Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules are deployed independently and only communicate over standard protocols or APIs, they lend themselves to continuous delivery and continuous integration processes, reducing costs and risks of developing new features. However, with an increasing number of microservices, the complexity of adding security and identity capabilities to each of them can quickly get out of hand. By externalizing and centralizing identity and access management, organizations can ensure a secure and consistent identity and access management across on-premises and cloud infrastructures, as well as promote DevOps best practices.
Language: English • Duration: 59:26 • Resolution: 1280x720
Ping Identity’s PingFederate
Cisco Zero Trust Security
ARCON PAM SaaS
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity