Authentication

Executive View

Executive View: Duo Security - 71330

Duo Security provides a scalable multi-factor authentication solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity of user identity verification while monitoring the health of their devices before connecting them to the applications…

Webcast

Authentication & Authorization for the Microservices World

Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules…

Blog

Administrative Security in Security Products

At KuppingerCole, cybersecurity and identity management product/service analysis are two of our specialties. As one might assume, one of the main functional areas in vendor products we examine in the course of our research is administrative security. There are many components that make up…

Webinar

Dec 05, 2017: Authentication & Authorization for the Microservices World

As businesses are expanding their presence in the cloud, they are increasingly looking into innovative approaches towards software development and operations that allow them to bring their applications to the market faster, to make them more adaptable and scalable to the ever-changing…

Executive View

Executive View: Entrust IdentityGuard for Enterprise - 71321

Securely authenticating users is a major problem given the increasing threats from cyber-crime. Entrust IdentityGuard for Enterprise provides a comprehensive solution for enterprises to select and manage the way in which organizational users are authenticated to access both physical and…

Leadership Brief

Leadership Brief: Why Adaptive Authentication Is A Must - 72008

Adaptive Authentication, or the practice of varying authentication methods based on runtime evaluation of risk factors, is a requirement for accessing applications, resources, devices, networks, and even cyber-physical systems.

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Executive View

Executive View: SecureAuth IdP - 71327

SecureAuth provides a strong, well-integrated set of identity management solutions covering Multi-Factor Authentication, Risk-based Adaptive Authentication, Single Sign-On, and User Self-Service.       

Blog

The Return of Authorization

Authorization is one of the key concepts and processes involved in security, both in the real world as well as the digital world.  Many formulations of the definition for authorization exist, and some are context dependent.  For IT security purposes, we’ll say authorization…

Executive View

Executive View: Telekom Magenta Security - 70342

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für…

Executive View

Executive View: Signicat - 72537

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Executive View

Executive View: IdentityX® from Daon - 71312

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk,…

Webcast

Denis Joannides - Empowering the Digital Insurers

In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to a digital Insurer. Denis discusses the importance of a secure infrastructure including…

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Executive View

Executive View: EmpowerID - 70297

EmpowerID provides  a complete solution for IAM, CIAM, and Adaptive  Authentication.  With a highly  customizable workflow and authorization engine,  EmpowerID delivers advanced functionality for  enterprise and government  customers.

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Blog

GDPR as an Opportunity to Build Trusted Relationships with Consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live…

Advisory Note

Advisory Note: Mobile Biometrics for PSD2 - 71512

Many new biometric technologies and products have emerged in the last few years. Mobile biometric solutions offer multi-factor and strong authentication possibilities, as well as transactional authorization. Mobile biometrics will become an important architectural component in the financial…

Conference

Nov 27 - 29, 2017: Consumer Identity World Europe 2017

Managing customer information in a digitally transformed economy with numerous business partners demanding access is one of the most significant challenges today, and it will continue to evolve rapidly. Besides that, the challenge is to offer user-friendly login procedures via social media…

Blog

PSD2 RTS Final Draft: The good and the not-so-good

The European Banking Authority released the final draft of the Regulatory Technical Specifications for PSD2 this week.  It contains several improvements and clarifications, but there are still a few areas that fall short of industry expectations. After the release of the initial…

Advisory Note

Advisory Note: Mobile Biometrics for Authentication and Authorization - 70283

Many new biometric technologies and products have emerged in the last few years.  Biometrics have improved considerably, and are now increasingly integrated into smartphones.  Mobile biometric solutions offer not only multifactor and strong authentication possibilities, but also…

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Blog

PSD II, Adaptive Authentication, and Multi-Factor Authentication

The upcoming updated Payment Services Directive (PSD II) will, among other changes, request Multi-Factor Authentication (MFA) for all payments above 10€ which aren’t done electronically. This is only one major change PSD II brings (another major change are the mandatory open…

Executive View

Executive View: TechDemocracy CRS&G Cyber Risk Governance Services Framework - 72536

Achieving risk governance and resilience, while ensuring protection from Cyber risks by creating a standards-based process framework focusing on a risk based approach and implemented using a complementary software platform.

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Regulatory Compliance a Potential Driver of Cloud Migration

Newly announced AWS offerings of Access Analyzer, Amazon Detective and AWS Nitro Enclaves discussed in my last blog post, further round out AWS’s security services and tools such as Amazon GuardDuty that continuously monitors for threats to accounts and workloads, Amazon Inspector that assesses application hosts for vulnerabilities and deviations from best practices, Amazon Macie that uses machine learning to discover, classify, and protect sensitive data, and AWS Security Hub, a unified [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00