Enterprise Key & Certificate Management

Webcast

Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Thanks to the maturity and highly standardized nature of public key infrastructures (and a large number of legacy business applications tied into them), enterprise IT departments continue to rely on the proven technology, but they are feeling an increasing pressure from businesses to…

Webinar

Nov 03, 2016: Reinventing Smart Cards for the Modern Agile, Connected Enterprise

Smart cards have been a key part of any IT department’s security and identity management toolkit for over two decades. They are widely used for such operations like two-factor authentication, digital signatures, data encryption or single sign-on. Smart cards are an integral part of every…

Webcast

You Thought Shadow IT Was Bad? Meet Your Company's Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Webinar

Sep 01, 2016: You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard…

Executive View

Executive View: Universal SSH Key Manager - 71509

Universal SSH Key Manager from SSH Communications Security Corporation is an enterprise-grade solution for centralized automated management of SSH keys across multiple platforms and network devices.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The importance of consent management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed CIAM [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00