Research

Executive View

KuppingerCole’s Executive View is a short report with four to five pages written by one of KC’s Analysts about a specific client product. In an Executive View an analyst describes the product in a concise manner and shows its strengths and challenges to give end users a short expert reference.
Synacor Cloud ID
Executive View
Synacor Cloud ID
Synacor offers Cloud ID as a highly capable and scalable Consumer Identity and Access Management (CIAM) solution for the consumer services and media streaming market. Their platform is fully...
Oracle Data Safe
Executive View
Oracle Data Safe
Oracle Data Safe is a cloud-based service that improves the security of Oracle databases on-premises and in the cloud by identifying risky configuration, users, and sensitive data, which allows...
Palo Alto Networks XSOAR
Executive View
Palo Alto Networks XSOAR
Security Orchestration, Automation and Response (SOAR) platforms are becoming essential components of security architectures in many organizations around the world. SOAR platforms are designed to...
WALLIX Bastion
Executive View
WALLIX Bastion
WALLIX Bastion is a PAM solution that offers the fundamentals of session management, password management and access management as well as more advanced features such as PEDM and privileged...
Microsoft Cloud App Security
Executive View
Microsoft Cloud App Security
Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to...
Cloudentity Authorization Control Plane
Executive View
Cloudentity Authorization Control Plane
IT organizations often contend with information from multi-security services located on-premises, cloud, and even multi-cloud environments that can be inconsistent, increasing attack risks if not...
Cysiv SOCaaS
Executive View
Cysiv SOCaaS
Cysiv SOCaaS is a Security Operations Center (SOC) as a Service offering based on Cysiv's cloud-native, co-managed platform that is highly scalable, supports multi-tenancy, and ingests telemetry...
HID Global Authentication Platform
Executive View
HID Global Authentication Platform
HID Global offers robust and highly secure solutions for identity and access management, including physical access controls, smart identity card manufacturing and credential issuance, biometric...
BeyondTrust Endpoint Privilege Management
Executive View
BeyondTrust Endpoint Privilege Management
Privileged Access Management (PAM), of which Endpoint Privilege Management (EPM) is a part, is an essential component in protecting organizations against cyber-attacks, ransomware, malware,...
BMC Helix ITSM
Executive View
BMC Helix ITSM
BMC Helix ITSM is flexible, scalable and secure IT Service Management application built on top of a no-code platform enables organizations create their own custom apps. BMC Helix ITSM can be...
SAP Enterprise Threat Detection
Executive View
SAP Enterprise Threat Detection
In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system...
SecurEnds Credential Entitlement Management
Executive View
SecurEnds Credential Entitlement Management
Due to the potential impact of security risks arising from a lack of proper access governance controls, access governance has become a vital IAM technology for any organization. SecurEnds...
Previous
6 7 8 9 10 11 12 Next