An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe's largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

To access this post, you must purchase Member Content.
An analysis of new data security provider Nullafi.
Last week saw the release of my latest research report: 2020 Cyber Security Startup Funding Analytics. […]

This week Google announced the general availability of their "planet scale" zero trust solution for the corporate environment, called BeyondCorp Enterprise.

BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model - away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.

To access this post, you must purchase Member Content.
By Simon Moffatt. The last 6 months has seen some interesting innovation occur within the privacy […]
This article takes a look at funding into the identity and access management vendor space between […]