Access and Identity

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought…

Webcast

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.

Executive View

Executive View: CyberArk Privileged Session Manager for Web - 79034

Securing and monitoring privileged access to cloud environments is a crucial security requirement, more so because privileged accounts are powerful, shared in nature and generally accessible from outside the organization. IAM leaders responsible for privileged access management (PAM) must…

Webinar

May 09, 2019: Next-Gen Identity Analytics and Access Governance Approach

Identity Governance and Administration (IGA) is undoubtedly one of the most valued but complex and lengthy technology implementations. While IAM leaders are still trying to figure out the complexities of IGA, the massive cloud uptake with the advent of machine learning accelerates identity…

Leadership Compass

Leadership Compass: Privileged Access Management - 79014

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased…

Webcast

Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart…

Webinar

May 28, 2019: All the Roads Lead to the C, Paved with B2B

More and more organizations use CIAM for B2B use cases as such combination can help companies position themselves on the market. While no one argues that user experience journey for the B2B Customer is just as important as any other customer, they most certainly need a relatively different…

Executive View

Executive View: Krontech SingleConnect - 80031

Krontech offers an integrated Privileged Access Management (PAM) platform comprising of several technology modules targeted at specific PAM functions. With a simplified approach to PAM, Krontech offers a promising alternative to other new market entrants, owing to its faster deployment…

Executive View

Executive View: Thycotic Privilege Manager - 80004

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a direct impact on an organization’s security posture. Thycotic Privilege Manager is a market leading EPM…

Webinar

Apr 30, 2019: Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems.

Executive View

Executive View: Kleverware IAG - 80042

Kleverware is a French software company that is focused on delivering a lean, targeted solution for Identity & Access Governance (IAG). Their solution Kleverware IAG allows for rapidly implementing access reviews and entitlement reporting, and can easily collect and homogenize…

Whitepaper

Whitepaper: PATECCO Privileged Access Management Services - 80037

Privilege Management is the set of critical cybersecurity controls that deal with the management of security risks associated with privileged access in an organization. Maintaining control over privileged users, extended privileges and shared accounts demands for a well-integrated solution,…

Executive View

Executive View: Ilantus Compact Identity - 80052

IDaaS is fast becoming the new face of Identity and Access Management (IAM) with several vendors now delivering cloud-based IAM services to support the whopping cloud uptake by the business. Ilantus Compact Identity is an entry level enterprise IDaaS offering targeted at SMB customers to…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Palo Alto Networks Continues to Bet on Security-as-a-Service

The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an effort to round out its offerings to meet what it expects will be growing market demand. A key element of its go-to market strategy is in response to market demand to reduce the complexity of security and to reduce the number of suppliers by adding cloud-delivered so Software-Defined Wide Area Network [...]