Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach to the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.
Language: English • Duration: 54:07 • Resolution: 1920x1080
Ping Identity’s PingFederate
Cisco Zero Trust Security
ARCON PAM SaaS
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity