Access and Identity

Executive View

Executive View: OpenIAM Identity and Access Management - 70337

OpenIAM provides a comprehensive suite for both Identity Management and Access Management, covering the full range from Identity Provisioning and Access Governance to Enterprise SSO, Cloud SSO, and Identity Federation. The product is based on a modern, well-thought-out software architecture…

Advisory Note

Advisory Note: KRIs and KPI for Access Governance - 72559

This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then…

Executive View

Executive View: PlainID - 70358

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technology enables customers to easily externalize authorization decisions from applications, achieving higher…

Webinar

Nov 09, 2017: Industrial Control Systems: Understanding the Access Risks and Security Challenges

For decades, Industrial Control Systems have evolved completely separately from traditional IT, with their own business drivers, requirements and regulations and proprietary hardware designs and network protocols. Needless to say, security from cyberattacks was never a priority for…

Webcast

Eve Maler - UMA deep dive - GDPR, PSD2 - pivot to CIAM

Presentation at the Kantara Workshop

Webcast

The New Role of IAM in the Age of Digital Transformation

Organizations are under pressure to change in the current age of Digital Transformation. One of the key differentiators of innovative digital business models and thus new revenue streams is the profoundly changed relationship to customers and consumers. Creating innovative consumer…

Blog

Recapping CIW Seattle 2017

Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that they do.  Kantara is an international standards organization which develops technical…

Webcast

Cognitive Technologies and the Future of Identity & Access Management

Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just…

Blog

Changes in the Scope of Investors for IAM

As a long-term observer of the IAM market, KuppingerCole finds it interesting to see the change in both the size of investments and the type of investors in this market. Just recently, ForgeRock announced an $88 million round in series D funding. This follows other major investments in IAM…

Executive View

Executive View: Omada Identity Suite - 70301

Omada Identity Suite is a solution for IGA (Identity Governance and Administration), supporting both Access Governance and Identity Provisioning. It provides, amongst many other features, strong automation of entitlement management and insight into access risks, altogether with a high…

Executive View

Executive View: Beta Systems Garancy IAM Suite - 71530

Beta Systems Garancy IAM Suite combines the various modules for Identity and Access Management in the Beta Systems portfolio into one suite. The combined offering delivers a strong feature set with some outstanding capabilities such as the depth of application-specific connectors and role…

Webcast

Consent Lifecycle Management: Consumer IAM’s Core Capability?

2018 is going to be a hell of a year for nearly every organization operating within the European Union. Not only the dreaded General Data Protection Regulation (GDPR) will finally take effect next May, introducing massive changes to the way companies will have to deal with personal…

Executive View

Executive View: TITUS Classification for Mobile - 71320

TITUS Classification for Mobile is a solution that not only supports classification of documents and email on both iOS and Android platforms, but also delivers a secure document storage on these devices. It integrates with a variety of other tools and services and is easy to use.

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Executive View

Executive View: IBM Security Identity Governance and Intelligence - 71113

A business-driven approach to Access Governance and Intelligence, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Providing connectivity to target systems based on direct connectors and via IBM Security…

Webinar

Oct 18, 2017: GDPR: The Six Critical Steps to Compliance and Brand Differentiation

From May 2018 when the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. Companies collecting such information from their customers will have to adapt to fundamental changes both in the very definition of personal…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]