An independent vendor assessment of Transmit Security, covering Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
Planning Recommendations for implementation of Passwordless Authentication. Covering Existing Modals Inventory, Device & User Inventory, Pilot, Case Study Analysis and Roadmapping.
100+ questions that can be used during the request for proposal phase of vendor engagement for Passwordless Authentication providers.
A review of the Key Organisational Challenges that exist with respect to Authentication
An independent vendor assessment of Secret Double Octopus including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
Note the subtle play on words there? Is cyber security a huge mess of complexity or are we heading for a huge opportunity to integrate and manage disparate technology via an adaptive mesh? The concept of a cyber security mesh seems to have emerged from the lips (or pages) of Gartner – perhaps as early […]
An independent vendor assessment of Veridium including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
Authorization – the old chestnut often associated with role based access control – is seemingly making a cool-kid comeback. Well, RBAC is like SAML and passwords – seemingly dead, yet still going strong at the same time. Very smart. I was lucky (?) enough to have been in the RBAC space the first time ’round […]
An independent vendor assessment of HYPR including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.
An independent vendor assessment of Keyless.io including: Company Key Facts, Funding, Case Studies, Technology Key Facts, Technology Review and Strengths Analysis.