15, 2020

Executive View: Saviynt Security Manager for Enterprise IGA - 80325

Richard Hill

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functionality. Designed to be deployed as a cloud, hybrid, or on-premise solution, the Saviynt Security Manager for Enterprise IGA helps customers demonstrate assured compliance using their access governance and risk…

Jan 14, 2020

Executive View: AWS Security Analytics Solutions - 80220

Alexei Balaganski

AWS provides a comprehensive suite of services to monitor for threats, misconfigurations and compliance violations across its portfolio, with all security alerts aggregated, organized and prioritized within AWS Security Hub – an extensible cloud security and compliance management platform.

Jan 13, 2020

Leadership Brief: IAM for Robotic Process Automation: How to Avoid Security Challenges - 80383

Martin Kuppinger

Robotic Process Automation (RPA) is one of the trending topics in today’s IT environments. RPA promises to automate manual tasks within business processes by implementing (software) “robots” that perform these tasks instead of humans. Such software robots must have a digital identity, and the access rights of these robots must be kept under control for enforcing the…

Jan 10, 2020

Executive View: F-Secure Rapid Detection & Response - 80182

John Tolbert

Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security analysts determine if malicious activities have occurred. The solution also allows for pre-configured remediation actions to be executed when certain conditions are met and offers F-Secure expert…

Jan 06, 2020

Leadership Brief: Radically Lean: NoOps and Serverless Computing - 80305

Warwick Ashford

Computing is continually getting leaner and becoming more like a utility as it moves increasingly further away from on-premise physical hardware by abstracting IT environments away from the underlying infrastructure. This trend towards NoOps computing that eliminates the need for operational teams to manage software and infrastructure has seen the introduction of Virtual Machines,…

Jan 06, 2020

Executive View: Informatica Data Privacy Management - 80276

Warwick Ashford

Informatica Data Privacy Management is an AI-enhanced unified data security platform for identifying, analyzing, quantifying and mitigating risk related to sensitive data to enable businesses to get the most out of company data and digital transformation processes without exposing the enterprise to increased risk. Data Privacy Management includes tools to identify and monitor sensitive…

 2019

top  

Date Title Price
Dec 19, 2019

Executive View: Sovrin Network Self-Sovereign Identity - 80112

Anne Bailey

Expectations are changing for Identity and Access Management. Users demand control over their personal information, and enterprises need to fundamentally rethink their relationship to personal customer data in the wake of GDPR and CCPA. Self-Sovereign Identity (SSI) from the Sovrin Network allows enterprises to streamline their collection of identity information, sign-on options for…

Dec 18, 2019

Leadership Brief: Optimizing your Cybersecurity Spending - 80260

Christopher Schuetze

Prioritizing cybersecurity portfolio expenditures can be a very complex process. At best, the investments should be as low as needed but high enough to be prepared for future attacks and data breaches. In order to invest sensibly, companies must be aware of the challenges and trends. This Leadership Brief describes a few top-level challenges and recommendations when planning your 2020…

Dec 16, 2019

Leadership Brief: Distributed Decentralized AI: Create, Share, Scale, Monetize - 80272

Anne Bailey

Using artificial intelligence services in combination can offer heightened results, whether it be in accuracy, robustness, customization, or geographical spread. Distributed, decentralized AI is a dynamic research space that is rapidly producing enterprise solutions. However, there are a variety of methods, environmental drivers, and use cases associated with decentralized AI. This…

Dec 16, 2019

Advisory Note: Emerging Technologies Fostering Digital Business Innovation: Finance Industry - 80264

Anne Bailey

The relative success of FinTechFinTechs drives the conversation surrounding finance and emerging technologies, and their products are capturing the hearts and minds of consumers. But despite the disruptive reputation of AI, blockchain, and IoT, FinTechs are not competing in a dramatically different way than legacy financial institutions. FinTechs provide the same services, but choose to…

Dec 13, 2019

Leadership Brief: AI in the Legal Industry: The Basics in a Nutshell - 80269

Anne Bailey

Artificial Intelligence (AI) applications in the legal industry already range from naissent to mature. However, the legal implications of such applications and trends in global regulation should be considered when assessing the suitability of any AI application. This leadership brief offers an overview of the current state of AI in the legal industry.

Dec 11, 2019

Advisory Note: Future of Identity Management - 71303

Warwick Ashford

Digital identities are at the core of Digital Transformation, Information Security and Privacy, and therefore it has never been more important for enterprises to ensure they have the capability to manage identities effectively and efficiently in a rapidly changing business, regulatory and IT environment. This Advisory Note looks at the main trends and challenges to help businesses…

Dec 11, 2019

Whitepaper: CCPA: The Need for Data-Centric Security - 80136

Martin Kuppinger

CCPA is the latest in a series of global privacy regulations. It comes with new requirements for dealing with personal data and is accompanied by severe penalties. Thus, businesses must take appropriate action to comply with CCPA. While handling consent and opt-outs are at the forefront, successful mitigation of risks starts with data-centric security – it is about understanding…

Dec 10, 2019

Executive View: Axiomatics APS - 80314

Richard Hill

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently both on-premises and in the cloud.

Dec 02, 2019

Leadership Compass: API Management and Security - 70311

Alexei Balaganski

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements in the most efficient way. We examine the complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise and identify the vendors, their products,…

Nov 28, 2019

Whitepaper: Digital Transformation for Business Enablement Requires a Modern Identity Fabric - 80165

Martin Kuppinger

Digital Identities are at the heart of the Digital Transformation. Without the ability to unify identities and manage the access of everyone to everything  to every digital service effectively, transformation initiatives will fail. Business can’t afford to implement these capabilities on a per service basis – this will increase cost, slow down time-to-market and lead to…

Nov 25, 2019

Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170

Martin Kuppinger

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide identity services that can be consumed by digital services. Focus is shifting from modern UIs for managing existing applications to APIs that provide the identity services. Modern Identity Fabrics must serve both…

Nov 22, 2019

Buyer's Compass: Decentralized Identity - 80050

Anne Bailey

Blockchain identity solutions are developing into a viable segment in IAM. Because the market segment is still very heterogeneous and gaining maturity, selecting a vendor to provide blockchain ID solutions should be done with care. This KuppingerCole Buyer’s Compass will equip you with key criteria and questions to help select an appropriate vendor.

Nov 21, 2019

Executive View: IBM Cloud Pak for Security - 80172

Martin Kuppinger

IBM Cloud Pak for Security is an innovative solution that can run in a variety of deployment models that supports security analytics and incident response for today’s complex, hybrid and multi-cloud environments. It provides a consolidated view on security and threat information across a range of sources from IBM and other vendors. It supports federated search across that data, plus…

Nov 19, 2019

Executive View: Identity Automation’s RapidIdentity Solution - 80028

Martin Kuppinger

Identity Automation’s RapidIdentity is an Identity and Access Management (IAM) solution that targets the specific requirements of healthcare organizations. Beyond delivering standard IAM capabilities, RapidIdentity helps healthcare organizations access a unified solution instead of relying on disparate point solutions. RapidIdentity’s cohesive suite of tools reduces…

Nov 18, 2019

Leadership Brief: Top 3 Initiatives to Improve CX and Customer Journeys - 80293

Roland Bühler

When it comes to digital marketing, companies of all business sectors try to constantly improve customer experience (CX) and customer journeys. In many cases, there is a single focus on technological topics, such as machine learning or conversational interfaces. But, is technology the key to success? This leadership brief gives an overview of relevant topics regarding optimization of CX…

Nov 18, 2019

Executive View: IBM Decentralized Identity - 80099

Anne Bailey

The IBM Decentralized Identityplatform is both an enterprise solution for individual companies and the foundation of a global decentralized identity ecosystem. IBM’s decentralized identity solution has prioritized interoperable protocols rooted in Hyperledger Indy and Aries to provide secure exchange of information. IBM’s decentralized identitysolution can help enterprises…

Nov 14, 2019

Whitepaper: Grundlagen des Privileged Access Managements - 80332

Paul Fisher

Privileged Access Management (PAM) ist einer der wichtigsten Bereiche des Risikomanagements und der Datensicherheit für jedes Unternehmen. Privilegierte Konten werden traditionell an Administratoren, aber auch weitere Benutzer innerhalb eines Unternehmens vergeben, um auf kritische Daten und Anwendungen zuzugreifen. Doch die sich ändernden Unternehmensabläufe und die…

Nov 13, 2019

Leadership Compass: Identity as a Service (IDaaS) IGA - 80051

Martin Kuppinger

An emerging market, IDaaS IGA is largely characterized by cloud-based delivery of Identity Provisioning and Access Governance capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for traditional IGA use cases, helping IDaaS IGA to increasingly become the preferred choice of customers for IAM…

Nov 13, 2019

Executive View: ForgeRock Access Management - 80319

John Tolbert

ForgeRock Access Management is a full-featured Identity and Access Management (IAM) system, and a primary component in their Identity Platform.  It provides numerous authentication options, an intelligent adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards development, and that is reflected by…

Nov 11, 2019

Whitepaper: Modern B2B Identity Management - 80135

Richard Hill

With Business-to-Business (B2B) transformation comes digital initiatives to better connect B2B customer systems and supply chain services, and in doing so, Identity and Access Management (IAM) becomes a crucial consideration. IAM shares standard features that can be used in B2E or B2C use cases as well, but IAM in the B2B context has specific requirements that need to be addressed. B2B…

Nov 11, 2019

Architecture Blueprint: Identity and Access Management - 72550

Matthias Reinwarth

IAM has been one of the central security infrastructures for many years. The changing role and importance of digital identities leads to fundamental changes in IAM architectures. The challenges for a future proof IAM are complex, diverse and sometimes even conflicting. Organization demand for a blueprint to design and implement efficient and durable IAM architectures that meet current and…

Nov 08, 2019

Executive View: IBM MaaS360 with Watson - 79067

Warwick Ashford

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops, desktops, wearables, and the Internet of Things (IoT). With an open platform for integration with existing apps and infrastructure, IBM MaaS360 is backed by around-the-clock customer support and services, and…

Nov 07, 2019

Leadership Compass: Infrastructure as a Service – Global Providers - 80035

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Nov 07, 2019

Whitepaper: Understanding Privileged Access Management - 80302

Paul Fisher

Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. Privileged accounts have traditionally been given to administrators and other users within an organization to access critical data and applications. But, changing business practices and digital transformation has meant that privileges accounts have become more…

Nov 06, 2019

Buyer's Compass: Endpoint Detection & Response (EDR) - 80213

John Tolbert

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help detect and remediate these kinds of threats. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments.…

Nov 04, 2019

Executive View: Atos DirX Access - 80167

Martin Kuppinger

Atos DirX Access is a mature solution for Access Management, covering the full range of targets from legacy web applications to modern SaaS services. It comes with comprehensive support for modern standards, including FIDO 2.0. A specific strength is the support for specific capabilities such as session state sharing across servers, Dynamic Authorization Management, or integrated User…

Oct 31, 2019

Executive View: Ping Identity Data Governance - 70295

Richard Hill

In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply with the growing number of privacy regulations. PingDataGovernance provides the capabilities to control how data is accessed from data stores as well as giving data protection at the API layer.

Oct 30, 2019

Executive View: One Identity Safeguard Suite - 80074

Paul Fisher

Privileged Access Management (PAM) has evolved into a set of crucial technologies that addresses some of the most urgent areas of cybersecurity today against a backdrop of digital transformation. One Identity Safeguard Suite is a PAM solution that uses a modular approach across password management, session management and privilege account analytics.

Oct 28, 2019

Executive View: Microsoft Azure Active Directory - 79077

Richard Hill

From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as cloud services or IDaaS (Identity as a Service). Microsoft Azure Active Directory (Azure AD) provides Directory Services, Identity Federation, and Access Management from the cloud in a single…

Oct 25, 2019

Leadership Brief: Hype vs. Reality in AI & ML: Where are the Concrete Business Benefits? - 80271

Anne Bailey

The conversation on artificial intelligence and machine learning is still largely driven by hype. But concrete business benefits exist for narrow AI solutions, and it is time to separate hype from reality. This leadership brief identifies the characteristics of successful AI use cases, provides examples across multiple industries and business departments, and provides recommendations on…

Oct 25, 2019

Leadership Brief: Defending Against Ransomware - 80235

John Tolbert

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layered defense is the best strategy. Take steps now to reduce the likelihood of falling victim to it. Make sure you have good offline backups if you get hit. Don’t give up and pay the ransom.

Oct 24, 2019

Leadership Brief: Penetration Testing Done Right - 70359

Paul Simmonds

Penetration Testing should be a key part of any business's assurance process, providing a level on independent testing that they are not wide open to hackers or other malicious actors; however, a penetration test is not a simple “off-the-shelf” test and needs careful design and planning.

Oct 23, 2019

Leadership Brief: Do I need Network Threat Detection & Response (NDTR)? - 80296

John Tolbert

NTDR products/services are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? We’ll look at what NTDR products do, reasons to consider NTDR, and some high-level evaluation criteria regarding NTDR products.

Oct 17, 2019

Whitepaper: Privileged Access Management requirements for Small to Medium Size Businesses (SMB) - 80123

Paul Fisher

Privileged Access Management (PAM) is fast becoming one of the most important areas of Identity and Access Management (IAM). Privileged accounts are given to admins and other users within an organization to access critical data and applications. However, if these are not managed securely, SMBs can find themselves having accounts still open for people who have left or for people who no…

Oct 15, 2019

Executive View: Optimal IdM - Optimal Cloud - 80162

Richard Hill

For many organizations, the adoption of cloud services has become a strategic imperative which includes moving security services to the cloud as well. Optimal IdM provides a comprehensive identity management solution that provides federation, single sign-on, and strong two-factor authentication all within a private cloud.

Oct 09, 2019

Executive View: Curity Identity Server - 80159

John Tolbert

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to deploy necessary new features while shielding users from complexity.

Oct 08, 2019

Executive View: Devolutions PAM Solution - 80070

Martin Kuppinger

Devolutions provides a PAM solution targeted at SMB customers that provides a good baseline set of PAM capabilities and easy to deploy and operate. The solution comes with a password vault, account discovery capabilities, and strong remote access features. While some of the more advanced capabilities of the leading-edge PAM solutions are lacking, the product fits well to the target group…

Oct 07, 2019

Executive View: AWS Control Tower - 80219

Mike Small

Managing access to applications, systems and resources is a key task for any organization and the hybrid IT deployment model has made this even more complex.  One area of concern is managing administrative access – administration is an essential process, but the administrator accounts provide the keys to the kingdom. This report describes how AWS Control Tower helps to…

Sep 26, 2019

Leadership Compass: Consumer Authentication - 80061

John Tolbert

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions.

Sep 24, 2019

Executive View: Tremolo Security – A Different Approach - 80160

Graham Williamson

It’s time to consider a different way to manage and use identity information. We tend to deploy identity management suites and change our processes to suit. But this can constrain us and restrict our agility in deploying identity management services. Tremolo Security breaks the mold and asks us to focus on the task to be performed, and then to deploy an optimal solution.

Sep 20, 2019

Leadership Brief: Responding to Cyber Incidents - 80209

Mike Small

The overwhelming majority of organizations now depend upon online services to support their business and this exposes them to cyber security risks. While most have security protection technologies in place few have a plan for how they would respond to a cyber incident. Today, the question is not if your organization will suffer a cyber incident but when - and this makes it essential to…

Sep 18, 2019

Advisory Note: Demystifying the Blockchain: What Makes a Blockchain Useful to a Firm? - 80301

Anne Bailey

Blockchain technology – as the hype advertises – can be a value-adding solution for businesses and individuals. However, it is necessary to separate blockchain’s functionality from its fame before a firm can find an appropriate use case. This report deconstructs the main features that make blockchains unique from traditional database software and identify the ways that…

Sep 17, 2019

Executive View: Oracle Data Safe - 80076

Alexei Balaganski

Oracle Data Safe is a cloud-based service that improves Oracle database security by identifying risky configuration, users and sensitive data, which allows customers to closely monitor user activities and ensure data protection and compliance for their cloud databases.

Sep 17, 2019

Whitepaper: Ein schlanker Ansatz für Identity & Access Governance - 80107

Martin Kuppinger

Identity & Access Governance ist ein Muss für jedes Unternehmen. Leider ist die Art und Weise, wie es heute gehandhabt wird, ineffizient und schwerfällig. Es ist an der Zeit, die Ansätze zu Identity & Access Governance zu überprüfen und schlanke Konzepte umzusetzen, die Unternehmen helfen, sich effizient an die Vorschriften zu halten und gleichzeitig…

Sep 17, 2019

Whitepaper: A Lean Approach on Identity & Access Governance - 80048

Martin Kuppinger

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean concepts that help businesses to comply in an efficient manner, while also effectively mitigating business risks that derive from excessive…

Sep 17, 2019

Advisory Note: The Future of Cryptocurrencies - 80263

Anne Bailey

Cryptocurrencies remain a speculative asset, but the launch of Facebook’s Libra could upset the status quo. There are many business opportunities which would stem from widespread adoption of cryptocurrencies, but also many challenges including data protection and tracking criminal activities. The relationship between government regulators, financial institutions, and…

Sep 13, 2019

Leadership Brief: PSD2: New business opportunities and risks - 80303

John Tolbert

The Revised Payment Service Directive (PSD2) Regulatory Technical Specifications (RTS) take effect this autumn across the EU. The directive will provide new benefits and rights for consumers, and create new business opportunities in the financial sector. However, new opportunities also imply new risks.

Sep 12, 2019

Leadership Brief: Top Cyber Threats - 72574

Christopher Schuetze

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them.

Sep 11, 2019

Leadership Brief: How to set up your IAM organization - 72548

Christopher Schuetze

A technology-oriented approach to identity and access management (IAM) is becoming less important as identities become more diverse and access requirements grow. As a result, CISOs and IAM Security Officers are struggling to promote and develop the maturity of skills in the silos of technical identity management services. Adapting the structure of IAM organizations so that they are based…

Sep 11, 2019

Leadership Brief: How to get a Grip on OT Cybersecurity - 72573

Richard Hill

With the increasing demand for more connectivity, Operational Technology (OT) organizations will need to become more interconnected with IT over time. The convergence of IT and OT is inevitable, so get started now on getting a grip on your OT Cybersecurity.

Sep 10, 2019

Whitepaper: Why Modern Enterprise IAM Must Be Rearchitected: Build Your Case for Containerized IAM and IDaaS - 80044

Martin Kuppinger

IT paradigms are under change. Containerized solutions, building on Microservice Architectures and exposing well-defined sets of APIs, are rapidly becoming the new normal. Such architectures provide clear benefits when used for IAM, allowing customers to shift from lengthy deployments of complex IAM tools to an agile deployment and operations approach, based on continuous innovation.…

Sep 10, 2019

Executive View: Akamai Zero Trust Security - 80054

Alexei Balaganski

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Trust, making it safe, scalable and easy to manage – delivered entirely from the cloud.

Sep 09, 2019

Executive View: Uniken REL-ID Security Platform - 80045

Roland Bühler

When it comes to omni-channel and multi-device marketing and commerce, authentication is an important topic. The challenge is to achieve both security and the user experience as part of an integrated customer journey. UNIKEN REL-ID is a security platform that addresses that challenge across various channels, including mobile, web, voice, and chat.

Sep 04, 2019

Executive View: AdNovum NEVIS Security Suite - 80066

John Tolbert

A solution for managing secure access to online services, protected assets and sensitive data. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Sep 03, 2019

Executive View: Oracle Identity Cloud Service - 80156

Mike Small

Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications.  While this provides many benefits it also creates challenges around security and administration.  Managing identity and access in a consistent manner across all IT services, irrespective of how they are delivered, is key to meeting these challenges.  This report…

Sep 02, 2019

Whitepaper: Oracle Identity Cloud Service: Identity for Business Applications in the Hybrid IT - 80155

Martin Kuppinger

Today, most businesses are using hybrid IT, with a mix on-premises and cloud applications and services. And hybrid IT is here to stay, given that many of the legacy applications are hard and costly to migrate. Thus, Identity Services must work well for all these applications and the entire hybrid IT  infrastructure. While they increasingly run from the cloud, as IDaaS (Identity as a…

Sep 02, 2019

Executive View: IBM Cloud Identity - 79065

Paul Fisher

IDaaS IAM is a fast growing market, characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. The promise of improved time-to-value proposition is prioritizing adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS to dominate new IAM purchases globally. This report is an…

Sep 02, 2019

Leadership Brief: Identity Fabrics - Connecting Anyone to Every Service - 80204

Matthias Reinwarth

Digital technologies are now influencing and changing all areas within organizations. This is fundamentally reshaping the way communication takes place, how people work together and how value is delivered to customers. Ever-changing application and infrastructure architectures reflect the requirements of the evolving challenges that face companies, government agencies and educational…

Aug 30, 2019

Leadership Compass: Identity API Platforms - 79012

Richard Hill

Identity API Platforms expose APIs to capabilities ranging from IAM to Federation and more while supporting both the agile and DevOps paradigms that address the more complex IT environments seen today. This Leadership Compass will give you an overview and insights into the Identity API Platform market; providing you a compass to help you find the product that you need.

Aug 29, 2019

Whitepaper: KRITIS - Kritische Infrastrukturen verstehen und schützen - 80194

Matthias Reinwarth    Christopher Schuetze

Organisationen oder Institutionen, die für die Öffentlichkeit wichtig sind, werden als Kritische Infrastrukturen (KRITIS = "Kritische Infrastrukturen") bezeichnet. Als solche unterliegen sie umfassenden und strengen Richtlinien, bestehend aus Gesetzen und Vorschriften. Ihr Ausfall oder ihre erhebliche Beeinträchtigung kann zu anhaltenden Versorgungsengpässen,…

Aug 29, 2019

Whitepaper: KRITIS – Understanding and protecting critical infrastructure - 80065

Matthias Reinwarth    Christopher Schuetze

Organizations or institutions that are essential for the public are called Critical Infrastructure (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic…

Aug 29, 2019

Executive View: Micro Focus® Data Protector - 80193

Mike Small

Ensuring the continuity of IT services is an essential component of business continuity planning. Organizations typically use data protection solutions that take copies of the IT service data which can be used to restore the service when needed. Most organizations now have a hybrid IT environment with a cloud first approach to choosing new applications and data protection solutions need…

Aug 29, 2019

Executive View: Service Layers Managed IAM - 80129

Martin Kuppinger

Service Layers delivers a comprehensive managed IAM solution, based on best-of-breed IAM products. The solution is well-architected, following modern concepts including DevOps, container-based deployments, and microservices architectures. It thus can be run and operated on various infrastructures. Service Layers provides full operations support across global regions. With this solutions,…

Aug 22, 2019

Whitepaper: Identitäten richtig handhaben - damit Ihre digitale Geschäftsstrategie erfolgreich wird - 80297

Martin Kuppinger

Registrierung und Authentifizierung sind die ersten Schritte, die erfolgen, wenn ein Nutzer Kunde digitaler Dienstleistungen werden möchte. Funktionieren diese Schritte nicht wie vom Nutzer erwartet, leidet die Akzeptanz solcher Dienste und damit ist der Erfolg digitaler Geschäftsstrategien in Gefahr. Identitäts-API-Plattformen helfen beim Aufbau von standardisierten…

Aug 20, 2019

Leadership Compass: IDaaS Access Management - 79016

Anmol Singh    Martin Kuppinger

A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. Improved time-to-value proposition prioritizes adoption of IDaaS for B2B, B2E and B2C access management use-cases, helping IDaaS AM to dominate new IAM purchases globally. This Leadership Compass…

Aug 14, 2019

Whitepaper: Privileged Access Governance - 80015

Anmol Singh

Privileged Access Governance or PAG is fast becoming a crucial discipline of Privileged Access Management (PAM) to help organizations gain required visibility into the state of privileged access necessary to support the decision-making process and comply with regulations. Besides providing support for managing lifecycle events of privileged accounts, PAG includes privileged access…

Aug 13, 2019

Leadership Brief: Access Reviews Done Right - 80195

Matthias Reinwarth

Access reviews are considered important risk management controls in many organizations. They are intended to ensure that each user, process and system has always  only the minimum amount of access rights, which are necessary to perform associated tasks. In light of compliance, governance and the organizations's internal commitment to protecting itself from unwanted access, concepts…

Aug 12, 2019

Executive View: TrustBuilder Identity Hub - 80071

Martin Kuppinger

TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seamless application integration. Targetted mostly at B2B and B2E use-case requirements, TrustBuilder is building on additional features to address the consumer IAM requirements.

Aug 09, 2019

Executive View: ESET Endpoint Security - 80181

John Tolbert

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent malware detection tests. The product also is one of the top-performing, lowest impact endpoint security agents available in the market today.

Aug 07, 2019

Whitepaper: Do Identity Right – So Your Digital Business Strategy Succeeds - 80134

Martin Kuppinger

Registration and authentication are the first things that happen when someone becomes a user of digital business services. If these steps don’t work as the user wants, the acceptance of such services will suffer and the success of digital business strategies is at risk. Identity API Platforms help build a standardized approach for delivering unified identity services to businesses.…

Aug 07, 2019

Executive View: SAST SUITE Der Akquinet AG - 80191

Martin Kuppinger

Die heutigen SAP-Sicherheitsanforderungen gehen weit über die traditionellen Access Governance-Anforderungen an Benutzer, deren Zugriff und Rollen hinaus. akquinet bietet eine vollwertige Produktsuite für GRC (Governance, Risk & Compliance) und Sicherheit für SAP-Umgebungen. Die bereitgestellten Module decken ein breites Spektrum an Funktionen in dem sensiblen Bereich…

Aug 07, 2019

Executive View: SAST SUITE by akquinet AG - 80116

Martin Kuppinger

Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users and their access and roles. AKQUINET offers a full-featured product suite for GRC (Governance, Risk & Compliance) and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive area of SAP security and GRC.

Jul 31, 2019

Whitepaper: IAM for Healthcare: It’s time to act - 80029

Martin Kuppinger

Healthcare organizations deal with highly sensitive information. They face challenges in complying with ever-tightening regulations, combating ever-increasing cyber risks, and adapting to Digital Transformation. Comprehensive healthcare IAM, beyond pure SSO, helps Healthcare organizations to better cope with these challenges.

Jul 30, 2019

Executive View: Xton Technologies Access Manager - 80128

Martin Kuppinger

Xton Technologies provides an integrated PAM (Privileged Access Management) solution covering the key capabilities in this area such as managing credentials of sensitive and shared account, session management and remote control access. Xton focuses on efficient implementation of these capabilities and is an interesting alternative to established players in the PAM market.

Jul 29, 2019

Executive View: Symphonic – Intelligent Authorization - 80154

Graham Williamson

There are several trends that continue to make the use of identity information for access control more complex. The prevalence of smartphones as the end-user client of choice, the increasing use of API channels needing access to corporate data and the increasingly complex hybrid cloud environment all serve to increase the complexity of managing authorized access to protected resources.…

Jul 26, 2019

Leadership Brief: The Differences Between Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) - 80186

John Tolbert

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at key features of each type of solution below.

Jul 26, 2019

Advisory Note: Protect Your Cloud Against Hacks and Industrial Espionage - 72570

John Tolbert

Hacks against on-premises and cloud infrastructure happen every day. Corporate espionage is not just the stuff of spy novels. Unethical corporate competitors and even government intelligence agencies use hacking techniques to steal data. Reduce the risk of falling victim to hackers and industrial espionage by implementing the proper security tools in your cloud-based environments.

Jul 26, 2019

Executive View: Radiflow SCADA Security Suite - 80053

Alexei Balaganski

Radiflow SCADA Security Suite is a comprehensive set of hardware products, software solutions, and managed services offering risk-based insights into ICS/SCADA networks, intelligent detection of IT and OT-related cyberthreats, as well as proactive protection against any deviations from established security policies.

Jul 22, 2019

Leadership Brief: Do I Need Endpoint Detection & Response (EDR)? - 80187

John Tolbert

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly deploy, operate, and get value out of it? We’ll look at reasons to consider EDR or EDR as a managed service below.

Jul 09, 2019

Executive View: Kaspersky Endpoint Security for Business - 80180

John Tolbert

Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their Global Research and Analysis Team (GreAT). Kaspersky’s endpoint security product covers a wide variety of endpoint operating systems, and usually rate very highly in independent malware detection tests.

Jul 02, 2019

Whitepaper: ForgeRock Identity Platform for PSD2 & API Security - 80049

Richard Hill

The Revised Payment Service Directive (PSD2) promises to make the European Union (EU) cross-border transactions further transparent, faster and more secure while increasing competition and choice for consumers. To do so, Banks and other financial service providers must quickly make the necessary technical infrastructure changes to prepare for PSD2. The ForgeRock Identity Platform provides…

Jun 27, 2019

Leadership Compass: Database and Big Data Security - 79015

Alexei Balaganski

This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. We examine the broad range of technologies involved, vendor product and service functionality, relative market shares, and innovative approaches to…

Jun 12, 2019

Whitepaper: Radiant Logic and the Identity Integration Imperative - 80075

Martin Smith

Digital transformation and the need for business agility are creating an explosion in the volume, variety and velocity of identity data that enterprises have to manage efficiently. And now regulators have sharply increased the liability of enterprises for assuring that identity data is safeguarded, only accessed appropriately, and accurate. An integrated identity capability can be the key…

May 27, 2019

Executive View: Osirium Opus Privileged IT Process Automation - 79068

Martin Kuppinger

Osirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus allows for defining and managing granular tasks, that can be executed securely on the target systems. By doing so, the efficiency of service desks can increase significantly, while security risks are mitigated.

May 16, 2019

Whitepaper: The Dark Side of the API Economy - 80019

Alexei Balaganski

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners. Unfortunately, many organizations still lack competence in the field of API security and…

May 13, 2019

Executive View: Ideiio IGA - 80077

Anmol Singh

Identity Governance and Administration (IGA) is an important security and risk management discipline that builds the necessary foundation of any organization’s IT security portfolio. ideiio, a spun out from IAM systems integrator ProofID, is a new vendor in the IGA space offering IGA functions targeted at mid-market customers to meet their basic IGA requirements with minimal effort…

May 09, 2019

Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105

Martin Kuppinger

As the hype around Blockchain is slowing down, the market is moving into a phase of maturity, focusing on business cases where Blockchain technology delivers concrete value, in combination with other types of technologies. Blockchain ID and the related concept of Self Sovereign Identity (SSI) are gaining momentum, in areas such as KYC (Know Your Customer), Consumer Authentication, and…

May 08, 2019

Buyer’s Compass: Endpoint Protection - 80110

John Tolbert

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for endpoint protection.

May 08, 2019

Executive View: Wallix Bastion - 79053

Anmol Singh

The WALLIX Bastion is a single gateway-based solution for PAM offering advanced session management, password management and access management capabilities, with built-in controls for access request management. Offering Single Sign-On (SSO) to target systems, the WALLIX Bastion provides detailed session recording, auditing and monitoring capabilities in easy-to-configure and scale…

May 07, 2019

Executive View: FIDO2 - 80059

John Tolbert

The FIDO® Alliance has released new authentication specifications that enhance security and privacy, standardize the authentication experience and underlying APIs, improve the usability, and extend the FIDO paradigm to more types of devices, platforms, and environments. With the publication of FIDO2 (comprised of FIDO’s CTAP and W3C’s WebAuthn specification), FIDO has more…

May 07, 2019

Executive View: Darktrace Enterprise Immune System - 80003

Alexei Balaganski

Darktrace Enterprise Immune System is a cyber-defense platform that utilizes a self-learning AI-based technology to detect, investigate and neutralize various cyber-threats in real time, across the whole corporate IT infrastructure, including physical and virtualized environments, industrial control networks, cloud infrastructures, and SaaS applications.

May 07, 2019

Buyer’s Compass: Consumer Identity and Access Management Solution - 80111

John Tolbert

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.

May 07, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s Produktportfolio bietet eine gut integrierte Privileged Access Management (PAM) Suite mit einer Reihe von Funktionen für die Erkennung und Minderung von Sicherheitsbedrohungen, die durch den Missbrauch von privilegierten Accounts und Zugriffsberechtigungen verursacht werden. BeyondTrust’s Password Safe stellt die branchenführenden Funktionen für…

May 07, 2019

Whitepaper: Identity Governance. The Value of Leveraging IGA Functions from the Cloud - 80043

Martin Kuppinger

With IT functions gradually shifting to the cloud, it is time to rethink the way  supporting infrastructure and platform services such as IGA (Identity Governance and Administration) are implemented. While solutions running on premises, but also supporting cloud services were the norm until now, running IGA as a service, with support for the hybrid reality of IT infrastructures…

May 06, 2019

Executive View: Exostar Supplier Risk Management - 79074

Martin Kuppinger

Exostar Supplier Risk Management delivers advanced capabilities for identifying and managing risk and compliance with cybersecurity and other best practices and standards, along the entire supply chain. By building on the capabilities of the Exostar Platform as an industry collaboration network, it enables re-use of supplier representations and certifications with multiple buyers, thus…

May 03, 2019

Leadership Brief: Artificial Intelligence in Cybersecurity - 70278

Alexei Balaganski

Artificial Intelligence remains the hottest buzzword in almost every segment of the IT industry nowadays, and not without reason. The very idea of teaching a machine to mimic the way humans think (but much, much quicker) without the need to develop millions of complex rules sounds amazing: instead, machine learning models are simply trained by feeding them with large amounts of carefully…

May 02, 2019

Executive View: One Identity Manager SAP Integration - 80073

Martin Kuppinger

One Identity Manager in combination with the cloud-based Starling Connect service delivers a broad range of integrations into both traditional and cloud-based SAP services. The integration capabilities count amongst the leading-edge solutions in IGA (Identity Governance and Administration) products.

Apr 29, 2019

Executive View: Kleverware IAG - 80106

Martin Kuppinger

Kleverware ist ein französisches Softwareunternehmen, das sich auf die Entwicklung einer schlanken Lösung für Identity & Access Governance (IAG) fokussiert hat. Kleverware IAG ermöglicht die schnelle Implementierung von Berechtigungsprüfungen und -berichten und kann auf einfache Weise Berechtigungsdaten in heterogenen, komplexen IT-Landschaften,…

Apr 26, 2019

Executive View: BeyondTrust Password Safe - 80067

Anmol Singh

BeyondTrust’s portfolio of products provides a well-integrated Privileged Access Management (PAM) suite with a range of capabilities for  detection and mitigation of security threats caused by  abuse of privileged accounts and access entitlements. BeyondTrust’s Password Safe delivers market-leading shared account password management and session management…

Apr 18, 2019

Executive View: Ubisecure Identity Platform - 79072

John Tolbert

Ubisecure Identity Platform is an integrated consumer identity and access management suite for on-premise or cloud deployment. Ubisecure features strong federation capabilities, innovative standards support, and the ability to leverage some bank and national IDs. RapidLEI provides a way to manage organizational identity.  

Apr 11, 2019

Leadership Brief: Data Security and Governance (DSG) for Big Data and BI Environments - 80109

Anmol Singh

Increased relevance of BigData and BI environments in supporting business decisions requires a broad set of data points to be collected throughout the lifetime of an application and users’ interaction with it. Security and risk management leaders must ensure that the risks emerging from the abundance and extensive use of this data are identified and that the right security and…

Apr 10, 2019

Leadership Brief: The Limits of AI in Marketing Automation - 79007

Roland Bühler

Artificial intelligence and machine learning are megatrends in marketing analytics and automation—it's often seen as the holy grail of digital marketing, as its possibilities seem to be endless. But are they? This leadership brief discusses typical limits and risks of ML-based marketing automation—and shows how to overcome or manage them.

Apr 09, 2019

Leadership Brief: Machine Learning, Marketing, and Privacy - 80032

Roland Bühler

Artificial intelligence and machine learning techniques are becoming more and more important for marketing. ML offers new possibilities to analyze customer data, enabling individual marketing measures to be delivered. Nevertheless, privacy is often a concern when it comes to ML. Furthermore, legislation based on GDPR has to be considered. This leadership brief gives an overview of the…

Apr 08, 2019

Leadership Brief: AI and Machine Learning – The Basics in a Nutshell - 80033

Roland Bühler

Artificial intelligence is becoming more and more important for various applications in almost all industrial sectors. This leadership brief gives a basic overview of the main principles of artificial intelligence (AI), with a strong focus on machine learning (ML). Typical use cases are illustrated based on some examples—with a marketing and identity management-oriented focus.

Apr 08, 2019

Executive View: ManageEngine AD360 - 79070

Martin Kuppinger

ManageEngine AD360 is a tool targeted at the in-depth management of Microsoft Active Directory and connected systems such as Microsoft Office 365. It comes with capabilities that go beyond pure entitlement, by adding authentication features, UBA (User Behavior Analytics), and even Single Sign-On to several cloud services. However, the core of the product is supporting an efficient,…

Apr 08, 2019

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.2 - 79079

Richard Hill

Consumer Identity and Access Management (CIAM) is a rapidly growing market that offers a better user experience for the consumer and new challenges for the organization. NRI Secure’s Uni-ID Libra provides the necessary components of a CIAM solution with a focus on the Japanese market.

Apr 08, 2019

Executive View: BigID - 80046

Richard Hill

With today's mounting regulations to protect sensitive customer data, organizations are faced with new requirements, challenges and compliance risks. BigID assist organizations with their data compliance requirements by helping them find, categorize and map their data at scale.

Apr 05, 2019

Leadership Brief: Marketing, IoT, and Privacy - 80034

Roland Bühler

The Internet of Things (IoT) is an IT megatrend. Apart from offering new possibilities and experiences to its users, IoT is highly interesting for marketers as it offers new ways to communicate with consumers and customers, leading to new possibilities in terms of analytics and consumer engagement as well. But what about privacy when IoT comes into play? This Leadership Brief gives an…

Apr 03, 2019

Executive View: Simeio IAM for SMB - 79071

John Tolbert

Simeio offers a turnkey Identity and Access Management IDaaS solution for small-to-medium size businesses. IAM for SMB prioritizes ease-of-use for business owners and administrators as well as security. The solution provides comprehensive user management via workflows, which are accessible via mobile devices.

Apr 03, 2019

Executive View: WSO2 Identity Server - 80060

Richard Hill

Identity Management solutions need to address the growing number of identities associated with applications and endpoints, as well as the ability to integrate with the diversity of application and service APIs. WSO2 Identity Server provides a comprehensive and flexible solution for the modern enterprise.

Mar 28, 2019

Executive View: R&S®Trusted Gate von Rohde & Schwarz Cybersecurity - 80036

Matthias Reinwarth

Verlässliche Kontrolle und Monitoring sensibler Informationen, die in öffentlichen Clouds und Kollaborationstools (Microsoft® SharePoint™, Office 365™) gespeichert sind durch Virtualisierung, Verschlüsselung und Datenfragmentierung. Sichere und benutzerfreundliche Zusammenarbeit an geschützten Dokumenten und transparente, datenzentrische Sicherheit…

Mar 28, 2019

Executive View: AWS Certificate and Key Management - 70365

Alexei Balaganski

A suite of fully managed encryption key and TLS certificate management services natively integrated with over 50 other AWS services to ensure data protection and regulatory compliance across the whole cloud footprints.

Mar 25, 2019

Executive View: CyberArk Privileged Session Manager for Web - 79034

Anmol Singh

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must evaluate their security requirements associated with administrative access to cloud platforms and…

Mar 25, 2019

Leadership Compass: Privileged Access Management - 79014

Anmol Singh

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a…

Mar 22, 2019

Executive View: Digital Shadows SearchLight™ - 79041

Matthias Reinwarth

Digital Risk Protection as a Service. A combination of data loss protection, the securing of brands and reputation online and the reduction of the overall attack surface by identifying weaknesses in an organization’s infrastructure.

Mar 20, 2019

Executive View: Amazon GuardDuty - 80005

Alexei Balaganski

Amazon GuardDuty is a fully managed, simple, and affordable security monitoring and threat detection service that combines machine learning and anomaly detection to enable quick and uncomplicated identification of suspicious activities and malicious behavior across AWS cloud accounts and workloads.

Mar 20, 2019

Executive View: Krontech SingleConnect - 80031

Anmol Singh

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment cycle and its technological advantage in securing database privileges.

Mar 15, 2019

Executive View: Thycotic Privilege Manager - 80004

Anmol Singh

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM product that provides endpoint threat protection for controlled desktop and server environments through a…

Mar 06, 2019

Executive View: Kleverware IAG - 80042

Martin Kuppinger

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rapidly implementing access reviews and entitlement reporting, and can easily collect and homogenize entitlement data across heterogeneous, complex IT landscapes, including SaaS services, business applications,…

Mar 05, 2019

Whitepaper: PATECCO Privileged Access Management Services - 80037

Matthias Reinwarth

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution, consisting of risk mitigation, well-defined processes und well-executed implementation.

Mar 05, 2019

Executive View: Thales Vormetric Application Crypto Suite - 79069

Martin Kuppinger

Encryption, tokenization, and data masking are essential capabilities needed in today’s highly regulated environments. Protecting sensitive information requires these capabilities, beyond just network and file-level encryption. Vormetric Application Crypto Suite from Thales eSecurity provides an integrated, easy-to-use set of services covering the needs for such environments.

Mar 01, 2019

Executive View: Ilantus Compact Identity - 80052

Anmol Singh

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the business. Ilantus Compact Identity is an entry level enterprise IDaaS offering targeted at SMB customers to jump start their IAM with minimal effort and investment.

Feb 26, 2019

Executive View: Veracode Application Security Platform - 79060

Alexei Balaganski

Veracode Application Security Platform is a cloud-based application security testing platform providing unified insights into software security risks at every stage of the development lifecycle.

Feb 19, 2019

Executive View: Bromium Secure Platform 4.1 - 71309

Matthias Reinwarth

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user behavior monitoring and enhanced enterprise management capabilities.

Feb 14, 2019

Advisory Note: Maturity Level Matrix for Cyber Security - 72555

Mike Small

KuppingerCole Maturity Level Matrixes for the major market segments within cyber security. These provide the foundation for rating the current state of your cyber security projects and programs.  

Feb 14, 2019

Architecture Blueprint: Hybrid Cloud Security - 72552

Mike Small

Organizations now commonly use multiple cloud services as well as on-premises IT. This KuppingerCole Architecture Blueprint provides a set of building blocks needed to design, implement and integrate security for the Hybrid Cloud.

Feb 14, 2019

Executive View: R&S®Trusted Gate by Rohde & Schwarz Cybersecurity - 80036

Matthias Reinwarth

Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (SharePoint, Office 365) through virtualization, encryption and fragmentation of data while enabling the safe and convenient cooperation with protected documents. Transparent, data-centric security for cloud, onpremises and hybrid storage environments.

Feb 12, 2019

Leadership Compass: Access Management and Federation - 71147

Richard Hill    Martin Kuppinger

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Web Access Management and Identity Federation on-premises platforms. Your compass for finding the right path in the market.

Feb 11, 2019

Executive View: Hitachi ID Privileged Access Manager - 80030

Martin Kuppinger

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophisticated operational capabilities in the areas of service account management and real-time password synchronization. Organizations looking for enterprise-scale PAM solutions should consider HIPAM in their shortlists.

Feb 11, 2019

Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. ForgeRock Identity Platform provides strong customer authentication capabilities that can help businesses meet the technical challenges posed by PSD2.

Feb 11, 2019

Executive View: Checkmarx Software Exposure Platform - 71512

Alexei Balaganski

Checkmarx Software Exposure Platform combines application security testing tools, managed services, and training in a single solution that enables developers to detect, prioritize and mitigate software-related risks at every stage of the development life cycle.    

Feb 06, 2019

Whitepaper: Cisco: Next-Generation Enterprise Security Delivered from the Cloud: Addressing Modern Cyber Threats with Cisco Umbrella - 80017

Alexei Balaganski

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and…

Jan 31, 2019

Executive View: comforte AG SecurDPS Enterprise - 80007

Alexei Balaganski

comforte AG SecurDPS Enterprise is a highly scalable data protection platform that combines stateless tokenization technology and hardened fault-tolerant architecture to ensure security and compliance of sensitive data in mission-critical business applications.

Jan 30, 2019

Executive View: SAP Customer Data Cloud - 79001

John Tolbert

SAP Customer Data Cloud provides a complete solution for Consumer Identity and Access Management.   Entirely cloud-based, SAP Customer Data Cloud delivers advanced customer identity, consent, profile management and marketing service functionality for enterprise customers.

Jan 24, 2019

Executive View: SSH.COM PrivX - 70302

Martin Kuppinger

SSH.COM PrivX is an innovative solution for privileged access to sessions running on hosts in the cloud and on premises. Based on short-lived certificates and a policy- and role-based, automated access control, it is targeted at agile IT environments such as DevOps environments.

Jan 08, 2019

Executive View: Safe-T Software Defined Access - 79075

Martin Kuppinger

Safe-T Software Defined Access delivers a software-based solution that provides data protection by controlling both access and usage of corporate data, services, and applications, protection is done by authenticating users prior to providing access. The solution supports a variety of use cases, including hybrid cloud deployments and access to cloud services such as Microsoft Office 365.…

Jan 04, 2019

Whitepaper: OneSpan Intelligent Adaptive Authentication - 80026

John Tolbert

Fraud reduction is a paramount concern in many industries today.  Finance, as well as healthcare and retail companies, are increasingly targeted by cybercriminals. New regulations in the financial industry are coming into force in many areas around the world. These regulations aim to improve security and reduce fraud. OneSpan Intelligent Adaptive Authentication provides strong and…

 2018

top  

Date Title Price
Dec 14, 2018

Leadership Compass: CIAM Platforms - 79059

John Tolbert

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

Dec 04, 2018

Executive View: VeriClouds Identity Threat Protection Platform - 79083

Mike Small

Securely authenticating users remains a difficult problem. VeriClouds offers an Identity Threat Protection Platform that can provide a useful additional level of assurance against the reuse of compromised credentials.  There are many approaches, products, and services around user authentication, however, the VeriClouds Identity Threat Protection Platform is unique in what it offers. 

Dec 04, 2018

Leadership Brief: What AI Can Do for You Today – and What Not - 79002

Mike Small

AI is a generic term that covers a range of technologies. Today some of those technologies are sufficiently mature for commercial exploitation and some are not. This leadership brief describes the current state of AI technologies and recommends the areas where they can be applied today.

Nov 30, 2018

Whitepaper: Signicat: Balancing Security and Convenience: Identity Verification & Authentication made easy - 79081

Martin Kuppinger

Identity Verification is the first step in the journey of the digital customer. From there, Authentication is the first thing to do when returning. Balancing security & convenience and creating a seamless experience for customers is essential to keeping customers happy and minimizing churn rates: Identity Assurance done correctly is an essential step towards success in digital business.

Nov 29, 2018

Leadership Compass: Cloud Access Security Brokers - 70614

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Nov 28, 2018

Buyer's Guide: Marketing Automation Systems and GDPR Readiness - 80018

Roland Bühler

Marketing automation systems are key when it comes to digital or omni-channel marketing. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor and requirements for successful deployments. It will also prepare your organization to conduct RFIs and RFPs to select the right marketing automation solution – in line with GDPR…

Nov 22, 2018

Executive View: Saviynt Identity Governance and Administration (IGA) - 70370

Richard Hill

Saviynt provides a comprehensive platform for Identity Lifecycle Governance and Administration combined with Application GRC, IaaS Governance, Data Governance, and Privileged User Governance. The solution is designed to be deployed as a cloud, hybrid or on-premise solution. The Saviynt Security Manager helps customers demonstrate compliance using their access governance and risk…

Nov 13, 2018

Executive View: Sphere Identity Platform - 79052

Richard Hill

Any Self-Sovereign Identity platform must strike a balance between the individual and the organization that uses it. The Sphere Identity platform provides not only primary support for B2B, but also economic incentives for both individuals and organizations through ease of use, privacy, and rewards for the individual, and reduced compliance risk, easy customer onboarding and integration…

Nov 09, 2018

Buyer’s Guide: Identity-as-a-Service (IDaaS) - 71526

Anmol Singh

Organizations need a detailed yet carefully guided and defensible approach to evaluate Identity and Access Management Services (IDaaS). This document provides the required guidance and criteria necessary for evaluating IDaaS providers and supporting the request for proposal (RFP) processes. Security leaders are encouraged to use the criteria laid out in this research for IDaaS evaluation…

Nov 06, 2018

Executive View: IBM Security Access Manager (ISAM) - 79066

Richard Hill

As IAM is continuing to evolve based on the growing list of IT security requirements, so is IBM Security Access Manager (ISAM). Not only does ISAM provide the essentials of access management and federation use cases, but it also provides Risk-Based Access Control and Mobile capabilities, as well as providing flexible deployment models.

Nov 06, 2018

Executive View: ThreatMetrix Digital Identity Network, powered by ThreatMetrix ID - 79049

John Tolbert

ThreatMetrix, a LexisNexis Risk Solutions Company, is a global fraud, identity and authentication company, helping customers deliver a unified experience  across their digital customer journey.  Built on a platform  providing a unified, global customer digitial identity, ThreatMetrix enables businesses to prevent fraud, reduce friction, and streamline the customer…

Nov 05, 2018

Executive View: AWS Identity and Access Management - 79048

Graham Williamson

AWS is the largest global provider of Cloud infrastructure with extensive capabilities to suit a wide range of customer requirements for cloud-based services. The AWS platform now provides easy-to-use facilities to allow customer to better leverage their identity management environment.

Nov 02, 2018

Executive View: Securonix Cloud SIEM and UEBA - 79035

Alexei Balaganski

Securonix Cloud is a next-generation security intelligence platform that provides comprehensive security information and event management, as well as user and entity behavior analytics offered as a fully managed Security Operations Platform in the cloud.

Oct 17, 2018

Executive View: Zscaler Security-as-a-Service Platform - 72505

Alexei Balaganski

Zscaler is the world’s largest multi-tenant distributed cloud security platform that delivers a broad range of services without any on-premises hardware or software agents, including cybersecurity, network transformation, public cloud connectivity, and secure access to on-premises and cloud services.

Oct 11, 2018

Executive View: FSP Identity Governance & Administration Suite ORG - 79050

Matthias Reinwarth

Die FSP Identity Governance & Administration Suite ORG ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer…

Oct 10, 2018

Whitepaper: SailPoint: Governance for all data: Get a grip on unstructured data - 79046

Martin Kuppinger

While many businesses have solutions for managing and reviewing access at a coarse-grain, cross-system level in place as part of their Identity & Access Governance solutions, they lack an integrated approach for governing access to unstructured data. However, for mitigating access risks to that data, expanding the aperture of identity governance programs is mandatory. This whitepaper…

Oct 10, 2018

Leadership Compass: Identity Governance & Administration - 71135

Anmol Singh    Martin Kuppinger

Backed by closer integration of Identity Provisioning and Access Governance capabilities, the IGA market continues to evolve and enters mainstream market adoption with most vendors providing mature capabilities around the core IGA functions. This Leadership Compass provides insights into the IGA market and presents an evaluation of vendors based on criteria important for successful IGA…

Oct 09, 2018

Leadership Compass: Cloud-based MFA Solutions - 70967

John Tolbert

This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) solutions and provides you with a compass to help you to find the service that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Cloud-based MFA solutions.

Oct 09, 2018

Leadership Brief: Mit den VAIT zu einer transparenteren Versicherungs-IT - 80388

Matthias Reinwarth

Mit dem im Juli 2018 final vorgelegten Dokument „Versicherungsaufsichtliche Anforderungen an die IT“ (VAIT) gibt die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) Versicherungsunternehmen konkretere Vorgaben für die Umsetzung ihrer Geschäftsprozesse mittels IT an die Hand. Diese stellen Herausforderungen dar, denen in betroffenen Unternehmen…

Sep 25, 2018

Advisory Note: GRC Reference Architecture - 72582

Mike Small

GRC covers the areas of Governance, Risk and Compliance and this report refers to GRC in the context of delivering IT services to meet organizational goals.  GRC is concerned with setting objectives, policies and controls and monitoring performance against these.  This report provides an architecture for the successful implementation of GRC within an organization.

Sep 19, 2018

Leadership Compass: Adaptive Authentication - 79011

John Tolbert

This report provides an overview of the market for on-premise Adaptive Authentication solutions and provides you with a compass to help you to find the product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing on-premise Adaptive Authentication solutions.

Sep 19, 2018

Whitepaper: Overcoming PSD2 Challenges with Onegini Connect - 79058

Richard Hill

Many changes are coming to Europe's financial landscape due to the Revised Payment Service Directive (PSD2). PSD2 will present new challenges to overcome, as well as potential benefits for Third Party Providers (TPPs) and consumers.  Account Information Service Providers (AISP) and Payment Initiation Service Providers (PISP) functions have historically been performed by banks;…

Sep 19, 2018

Executive View: United Security Providers Secure Entry Server - 79040

Matthias Reinwarth

United Security Providers (USP) provides a web access management platform designed to provide a unified and efficient approach towards Web Application Firewall (WAF), Authentication, CIAM and Identity Federation capabilities for complex use cases and hybrid on-premises and cloud solutions.

Sep 14, 2018

Executive View: Evidian Identity & Access Management - 70872

Richard Hill

With the continually evolving security requirements and challenges IT faces today, the capabilities of IAM must also advance to keep up. Evidian meets these modern IAM requirements by integrating Identity Governance and Administration, and Analytics & Intelligence into their IAM suite.

Sep 14, 2018

Executive View: ObserveIT Insider Threat Management - 79038

Alexei Balaganski

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightweight and streamlined solution for detecting and mitigating various insider threats.

Sep 10, 2018

Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. RSA provides foundational technical capabilities in their SecurID, Adaptive Authentication, Web Threat Detection, and Archer products that can help businesses meet the…

Sep 06, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Die Delphix Dynamic Data Platform ist eine integrierte Plattform für die Verwaltung, Absicherung und Replizierung von Daten in lokalen, cloudbasierten und Hybrid-Umgebungen. Sie kombiniert eine hochleistungsfähige Virtualisierung mit integriertem Data Masking und automatisierten Self-Service-Workflows. Auf diese Weise erhöht sie signifikant die Effizienz in Bezug auf Agile…

Aug 23, 2018

Executive View: CA Privileged Access Management Suite - 79047

Anmol Singh

CA Technologies offers comprehensive Privileged Access Management (PAM) under CA Privileged Access Management Suite comprising of several modules bundled in a single product. The CA PAM solution blends well with CA’s popular IAM Suite to offer market leading PAM capabilities for large scale deployments requiring complex integrations and fine-grained command control.

Aug 21, 2018

Executive View: TechDemocracy Intellicta - 70362

Matthias Reinwarth

A software platform designed to achieve a holistic assessment of an organization’s cybersecurity, compliance, risk and governance status by establishing risk governance, resilience and protection from cyber threats through the deployment of a standards-based risk governance framework.

Aug 21, 2018

Executive View: ViewDS Cobalt - 70851

Richard Hill

ViewDS Cobalt is a cloud-architected identity platform flexible enough to support on-premises, cloud, and hybrid environments. With all aspects of the platform management fully accessible via APIs, Cobalt is uniquely positioned to support the automation and integration requirements of today’s modern IT environment.

Aug 20, 2018

Executive View: Senrio Insight - 72525

Alexei Balaganski

Senrio Insight is an Industrial IoT cybersecurity platform utilizing passive nonintrusive network device discovery to provide visibility and analytics of industrial device behavior and rapid detection of abnormal activities.  

Aug 17, 2018

Executive View: WidasConcepts cidaas - 79057

John Tolbert

WidasConcepts offers a complete consumer identity and access management solution:  cidaas.  cidaas is developed and hosted in Germany. cidaas contains most standard and many innovative features, such IoT integration and consent management.  It is based on a micro-services architecture which enables continuous deployment of service enhancements.

Aug 17, 2018

Executive View: CipherCloud CASB+ - 79037

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of CipherCloud CASB+ which strongly matches…

Aug 15, 2018

Executive View: Semperis Directory Services Protector for Active Directory - 79054

Dan Blum

Active Directory provides critical identify infrastructure for the enterprise. Semperis offers Active Directory change monitoring and forest recovery products. The Semperis DS-Protector product support change monitoring and rollback for a broad set of AD infrastructure objects.

Aug 09, 2018

Executive View: 1Kosmos BlockID - 79064

Martin Kuppinger

1Kosmos BlockID is one of the first commercial implementations of a blockchain-based identity solution that works for both consumers and employees. It is well thought-out and implements the fundamental concepts of Self Sovereign Identity. It integrates well with existing identity and service providers. While there are still some challenges to solve, BlockID delivers on the promise of…

Aug 09, 2018

Advisory Note: Big Data Security, Governance, Stewardship - 72565

Mike Small

An ever-increasing number of devices, sensors and people are connected to the global internet and generate data.  The analysis of this data can help organizations to improve their effectiveness and make better decisions.  However, there are concerns over the trustworthiness of the data as well as the ethics of its use.  This report describes how good Information Stewardship…

Aug 08, 2018

Executive View: MinerEye Data Tracker - 79063

Martin Kuppinger

MinerEye DataTracker is an AI-based application that identifies, classifies, and tracks unstructured information. It creates cluster of similar content across data sources and analyzes information about classified data in those clusters, to triggers applications such as DLP, IRM and Access control tools. It also provides deep insight into unstructured data based on sophisticated…

Aug 06, 2018

Executive View: StealthINTERCEPT® - 70367

Mike Small

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy enforcement, change and access monitoring and Active Directory security component of the STEALTHbits’…

Jul 31, 2018

Executive View: NRI SecureTechnologies: Uni-ID Libra 2.0 - 70266

Martin Smith

NRI Secure’s Uni-ID Libra is a relatively new entrant in the rapidly growing market for consumer identity management (CIAM). Focused for now completely on the Japanese market, the product emphasizes security, leveraging the company’s expertise in managed SOC services and security software. The near-term product roadmap includes enhanced consent management and support for FIDO…

€190.00 *
Jul 27, 2018

Executive View: Centrify Next-Gen Access Platform - 79036

Richard Hill

Often, enterprise security is delivered as separate services such as Identity-as-aService (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Centrify converges these market segments into a single platform to deliver the next generation of access management.

Jul 20, 2018

Executive View: Deep Secure Content Threat Removal Platform - 79056

Martin Kuppinger

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious content and then creates new, clean data for onward delivery. In this way, it defeats zero-day attacks and prevents covert data loss, all transparent to end users.

Jul 19, 2018

Executive View: One Identity Safeguard - 79042

Martin Kuppinger

One Identity is one of the leading vendors in the field of IAM. With their recent acquisition of Balabit and the integration of their Privilege Management offerings into the Safeguard product portfolio, the company positions itself among the leaders in the Privilege Management market, delivering a comprehensive portfolio of Privilege Management capabilities.

Jul 17, 2018

Executive View: RSA® Identity Governance and Lifecycle - 71052

Martin Kuppinger

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities and their access, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal.

Jul 17, 2018

Executive View: Delphix Dynamic Data Platform - 79010

Alexei Balaganski

Delphix Dynamic Data Platform is an integrated platform for managing, securing and replicating data across on-premises, cloud and hybrid environments. Combining high-performance virtualization, integrated masking and automated self-service workflows, it significantly increases efficiency of agile development, data analytics, cloud migration, disaster recovery and other DataOps use cases.

Jun 22, 2018

Buyer's Guide: Hybrid Cloud Services - 72562

Mike Small

Organizations now commonly use multiple cloud services as well as on premises IT. This KuppingerCole Buyer’s Guide focusses on IaaS services. It will provide you with questions to ask vendors, criteria to select your vendor, and the requirements for successful deployments. This report will prepare your organization to conduct RFIs and RFPs for IaaS as part of a Hybrid IT service…

Jun 05, 2018

Leadership Compass: Access Governance & Intelligence - 71145

Martin Kuppinger    Anmol Singh

Leaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Jun 05, 2018

Executive View: Varonis DatAdvantage - 79029

Martin Kuppinger

Getting a grip on your data is a bigger challenge than ever before. While solutions for central IT environments such as SAP are quite established, a significant portion of critical data resides in unstructured data stores such as file servers or collaboration services. This includes PII (think “GDPR”), but also blueprints, financial data, and more. It is essential having tools…

May 28, 2018

Executive View: Cayosoft Administrator v5 - 79000

Alexei Balaganski

Cayosoft Administrator is an integrated platform for management and automation of Active Directory and Office 365 environments, including hybrid deployments. The latest release adds new capabilities not available in native Microsoft tools, focusing on customers who have already completely moved to the cloud.

May 24, 2018

Executive View: Onegini Connect - 79031

John Tolbert

Onegini provides a compelling solution for Consumer Identity and Access Management (CIAM). Onegini is headquartered in Europe and has global ambitions. They have expertise in EU regulations such as GDPR and PSD2. They are positioning their product as a CIAM solution for financial, health care, and insurance industries with a strong mobile differentiator to enhance customer engagement.

May 18, 2018

Leadership Brief: Product Security as Your Biggest Challenge: Start Before It’s Too Late - 72011

Richard Hill

The Internet of Things (IoT) has enormous potential to transform and benefit both consumers and industries, but along with it comes significant privacy and security implications. Addressing these challenges early on in an IoT project can go a long way to lowering potential security risks in the field.

May 18, 2018

Whitepaper: Varonis - Daten kennen - 79028

Martin Kuppinger

Neue Regulierungen wie die Datenschutz-Grundverordnung (DSGVO) und die stetig wachsende Gefahr durch Cyber-Attacken führen zu einem hohen Druck auf Unternehmen. Es gibt aber auch Chancen, wenn man versteht, wo die wirklich wertvollen Daten liegen und sich darauf fokussiert, diese Daten im Unternehmen optimal zu nutzen und sie gezielt zu schützen, statt mit breitflächigen…

May 16, 2018

Architecture Blueprint: Access Governance and Privilege Management - 79045

Matthias Reinwarth

Well-designed IAM/IAG-architectures establish real-time visibility of all accounts of a person, thereby closing a formerly intrinsic security gap. Bridging between established governance silos within organizations enables full enforcement of Segregation of Duties rules for both business and privileged access. Thus, it substantially improves an organization's security posture.

May 11, 2018

Executive View: StealthDEFEND® - 70366

Mike Small

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. 

May 03, 2018

Executive View: Oracle Database Security Assessment - 70965

Alexei Balaganski

This report provides an executive summary of Oracle’s Database Security capabilities based on recently published KuppingerCole research. It covers both the company’s traditional database security solutions and the innovative Autonomous Database cloud platform.

May 03, 2018

Executive View: Pirean Consumer IAM Platform - 70223

Richard Hill

In today’s modern digital environments, organizations need an IAM solution that can span the breadth of employees, consumers, and citizens. Pirean's Access: One provides a single point of access and control that can meet these need with support for secure mobility and flexible workflows.

Apr 30, 2018

Executive View: Cleafy - 79030

Alexei Balaganski

Cleafy is an integrated real-time clientless threat detection and prevention platform for online services in highly regulated industries, providing protection against advanced targeted attacks for web applications and mobile apps.  

Apr 26, 2018

Executive View: RadiantOne Federated Identity Suite - 70845

Martin Smith

Radiant Logic’s federation suite evolves the directory to be a “single source of truth” about identity data in even the most complex hybrid enterprise. It provides an important building block at the center of an integrated identity management capability.

Apr 19, 2018

Whitepaper: Saviynt: IAM for the Hybrid Reality. Efficiently Managing On-Premise IT and the Cloud - 70364

Richard Hill

Most organizations today run in a hybrid IT environment. However, their IAM solutions have repeatedly been built for the traditional on-premises IT. IAM needs to become a service that supports the hybrid IT infrastructure organizations run today. This whitepaper describes the paradigm shift, the customer needs, and a solution to help businesses move forward in this hybrid IT environment.

Apr 19, 2018

Executive View: ARCON Privilege Manager - 70950

Anmol Singh

ARCON offers a platform suite with multiple Privilege Management capabilities bundled in a single product offering. In addition to generic capabilities necessary for managing privileged access across a typical IT infrastructure, ARCON’s PAM suite offers distinct advantages to support the scalability and complexity requirements of large data centre deployments.

Apr 18, 2018

Executive View: inWebo 2FA Platform - 80386

John Tolbert

inWebo offers a cloud-based Two-Factor Authentication (2FA) solution, with some unique and proprietary authentication methods that can be less obtrusive and more user-friendly. The inWebo solution provides easy-to-deploy application plug-ins and SDKs for mobile authenticators.

Apr 18, 2018

Executive View: Micro Focus Privileged Account Manager - 71314

Martin Smith

With massive data breaches in the headlines and increased regulatory scrutiny of failures to implement effective cybersecurity controls, enterprise management of privileged user accounts has become a business imperative. This report provides an overview of Micro Focus’ NetIQ Privileged Account Manager.

Apr 16, 2018

Leadership Compass: Infrastructure as a Service – Global Providers - 70303

Mike Small

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment.  This Leadership Compass focusses on Infrastructure as a Service (IaaS) from Cloud Service providers (CSP) with a global presence and with a specific focus on security and compliance.

Mar 28, 2018

Whitepaper: Pirean: Orchestrated Identity for Meeting IAM & CIAM Requirements -70225

John Tolbert

Identity and Access Management (IAM) for employees and partners is a foundational element in all digital environments today.  Consumer Identity and Access Management (CIAM) systems and services provide new technical capabilities for organizations to know their customers better.  Pirean’s solutions for IAM and CIAM can help companies deploy a single solution to meet both…

Mar 23, 2018

Executive View: Microsoft Azure Information Protection - 72540

Dan Blum

Microsoft Azure Information Protection creates a viable user experience for data classification and labeling of Office documents and emails. It enables sensitive data discovery; integrates data protection capabilities throughout Microsoft’s Azure, Office, and Windows environments; and is gaining third party support from Adobe and data leakage prevention (DLP) vendors among others.…

Mar 21, 2018

Executive View: UNIFY Identity Broker - 70263

Richard Hill

With today's ever-growing IT requirements for integrations between identity sources, applications and services whether on-premise, the cloud, or hybrid environments, an advanced identity provider service is required to bridge these disparate technologies. UNIFY Solutions overcomes these challenges with their Identity Broker.

Mar 20, 2018

Leadership Brief: Securing PSD2 APIs - 72596

John Tolbert

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs) and Payment Initiation Service Providers (PISPs) to use.

Mar 20, 2018

Leadership Brief: Marketing Chatbots and GDPR - 79026

Roland Bühler

Chatbots are a recent trend in marketing automation, designed to enhance customers’ digital journeys and elicit more information from consumers. This report evaluates the impact of GDPR will have on the use of chatbots and provides an overview of topics to be considered in order to ensure compliance.

Mar 14, 2018

Advisory Note: Security Organization Governance and the Cloud - 72564

Mike Small

The cloud provides an alternative way of obtaining IT services that offers many benefits including increased flexibility as well as reduced cost.   This document provides an overview of the approach that enables an organization to securely and reliably use cloud services to achieve business objectives.

Mar 14, 2018

Leadership Brief: The Anti-Malware Requirement in PSD2 - 79027

John Tolbert

The Revised Payment Service Directive (PSD2) mandates thatservice providersevaluatetransaction requests for signs of malware infection. In order for transactions to be considered low-risk, there must be no signs of malware infection in any sessions of authentication events.

Mar 06, 2018

Executive View: Axiomatics APS - 70346

Richard Hill

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes available a suite of tools and services to manage an Attribute Based Access Control (ABAC) policy life-cycle efficiently.

Feb 28, 2018

Excutive View: Imprivata - 71514

Martin Smith

On October 24, 2017, Imprivata significantly enhanced their healthcare-focused enterprise SSO offering with Identity Provisioning and Access Governance capabilities acquired from Caradigm. With that offering they are broadening their portfolio while remaining focused on the healthcare market segment.

Feb 28, 2018

Whitepaper: GDPR Herausforderungen mit Delphix meistern - 70368

Mike Small

Mit der neuen Datenschutz-Grundverordnung (GDPR) führt die EU strenge Kontrollen bezüglich der Verarbeitung personenbezogener Daten von EU-Bürgern sowie hohe Geldstrafen bei Nicht-Einhaltung eben dieser ein. Die Compliance der Grundverordnung erfordert kostenintensive Kontrollen, die sich mit den direkten geschäftlichen Vorteilen der Verarbeitung personenbezogener…

Feb 28, 2018

Whitepaper: Meeting GDPR Challenges with Delphix - 70368

Mike Small

GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.  Compliance requires costly controls that can be justified for processing of PII with direct business benefits.  However, using PII for non-production purposes such as development and test, incur the same risks and need the same costly…

Feb 28, 2018

Advisory Note: Cloud Services and Security - 72561

Mike Small

This report provides a review of the major security risks from the use of cloud services, how responsibility for security is divided between Cloud Service Provider and customer and the key controls that an organization should implement to manage these risks. 

Feb 13, 2018

Advisory Note: How to Assure Cloud Services - 72563

Mike Small

This report is one of a series of documents around the use of cloud services.  It identifies how standards as well as, independent certifications and attestations can be used to assure the security and compliance of cloud services.

Feb 13, 2018

Executive View: VMware AppDefense - 70840

Matthias Reinwarth

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized environments.

Feb 09, 2018

Point of View Paper: One Identity - The Journey to IAM Success - 70226

Martin Kuppinger

Identity and Access Management (IAM) is many things. For some it’s all about streamlining the user experience through technologies and practices that make it easier for them to securely logon. For others, IAM is all about identity lifecycle management – ensuring that accounts are set up, modified, and retired in a timely, accurate, and secure manner. And for still others…

free
Feb 06, 2018

Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172

John Tolbert

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product that best meets your needs.  We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Anti-Malware solutions for enterprises.

Jan 24, 2018

Executive View: FSP Identity Governance & Administration Suite ORG - 70841

Martin Kuppinger    Matthias Reinwarth

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance, gerade in stark regulierten Branchen. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer…

€190.00 *
Jan 24, 2018

Executive View: Oracle Autonomous Database - 70964

Alexei Balaganski

Oracle Autonomous Database is the world’s first fully automated cloud database platform powered by machine learning. By eliminating human factor from database management, it provides unprecedented security, reliability and performance for enterprise data management in the cloud.

Jan 24, 2018

Executive View: RSA SecurID® Access - 70323

Martin Kuppinger

RSA SecurID Access is an integrated offering for Adaptive Authentication, supporting a broad range of different authentication methods on virtually any type of endpoint and integration to a large range of on-premises applications and cloud services. It supports context-aware authentication and uses machine learning to assess user risk and simplify the user experience.

Jan 17, 2018

Executive View: SAP HANA Platform Security - 70272

Mike Small

SAP HANA Platform securely supports the IT applications and services needed by organizations to achieve digital transformation as well as the traditional IT systems of record. It offers a high - performance database through in - memory processing and provides enterprise grade security features that cover  the  confi dentiality, integrity and availability of the data being held…

Jan 17, 2018

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix & Linux bietet umfassenden Schutz für privilegierte Accounts auf Unix- und Linux-Plattformen.

Jan 16, 2018

Executive View: Symantec CloudSOC™ - 70615

Mike Small

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches…

Jan 12, 2018

Executive View: Osirium: Privileged Access Management - 70836

Martin Kuppinger

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes with a well-thought-out gateway approach for supporting downstream applications.

Jan 12, 2018

Leadership Brief: A Practical Approach to Enterprise Security Architecture (ESA) - 70222

Dan Blum

An enterprise security architecture (ESA) is a critical component to an enterprise architecture (EA) that describes how IT services, processes, and technologies should be protected given a customer’s unique business, security, and compliance requirements.

Jan 09, 2018

Executive View: Thycotic Privilege Manager - 70221

Martin Kuppinger

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus minimize risks caused by cyberattacks and fraudulent users.

€190.00 *

 2017

top  

Date Title Price
Dec 28, 2017

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

Martin Kuppinger

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides in-depth protection for privileged accounts on these platforms.

Dec 19, 2017

Executive View: Ilantus IDaaS Next - 70252

Martin Kuppinger

Ilantus IDaaS Next is an offering in the emerging market of IDaaS B2E, i.e. IDaaS offerings targeted at enterprise customers that must manage both SaaS services in the cloud and on-premise applications and who need more than just SSO capabilities. The service comes with some interesting features and a well-thought-out roadmap for further evolution.  

Dec 13, 2017

Executive View: AlgoSec Security Management Suite - 70262

Alexei Balaganski

AlgoSec Security Management Suite ist eine hochautomatisierte und speziell für Unternehmen konzipierte integrierte Lösung zur Verwaltung von Netzwerksicherheitsrichtlinien und der Konnektivität von Geschäftsanwendungen für verschiedenste Geräte in heterogenen Umgebungen.

€190.00 *
Dec 07, 2017

Executive View: Duo Security - 71330

Richard Hill

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications they use. Duo Security goes beyond 2FA with adaptive authentication, endpoint visibility, mobile…

Nov 24, 2017

Executive View: ERPScan Smart Cybersecurity Platform for SAP - 72510

Matthias Reinwarth

ERPScan Smart Cybersecurity Platform for SAP is an Al-driven enterprise level solution for SAP that leverages machine learning. By addressing predictive, preventive, detective and responsive capabilities, and by leveraging vulnerability management, source code security and the analysis of Segregation of Duties (SoD) violations, it provides comprehensive security analytics covering all…

Nov 20, 2017

Whitepaper: Airlock: Meeting PSD2 Challenges with Ergon Airlock Suite - 70328

John Tolbert

The Revised Payment Service Directive (PSD2) will drive many changes in technical infrastructure at financial institutions across Europe.  Banks and other financial service providers must quickly prepare for PSD2. Ergon’s Airlock Suite provides foundational technical capabilities that can help businesses meet the challenges posed by PSD2. 

Nov 20, 2017

Executive View: Janrain Janrain Identity Cloud® - 70845

John Tolbert

Janrain provides a complete solution for Consumer Identity and Access Management (CIAM). Janrain is a pioneer in the field, creating the category of CIAM and developing the popular “ social login” authentication method .

Nov 16, 2017

Executive View: AlgoSec Security Management Suite - 70262

Alexei Balaganski

AlgoSec Security Management Suite is a highly automated and business-focused integrated solution for managing network security policies and business application connectivity across a wide range of devices in heterogeneous environments.    

Nov 14, 2017

Advisory Note: Maturity Level Matrix for GDPR Readiness - 72557

Matthias Reinwarth

KuppingerCole Maturity Level Matrix for the degree of readiness for implementing EU GDPR (General Data Protection Regulation) requirements. Foundation for assessing the current status and identifying specific measures in your GDPR compliance projects and programs.

Nov 09, 2017

Executive View: STEALTHbits® Products Overview - 70270

Mike Small

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access Management, and Threat Detection.

Nov 08, 2017

Leadership Compass: Identity Provisioning - 71139

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Nov 08, 2017

Executive View: Forum Sentry API Security Gateway - 70930

Alexei Balaganski

Forum Sentry API Security Gateway is an integrated platform for API and service security, access management and legacy application modernization with a strong focus on “security by design”, certified encryption, and support for a broad range of Web Services, B2B, Mobile, Cloud and IoT APIs and other protocols.

Nov 07, 2017

Executive View: ManageEngine Password Manager Pro - 70613

Martin Kuppinger

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management, Application-to-Application Privilege Management, or Session Management. The tool counts among the advanced, feature-rich…

Nov 06, 2017

Executive View: Atos DirX Identity - 71702

Martin Kuppinger

Atos DirX Identity is a mature offering for IGA (Identity Governance and Administration), delivering both leading-edge Identity Provisioning capabilities and a strong Access Governance feature set. Atos has made significant improvements when it comes to the ease and flexibility of customization and added a modern, responsive user interface.

Nov 06, 2017

Executive View: BeyondTrust PowerBroker PAM - 70275

Martin Kuppinger

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products for major system architectures, PowerBroker PAM delivers deep support for privilege management on…

Nov 02, 2017

Whitepaper: Airlock: Datenschutz-Grundverordnung (DSGVO): Mehr als nur Consent Management! - 70327

Martin Kuppinger

Die DSGVO oder EU GDPR (General Data Protection Regulation), die ab dem 28. Mai 2018 voll wirksam ist, wird derzeit vor allem mit den Zustimmungsregeln zur Nutzung personenbezogener Daten (Consent) und den Rechten der Betroffenen wie beispielsweise dem „Recht auf Vergessen“ in Verbindung gebracht. Die DSGVO sieht aber auch den angemessenen Schutz von personenbezogenen Daten…

Oct 24, 2017

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

Martin Kuppinger

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks remain at a high level – perimeter security in itself does not protect sufficiently anymore.…

Oct 24, 2017

Whitepaper: ForgeRock: The Effect of GDPR on Customer Relations - 73000

Martin Kuppinger

The upcoming EU GDPR will have significant impact on how business can collect PII of their customers and consumers. Business are well-advised to thoroughly review these changes and prepare. Managing consumer identities consistently across all apps, portals, and services is essential. Identity Platforms provide the foundation for moving to a consistent management of consumer identities and…

Oct 18, 2017

Executive View: Entrust IdentityGuard for Enterprise - 71321

Mike Small

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and logical assets.

Oct 16, 2017

Whitepaper: TechDemocracy: Moving towards a holistic Cyber Risk Governance approach - 70360

Matthias Reinwarth

The ongoing task of maintaining cyber security and risk governance, while providing evidence and communicating efficiently with corporate stakeholders is getting increasingly more important for practically every organization. Understanding the risk posture and providing transparency while aligning cyber security efforts with corporate strategies is a major challenge. The current lack of…

Oct 09, 2017

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

John Tolbert

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

Oct 05, 2017

Executive View: Ubisecure Identity Server - 70838

John Tolbert

Ubisecure Identity Server is an integrated consumer identity and access management suite for on-premise deployment. Ubisecure Identity Cloud is for cloud-based deployments. Ubisecure features strong federation capabilities and the ability to leverage some bank and national IDs.

€190.00 *
Oct 04, 2017

Executive View: Axiomatics Data Security - 70345

Alexei Balaganski

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based Access Control mechanism across multiple data stores, and centralizes policy-based authorization rules for access to corporate data.

Oct 02, 2017

Advisory Note: Redefining Access Governance - Beyond annual recertification - 72579

Matthias Reinwarth

Improve your level of compliance, gain up-to-date insight and reduce recertification workload. Add business risk scoring to your Access Governance Architecture, focus attention on high-risk access and extend your existing infrastructure to provide real-time access risk information. Re-think your existing Access Governance processes and understand upcoming IAM challenges and their impact…

€995.00 *
Sep 27, 2017

Executive View: OpenIAM Identity and Access Management - 70337

Martin Kuppinger

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture and exposes its capabilities through a consistent API layer, which makes it an interesting option…

Sep 26, 2017

Advisory Note: KRIs and KPI for Access Governance - 72559

Mike Small

This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then can be used in IT management and corporate management.

Sep 26, 2017

Executive View: PlainID - 70358

John Tolbert

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technology enables customers to easily externalize authorization decisions from applications, achieving higher efficiencies, more fine-grained access controls, and improved security.

Sep 15, 2017

Executive View: iWelcome IDaaS and CIAM - 70298

John Tolbert

iWelcome provides a complete solution for both Identity-as-a-Service and Consumer Identity and Access Management. As an EU-based company, iWelcome strives to help their customers with GDPR compliance, and as such as provides unparalleled consent management features.

Sep 13, 2017

Executive View: Omada Identity Suite - 70301

Martin Kuppinger

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high degree of automation in application onboarding.

Sep 13, 2017

Executive View: Beta Systems Garancy IAM Suite - 71530

Martin Kuppinger

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role management capabilities.

Sep 11, 2017

Executive View: TITUS Classification for Mobile - 71320

Martin Kuppinger

TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document storage on these devices. It integrates with a variety of other tools and services and is easy to use.

Sep 11, 2017

Executive View: VeriClouds CredVerify™ - 72567

Mike Small

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

€190.00 *
Sep 11, 2017

Buyer’s Guide: Consumer Identity and Access Management Solution - 70259

John Tolbert

Consumer Identity is a fast-growing specialty solution. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for selecting the right CIAM solution for your organization.

Sep 11, 2017

Executive View: IBM Security Identity Governance and Intelligence - 71113

Martin Kuppinger

A business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Providing connectivity to target systems based on direct connectors and via IBM Security Identity Manager.

Aug 21, 2017

Executive View: One Identity SafeGuard 2.0 - 71251

Martin Kuppinger

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities, and other features such as very strong workflow support.

€190.00 *
Aug 18, 2017

Executive View: SAP Fraud Management - 71182

Bruce Hughes

SAP Fraud Management leverages the power and speed of the SAP HANA platform to detect fraud earlier, improve the accuracy of detection and uses predictive analytics to adapt to changes in fraud patterns.

Aug 17, 2017

Leadership Compass: Cloud Access Security Brokers - 72534

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
Aug 17, 2017

Executive View: eperi Encryption Gateway - 70619

Alexei Balaganski

eperi provides an encryption gateway for data stored in the cloud, based on a unique flexible approach based on templates that specify which data should be  encrypted and how. Combined with built-in indexing capabilities, the product enables fully transparent and infinitely extensible end-to-end cloud data  encryption with out-of-the-box support for popular SaaS applications.

Aug 14, 2017

Executive View: SailPoint SecurityIQ - 70849

Martin Kuppinger

SailPoint SecurityIQ counts amongst the leading Data Access Governance solutions, providing tight integration into SailPoint IdentityIQ and thus delivering full Data Access Governance capabilities. Amongst the outstanding features are the real-time and behavioral analytics features and the broad support for unstructured data stores such as file servers, NAS devices, and SaaS data stores.

Aug 11, 2017

Buyer’s Guide: Ransomware Protection - 72599

John Tolbert

Ransomware is a global cybersecurity threat. This KuppingerCole Buyer’s Guide will provide you with questions to ask vendors, criteria to select your vendor, and requirements for successful deployments. This document will prepare your organization to conduct RFIs and RFPs for ransomware protection.

Aug 11, 2017

Advisory Note: Understanding and Countering Ransomware - 70947

Martin Kuppinger

Ransomware is a top security threat and continuously on the rise. Financial organizations, healthcare institutions, and manufacturing industries are the most vulnerable groups; however, individual users as well have been victims of ransomware. The purpose of this Advisory Note is to analyze the concept of ransomware, elaborate on its global reach and provide concrete advice on what to do…

Aug 11, 2017

Executive View: Thycotic Secret Server - 71060

Martin Kuppinger

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach for rapid deployment and an overall strong feature set.

Aug 09, 2017

Executive View: Auth0 Customer Identity Management - 71053

John Tolbert

Auth0 has a flexible identity platform that can be used for both Consumer Identity and Access Management (CIAM), Business - to - Employee (B2E), and Business - to - Business (B2B) scenarios. Auth0’s Customer Identity Management solution is focused on developers an d as such is highly customizable to meet a variety of business requirements.    

Aug 09, 2017

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - 74003

Martin Kuppinger

À l’heure actuelle de la transformation numérique, la plupart des entreprises subissent fortement la pression du changement. Les modèles d’affaires évoluent et ceux qui émergent redéfi nissent profondément la relation aux clients et aux consommateurs. Si la connaissance de ces derniers gagne globalement en pertinence, la majeure…

€900.00 *
Aug 09, 2017

L'etat des organisations: Est-ce que leur Gestion des Identités et des Accès répond aux besoins à l’ère de la transformation digitale? - Management Summary - 74003

Martin Kuppinger

La « Transformation numérique » révolutionne les modèles de gestion et les processus au sein des entreprises, ainsi que les services apportés aux clients. Elle conduit à une intégration étroite entre l‘activité opérationnelle et l‘infrastructure informatique sous-jacente. L’infrastructure…

free
Aug 08, 2017

Leadership Brief: Lösungen für die Personalknappheit in Ihrem Cyber Defense Center - 70268

Martin Kuppinger

Ausreichend und gut qualifiertes Personal für ihr Cyber Defense Center (oder den  IT - Sicherheitsbereich) zu finden ist schwierig. Die Antwort auf die Personalknappheit besteht aus drei Elementen: Ausbildung. Dienstleistungen. Werkzeuge.

Aug 08, 2017

Executive View: Deep Secure Content Threat Removal Platform - 71311

Martin Kuppinger

The Content Threat Removal  Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero - day attacks and prevents data loss, all transparent to end users.

€190.00 *
Aug 04, 2017

Leadership Brief: Schutz gegen Ransomware - 70336

John Tolbert

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

Aug 04, 2017

Leadership Brief: Vorbereitung auf die EU-DSGVO: Sechs Schlüsselaktivitäten - 70340

Mike Small

Mit der kommenden EU-DSGVO (Datenschutz-Grundverordnung) im Mai 2018 verändern sich die Anforderungen an den Umgang mit personenbezogenen Daten. Dieser Report identifiziert sechs zentrale Aktivitäten, die innerhalb der IT unternommen werden sollten, um auf die Erfüllung dieser Anforderungen vorbereitet zu sein.

Aug 03, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte Geschäftsvorgänge ermöglichen? Dieser Report bietet Ihnen einen Leitfaden, der Sie dabei…

€1295.00 *
Aug 02, 2017

Executive View: Microsoft Azure Stack - 72592

Alexei Balaganski

Microsoft Azure Stack is an integrated hardware and software platform for delivering Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) services of Microsoft Azure public cloud on premises, providing a truly consistent hybrid cloud platform for a wide variety of business use cases.

Jul 28, 2017

Executive View: ForgeRock Identity Platform - 70296

Martin Kuppinger

ForgeRock Identity Platform delivers a common set of capabilities, as well as  good  integration for the various ForgeRock components. It provides a common layer  for identity and access management services that customers require when  building new consumer - facing business applications and services, including consumer and industrial IoT support, on their way to the…

Jul 27, 2017

Executive View: SecureAuth IdP - 71327

John Tolbert

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Jul 24, 2017

Executive View: Telekom Magenta Security - 70342

Martin Kuppinger

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für Unternehmen, wenn es um die  Unterstützung und insbesondere Managed Services im Bereich …

Jul 20, 2017

Executive View: Gigya Identity Enterprise - 70299

John Tolbert

Gigya provides a complete solution for  Consumer Identity and Access Management. Entirely cloud - based, Gigya delivers advanced consumer identity and marketing service  functionality for enterprise customers.

€190.00 *
Jul 17, 2017

Executive View: Signicat - 72537

Almir Kolari

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Jul 11, 2017

Executive View: IdentityX® from Daon - 71312

Alexei Balaganski

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk, reducing fraud and securing critical infrastructures.

Jul 11, 2017

Leadership Brief: Cloud Provider Codes of Conduct and GDPR - 70276

Mike Small

Codes of Conduct  can help organizations choose between suppliers.   This report  compares two recently announced codes for cloud service providers and how  these relate to GDPR .

Jul 07, 2017

Executive View: Nexis Controle 3.0 - 72535

Matthias Reinwarth

Nexis Controle 3.0 setzt intelligente Analytics-Verfahren für Rollen und Identitäten um und legt damit die Grundlage für ein strategisches Lebenszyklusmanagement von Rollen, entweder als eigenständige Lösung oder als ergänzende Komponente zu bestehenden Identity- und Access Management-Infrastrukturen. Die bessere Einbindung von bestehendem Wissen im…

Jul 04, 2017

Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance and Federation (IDaaS B2E) - 70319

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting full Identity and Access Management and Governance capabilities for employees in hybrid environments, but also delivering Single Sign-On to the Cloud and providing support for other groups of users. Your compass for finding the right path in the market.

Jul 03, 2017

Executive View: Nexis Controle 3.0 - 72535

Matthias Reinwarth

Nexis Controle 3.0 implements intelligent role and identity analytics while laying the foundation for strategic role lifecycle management as either a stand-alone solution or as a companion component to existing Identity and Access Management infrastructures. The integration of corporate business expertise through targeted workflow and interaction approaches means a leap forward towards…

Jun 30, 2017

Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141

Martin Kuppinger

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the market.

Jun 29, 2017

State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - Management Summary - 74003

Martin Kuppinger

The „Digital Transformation“ is changing business models, business processes, and the services provided to customers. With the Digital Transformation leading to a tight integration between business and the underlying IT infrastructure, that IT infrastructure must change as well for supporting the new business requirements on agility, innovativeness, and security. Identity…

free
Jun 29, 2017

Survey: State of Organizations: Does Their IAM Meet Their Needs in the Age of Digital Transformation? - 74003

Martin Kuppinger

Organizations are under pressure to change in the current age of Digital Transformation. Business models are changing and a common element of new business models is the changing relationship to customers and consumers. While managing consumer identities is increasing in relevance, most information still is held in on-premise systems. The combination of new regulations, such as the…

€900.00 *
Jun 29, 2017

Leadership Brief: 5 Steps to Consumer Identity and Access Management - 72549

John Tolbert

Enterprises deploying Consumer Identity and Access Management (CIAM) solutions are realizing the benefits, which range from increased brand loyalty and sales to enhanced regulatory compliance.

Jun 21, 2017

GDPR and PSD2: Challenges and Opportunities for CIAM

John Tolbert

GDPR and PSD2 will pose enormous technical challenges. Learn more about the challenges and opportunities and how CIAM solutions can help organizations comply with these new regulations. This Leadership Brief shows the slides which correspond with the keynote KuppingerCole Lead Analyst John Tolbert held on June 20, 2017 during the Cloud Identity Summit in Chicago.

free
Jun 20, 2017

Executive View: PingIdentity’s PingDirectory - 70294

John Tolbert

PingDirectory provides a flexible and scalable base for IAM and customer IAM.  With advanced functions for encryption, load-balancing, and virtual directory, PingDirectory can meet and exceed security requirements and SLAs.

Jun 12, 2017

Leadership Compass: Privilege Management - 72330

Martin Kuppinger

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege Management and provides you with a compass to help you to find the Privilege Management product that…

€1295.00 *
Jun 09, 2017

Leadership Compass: CIAM Platforms - 70305

John Tolbert

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing CIAM solutions.

€1295.00 *
Jun 07, 2017

Advisory Note: Identity in IoT - 70282

John Tolbert

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects are connected to the Internet and communicate with other devices and human users. Adding notions of digital identity has been problematic to date, but identity management solutions are on the horizon that will improve usability and security for IoT.

May 31, 2017

Leadership Brief: Six Key Actions to Prepare for GDPR - 70340

Mike Small

From May 2018, when the upcoming EU GDPR (General Data Protection  Regulation) comes into force, the requirements for managing personal data will change. This report identifies six key actions that IT needs to take to prepare for  compliance.

May 30, 2017

Executive View: Salesforce Identity - 70813

John Tolbert

Salesforce has been a pioneer in Software as a Service (SaaS) from the early days.  Digital identity has been an integral part of the Salesforce platform.  Salesforce Identity is an enterprise class CIAM and IDaas solution.

May 22, 2017

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Alexei Balaganski

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for incorporating interoperable and future-proof risk-based biometric authentication into mobile and web…

May 15, 2017

Executive View: Symantec Advanced Threat Protection - 71155

Alexei Balaganski

Symantec Advanced Threat Protection is a unified platform for uncovering and remediating advanced cyber-attacks across endpoints, network and email, which augments existing Symantec endpoint protection and threat intelligence technologies with advanced security analytics capabilities.

May 02, 2017

Executive View: Vendor Overview CyberArk - 70280

Graham Williamson

CyberArk is a pioneer in Privileged Account Security, and is widely recognized as the leader in this sector. Building upon a strong base product, CyberArk has enhanced its offering to include the capabilities that organizations need to secure and manage pr ivileged  accounts and their credentials associated with users, applications, and other system assets across  an…

Apr 28, 2017

Executive View: Securonix SNYPR - 70292

Alexei Balaganski

Securonix SNYPR is an open and modular next-generation security intelligence platform that combines log management, security information and event management, user and entity behavior analytics and fraud detection, serving as a foundation for a broad portfolio of specialized security analytics solutions.

€190.00 *
Apr 26, 2017

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Dan Blum

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained  authorization but break down in the face o f dynamic environments or complex access policies. A…

Apr 21, 2017

Executive View: EmpowerID - 70297

John Tolbert

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Apr 19, 2017

Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811

John Tolbert

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies.

Apr 13, 2017

Leadership Brief: Mobile Connect - 71518

John Tolbert

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Apr 11, 2017

Leadership Brief: How to close the skill gap in your Cyber Defense Center - 72800

Martin Kuppinger

Getting sufficient and sufficiently skilled people for your Cyber Defense Center (or  your IT Security department) is tough. The answer to the skill gaps consists of  three elements: Education.  Services. Tools.

Apr 10, 2017

Executive View: Hitachi ID IAM Suite - 72543

John Tolbert

Hitachi ID offers an all - in - one IAM package to address enterprise business  requirements.   With an emphasis on  process automation and self - service, the  Hitachi ID IAM Suite helps businesses reduce their expenditures on identity - related administration and governance.

Apr 05, 2017

Leadership Brief: Defending against ransomware - 70336

John Tolbert

Ransomware is an epidemic.  Prevention is the best strategy.  Don’t give up and pay the  ransom.

Mar 30, 2017

Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513

Graham Williamson

As a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over their intellectual property. Of late the company has developed a more diversified client base,…

€495.00 *
Mar 30, 2017

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

Paul Simmonds

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the firewall may have a part to play, by using it in a role where it is actually able to be effective.

Mar 29, 2017

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Matthias Reinwarth

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all types of users, end user software and devices can foster efficiency, agility and security in many…

Mar 29, 2017

Executive View: Ping Identity PingOne - 70288

John Tolbert

PingOne provides c loud - based Single Sign - On (SSO)  and Identity - as - a - Service  (IDaaS)  for employees, business partners, and  consumers . PingOne is a  key  component of PingIdentity’s Consumer Identity and Access Management SaaS  offering, supporting social logins, self - registration, and SSO to all popular SaaS  apps.

Mar 21, 2017

Executive View: HexaTier Database Security and Compliance - 71255

Alexei Balaganski

HexaTier provides an all-in-one database security and compliance solution across  multiple platforms with a strong focus on  cloud environments and Database-as-a-Service products.

Mar 20, 2017

Executive View: Cisco Advanced Malware Protection - 72518

Alexei Balaganski

Cisco Advanced Malware Protection (AMP) is an integrated enterprise security intelligence and malware protection solution. By combining global threat intelligence with dynamic malware analysis and continuous endpoint and network monitoring, AMP provides constant visibility and control across all environments before, during, and after a cyber-attack.

Mar 20, 2017

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

John Tolbert

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty.  

Mar 09, 2017

Leadership Compass: Database Security - 70970

Alexei Balaganski

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems, underlying computing and network infrastructures, as well as applications accessing the data.

Mar 09, 2017

The Future of Banking: Management Summary - 74002

Martin Kuppinger

The Finance Industry is facing a profound change with the introduction of PSD2, an update to the 2007 EU Directive on Payment Services. The directive, which comes into force on January 13, 2018, continues Europe´s goal to modernize, unify and open its financial landscape. In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2, such as banks and…

free
Mar 03, 2017

Advisory Note: Mobile Biometrics for PSD2 - 72512

John Tolbert

Many new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial services industry under the Revised Payment Services Directive (PSD2). However, there are several…

€995.00 *
Mar 02, 2017

Survey: The Future of Banking - 74002

Martin Kuppinger

The Future of Banking: Innovation & Disruption in light of the revised European Payment Services Directive (PSD2) In early 2017 KuppingerCole performed a survey amongst the industries affected by PSD2. The primary focus of the survey was on Strong Customer Authentication, API Strategy and KYC & Customer Identity Management, in the context of the changing requirements imposed by…

€900.00 *
Feb 28, 2017

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Mike Small

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure compliance in this hybrid environment.

Feb 27, 2017

Leadership Brief: Securing PSD2 APIs - 72513

John Tolbert

The Revised Payment Service Directive (PSD2) mandates that banks provide APIs for Account Information Service Providers (AISPs), Payment Initiation Service Providers (PISPs) and any Third Party Providers (TPPs) to use.

free
Feb 17, 2017

Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283

John Tolbert

Many new biometric technologies and products have emerged in the last few years.  Biometrics have improved considerably, and are now increasingly integrated into smartphones.  Mobile biometric solutions offer not only multifactor and strong authentication possibilities, but also transactional authorization.  However, there are a number of challenges with biometric…

Feb 16, 2017

Executive View: Ping Identity’s PingFederate - 70284

John Tolbert

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain.

Feb 15, 2017

Executive View: CensorNet Cloud Security Platform - 72529

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve…

Feb 08, 2017

Leadership Compass: Adaptive Authentication - 71173

John Tolbert

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

€1295.00 *
Feb 02, 2017

Whitepaper: Balabit - Privilege Management - 72705

Martin Kuppinger

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User Behavior Analytics are cornerstones of a modern SOC.

Jan 30, 2017

Executive View: AWS Lambda - 72524

Alexei Balaganski

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the Amazon Cloud.

Jan 30, 2017

Executive View: Microsoft Security Suite - 72541

Graham Williamson

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Jan 18, 2017

Executive View: Centrify Privilege Service - 71326

John Tolbert

Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise.  

Jan 17, 2017

Executive View: RSA Identity Governance and Lifecycle - 72503

John Tolbert

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment to access reconciliation to removal.

€190.00 *
Jan 16, 2017

Executive View: Watchful Software RightsWatch - 70848

Dave Kearns

RightsWATCH automatically classifies and protects any file format in accordance with corporate policy based on content, context or metadata-aware policy rules, extending the Microsoft Right Management facility to ensure that sensitive and confidential information is identified and classified appropriately.

€190.00 *
Jan 13, 2017

Executive View: SAP HANA Cloud Platform Identity Authentication and Provisioning - 70290

John Tolbert

SAP HANA Cloud Platform Identity Authentication and Provisioning is a cloud- based platform for provisioning and managing digital identities and access for SAP solutions and more.  

Jan 11, 2017

Advisory Note: Plant Automation Security - 71560

Graham Williamson

Industrial Computer Systems (ICS) are increasingly coming under attack as hackers are realizing the economic and reputational benefit of a successful operations technology system compromise. Organizations seeking to exploit their plant automation systems to drive business processes are deploying communications paths to their ICSs and raising the risk profile of their organizations.

Jan 10, 2017

Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536

Matthias Reinwarth

Achieving risk governance and resilience, while ensuring protection from Cyber risks by creating a standards-based process framework focusing on a risk based approach and implemented using a complementary software platform.

€190.00 *
Jan 05, 2017

Executive View: FSP Identity Governance and Administration Suite - 71324

Martin Kuppinger

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von rollenbasierter und richtlinienbasierter Zugriffssteuerung in einer einzigen Lösung.

€190.00 *

 2016

top  

Date Title Price
Dec 22, 2016

Advisory Note: Enterprise Role Management - 70285

Martin Kuppinger    Matthias Reinwarth

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the right data model, efficient processes and an adequate organization for implementing role management…

Dec 21, 2016

Executive View: ForgeRock Access Management - 71316

John Tolbert

ForgeRock Access Management is a full-feature Identity and Access Management (IAM) system.  It provides numerous authentication options, an adaptive risk engine, identity federation, and advanced policy-based authorization capabilities.   ForgeRock supports open standards development, and that is reflected by the multi-protocol support in ForgeRock Access Management. …

Dec 19, 2016

Executive View: CipherCloud Trust Platform - 72530

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CipherCloud Trust Platform provides a valuable tool that organizations can use to improve governance…

€190.00 *
Dec 14, 2016

Executive View: Skyhigh Cloud Security Platform - 72532

Mike Small

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve…

Nov 25, 2016

Advisory Note: Sustainable Infrastructures through IT Compliance - 72025

Matthias Reinwarth

Well-designed, state-of-the-art compliance programs help in maintaining an adequate IT architecture and its underlying processes. Forward-thinking organisations understand compliance as a strategic and future-oriented business objective, and embed IT Compliance and security into their organizational process framework and transform compliance expenses into strategic budgets.

Nov 24, 2016

Executive View: Vaultive Cloud Data Security Platform - 72533

Mike Small

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor.  This makes it imperative that it is protected against risks of leakage and unauthorized disclosure.  Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting…

Nov 23, 2016

Leadership Compass: CIAM Platforms - 71171

John Tolbert

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

€1295.00 *
Nov 22, 2016

Advisory Note: Consumer Identity and Access Management for “Know Your Customer” - 71701

John Tolbert

Consumer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better. Implementing CIAM can provide better user experiences, generate additional revenue, and enhance brand loyalty. Enterprises want to collect, store, and analyse data on consumers in order to create additional sales opportunities and increase…

Nov 18, 2016

Executive View: Boldon James – Data Classification - 72508

Paul Simmonds

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that information should be handled. Only by providing clear, unambiguous guidance can information be…

Nov 18, 2016

Executive View: Avatier Identity Management Suite - 71510

Dave Kearns

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Nov 17, 2016

KuppingerCole und BARC gemeinsame Studie: Big Data und Informationssicherheit - 74001

Alexei Balaganski

Angesichts immer fortschrittlicherer und häufigerer Cyber-Angriffe sowie der Tatsache, dass die traditionelle Idee des Sicherheitsperimeters fast gänzlich ausgestorben ist, müssen Unternehmen ihre Strategien in Bezug auf Cyber-Sicherheit überdenken. Neue Lösungen für Security Intelligence in Echtzeit (Real-time Security Intelligence) kombinieren Big Data und…

free
Nov 16, 2016

KuppingerCole and BARC Joint Study: Big Data and Information Security - 74001

Alexei Balaganski

As cyber-attacks are becoming increasingly advanced and persistent, and the traditional notion of a security perimeter has all but ceased to exist, organizations have to rethink their cybersecurity strategies. The new Real-Time Security Intelligence solutions are combining Big Data and advanced analytics to correlate security events across multiple data sources, providing early detection…

free
Nov 10, 2016

Advisory Note: KYC as an Enabler in the Financial Services Business Transformation - 72523

Bruce Hughes

The Financial Services Industry (FSI) is undergoing unprecedented evolutionary and revolutionary change.  FSIs need to transform their business models to respond to today’s challenges and to position the business with the flexibility required to adapt to opportunities as the business landscape evolves. This report examines the issues and challenges FSIs face with market…

Nov 09, 2016

Advisory Note: Information Stewardship in the Age of Blockchain - 71602

Karin Gräslund

Blockchain seems to be one of the most important basic technologies of emerging business models and countless entrepreneurial initiatives using it have been started in the recent past. This report provides insights and a closer look at how blockchain technology is most probably improving the current state of Information Stewardship. It highlights the most relevant value proposition,…

Nov 02, 2016

Executive View: Indeed AirKey Enterprise - 71256

Alexei Balaganski

AirKey Enterprise is a software smart card platform that is 100% compatible with existing standards and APIs for traditional smart cards, enabling high security, low cost, and unified management of a hybrid smart card infrastructure.

Oct 27, 2016

Executive View: Securonix Security Analytics Platform - 72507

Alexei Balaganski

Securonix Platform provides advanced security analytics technology for collecting, analyzing and visualizing a wide range of business and security information, converting it into actionable intelligence and serving as a basis for a broad portfolio of specialized security solutions.

€190.00 *
Oct 17, 2016

Executive View: Emerging Threat Intelligence Standards - 72528

Mike Small

Threat intelligence is a vital part of cyber-defence and cyber-incident response. To enable and automate the sharing threat intelligence, OASIS recently made available the specifications for STIX™, TAXII™ and CybOX™ as international open standards. This report provides an overview of these specifications and their application to Real Time Security Intelligence. 

€190.00 *
Oct 14, 2016

Advisory Note: Rising to the Security Challenge of Heavy Cloud Adoption - 72542

Dan Blum

Many enterprises have decided on a “cloud first” strategy, or have seen heavy cloud adoption evolve spontaneously as their business units embrace cloud for cost savings, agility or other competitive imperatives. Security teams face challenges controlling, influencing or enabling cloud adoption. This document provides guidance on how IT security leadership should deal with the…

Sep 28, 2016

Executive View: Sophos Threat Intelligence - 71681

Mike Small

Sophos offers a range of security solutions as software, appliances and cloud services. These products exploit threat intelligence that is gathered by Sophos Labs, shared in real time between Sophos Next-Gen Firewall and Sophos Next-Gen Endpoint Protection, and integrated through Sophos Security Heartbeat. These products include the recently released Sophos Intercept X.

€190.00 *
Sep 27, 2016

Executive View: RSA NetWitness Suite - 72516

Alexei Balaganski

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and investigate sophisticated cyber-attacks. 

Sep 26, 2016

Executive View: VMware Identity Manager - 71455

Martin Kuppinger

VMware Identity Manager bridges the gap between IT Service delivery and access to applications. Available as both an on-premise and a cloud solution, VMware Identity Manager delivers instant SSO to a broad variety of applications and provides contextual experience to VMware WorkspaceOne.

Sep 01, 2016

Executive View: LogRhythm Security Intelligence Platform - 72517

Alexei Balaganski

LogRhythm provides a unified security intelligence platform combining next-generation SIEM, log management, network and endpoint monitoring and forensics with full threat lifecycle management and response orchestration.

€190.00 *
Aug 29, 2016

Executive View: Microsoft Advanced Threat Analytics - 71554

Alexei Balaganski

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious user and device activity within corporate networks.

Aug 26, 2016

Advisory Note: The Impact of Blockchains on Business Process Management and Optimisation - 71609

Bruce Hughes

Distributed and decentralised ledger technology with Smart Contracts and the Internet of Things (IoT) can enhance BPM (Business Process Management) and BPO (Business Process Optimisation) processes significantly. This report examines the role that blockchain-based technologies and IoT can play in streamlining and managing BPM/BPO. 

Aug 25, 2016

Executive View: Ergon Airlock Suite - 72509

Martin Kuppinger

Ergon Informatik, a Swiss software vendor, delivers an integrated solution for Web Access Management, Identity Federation and Web Application Firewall capabilities that shows both breadth and depth in features. Furthermore, it comes with a good set of baseline identity lifecycle management functions, especially for external users. 

€190.00 *
Aug 23, 2016

Leadership Compass: Cloud Access Security Brokers - 71138

Mike Small

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

€1295.00 *
Aug 17, 2016

Advisory Note: The Blockchain and Life Management Platforms - 71606

Ivan Niccolai

The core features of blockchains - decentralization and algorithmic consensus – can enable the creation of Life Management Platforms (LMPs) with better security and availability, as well as promote wider public adoption by providing independently-verifiable proof of personal data integrity. Even though there remain some requirements of LMPs that are not solvable with blockchains,…

Aug 16, 2016

Executive View: Microsoft Azure Blockchain Services - 71332

Ivan Niccolai

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of preconfigured Virtual Machines, developer templates and artefacts, Microsoft Azure’s BaaS offering can significantly lower technical complexity barriers to the adoption of blockchain-powered…

Aug 15, 2016

Leadership Brief: Transforming IAM – not Panicking - 71411

Mike Small

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Aug 09, 2016

Executive View: Beta Systems Garancy Recertification Center - 71315

Christian Himmer

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive browser interface – optimized for usage on desktops, tablets and also on mobile devices.

Jul 26, 2016

Executive View: Deep Identity - 71453

Graham Williamson

Managing provisioning into an identity repository is a basic organizational process that varies remarkably between organizations. Some companies have a highly functional process that minimizes manual input and maximizes efficiency. Others have very manual processes that are costly and open to abuse. Deep Identity has developed an easy-to-use solution that adopts a role-based provisioning…

Jul 22, 2016

Executive View: IBM QRadar Security Intelligence Platform - 72515

Alexei Balaganski

IBM QRadar Security Intelligence Platform provides a unified architecture that combines security information with event management, real-time detection of advanced threats, attacks and breaches, forensic analysis and incident response, as well as automated regulatory compliance.

Jul 21, 2016

Executive View: Sophos Protection for Amazon Web Services - 71680

Mike Small

Sophos UTM is a suite of integrated security applications that provides the same layered protection for applications and data hosted in the AWS cloud as for on premise deployments. This report provides a review of the functionality provided by this set of products and an assessment of its strengths and challenges.

€190.00 *
Jul 19, 2016

Advisory Note: Blockchains and Risk - 71608

Mike Small

A blockchain is a data structure, originally used by bitcoin, that maintains a growing list of transaction records in a way that is extremely resistant to tampering. This technology is seen by many as the basis for creating distributed ledgers for a wide range of applications. This report considers the risks associated with the use of this technology and recommends an approach to managing…

Jul 18, 2016

Advisory Note: The Disruptive Potential of Blockchains in IoT Security - 71612

Ivan Niccolai

Blockchains have the ability offer many solutions regarding the security concerns currently limiting the growth of the Internet of Things (IoT). Blockchains, combined with other decentralised, peer-to-peer technologies can improve IoT security by enabling authenticity and integrity assurance of connected things, scalable management of connected devices, and secure information transmission.

Jul 18, 2016

Advisory Note: Blockchains and Cybersecurity - 71603

Ivan Niccolai

From trusted third parties to algorithmic consensus: new cybersecurity opportunities and challenges with blockchains. Blockchains can provide distributed and decentralised improvements to the merely distributed critical systems the internet depends on today, but we cannot yet completely replace trusted third parties and human judgement with algorithms.

Jul 18, 2016

Executive View: SailPoint IdentityIQ - 71319

Christian Himmer

SailPoint IdentityIQ is one of the leading products in the emerging market for Identity and Access Governance. The governance-based approach centralizes visibility and compliance, and minimizes risk by applying controls across all IAM services geared towards business users. They expand their libary of connectors and extend their integration of Mobile Device Management tools and cloud…

Jul 15, 2016

Executive View: IBM Privileged Identity Manager - 71557

Ivan Niccolai

IBM’s Security Privileged Identity Manager is an across-the-board Privilege Management solution which protects, automates and audits the use of privileged identities and recourses across the extended enterprise, including cloud environments. It stands out from competitors for its fine-grained database privilege management capabilities and well-designed administrator endpoint monitoring.

Jul 06, 2016

Executive View: Auth0 Authentication Service - 71325

Graham Williamson

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are multiple identity providers to accommodate and problems are compounded when members of the public are…

Jul 05, 2016

Executive View: ForgeRock OpenIDM - 71317

Ivan Niccolai

ForgeRock OpenIDM is a standards- and platform-centric product which combines proven reliability with ForgeRock’s commitment to innovation. Given the growing importance of customer-centric identity management, OpenIDM’s focus on performance, flexibility and the management of not only people, but devices and things makes this product worthy of serious consideration for…

€190.00 *
Jul 04, 2016

Executive View: Microsoft Azure Active Directory - 71550

Martin Kuppinger

Directory Services, Identity Federation, and Access Management from the Cloud in a single integrated solution. Extend your Active Directory infrastructure to the Cloud and manage business partners, customers, and Cloud service access in a combined service.

Jul 04, 2016

Executive View: Protected Networks 8MAN - 71520

Martin Kuppinger

8MAN ist eine Access Rights Managment-Lösung für Windows-Umgebungen. Der Fokus liegt auf der Analyse von Berechtigungen und ihrer Verwaltung in solchen Umgebungen. Damit fällt 8MAN in die Kategorie von Entitlement & Access Governance-Lösungen und kann bestehende Identity Management-Lösungen sinnvoll ergänzen.

€190.00 *
Jun 28, 2016

Executive View: EmpowerID Office 365 Manager - 71322

Alexei Balaganski

EmpowerID Office 365 Manager is an Identity and Access Management solution for Office 365 providing single sign-on, user provisioning and administration, and access governance functions in a single integrated package.

€190.00 *
Jun 27, 2016

Executive View: ForgeRock Identity Gateway - 71318

Alexei Balaganski

ForgeRock Identity Gateway is a centralized proxy-based gateway enabling secure access and policy enforcement for web applications, APIs, devices and things. 

Jun 16, 2016

Executive View: AdNovum Nevis Security Suite - 71094

Matthias Reinwarth

A solution for managing secure access to corporate resources and protected assets. Strong authentication, a broad spectrum of access management methods, sustainable maintenance processes of identities and authorization data form the basis for secure and auditable user access to applications.

Jun 15, 2016

Executive View: Bomgar Privileged Access Management - 71307

Matthias Reinwarth

Bomgar Privileged Access Management is a comprehensive solution for managing, controlling and monitoring secure privileged access to critical systems. It implements administrative session management and recording while providing collaboration within sessions and integrates with enterprise infrastructure like IAM, SIEM, ITSM and Change Management systems. 

€190.00 *
Jun 09, 2016

Executive View: Forum Systems Sentry and Identity Federation - 72511

Matthias Reinwarth

Sentry, Forum Systems flagship product, implements a wide range of features: support for a wide range of federation use case scenarios are complemented with API Gateway functionality and mature Web Access Management services.

€190.00 *
Jun 08, 2016

Executive View: Balabit Contextual Security Intelligence Platform - 71306

Alexei Balaganski

Contextual Security Intelligence is a new IT security concept, which states that additional levels of security controls restricting business performance should be avoided and replaced with more efficient monitoring tools. Balabit’s CSI Platform combines Log Management, Privileged Activity Monitoring, and User Behavior Analytics into an integrated real-time security intelligence…

Jun 07, 2016

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

Mike Small

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Jun 02, 2016

Executive View: One Identity Manager v7.0.1 - 70894

Ivan Niccolai

One Identity Manager is well-designed, well-integrated and complete Identity Management solutions, which continues to demonstrate leadership in the IAM/IAG market. Version 7.0.1 builds on the major release (v7), and adds a significant number of new features along with performance improvements thanks to its new modular architecture.

May 24, 2016

Executive View: PingAccess - 71507

Ivan Niccolai

PingAccess is a web and API Access Management offering from Ping Identity. PingAccess is tightly integrated with PingFederate and provides a superior alternative to traditional Web Access Management products with its ability to provide policy- and context-driven access control to traditional on-premise web applications and cloud applications, as well as to REST-based APIs.

May 23, 2016

Executive View: Omada Identity Suite v11.1 - 70835

Ivan Niccolai

Omada Identity Suite is a strong offering which is well-respected for its advanced Access Governance features. New functionality and strategic partnerships position the solution as a comprehensive Identity and Access Management product, with flexible cloud and on-premise deployment options.

€190.00 *
May 20, 2016

Executive View: Universal SSH Key Manager - 71509