Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Evolveum MidPoint 4.8 Release
Executive View
Evolveum MidPoint 4.8 Release
This KuppingerCole Executive View looks at the new features in release 4.8 of Evolveum’s midPoint IGA platform. Evolveum continues to innovate midPoint by introducing new features around advanced...
ARCON Security Compliance Management
Executive View
ARCON Security Compliance Management
This KuppingerCole Executive View Report looks at some of the options available to IT leaders and security strategists to manage security compliance across their IT estate. A technical review of...
Tanium XEM Platform
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
cidaas CIAM
Executive View
cidaas CIAM
cidaas offers a complete customer identity and access management solution (CIAM) with many standard and advanced features. The cidaas solution is based on a micro-services architecture which...
Thales OneWelcome Identity Platform
Executive View
Thales OneWelcome Identity Platform
This KuppingerCole paper looks at the Consumer Identity and Access Market and the key capabilities of vendors in this space. A technical review of the Thales OneWelcome Identity Platform is included.
ShardSecure Microshard Technology
Executive View
ShardSecure Microshard Technology
Organizations find themselves at the crossroads of data sovereignty and data privacy, resulting from cloud adoption. This has led to compliance with cross-border data protection laws and...
AWS Elastic Disaster Recovery
Executive View
AWS Elastic Disaster Recovery
Data resilience and disaster recovery solutions are an essential element of business continuity plans and, as organizations go through digital transformation and become more dependent upon their IT...
Oracle Security Zones
Executive View
Oracle Security Zones
Poorly managed security controls within a cloud services tenant’s resources are increasingly the cause of security incidents and compliance failures. Today’s dynamic infrastructure and development...
Akana by Perforce
Executive View
Akana by Perforce
Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business...
Orca Cloud Security Platform
Executive View
Orca Cloud Security Platform
Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. Today's dynamic infrastructure and development...
Microsoft Cloud App Security
Executive View
Microsoft Cloud App Security
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to...
HID Global Fraud Prevention Offering
Executive View
HID Global Fraud Prevention Offering
HID Global offers robust and secure solutions for identity and access management, including a highly scalable authentication platform, physical access controls, smart identity card manufacturing...
Previous
1 2 3 4 5 6 7 Next