Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Thales OneWelcome Identity Platform
Executive View
Thales OneWelcome Identity Platform
This KuppingerCole paper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is included.
Britive
Executive View
Britive
This Executive View report examines cloud entitlement management challenges companies face. It also provides a concise analysis of the Britive platform that enables cloud-first security best...
NRI Secure Uni-ID Libra 2.7
Executive View
NRI Secure Uni-ID Libra 2.7
Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a...
Pathlock Platform
Executive View
Pathlock Platform
This KuppingerCole Executive View report looks at the Pathlock Platform, a SaaS-based solution for managing access and entitlements in Line of Business (LoB) solutions such as SAP.
Devolutions Server and Remote Desktop Manager
Executive View
Devolutions Server and Remote Desktop Manager
CISOs must provide secure, rapid access to on-premises, IaaS and SaaS computing environments. It requires a rethink on traditional approaches to authentication, including to privileged resources....
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
SailPoint Identity Security Cloud
Executive View
SailPoint Identity Security Cloud
SailPoint Identity Security Cloud is a cloud-based identity security solution that helps organizations manage access to their applications, data, and other resources. The platform provides a...
ExeonTrace NDR
Executive View
ExeonTrace NDR
Network monitoring is a foundational element of security architecture. Sophisticated attackers may deliberately delete logs on servers and endpoints to cover up their tracks. This means that the...
ForgeRock Identity Orchestration
Executive View
ForgeRock Identity Orchestration
Identity and access management (IAM) systems represent the front door to every digital organization. They can provide a welcoming experience, or they can make it difficult to get in. They can...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
In recent years, investment into cybersecurity has soared but, in most cases, these efforts have not fully addressed the reliance on passwords and the challenges they introduce. Without secure...
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
Beyond Identity Secure DevOps
Executive View
Beyond Identity Secure DevOps
Organizations that fail to secure access to resources are at risk of suffering from cyberattacks, data loss or compliance failure. As the market grows and business demands become more acute,...
Previous
1 2 3 4 5 6 7 Next