SWOT Assessment: SafeNet Authentication Service v3.3
|
|
- Moris Griffin
- 7 years ago
- Views:
Transcription
1 SWOT Assessment: SafeNet Authentication Service v3.3 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT Publication Date: 25 Nov 2013 Author: Andrew Kellett SUMMARY Catalyst Securing safe access to business systems while retaining usability and ease of access for authorized users has always been a difficult balancing act. The ever-increasing use of cloud-based applications and the growing range of mobile facilities available to business users add extra layers of complexity. At the same time, cloud and mobile services provide new identity management opportunities. SafeNet, with its extensive range of cloud-based identity management products, offers hardware and software-based authentication and access control facilities for enterprise and service provider clients. Central management from a single portal and the ability to map user authentication and access rights to business risk at the time of access underpins the SafeNet solution, and also drives the need for more flexible and secure identity management services. Key messages SafeNet cloud-based authentication services are relevant to both the service provider community and enterprise clients. Service providers (SPs) are afforded the facilities to deliver a secure, own-branded and managed, virtual authentication and access control service, without the overheads of major infrastructure investment. Multi-tier management enables SPs to manage all their subscribers from a single portal. Services for enterprise clients offer efficiencies and savings driven by high levels of automation for policy controls, self-service provisioning, user management, and reporting. Cost savings are made through reduced administration and infrastructure overheads. The growth in cloud-based security services is changing the dynamics of the identity management sector, as is the growing use of cloud-based applications and services in enterprises. However, there are a number of organizations that for business and compliance Ovum. Unauthorized reproduction prohibited Page 1
2 reasons cannot and will not move their operations or identity management controls to a cloud-based service. Ovum view Cloud and mobility is transforming the way users consume business services. For the vast majority of public and private sector organizations, the changes are already underway. Ovum research shows that less than 20% of enterprise organizations have no cloud deployments, and up to 80% of users claim to have mobile access to business systems. For many organizations the traditional platform approaches to managing identity have proved too difficult to support and too costly to maintain. The opportunity to move services to the cloud, and at the same time reduce cost and management overheads is attractive on a number of levels. This is particularly the case if the solution on offer supports seamless, single sign-on (SSO) between core operational systems and cloud-based applications and services. Small-to-medium businesses (SMBs) have often been excluded from mainstream identity management because of the cost and support overheads. For cloud-based alternatives they are a significant target, along with larger organizations that do not have the internal IT resources to support complex security issues. SafeNet offers the flexibility and coverage to support service providers and enterprise clients. The company's cloud-based identity management platform allows customers to consume strong authentication services from the cloud, but does not force clients to rip and replace existing identity management products. It supports a phased and automated approach to migration while retaining the ability to support third-party tokens and services. RECOMMENDATIONS FOR ENTERPRISES Why consider the SafeNet Authentication Service SafeNet offers a viable, cloud service alternative to the traditional platform approach to identity management. The SafeNet Authentication Service provides secure, automated, authentication-as-a service and web SSO without the infrastructure, support, and cost overheads of the traditional identity management model. Strong authentication is supported using scalable, flexible, and automated workflows and application program interfaces (APIs), and by taking a vendor-agnostic approach to the wide range of hardware and software tokens that it is able to work with. Deployment to SafeNet's cloud environment is quick and relatively painless for business clients and their users and devices. SafeNet offers: A choice of hosted and on-premise identity management services. A multi-tiered and multi-tenanted approach allows service providers to manage unlimited numbers of organizations, and enterprises to control disconnected operational groups. Integrated billing facilities enable service providers to manage the commercial aspects of their operations. Ovum. Unauthorized reproduction prohibited Page 2
3 The fully customizable white-label approach allows portal and token branding, and local language customization for user interfaces. Automated support extends to user synchronization, token provisioning, traditional RADIUS applications and SAML-based services, reporting and alerts, security policy application, and self-service enrolment. A self-service portal is available to help reduce help-desk call volumes. Automated reporting and preconfigured reports are available, as is integration with mainstream security information and event management (SIEM) systems. SWOT ANALYSIS Strengths Flexibility and service meets the needs of enterprise clients and SPs SafeNet offers hosted and on-premise choices for its cloud-based identity management services. It delivers a fully out-sourced solution for enterprise clients, while service providers can build a scalable offering within their own services-based operations. Automation of service reduces operational and management overheads A fully automated approach to service delivery reduces support and management overheads. It also cuts back on cost and complexity issues normally associated with running strong authentication solutions. Automation includes: user synchronization, token provisioning, SAML service registration, reporting, security policy application, self-enrolment, and alerting services. Enterprise operability is driving the SafeNet service SafeNet offers support for a wide range of operational systems and services including integration with traditional RADIUS applications and newer SAML-based services. There is support for services and applications delivered from outside the enterprise and for integration with the third-party offerings of the service provider community and systems integrators. Weaknesses Identity as a service has limits to its appeal Identity as a cloud-based service is already changing the dynamics of the identity management sector. There is also significant market potential for further take up. That notwithstanding, there are a substantial number of organizations that for business and compliance reasons cannot and will not move their operations or identity management controls to a cloud-based service provider. For these scenarios, SafeNet offers an on-premises version of its cloud service, which enables service providers to host the service themselves. Ovum. Unauthorized reproduction prohibited Page 3
4 High levels of competition make it important not to undersell the brand The delivery of identity management services from the cloud is already one of the most competitive areas of the security marketplace. It is important not to undersell the brand. SafeNet already has a large client base, but with its white label and partnering approach many customers will not be aware they are using its products. Opportunities Product convergence within the services sector provides opportunities The adoption of cloud and SaaS applications continues to rise, increasing the requirement for a consistent identity bridge as more users have remote, across-platform requirements. It increases the need to align authentication and SSO services as the pressure to actively reduce the number of accounts and passwords each user needs to remember grows. Cloud-based authentication offers important new market opportunities Increased need for strong authentication in business environments will lead to new groups of users consuming cloud-based authentication services. These include organizations that are expanding operations to use cloud-based applications and services, the smaller number of cloud-only users, and the growing number of organizations that rely on a service provider to oversee identity management services. Mobile device usage creates both problems and opportunities The widespread adoption of mobile computing platforms creates situations where users have multiple identities and require access to business systems from more than one endpoint device. There are good opportunities to make use of mobile devices as "the something that the user owns" component of authentication, and as the security on these devices matures, as a platform for generating one-time tokens for SSO access. Threats Too many solutions and too little in the way of consistency The cloud services sector of the identity management market is overburdened with new entrants and technology that lacks the maturity to deliver the levels of service that businesses are demanding. Identity platform vendors see the cloud as a new opportunity In addition to the new entrants to the identity management sector, established service providers such as SafeNet are coming under pressure from mainstream identity management vendors that see identity-as-a-service as a natural extension of their existing product portfolios. Ovum. Unauthorized reproduction prohibited Page 4
5 DATA SHEET Key facts about the solution Table 1: Data sheet: SafeNet Authentication Service Product name SafeNet Authentication Service Product classification Cloud-based authentication and SSO solution Version number 3.3 Release date June 2013 Industries covered Manufacturing, pharmaceuticals, healthcare, financials, government and public sector, healthcare, law enforcement, IT, retail Geographies covered All Relevant company sizes All Platforms supported This is a web-based service that can be accessed by any Internet-connected browser Languages supported Services can be customized for all languages Licensing options Per-user per-year licensing Deployment options On-premise, on-premise (managed), hosted (dedicated), and SaaS Route(s) to market Via the service provider channel, direct sales, and other distribution channels URL Company headquarters Belcamp Maryland US European headquarters Camberley North America headquarters As company headquarters UK Asia-Pacific headquarters Hong Kong Source: Ovum APPENDIX Further reading Methodology Cloud: Transforming the IAM Industry, IT (July 2013) Security Challenges in the Authentication Sector, IT (August 2013) Ovum SWOT Assessments are independent reviews carried out using Ovum s evaluation model for the relevant technology area, supported by conversations with vendors, users, and service providers of the solution concerned, and in-depth secondary research. Ovum. Unauthorized reproduction prohibited Page 5
6 Author Andrew Kellett, Principal Analyst, Infrastructure and Security We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at consulting@ovum.com. Disclaimer All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher, Ovum (an Informa business). The facts of this report are believed to be correct at the time of publication but cannot be guaranteed. Please note that the findings, conclusions, and recommendations that Ovum delivers will be based on information gathered in good faith from both primary and secondary sources, whose accuracy we are not always in a position to guarantee. As such Ovum can accept no liability whatever for actions taken based on any information that may subsequently prove to be incorrect. Ovum. Unauthorized reproduction prohibited Page 6
SWOT Assessment: Eccentex AppBase v5.0
SWOT Assessment: Eccentex AppBase v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002764 Publication Date: 29 Jul 2013 Author: Sue Clarke SUMMARY Catalyst Eccentex
More informationSWOT Assessment: FireMon Security Manager Suite v7.0
SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY
More informationSWOT Assessment: dotcms dotcms v2.5
SWOT Assessment: dotcms dotcms v2.5 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002855 Publication Date: 13 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Traditional
More informationCase Study: Unifying ITSM Practices and Technology
Case Study: Unifying ITSM Practices and Technology SBM Offshore Reference Code: EI025-000007 Publication Date: 17 Jun 2014 Author: Adam Holtby SUMMARY Catalyst As a result of corporate expansions, mergers,
More informationSecunia Corporate Software Inspector (Secunia CSI) ver.5.0
TECHNOLOGY AUDIT Secunia Corporate Software Inspector (Secunia CSI) ver.5.0 Secunia Reference Code: OI00070-107 Publication Date: December 2011 Author: Andy Kellett SUMMARY Catalyst Organizations need
More informationImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
More informationOn the Radar: Tessella
On the Radar: Tessella Creating an archive for the long-term preservation of digital content Reference Code: IT014-002789 Publication Date: 04 Sep 2013 Author: Sue Clarke SUMMARY Catalyst Ensuring that
More informationSWOT Assessment: CoreMedia, CoreMedia 7
SWOT Assessment: CoreMedia, CoreMedia 7 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002848 Publication Date: 09 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Web
More informationSWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
More informationSecunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
More informationOn the Radar: NextPlane
On the Radar: NextPlane Unified communications federation delivered via the cloud Reference Code: IT016-001534 Publication Date: 24 Sep 2013 Author: Saurabh Sharma SUMMARY Catalyst NextPlane UC Exchange
More informationOn the Radar: EMC Supplier Exchange
On the Radar: EMC Supplier Exchange Addressing key issues for managers of complex contracts in energy and engineering Reference Code: IT023-000006 Publication Date: 11 Jun 2014 Author: Warren Wilson SUMMARY
More informationSWOT Assessment: CoreMedia, CoreMedia Platform
SWOT Assessment: CoreMedia, CoreMedia Platform Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 12 May 2016 Product code: IT0014-003122 Sue Clarke Summary Catalyst Organizations
More informationEntarian ForestSafe version 4.1
TECHNOLOGY AUDIT Entarian ForestSafe version 4.1 Reference Code: OI00197-010 Publication Date: April, 2012 Author: Andrew Kellett SUMMARY Catalyst One of the most challenging areas within IT security concerns
More informationDocAve Software Platform
TECHNOLOGY AUDIT DocAve Software Platform AvePoint Reference Code: OI00069-021 Publication Date: July 2011 Author: Mike Davis SUMMARY Catalyst AvePoint's DocAve Software Platform v5.6 provides an enterprise-strength
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationSAFENET FOR SERVICE PROVIDERS. Deliver Data Protection Services that Boost Revenues and Margins
SAFENET FOR SERVICE PROVIDERS Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing some vexing security challenges. Give them a winning solution
More informationSWOT Assessment: BMC Remedy v9
SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an
More informationOn the Radar: CipherCloud
Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology
More informationSpecializing in visualizing and analyzing clinical trials data
ON THE RADAR Comprehend Systems Specializing in visualizing and analyzing clinical trials data Reference Code: OI00193-012 Publication Date: February 2012 Author: Andrew Brosnan and Cornelia Wels-Maug
More informationDifferentiate your business with a cloud contact center
Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September
More informationombiel campusm SUMMARY Catalyst Key findings Ovum recommends Reference Code: IT018-001456 Publication Date: 13 Apr 2014 Author: Tim Jennings
ombiel campusm Reference Code: IT018-001456 Publication Date: 13 Apr 2014 Author: Tim Jennings SUMMARY Catalyst campusm is a cross-platform mobile and web application environment that enables an educational
More informationSWOT Assessment: Alfresco, Alfresco One, v5.0
SWOT Assessment: Alfresco, Alfresco One, v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: May 5 th, 2015 Product code: IT0014-003012 Sue Clarke Summary Catalyst When
More informationEnterprise Content Management: The Suite Perspective
Enterprise Content Management: The Suite Perspective Publication Date: 04 Dec 2015 Product code: IT0014-003079 Sue Clarke Summary Catalyst The Ovum Decision Matrix: Selecting an Enterprise Content Management
More informationOvum Decision Matrix: Selecting an Enterprise Content Management Solution, 2013 14
Ovum Decision Matrix: Selecting an Enterprise Content Management Solution, 2013 14 Publication Date: August 2013 Author: Sue Clarke SUMMARY Catalyst Selecting an enterprise content management (ECM) platform
More informationHow To Use Syncplicity Panorama On A Mobile Device
On the Radar: Syncplicity Panorama New mobile content access tools for modern business work styles Publication Date: 11 Mar 2015 Product code: IT0021-000064 Richard Edwards Summary Catalyst The typical
More informationOn the Radar: Esri UK
On the Radar: Esri UK Geographic information reveals the determinants of better health Reference Code: IT011 000316 Publication Date: 30 May 2013 Author: Cornelia Wels Maug SUMMARY Catalyst The adoption
More informationOn the Radar: Be Informed
ON THE RADAR On the Radar: Be Informed Business Process Platform Reference Code: OI00190-018 Publication Date: April 2012 Author: Joe Dignan SUMMARY Catalyst The Holy Grail for public sector IT is a single
More informationCase Study: Vitamix. Improving strategic business integration using IT service management practices and technology
Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationWHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14
BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013
More informationEXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
More informationWHITE PAPER. Written by: Michael Azoff. Published Mar, 2015, Ovum
Unlocking systems of record with Web and mobile front-ends CA App Services Orchestrator for creating contemporary APIs Written by: Michael Azoff Published Mar, 2015, Ovum CA App Services Orchestrator WWW.OVUM.COM
More informationOn the Radar: JReport
Embedded reporting and analytics Publication Date: April 30 th, 2015 Product code: IT0014-003010 Surya Mukherjee Summary Catalyst Jinfonet Software, through its reporting and dashboarding applications,
More informationHow To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
More informationOn the Radar: ForgeRock
Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology
More informationOn the Radar: Pulse Secure
Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure
More informationProfiting from SafeNet Authentication Service Offerings
whitepaper Profiting from SafeNet Authentication Service Offerings A Guide for the Channel With SafeNet, service providers and VARs can deliver profitable and successful cloud services Executive Summary
More informationCA Service Management Solutions
CA Service Management Solutions CA Technologies Reference Code: IT017 004068 Publication Date: 09 Jan 2013 Author: Adam Holtby SUMMARY Catalyst IT functions are subject not only to the enterprise wide
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSprint IaaS Cloud Computing - Case Study and Customers
Sprint making business agility real with reliable cloud computing solutions Partnership with CSC enables enterprise-class cloud services SUMMARY Ovum view Customers of all sizes and in ever-increasing
More informationsolution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5
This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More informationOn the Radar: Apperian MAM
Mobile application management and enterprise app store Publication Date: 12 May 2015 Product code: IT0021-000082 Richard Absalom Summary Catalyst There is a massive opportunity for enterprises to develop,
More informationPeople-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More information2013 ICT Enterprise Insights in the Life Sciences Industry
2013 ICT Enterprise Insights in the Life Sciences Industry Key findings from the 2013 survey results Reference Code: IT010-000185 Publication Date: 03 Oct 2013 Author: Andrew Brosnan SUMMARY Catalyst The
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationSIP Trunking: Second-Wave Benefits
Trunking: Second-Wave Benefits trunking initially provided network savings to customers, but there are additional "second-wave" benefits to consider Reference Code: OT00050-002 Publication Date: January
More informationOvum Decision Matrix: Selecting a Business Process Management Solution, 2014
Ovum Decision Matrix: Selecting a Business Process Management Solution, 2014 Reference Code: EI024-000001 Publication Date: 12 Feb 2014 Author: Gary Barnett, Maxine Holt SUMMARY Catalyst Business process
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationRe-architecting Legacy Systems is the Keystone for Transformation
Re-architecting Legacy Systems is the Keystone for Transformation Legacy modernization lays the groundwork for the modern enterprise An Ovum White Paper Contents Executive summary... Introduction... Key
More informationIntroducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI
Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones
More informationCRM in the Contact Center and the Emergence of the Unified Agent Desktop
CRM in the Contact Center and the Emergence of the Unified Agent Desktop An excerpt from Datamonitor s recent report, DMTC2207 SUMMARY Publication Date: September 2008 Contact centers face ever-increasing
More informationConfiguration Guide. SafeNet Authentication Service AD FS Agent
SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationEXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski August 2013 by Alexei Balaganski ab@kuppingercole.com August 2013 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More informationWhy enterprise data archiving is critical in a changing landscape
Why enterprise data archiving is critical in a changing landscape Ovum white paper for Informatica SUMMARY Catalyst Ovum view The most successful enterprises manage data as strategic asset. They have complete
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationWhite Paper. Getting ahead in the cloud. the need for better identity and access controls
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
More informationIDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis
IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: CHERWELL SOFTWARE IDC MARKETSCAPE FIGURE FIGURE 1 IDC
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationMANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum
App user analytics and performance monitoring for the business, development, and operations teams CA Mobile App Analytics for endto-end visibility CA Mobile App Analytics WWW.OVUM.COM Written by: Michael
More informationBenefits of Personalizing IVR: An Eircom Case Study
Benefits of Personalizing IVR: An Eircom Case Study Reference Code: IT024-000014 Publication Date: 08 Apr 2014 Author: Clare McCarthy SUMMARY Catalyst Customer-service channels are at the forefront of
More informationWhite paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Management Challenges of Software
More informationOvum Decision Matrix: Selecting an Identity Management Solution for the Telecoms Industry, 2014 2015
Ovum Decision Matrix: Selecting an Identity Management Solution for the Telecoms Industry, 2014 2015 Publication Date: 23 Oct 2014 Product code: IT0024-000106 Adaora Okeleke Summary Catalyst Telcos use
More informationOvum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16
Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Publication Date: 29 Jul 2015 Product code: IT0022-000410 Roy Illsley Summary Catalyst The role and purpose
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationIT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
More informationAuthentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationCase Study. Microsoft Azure Cloud Migration For Idea Management Tool. Microsoft Azure. www.elegantmicroweb.com
Microsoft Azure www.elegantmicroweb.com ISO 9001:2008 Elegant MicroWeb Technologies Pvt. Ltd. A-305, Shapath - IV, Opp. Karnavati Club, SG Highway, Ahmedabad-380051 India Email: info@elegantmicroweb.com
More informationIDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment
IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Ping Identity IDC MARKETSCAPE
More informationp@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
More informationAddressing Enterprise Needs with a Software Defined Network Platform
Addressing Enterprise Needs with a Software Defined Network Platform Dynamic, customizable approach meets customer demand Date: December 2015 Author: Mike Sapien Ovum view Enterprise customers have virtualized
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationAxway API Portal. Putting APIs first for your developer ecosystem
Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management
More informationSecuring Virtual Desktop Infrastructures with Strong Authentication
Securing Virtual Desktop Infrastructures with Strong Authentication whitepaper Contents VDI Access Security Loopholes... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication
More informationPrompta volumus denique eam ei, mel autem
The Utroque F5 Cloud Democritum Federation Aeterno Nostro Reference Aperiam Architecture Usu Prompta volumus denique eam ei, mel autem Safely adopt an SaaS model by eliminating the drawbacks of distributed
More informationOvum Decision Matrix: Selecting a Customer Relationship Management Solution, 2013 14
Ovum Decision Matrix: Selecting a Customer Relationship Management Solution, 2013 14 Reference Code: EI015-000010 Publication Date: 24 Jul 2013 Author: Jeremy Cox, Maxine Holt SUMMARY Catalyst Although
More informationIDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis
IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: SERVICENOW IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape
More informationWhite. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationIdentity in the Cloud
White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4
More informationCA Service Management Solutions 14.1
CA Service Management Solutions 14.1 CA Technologies Publication Date: 06 Apr 2016 Product code: IT0022-000623 Adam Holtby Summary Catalyst IT functions are subject not only to the enterprise-wide mandate
More informationFive steps to improving the customer service experience
Five steps to improving the customer service experience Metrics, tips, and tools for utilizing customer feedback An Ovum White Paper Sponsored by Publication Date: January 2012 INTRODUCTION As the use
More informationRethinking Cloud Content Collaboration in Financial Services
Rethinking Cloud Content Collaboration in Financial Services Executive Summary The financial services sector generally prefers to take a risk-averse approach to new technology trends, with the need for
More informationHow To Protect Your Employees From Being Hacked By A Corporate Firewall
The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study
More informationThe PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check
More informationExecutive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
More informationGoogle Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
More informationIntegrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
More informationExtend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationCloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security
Russ Dietz Vice President & Chief Technology Officer Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security By Russ Dietz Vice President & Chief
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More information