Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Keyless Biometric Authentication
Executive View
Keyless Biometric Authentication
Keyless specializes in advanced authentication technologies to help customers increase authentication assurance and decrease risks of data leakage. Keyless delivers passwordless authentication...
BigID
Executive View
BigID
In today's data-centric world, it has become paramount to protect sensitive data and help organizations face mounting regulatory requirements, challenges, and compliance risks. BigID enables...
Microsoft Azure Active Directory
Executive View
Microsoft Azure Active Directory
From small businesses to large enterprises, organizations today require a solid foundation for their Identity and Access Management (IAM) services. These services are increasingly delivered as...
R&S®Trusted Gate - Secure Glocalization by  Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity
Rohde & Schwarz Cybersecurity offers reliable management of regulated and sensitive information to promote compliant collaboration and file sharing in unified SharePoint platforms for organizations...
IRM-Prot-On
Executive View
IRM-Prot-On
Sharing enterprise information is both a security risk and a necessity of the modern enterprise. IRM-Prot-On of Grupo CMC is a strong provider of enterprise information protection services. The...
BehavioSec
Executive View
BehavioSec
BehavioSec is a fraud risk analysis and authentication solution provider whose products leverage advanced behavioral biometrics and Artificial Intelligence / Machine Learning detection technology...
SAP Enterprise Threat Detection
Executive View
SAP Enterprise Threat Detection
In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system...
Oxyliom Solutions GAÏA Advanced Identity Management
Executive View
Oxyliom Solutions GAÏA Advanced Identity Management
The GAÏA Advanced Identity Management component of the GAÏA Trust Platform by XAYONE (formerly known as Oxyliom, referred to as Oxyliom in this report) integrates the key elements of identity...
Cysiv SOCaaS
Executive View
Cysiv SOCaaS
Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ingests telemetry...
R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Executive View
R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Transparent, data-centric security for untrusted infrastructures. Reliable control and monitoring of sensitive information stored in public clouds and collaboration tools (e.g. Microsoft Office...
OneWelcome Customer Identity and B2B identity
Executive View
OneWelcome Customer Identity and B2B identity
OneWelcome is the combined brand after the merger of iWelcome and Onegini, two leading Identity as a Service providers that are based in the Netherlands. OneWelcome offers a full-featured IDaaS for...
Archer Integrated Risk Management
Executive View
Archer Integrated Risk Management
Today’s GRC solutions offer better alignment with corporate objectives, increased transparency, superior information risk management and more cost-effective compliance. This paper looks at the...
Previous
1 2 3 4 5 6 7 Next