A few items that have popped into The Cyber Hut inboxes over the past couple weeks relating to funding and vendor news. Authorization Vendor PlainID Nets $75 million PlainID announced in December they had received a Series C investment round topping $75 million. This was lead by Insight Partners. PlainID are a leading authorization platform […]

An interview with the CEO of DataWiza Canming Jiang.

This post is only available to members.

An independent vendor assessment of PlainID, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Identity and Access Management is going through a new golden age. The movement to IAM as a foundational tool for B2E security and B2C business enablement is quite well known. The vendor narrative, funding and growth in both sectors is well documented. However, we’re also starting to see identity functions proliferate in a range of […]
Customer, consumer and citizen identity and access management platforms are often plagued by the internal design team analysis of “should we build or buy?”. Many early CIAM projects often get labelled as “just being a login box”. How hard can that be? There are often lots of uncertainties too. How many users will register for […]

An independent vendor assessment of Transmit Security, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

100+ questions that can be used during the request for proposal phase of vendor engagement for Passwordless Authentication providers.

This post is only available to members.

An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Note the subtle play on words there? Is cyber security a huge mess of complexity or are we heading for a huge opportunity to integrate and manage disparate technology via an adaptive mesh? The concept of a cyber security mesh seems to have emerged from the lips (or pages) of Gartner – perhaps as early […]

An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.