Becoming a member gives access to expert industry insight and inquiry hours as you need them.

Yearly subscription

Membership lasts for one year and provides a range of options from DIY, through to an embedded analyst and industry inquiry service.

Member only content

Gain access to restricted content including vendor assessments, buyer guides, emerging technology reports and industry overviews.

inquiry hours

Membership can include inquiry hours that can be used to support industry understanding, product go to market or architecture reviews.

academy training

Membership provides access to self-paced or live masterclass training on a range of identity and access management topics.

Vendor Review

Understand specific vendor capabilities, strengths and challenges

Market Review

Understand mature or emerging market use cases and trends

Enablement

Train and enable staff and customers on terminology, trends and tools

Member
Inquiry Hours

Membership can provide a number of analyst inquiry hours that can be used over the course of the yearly subscription.  They provide a way of augmenting and embedding expert knowledge into existing teams on both the buy side and sell side.

Architecture Review

Review and optimise existing designs and architecture

Procurement Support

Receive support during vendor due diligence or procurement cycles

Assess & Audit

Assess and audit existing tools or implementations

Membership Pricing Options

A range of membership options that provide a blended mixture of content and inquiry hours to augment, support and extend knowledge and understanding.

DIY
£ 50 / month
  • Member Only Content
  • Technology Assessments
  • Emerging Architecture
  • Buyer Guides
  • Requirements & Use Cases
Augmented
£ 250 / month
  • Everything in DIY
  • 1 Inquiry Call a Quarter
  • Self Paced Training
  • Email Support
Embedded
£ 495 / month
  • Everything in DIY
  • 1 Inquiry Call a Month
  • Self Paced Training
  • Email Support

Latest Member Only Content

Member content provides a range of vendor assessments, architecture patterns, technology test drives and emerging technology market overviews.

This category can only be viewed by members.

A long read post investigating the evolution of decoupled authorization platforms – including use case and capability analysis and brief vendor review including Axiomatics, PlainID, Styra and Scaled Access.

This post is only available to members.

An independent vendor assessment of Axiomatics, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Styra, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

A review of authorization related features added to the Auth0 platform between 2019 and 2022.

This post is only available to members.

An overview of the authorization related features added by Okta between 2019 and 2022

This post is only available to members.

A review of authorization related features added to ForgeRock’s Identity Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Microsoft Azure Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Google Cloud Platform between 2019-2022.

This post is only available to members.

A review of authorization related features added to Amazon Web Services between 2019-2022

This post is only available to members.

A primer on authorization technology, covering RBAC, ABAC, XACML, OAuth2, Open Policy Agent and Zanzibar.

This post is only available to members.

An independent vendor assessment of Scaled Access, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An interview with the CEO of DataWiza Canming Jiang.

This post is only available to members.

An independent vendor assessment of PlainID, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Transmit Security, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

100+ questions that can be used during the request for proposal phase of vendor engagement for Passwordless Authentication providers.

This post is only available to members.

An analysis of Consumer Use Cases for Passwordless Authentication

This post is only available to members.

An analysis of Employee Use Cases for Passwordless Authentication

This post is only available to members.

The limitations of MFA and an analysis into the rise of Passwordless Authentication.

This post is only available to members.

A review of the Key Organisational Challenges that exist with respect to Authentication

This post is only available to members.

An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

This week two European software as a service consumer identity and access management (CIAM) vendors merged to what is claimed to be Europe’s largest CIAM supplier.

iWelcome and Onegini become one, with the aptly titled new organisation called OneWelcome. Both have been long time suppliers of CIAM capabilities to primarily the European market.

This post is only available to members.

This week Google announced the general availability of their “planet scale” zero trust solution for the corporate environment, called BeyondCorp Enterprise.

BeyondCorp was the internal model Google developed to manage their controlled resources for remote access for employees. The premise was to migrate their trust model – away from the network addressing approach towards a device and identity model, leveraging access aware proxies to control web based access to internal APIs and services.

This post is only available to members.