Access and Identity

Vendor Report

Vendor Report: Jericho Systems – Attribute-Based Access Control - 71513

As a long-term contractor to the Dept. of Defense in the United States, Jericho Systems have a history of developing technology that protects computing assets from unauthorized access. Their development activity has attracted a number of awards and the company has been granted patents over…

Advisory Note

Advisory Note: Firewalls Are Dead - How to Build a Resilient, Defendable Network - 72163

The firewall is dead  – long live the firewall.... In today’s modern business the traditional firewall model, sitting at the corporate perimeter, has little value, and more often than not hinders business agility. In building a modern, resilient and defendable network the…

Webcast

Creating Secure and Unified Next Generation Workspaces

Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of…

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all…

Executive View

Executive View: Ping Identity PingOne - 70288

PingOne provides c loud - based Single Sign - On (SSO)  and Identity - as - a - Service  (IDaaS)  for employees, business partners, and  consumers . PingOne is a  key  component of PingIdentity’s Consumer Identity and Access Management SaaS …

Blog

GDPR as an Opportunity to Build Trusted Relationships with Consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live…

Whitepaper

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand…

Webcast

GDPR as opportunity to build trusted relationships with consumers

The new regulations of the EU GDPR apply not only to companies in the EU but every organization dealing with the personally identifiable information of EU citizens. This means most enterprises across the world will be impacted when compliance is required on May 25, 2018.

Webinar

Apr 27, 2017: Rollenmanagement erfolgreich etablieren sowie sicher und effizient betreiben

Das Management des sicheren Zugangs zu Ressourcen innerhalb einer Organisation ist eine der zentralen Aufgaben im Bereich des Identity und Access Managements. Die Aufgliederung existierender organisatorischer Komplexität durch deren Abbildung in handhabbare Rollen ist eine kontinuierliche…

Advisory Note

Advisory Note: Mobile Biometrics for PSD2 - 72512

Many new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]