In light of the recent integration of ForgeRock into Ping Identity, The Cyber Hut has received numerous inquiry calls regarding potential integrations, feature overlap, next steps and existing deployment advice. To that end, we're making available a basic feature comparison matrix that highlights the basic capabilities each vendor as in each of the main identity areas of B2E and B2C. This matrix was compiled using publicly available references with peer review by those who have implemented ForgeRock or Ping technologies in the last 3 years.
MANCHESTER, UNITED KINGDOM, August 22, 2023 — The Cyber Hut, a leading boutique industry analyst and advisory firm focused on the global identity and access management market, announced today it has released a new research report. “Identity Threat Detection & Response: Emerging Market Review” is a 39 page report focused on the most recent developments […]
A 39 page vendor agnostic report looking at the emerging market for identity threat detection and response. Table of contents: Introduction Identity Types Increasing Asset Types Increasing Core Service Deployment Explosion Adversarial Activity Switching to IAM Supply Chain Attacks Gaps in IAM Threat Framework What is ITDR? Sector Definition Use Cases How it Works Sample […]
A 39 page vendor agnostic report looking at the emerging market for identity threat detection and response. Table of contents: Introduction Identity Types Increasing Asset Types Increasing Core Service Deployment Explosion Adversarial Activity Switching to IAM Supply Chain Attacks Gaps in IAM Threat Framework What is ITDR? Sector Definition Use Cases How it Works Sample […]
A discussion on how role based access control may still deliver business value, if deployed in a slightly different way.
I wanted to expand to this based on conversations I've had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR - what it is and why it's important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
Next week our founder Simon Moffatt will be in conversation with Mattia Zago from Monokee, where they'll be discussing the evolution of identity and access management platforms to include key visualisation and orchestration capabilities.
Our founder Simon Moffatt will be delivering a keynote presentation at the Heliview Identity and Access Management conference on May 23rd. The event hosted at the Omnisport Apeldoorn arena in the Netherlands boasts a great lineup of industry specialists and suppliers from the likes of Okta, Saviynt, Beyond Trust, Okta, Trust Builder, ID Veritas, Sailpoint, […]
Join our founder and industry analyst Simon Moffatt on February 21st, where he will be in conversation with Jonathan Fussner from zero-trust identity and access management startup Cyberelements.
Each year a particular standard, component, model or approach within the identity and access management will be declared "dead" by expert commentators, startup vendors or just the bloke in the pub. As part of The Cyber Hut's Tuesday polls, I decided to test the water on this highly emotive topic before the Christmas holidays for our last poll of 2022.