Leverage independent thought leadership content

Our primary research can be used by vendors , integrators, distributors and managed service providers of identity, access and cyber security technology, as part of their collateral libraries and go to market strategy.

Reprint and Redistribute

Our research can be licensed in 6 or 12 month blocks for download, reprint and redistribution purposes. 

Vendor assessments

Our independent vendor assessments leverage open source intelligence, briefings and demo’s to create 18-22 page reports.

Technology
buyer guides

Our vendor agnostic buyer guides are long read (50+ page) reports covering use cases, capabilities and RFx questions.

custom
research

We can be commissioned to create custom research on emerging technology, architecture patterns or integration trends.

Latest Research Content

Security starts when authentication ends. It's a line I have used a few times over the years as it is one I actually quite believe in. In an era where firewalls are derided as being pretty toothless in the fight against omnipresent complex cyber attacks - and the concept of trusted networks quite rightly become obsolete in the world of "zero trust" - it always seemed odd to me, to put such a large emphasis on stringent authentication services. Clearly authentication is hugely important don't misunderstand, but my point really was that authentication (even with a strong MFA component) becomes less relevant if a) it is not continuous and b) not part of a more holistic approach focused on the access control of services, data and APIs.
A long read post investigating the evolution of decoupled authorization platforms - including use case and capability analysis and brief vendor review including Axiomatics, PlainID, Styra and Scaled Access.
To access this post, you must purchase Member Content.
An introduction to authorization startup Aserto.
What is driving the demand for new authorization models, software vendors and emerging authorization design patterns? This discusses previous failures of RBAC and XACML as well as modern architecture patterns such as identity centricity and the business mesh.
An independent vendor assessment of Axiomatics, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
An independent vendor assessment of Styra, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
To access this post, you must purchase Member Content.
A review of authorization related features added to the Auth0 platform between 2019 and 2022.
To access this post, you must purchase Member Content.
An overview of the authorization related features added by Okta between 2019 and 2022
To access this post, you must purchase Member Content.
Access control has very much been centred around models. Who should have […]
An overview and introduction to ConductorOne, an identity governance automation platform.
A review of authorization related features added to ForgeRock's Identity Platform between 2019-2022.
To access this post, you must purchase Member Content.
A review of authorization related features added to Microsoft Azure Platform between 2019-2022.
To access this post, you must purchase Member Content.

Contact us to learn more.