This category can only be viewed by members. To view this category, sign up by purchasing Membership - Vendor Explorer.

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe's largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

To access this post, you must purchase Membership - Vendor Explorer.
In Their Own Words What Is Nullafi“We’re an award-winning SaaS cybersecurity company with multiple patents granted for our data aliasing technology. The goal of our company was to set a new cybersecurity standard. While traditional methods all clamor for incremental improvements and competitive advantages in breach prevention, we stand apart (and “are notable” as Forbes […]
To access this post, you must purchase Membership - Vendor Explorer.
Last week saw the release of my latest research report: 2020 Cyber Security Startup Funding Analytics. This was a long read 70 page report. It focused solely on venture capitalist funding for global cyber security companies. It covered all early rounds in 2020, aimed solely on startups receiving seed and series A funding rounds. Over […]
To access this post, you must purchase Membership - Vendor Explorer.
By Simon Moffatt This week Google announced the general availability of their “planet scale” zero trust solution for the corporate environment, called BeyondCorp Enterprise. BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model – away from the network addressing […]
To access this post, you must purchase Membership - Vendor Explorer.
By Simon Moffatt. The last 6 months has seen some interesting innovation occur within the privacy and data security spaces. It seems some specific decoupling of end to end encryption, privacy vaulting and data centric security is starting to occur. Why is this interesting? Typically organisations have tackled the privacy situation using two pretty large […]
To access this post, you must purchase Membership - Vendor Explorer.
This article takes a look at funding into the identity and access management vendor space between January and June 2020. The focus is global and the sector definition is quite broad and based on the categories Crunchbase use. Funding decreased by over $130 million between 2019 and 2020 – likely a result of global uncertainty generated by […]
To access this post, you must purchase Membership - Vendor Explorer.
This week privileged access management vendor CyberArk completed the acquisition of SaaS identity and access player Idaptive. The price was approximately $70 million. What impact will this have on CyberArk’s go to market and potentially the rest of the privileged access management market? CyberArk Key Facts: Founded: 1999HQ: Greater Boston Area, USAFounders: Alon Cohen, Udi […]
To access this post, you must purchase Membership - Vendor Explorer.
The Covid-19 pandemic, has had far reaching impacts on global economic performance. Economic output in many countries is down, with many heading towards Q3 recessions. The main stock markets in the US and UK have seen significant downward trends over the last 6-8 weeks: But what impact, has Covid-19 had on public identity, authentication and […]
To access this post, you must purchase Membership - Vendor Explorer.
Amazon provides identity and access management services, under the product name of Cognito. “Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in with social identity providers, such as Facebook, Google, and Amazon, and enterprise […]
To access this post, you must purchase Membership - Vendor Explorer.
As part of the league table series, this article takes an alternative look at some of the top vendors in particular industry segments, such as access management, identity governance and administration, authentication and privileged access management. This league table is constructed with open source material from the National Vulnerability Database, as maintained by the National […]
To access this post, you must purchase Membership - Vendor Explorer.