Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
SailPoint Identity Security Cloud
Executive View
SailPoint Identity Security Cloud
SailPoint Identity Security Cloud is a cloud-based identity security solution that helps organizations manage access to their applications, data, and other resources. The platform provides a...
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
ForgeRock Identity Orchestration
Executive View
ForgeRock Identity Orchestration
Identity and access management (IAM) systems represent the front door to every digital organization. They can provide a welcoming experience, or they can make it difficult to get in. They can...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure...
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Beyond Identity Secure DevOps
Executive View
Beyond Identity Secure DevOps
Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...
Cymmetri Identity Platform
Executive View
Cymmetri Identity Platform
Cymmetri is a converged cloud-based IAM solution that facilitates verification, authentication, and authorization for employees, partners, contractors, and customers. The modern platform also makes...
AWS Elastic Disaster Recovery
Executive View
AWS Elastic Disaster Recovery
Data resilience and disaster recovery solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT...
PingOne Authorize
Executive View
PingOne Authorize
Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both...
1 2 3 4 5 6 7 Next