GEMALTO identity and access management in Big Data Security Solutions

USP : Enhanced encryption capabilities and broad range of technology integrations provide greater flexibility for enterprises to protect big data deployments

BUYERS
VENDORS
EXPERTS
2.5
ANALYSTS
 

GEMALTO identity and access management detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
3.2
3.4
3.3
Breadth and Depth of Product Offerings
3.85
3.00
2.60
Product Features and Functionality
2.95
3.80
3.55
Focus on Product Innovation
2.40
3.45
4.05
Product Differentiation and Impact on Customer Value
5.00
5.00
5.00
Product Differentiation and Impact on Customer Value
2.20
2.80
2.15
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

GEMALTO identity and access management has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    20 Participants

  • Niche Quadrant

    All-Asia-Pacific

    23 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Company Maturity
    Breadth of Applications Served
  • Company Maturity
    Partner Ecosystem
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Product Differentiation and Impact on Customer Value
  • Product Maturity / Product Enhancement Development
    Product Upgradation
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Direct Presence - Europe
  • Company Maturity / Geographic Footprint
    Direct Presence - Latin America
  • Company Maturity / Geographic Footprint
    Direct Presence - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Direct Presence - North America
  • Company Maturity / Geographic Footprint
    Sales Office - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Sales Office - Europe
  • Company Maturity / Geographic Footprint
    Sales Office - Latin America
  • Company Maturity / Geographic Footprint
    Sales Office - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Sales Office - North America
  • Product Maturity / Technology
    Intrusion Detection System/Intrusion Prevention System (Ids/Ips)
  • Product Maturity / Technology
    Product Variants
  • Product Maturity / Technology
    Unified Threat Management (Utm)
  • Product Maturity / Software Offered
    Backup and Recovery
  • Product Maturity / Software Offered
    Big Data Governance
WEAKNESSES
  • Product Maturity / Product Enhancement Development
    New Product Launches
  • Product Maturity / Technology
    Other Technology Offered
  • Company Maturity
    Geographic Footprint
  • Company Maturity / Breadth of Applications Served
    New Industry Verticals
  • Product Maturity / Focus on Product Innovation
    No. of Innovations
  • Product Maturity / Focus on Product Innovation
    R&D Spend
  • Product Maturity / Product Differentiation and Impact on Cus...
    Customer Feedback
  • Product Maturity / Product Features and Functionality
    Type of Channels
  • Company Maturity / Partner Ecosystem
    Distributors
  • Company Maturity / Partner Ecosystem
    Strategy to Address New Target Audience
  • Company Maturity / Effectiveness of Organic Growth Strategy
    Business Expansion Strategy
  • Company Maturity / No. of Mergers and Acquisitions
    No. of Joint Ventures
  • Company Maturity / No. of Mergers and Acquisitions
    No. of Mergers and Acquisitions
  • Company Maturity / Effectiveness of Organic Growth Strategy
    No. of New Customers in Last 2 Years
  • Company Maturity / Effectiveness of Organic Growth Strategy
    No. of New Products Launched
  • Company Maturity / No. of Mergers and Acquisitions
    No. of Partnerships and Collaborations
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Managed Security Services
  • Product Maturity / Data Type
    Data in Motion
  • Product Maturity / Breadth and Depth of Product Offerings
    Product Variants
See More

Have you EVER used GEMALTO identity and access management Products?

Share your experience with potential buyers.

TOP FEATURES
  • Technology
    Unified Threat Management (Utm)
  • Product Features and Functionality
    Data Type
  • Technology / Intrusion Detection System/Intrusion Prevention..
    Ips)
  • Software Offered
    Backup and Recovery
  • Technology
    Product Variants
  • Software Offered
    Technology
  • Software Offered
    Big Data Governance
  • Product Enhancement Development
    Product Upgradation
  • Software Offered
    Security Intelligence
  • Software Offered
    Others (Big Data Customization and Discovery..

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

GEMALTO identity and access management Presence in Big Data Security Solutions

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS