An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Note the subtle play on words there? Is cyber security a huge mess of complexity or are we heading for a huge opportunity to integrate and manage disparate technology via an adaptive mesh? The concept of a cyber security mesh seems to have emerged from the lips (or pages) of Gartner – perhaps as early […]

An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]

An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.

An independent vendor assessment of 1Kosmos including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.

This post is only available to members.
Manchester, UK. The Cyber Hut, the leading boutique industry analyst firm specialising in identity, access and cyber security technology, announced the release of a Buyer’s Guide for Passwordless Technology. The 61 page report is the result of a 12 week project analysing the vendors, use cases and capabilities associated with modern software based multi factor […]
This 8 page sample shows the table of contents and introduction. A long read research report analysing the market for passwordless authentication and how to migrate away from legacy based password authentication. This report focuses on the history and origins, consumer use cases, employee use cases, the authentication credential life cycle, capabilities analysis, vendor selection […]
The Cyber Hut are running a brief 5 question survey to understand adoption patterns for passwordless technology for 2022 and beyond. If you work in industry have responsibility or associations with authentication technology we’d love to hear your feedback. The survey is vendor agnostic, independent and anonymous. It contains 5 questions and can be completed […]