For our premium content subscribers

Research Services

TechVision Research provides early perspectives on key technology trends to help our clients stay ahead of the most difficult technology challenges they’ll face. Our research agenda uncovers key technology inflection points and defines their impact on organizations.  Our current portfolio includes technologies and practices for:

  • Identity and access management
  • Enterprise architecture and innovation
  • Information and data asset management
  • Cybersecurity
  • Privacy and consent
  • Emerging Technologies including
    • Blockchain and distributed ledgers
    • AI, Machine Learning and Predictive Analytics
    • Cloud computing, microservices, containerization, and DevOps

 

We take these inflection points and apply rigorous analysis leveraging technical depth, pragmatic business, industry and analytical skills. We augment this with experiential data collected from our advisory engagements.

Unlike other research firms, TechVision makes specific recommendations, takes clear positions and offers specific advice. Our experience helps us to make the judgment calls our clients expect. We are dedicated to digging deep, discovering trends, technology choices and recommendations that others don’t see.

We also take the enterprise point-of-view in our analysis.  With that perspective, we maintain separation from the vendors of the underlying technology in our content. It all starts with a world-class team of consulting analysts with deep experience and subject matter expertise. It is supported by analytic tools and proven best practices.

These issues are complex and cross IT and business unit boundaries, therefore everyone in the enterprise needs to have access to rich research and expert advice. It seems like an obvious concept but not one that our competitors follow. For our premium content, we provide annual subscriptions at an enterprise-level, so no more worrying about sorting out the have and have nots when it comes to availability of research. The simple truth is most enterprise-wide technology initiatives involve many people in many organizations and limiting access to research or other tools is suboptimal.

 

Not everyone needs the same depth of content as they begin to understand the implications of technology on their business.  TechVision Research offers levels of content to help our clients complete their knowledge journey.

Complimentary content

Many clients (and prospects) have a need to understand emerging technologies and best practices in order to understand how they may impact their ability to get their job done.  Techvision offers complementary content to begin the knowledge journey.  Our complimentary content can be found in the Resources section of the site.

Premium content

As clients need to dig deeper into a topic, they take advantage of our premium content which contains vendor evaluations and detailed recommendations to continue the knowledge journey.  Premium content subscribers can also schedule inquiries with any of our consulting analysts as part of their subscription service. 

See and download excerpts of our premium content by clicking the icons below.

Portfolio

Personhood Credentials

Personhood Credentials

Know Your Worker (KYW):  The Intersection of Worker Risk and IAM

Know Your Worker (KYW): The Intersection of Worker Risk and IAM

Cloud-based IoT Ecosystems fuel the AI Economy

Cloud-based IoT Ecosystems fuel the AI Economy

Data-centric Security

Data-centric Security

Developing a Decentralized Identity Reference Architecture

Developing a Decentralized Identity Reference Architecture

Digital Identity Wallets

Digital Identity Wallets

The Future of Identity Management (2024-2029)

The Future of Identity Management (2024-2029)

Supporting Methods and  Procedures for Innovation

Supporting Methods and Procedures for Innovation

OT/ICS Security

OT/ICS Security

Developing a Unified Endpoint Management and Security Strategy

Developing a Unified Endpoint Management and Security Strategy

CyberArk Expands IAM/Security Capabilities

CyberArk Expands IAM/Security Capabilities

A Generative AI Level Set

A Generative AI Level Set

Will the Thoma Bravo portfolio become the next IAM/IGA Platform?

Will the Thoma Bravo portfolio become the next IAM/IGA Platform?

An Operating Model for the Digital Enterprise

An Operating Model for the Digital Enterprise

Okta Identity Platform Assessment

Okta Identity Platform Assessment

Microsoft Entra as a Complete IAM Platform

Microsoft Entra as a Complete IAM Platform

Multicloud Cybersecurity Reference Architecture

Multicloud Cybersecurity Reference Architecture

The Future of Identity Management (2022-2027)

The Future of Identity Management (2022-2027)

Web3: Executive Level Set

Web3: Executive Level Set

Securing Your Supply Chain in an Era of Uncertainty

Securing Your Supply Chain in an Era of Uncertainty

Innovation Governance

Innovation Governance

Establishing a Modern-Day Identity Governance and Administration (IGA) Framework

Establishing a Modern-Day Identity Governance and Administration (IGA) Framework

Privileged Access Management: Will We Never Learn?

Privileged Access Management: Will We Never Learn?

Architecting and Managing Hybrid and Cloud-based Identity Services

Architecting and Managing Hybrid and Cloud-based Identity Services

Digital B2B Requires Updated IAM

Digital B2B Requires Updated IAM

Architecting and Securing an  API-Driven Economy

Architecting and Securing an API-Driven Economy

Online Consumerization Booms: Recalibrating Customer IAM (CIAM)

Online Consumerization Booms: Recalibrating Customer IAM (CIAM)

Decentralized Identity and Verifiable Credentials

Decentralized Identity and Verifiable Credentials

Innovation Execution

Innovation Execution

The Future of Identity Management (2021-2026)

The Future of Identity Management (2021-2026)

Customers Demand More:  Developing a Reference Architecture for CIAM

Customers Demand More: Developing a Reference Architecture for CIAM

Security Reference Architecture

Security Reference Architecture

Privileged Access Management:  Developing a Reference Architecture for PAM

Privileged Access Management: Developing a Reference Architecture for PAM

Microsoft Teams: A Safe 3CA Bet and/ or a Microsoft Cloud Trojan Horse?

Microsoft Teams: A Safe 3CA Bet and/ or a Microsoft Cloud Trojan Horse?

IAM Reference Architecture

IAM Reference Architecture

Communication, Collaboration, and Content: Shifting to Contextual Activities

Communication, Collaboration, and Content: Shifting to Contextual Activities

Zero Knowledge Authentication & Authorization: Soon the New Normal?

Zero Knowledge Authentication & Authorization: Soon the New Normal?

Developing a Customer IAM (CIAM) Strategy and Roadmap

Developing a Customer IAM (CIAM) Strategy and Roadmap

The Business Data Foundation for the Digital Enterprise

The Business Data Foundation for the Digital Enterprise

Digital Trust

Digital Trust

The Path to SD-WAN

The Path to SD-WAN

Integrated IT Governance Programs for the Digital Enterprise

Integrated IT Governance Programs for the Digital Enterprise

The Future of Identity Management (2020-2025)

The Future of Identity Management (2020-2025)

Integration of IAM with Physical Access Control Systems

Integration of IAM with Physical Access Control Systems

Graph Databases, GraphQL, and IAM

Graph Databases, GraphQL, and IAM

Zero Passwords in a Zero Trust World

Zero Passwords in a Zero Trust World

Privacy Regulation: A tactical approach for achieving compliance with the CCPA

Privacy Regulation: A tactical approach for achieving compliance with the CCPA

Decentralized, Blockchain-Enabled Identity Services Gain Traction

Decentralized, Blockchain-Enabled Identity Services Gain Traction

State of Application Programming Interfaces (API) Management and Security – Q3 2019

State of Application Programming Interfaces (API) Management and Security – Q3 2019

The Evolution of the Blockchain Consensus Protocol

The Evolution of the Blockchain Consensus Protocol

Securing Unified Communications

Securing Unified Communications

Privileged Access Management: More Necessary Than Ever as  Cloud-Shift Intensifies

Privileged Access Management: More Necessary Than Ever as Cloud-Shift Intensifies

Managing Consent: The Key to Trust and Compliance

Managing Consent: The Key to Trust and Compliance

A Practical Guide to DevOps

A Practical Guide to DevOps

State of Robotics Process Automation (RPA), Q2 2019

State of Robotics Process Automation (RPA), Q2 2019

Multi-Factor Authentication (MFA): Enterprise Strategy and Market Assessment

Multi-Factor Authentication (MFA): Enterprise Strategy and Market Assessment

Developing an Enterprise Blockchain Strategy

Developing an Enterprise Blockchain Strategy

Developing a Customer IAM (CIAM) Strategy and Roadmap

Developing a Customer IAM (CIAM) Strategy and Roadmap

Artificial Intelligence: an Enterprise Level Set

Artificial Intelligence: an Enterprise Level Set

The Identity of Things (IDoT)

The Identity of Things (IDoT)

Zero Trust Networking

Zero Trust Networking

Microservices Enterprise Level-Set

Microservices Enterprise Level-Set

Evolving Against Vulnerabilities, Breaches, and The Next Cyber Attack

Evolving Against Vulnerabilities, Breaches, and The Next Cyber Attack

Innovation Reference Architecture

Innovation Reference Architecture

The Future of Identity Management (2018-2023)

The Future of Identity Management (2018-2023)

How Microservices Can Improve Your IAM Strategy

How Microservices Can Improve Your IAM Strategy

Applying Start-up Concepts to Enterprise Innovation

Applying Start-up Concepts to Enterprise Innovation

Designing and Implementing an Effective Enterprise Identity Governance and Administration Program

Designing and Implementing an Effective Enterprise Identity Governance and Administration Program

Blockchain 101; An Executive Introduction to Distributed Ledger Technology

Blockchain 101; An Executive Introduction to Distributed Ledger Technology

Smart Contracts and Blockchain

Smart Contracts and Blockchain

Identity is the New Perimeter

Identity is the New Perimeter

Cloud-based Identity Management

Cloud-based Identity Management

Banking on Identity

Banking on Identity

Why Large Technical Projects Fail and How Yours Can Succeed

Why Large Technical Projects Fail and How Yours Can Succeed

Organizational Transformation is the Key to Digital Transformation

Organizational Transformation is the Key to Digital Transformation

Machine Learning and Artificial Intelligence on Big Data for Cybersecurity

Machine Learning and Artificial Intelligence on Big Data for Cybersecurity

The Rise of Machine Learning in the Enterprise:  Managing the Opportunities, Handling the Threats

The Rise of Machine Learning in the Enterprise: Managing the Opportunities, Handling the Threats

Emergence of CIAM

Emergence of CIAM

Enterprise Innovation Acceleration

Enterprise Innovation Acceleration

Blockchain Call-to-Action for Bankers

Blockchain Call-to-Action for Bankers

Enterprise Privacy Guidelines in a Changing Regulatory Environment

Enterprise Privacy Guidelines in a Changing Regulatory Environment

The Future of Information Sharing

The Future of Information Sharing

Blockchain Identity

Blockchain Identity

Privacy Beyond Compliance

Privacy Beyond Compliance

End of EA and IT as We Know IT

End of EA and IT as We Know IT

Fixing the Fundamentals – Data Asset Management

Fixing the Fundamentals – Data Asset Management

Fixing the Fundamentals – Data Strategy

Fixing the Fundamentals – Data Strategy

Context Based Identity Management

Context Based Identity Management

Unlocking the IoT Value to The Enterprise

Unlocking the IoT Value to The Enterprise

TechVision Crosstalk Report – Identity Management and Data

TechVision Crosstalk Report – Identity Management and Data

Blockchain Level Set

Blockchain Level Set

Internet of Things Reality Check

Internet of Things Reality Check

Enterprise Information Protection

Enterprise Information Protection

Data: The Fundamentals are Broken

Data: The Fundamentals are Broken

The Future of Identity Management

The Future of Identity Management

IoT as Security Risk Amplifier and Mitigation Strategies

IoT as Security Risk Amplifier and Mitigation Strategies

Fixing the Fundamentals – The Business Blueprint

Fixing the Fundamentals – The Business Blueprint

New European Privacy & Data Protection Regulations Compliance or Consequences

New European Privacy & Data Protection Regulations Compliance or Consequences

Opportunities in Europe with Electronic Identification and Trust Services

Opportunities in Europe with Electronic Identification and Trust Services

Custom content

We also tailor our research agenda based on the specific needs of our clients.  To that end, TechVision engages in custom research efforts to guide customer engagement and product development efforts that are for the exclusive use of that client.  Contact us for further details.

 

 

 

© 2019 All Rights Reserved

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.