80061 Leadership Compass Consumer Authentication 2019

80061 Leadership Compass Consumer Authentication 2019

KuppingerCole Report LEADERSHIP COMPASS by John Tolbert September 2019 Consumer Authentication This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions. by John Tolbert [email protected] September 2019 Leadership Compass KuppingerCole Leadership Compass Consumer Authentication Consumer Authentication Report No.: 80061 By KuppingerCole Content 1 Introduction ................................................................................................................................. 6 1.1 Market Segment ....................................................................................................................... 7 1.2 Delivery models ........................................................................................................................ 7 1.3 Required Capabilities ................................................................................................................ 7 2 Leadership.................................................................................................................................. 11 3 Correlated View ......................................................................................................................... 19 3.1 The Market/Product Matrix ................................................................................................... 19 3.2 The Product/Innovation Matrix .............................................................................................. 21 3.3 The Innovation/Market Matrix............................................................................................... 23 4 Products and Vendors at a glance ............................................................................................... 25 4.1 Ratings at a glance .................................................................................................................. 25 5 Product/service evaluation ......................................................................................................... 28 5.1 AdNovum NEVIS Suite ............................................................................................................ 30 5.2 Akamai Identity Cloud (formerly Janrain) .............................................................................. 31 5.3 Auth0 ...................................................................................................................................... 32 5.4 Broadcom (formerly CA Technologies) Layer 7 Authentication ............................................. 33 5.5 Cloudentity ............................................................................................................................. 34 5.6 CoffeeBean Technology Identity and Access Platform .......................................................... 35 5.7 Entrust Datacard IntelliTrust / IdentityGuard ........................................................................ 36 5.8 Ergon Informatik Airlock ......................................................................................................... 37 5.9 Evidian Web Access Manager................................................................................................. 38 5.10 ForgeRock Identity Platform................................................................................................... 39 5.11 IBM Trusteer Pinpoint ............................................................................................................ 41 5.12 iovation ................................................................................................................................... 42 5.13 LoginRadius Identity Platform ................................................................................................ 43 5.14 Microsoft Azure Active Directory B2C .................................................................................... 44 5.15 Nok Nok Labs S3 Authentication Suite ................................................................................... 45 5.16 NRI Secure Uni-ID Libra .......................................................................................................... 46 5.17 Ping Identity ............................................................................................................................ 47 5.18 Pirean Access: One ................................................................................................................. 48 5.19 SAP Customer Data Cloud ...................................................................................................... 49 5.20 SecureAuth Identity Platform ................................................................................................. 50 KuppingerCole Leadership Compass Consumer Authentication Report No.: 80061 Page 2 of 63 5.21 WSO2 Identity Server ............................................................................................................. 51 6 Vendors and Market Segments to watch ..................................................................................... 52 6.1 Amazon Cognito ..................................................................................................................... 52 6.2 Avatier .................................................................................................................................... 52 6.3 AvocoSecure Trust Platform ................................................................................................... 52 6.4 Duo Security ........................................................................................................................... 53 6.5 Fusion Auth ............................................................................................................................. 53 6.6 Singular Key ............................................................................................................................ 53 6.7 Swivel Secure .......................................................................................................................... 54 6.8 Ubisecure Identity Server ....................................................................................................... 54 6.9 UXP Systems ........................................................................................................................... 55 7 Methodology.............................................................................................................................. 56 7.1 Types of Leadership ................................................................................................................ 56 7.2 Product rating ......................................................................................................................... 57 7.3 Vendor rating .......................................................................................................................... 59 7.4 Rating scale for products and vendors ................................................................................... 60 7.5 Inclusion and exclusion of vendors ........................................................................................ 61 8 Copyright ................................................................................................................................... 62 Content of Tables Table 1: Comparative overview of the ratings for the product capabilities ............................................... 25 Table 2: Comparative overview of the ratings for vendors ........................................................................ 26 Table 3: AdNovum’s major strengths and challenges................................................................................. 30 Table 4: AdNovum’s rating .......................................................................................................................... 30 Table 5: Akamai’s major strengths and challenges ..................................................................................... 31 Table 6: Akamai’s rating .............................................................................................................................. 31 Table 7: Auth0’s major strengths and challenges ....................................................................................... 32 Table 8: Auth0’s rating ................................................................................................................................ 32 Table 9: Broadcom’s major strengths and challenges ................................................................................ 33 Table 10: Broadcom’s rating ....................................................................................................................... 33 Table 11: Cloudentity’s major strengths and challenges ............................................................................ 34 Table 12: Cloudentity’s rating ..................................................................................................................... 34 Table 13: CoffeeBean’s major strengths and challenges ............................................................................ 35 Table 14: CoffeeBean’s rating ....................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    63 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us