Access and Identity

Webcast

Extend your existing Active Directory to the Cloud

KuppingerCole Webinar recording

Webcast

Identity and Access Management: Where to Start?

KuppingerCole Webinar recording

Executive View

Executive View: NetIQ SecureLogin - 71066

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Executive View

Executive View: RSA Aveksa Identity Management & Governance - 70873

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking, to…

Executive View

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Webcast

Enterprise Single Sign-On - is there still a need for?

KuppingerCole Webinar recording

Leadership Compass

Leadership Compass: Identity Provisioning - 70949

Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts…

Blog

Step back and review your IAM program: Why you need to review your IAM/IAG Strategic Planning now

IAM/IAG (Identity Access Management/Governance) is changing. The Computing Troika of Cloud, Mobile, and Social Computing creates new challenges. Different deployment models, new devices and mobile users, and more groups of users to deal with more closely are fundamentally changing the…

Blog

Top Risks of IAM Programmes

IAM risks fit into 4 programme areas, Executive Support, Business Involvement, Strategy and Technology; and one area of the organisation, People. Each of these areas holds a number of risks which must be managed and controlled. 1. Executive Support Risk 1 – Without executive buy-in…

Webcast

Migrating away from your current Identity Provisioning solution

KuppingerCole Webinar recording

Webinar

May 06, 2014: How to stop the Insider Threat: Protect yourself from Privileged Users

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors,…

Vendor Report

Vendor Report: VASCO Data Security International - 70923

VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Road To CIAM Success – Why an Identity Fabric Powers Digital Transformation

The Ugly Face of Yesterday’s CIAM We all have multiple different personas. But before we put on our hats as identity “experts” -  either as architects, implementers or vendors - let us start by simply being consumers.  Consumers of online services for banking, e-commerce, education, entertainment, and more.  And by thinking as consumers, we can all tell endless stories of poor user experiences with respect to using those services. Those poor user experiences [...]