Becoming a member gives access to expert industry insight and inquiry hours as you need them.
Yearly subscription
Membership lasts for one year and provides a range of options from DIY, through to an embedded analyst and industry inquiry service.
Member only content
Gain access to restricted content including vendor assessments, buyer guides, emerging technology reports and industry overviews.
inquiry hours
Membership can include inquiry hours that can be used to support industry understanding, product go to market or architecture reviews.
academy training
Membership provides access to self-paced or live masterclass training on a range of identity and access management topics.
Vendor Review
Understand specific vendor capabilities, strengths and challenges
Market Review
Understand mature or emerging market use cases and trends
Enablement
Train and enable staff and customers on terminology, trends and tools
Member
Inquiry Hours
Membership can provide a number of analyst inquiry hours that can be used over the course of the yearly subscription. They provide a way of augmenting and embedding expert knowledge into existing teams on both the buy side and sell side.
Architecture Review
Review and optimise existing designs and architecture
Procurement Support
Receive support during vendor due diligence or procurement cycles
Assess & Audit
Assess and audit existing tools or implementations
Membership Pricing Options
A range of membership options that provide a blended mixture of content and inquiry hours to augment, support and extend knowledge and understanding.
DIY
Augmented
Embedded
Latest Member Only Content
Member content provides a range of vendor assessments, architecture patterns, technology test drives and emerging technology market overviews.
An interview with the CEO of DataWiza Canming Jiang.
An independent vendor assessment of Transmit Security, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
100+ questions that can be used during the request for proposal phase of vendor engagement for Passwordless Authentication providers.
An analysis of Consumer Use Cases for Passwordless Authentication
An analysis of Employee Use Cases for Passwordless Authentication
The limitations of MFA and an analysis into the rise of Passwordless Authentication.
A review of the Key Organisational Challenges that exist with respect to Authentication
An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe’s largest CIAM supplier.
iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.
This week Google announced the general availability of their “planet scale” zero trust solution for the corporate environment, called BeyondCorp Enterprise.
BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model – away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.