I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas. I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response.

All four areas have had significant venture capitalist funding over the past 36 months and the use cases and capabilities of each have started to stabilise to a point where buy side procurement and integration is becoming consistent and vendors are identifying their competitive go to market narratives.

So my poll was essentially asking, which of these areas would a buy-side practitioner look to invest in during 2022?

Vendor introduction report covering oort.io - an emerging vendor in the Identity Threat Detection and Response sector.
A few interesting items to hit The Cyber Hut intelligence inboxes over the past couple of weeks. Funding Roundup: Antimatter and Skiff Skiff a privacy enablement startup focused on the end-to-end encrypted workspace just received a $10.5 million Series A, lead by Sequoia. What do they do? They are focused on creating a completely private […]
An independent vendor assessment of Axiomatics, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
A review of authorization related features added to the Auth0 platform between 2019 and 2022.
An overview of the authorization related features added by Okta between 2019 and 2022
A review of authorization related features added to ForgeRock's Identity Platform between 2019-2022.
A review of authorization related features added to Microsoft Azure Platform between 2019-2022.
A review of authorization related features added to Google Cloud Platform between 2019-2022.
A primer on authorization technology, covering RBAC, ABAC, XACML, OAuth2, Open Policy Agent and Zanzibar.