skip to Main Content

Identity and Trust - Further Information

This page shows up to 100 pieces of content (newest at the top):

00002729 - ZERO TRUST MUTABLE Spotlight cover thumbnail

How a zero trust approach can help to achieve effective and mutable digital transformation

Implementing a zero trust framework is key for securing digital transformation efforts. This paper explains what is required and outlines the benefits.
SAP (Data Quality) InBrief cover thumbnail

SAP Data Quality

Bloor Evaluates the latest SAP Data Quality offering, a cloud-based solution that will gradually supersede its previous data quality products.
DISRUPTERS IN THE PRIVILEGE MANAGEMENT MARKET Spotlight (cover thumbnail)

Disrupters in the Privilege Management Market

Over the past few years, a raft of new, innovative vendors have sprung up to disrupt the privilege management market.
PRIVILEGE MANAGEMENT Spotlight (cover thumbnail)

Privilege Management - Protection for what you need the most… putting identity on the frontline

In the field of identity management, managing privileges assigned should be a very high priority. Stealing credentials is a top tactic for attackers.
PRIVILEGE MANAGEMENT TECHNOLOGIES MarketUpdate (cover thumbnail)

Privilege Management Technologies

This Market Update showcases the best known vendors and technologies in the privilege management space.
Cover for The state of play for identity management services

The state of play for identity management services - evidence from organisations in Germany and the UK

The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing.
Cover for CSI Tools

CSI Tools - Access Governance for Identities in SAP Environments

CSI Tools provide the automation required to solve the access governance problems that are inherent in SAP environments.
Cover for Identity & Access Management Services

Identity & Access Management Services

This document provides a snapshot of the current state of the market for identity and access management services.
Cover for Identity management services

Identity management services - bringing external services into the mix

In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation.
Cover for Getting ahead in the cloud

Getting ahead in the cloud - ...the need for better identity and access controls

This paper discusses recent developments in identity and access management technologies for cloud-based applications.
Cover for Identity Management as a Service

Identity Management as a Service

This Market Update covers IdMaaS solutions from seven vendors in the current market place.
Cover for Identity Management

Identity Management

Allowing access to your business systems a security nightmare? New Identity Management Report could help you sleep at night.
Cover for Computer Associates’ Identity and Access Management Suite r8

Computer Associates’ Identity and Access Management Suite r8

No summary available. For further information please contact us.
Back To Top