Content of Figures
- Figure 1 The Computing Troika pushes organizations to create an IT Infrastructure that goes beyond the perimeter of the organization.
- Figure 2 Supporting the Connected and Intelligent Enterprise helps organizations addressing major business challenges.
- Figure 3 Dealing with all types of user populations will require adaptive authentication and federation/SSO.
- Figure 4 Federation and Web Access Management are essential technologies to connect all types of users to all types of applications
- Figure 5 The Overall Leadership rating for the Access Management and Federation market segment
- Figure 6 Product Leaders in the Access Management and Federation market segment
- Figure 7 Innovation Leaders in the Access Management and Federation market segment
- Figure 8 Market Leaders in the Access Management and Federation market segment
- Figure 9 The Market/Product Matrix
- Figure 10 The Product/Innovation Matrix
- Figure 11 The Innovation/Market Matrix
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has ...Login Get full Access
1.1 Market Segment
Access Management and Identity Federation are frequently still seen as separate segments in the IT market. However, when looking at the business probl ...
Various drivers have led to this situation. At the core is the need for agility in a complex competitive landscape. Business models have to adapt more ...
Various technologies support all the different requirements customers are facing today. The requirements are:
- Use Cloud Services: Enabling an o ...
The Connected Enterprise means that organizations have to deal with more and larger user populations than ever before. Beyond the employees and some e ...
Web Access Management, on the other hand, comes into play when managing access to on-premise applications that do not support Identity Federation. Whi ...Login Get full Access
1.2 Delivery models
The focus is on on-premise solutions for this Leadership Compass. We also see a growing number of cloud services provided in particular Identity Feder ...Login Get full Access
1.3 Required Capabilities
When evaluating the products, besides looking at the aspects of
- overall functionality
- size of the company
- number of customers
- number of de ...
**Selecting a vendor of a product or service must not be only based on the comparison provided by a KuppingerCole Leadership Compass. The Leadership C ...Login Get full Access
2.1 Overall Leadership
The Overall Leadership rating is a combined view of the three Leadership categories, i.e., Product Leadership, Innovation Leadership, and Market Leade ...Login Get full Access
2.2 Product Leadership
The first of the three specific Leadership ratings is about Product Leadership. This view is mainly based on the analysis of product/service features ...
Product Leadership is the view in which we focus on the functional strength and completeness of the Web Access Management and Identity Federation prod ...Login Get full Access
2.3 Innovation Leadership
Another angle we take when evaluating products/services concerns innovation. Innovation is, from our perspective, a key capability in IT market segmen ...
We have rated only a few vendors as Innovation Leaders in the Web Access Management and Identity Federation market, which has have driven this market ...Login Get full Access
2.4 Market Leadership
Here we look at Market Leadership qualities based on certain market criteria including but not limited to the number of customers, the partner ecosyst ...
The Market Leadership evaluation, the top three are IBM, CA Technologies and Micro Focus primarily for their large global customer base, partner and s ...Login Get full Access
3 Correlated View
While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for, say, a product leader, but for a ...Login Get full Access
3.1 The Market/Product Matrix
The first of these correlated views looks at Product Leadership and Market Leadership. ...
In this comparison, it becomes clear which vendors are better positioned in our analysis of Product Leadership compared to their position in the Marke ...Login Get full Access
3.2 The Product/Innovation Matrix
The second view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation be ...
Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative. Here, ...Login Get full Access
3.3 The Innovation/Market Matrix
The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...
Vendors above the line are performing well in the market compared to their relatively weak position in the Innovation Leadership rating, while vendors ...Login Get full Access
4 Products and Vendors at a glance
This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on Web Access Management and I ...Login Get full Access
4.1 Ratings at a glance
Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in this table. ...Login Get full Access
In addition, we provide in the second table an overview which also contains four additional ratings for the vendor, going beyond the product view prov ...
...Login Get full Access
The scond table requires some additional explanation regarding the “critical” rating.
In Innovativeness, this rating is applied if vendors provide ...Login Get full Access
5 Product/service evaluation
This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the produ ...Login Get full Access
5.1 AdNovum Nevis Security Suite
AdNovum is a Swiss-based company founded in 1988. Their Nevis Security Suite consists of various components that support Web Access Management and Fed ...Login Get full Access
5.2 CA Single Sign-On
CA Technologies, recently acquired by Broadcom Inc., Single Sign-On is a very mature product in the market and is part of the CA Identity Suite. Altho ...Login Get full Access
5.3 EmpowerID SSO Manager
EmpowerID SSO Manager is delivered as part of their base single integrated IAM suite and provides their Access Management and Federation capabilities. ...Login Get full Access
5.4 Ergon Airlock Suite
Ergon Airlock is an integrated suite that combines Web Access Management and Identity Federation (Airlock IAM) with a Web Application Firewall (Airloc ...Login Get full Access
5.5 Evidian IAM Suite
Based in France, Evidian was acquired by ATOS group and is now a dedicated business branch in their Cybersecurity division since 2015. Evidian provide ...Login Get full Access
5.6 F5 Networks BIG-IP APM
F5 Networks core product is their BIG-IP in which their Access Policy Manager (APM) is a part of that product line and provides their Identity Federat ...Login Get full Access
5.7 ForgeRock Identity Platform
ForgeRock is a leader in the IAM space, providing a single integrated suite based on their Identity Platform. The Access Management and Identity Gatew ...Login Get full Access
5.8 IBM Security Access Manager
IBM Security Access Manager (ISAM) is a well-established product in the market, and IBM has one of the largest customer bases of all vendors in this m ...Login Get full Access
5.9 Micro Focus Access Manager
Micro Focus Access Manager is a mature and widely deployed product on the market and was the first vendor in the market to integrate Identity Federati ...Login Get full Access
5.10 One Identity Cloud Access Manager
One Identity has emerged through a number of different company acquisitions (Quest and Dell) and is now a separate legal entity as of 2017. Their Clou ...Login Get full Access
5.11 Oracle Access Management Suite Plus
Oracle Access Management Suite Plus is a single integrated suite that includes their Access Manager, Identity Federation, Entitlements Server, Adaptiv ...Login Get full Access
5.12 Ping Identity Federated Access Management
Ping Identity was founded in 2002 with a primarily focused in the area of Identity Federation. Since then, Ping Identity has steadily grown to add fea ...Login Get full Access
5.13 Rohde & Schwarz R&S®Web Access Manager
The Web Access Manager product was developed by the French company formally DenyAll, and more recently acquired the German company Rohde & Schwarz Cyb ...Login Get full Access
5.14 Ubisecure Identity Server
Ubisecure is a Finland based company established in 2002 with a customer base primarily in the Nordic region. Their Identity Server is delivered as a ...Login Get full Access
5.15 WSO2 Identity Server
WSO2 Identity Server is based on open source and provides Identity and Access Management (IAM) capabilities as a single integrated IAM suite. For the ...Login Get full Access
6 Vendors to watch
Besides the vendors covered in detail in this Leadership Compass document, we observe some other vendors in the market that have credible Access Manag ...Login Get full Access
6.1 Atos DirX Access
DirX Access is the Access Management and Federation solution within the Atos DirX product portfolio. Atos, having been acquired by Evidian indirectly ...Login Get full Access
6.2 Fischer International Identity
Fischer International Identity provides Web Access Management and Identity Federation both as on-premise and cloud deployments. Their Identity product ...Login Get full Access
6.3 Forum Systems - Sentry API Security Gateway
Forum Systems is a privately held independent engineering company based in Newton, Massachusetts, USA. Founded in 2001, the company can provide a comb ...Login Get full Access
6.4 Identity Automation RapidIdentity
Identity Automation started in 2004 as consulting firm helping companies with their Identity and Access Management (IAM) integrations such as provisio ...Login Get full Access
6.5 Indeed Identity
Indeed Identity is a Lithuanian-based software company that provides Enterprise Authentication and Enterprise Single Sign-On products. Although a rela ...Login Get full Access
OpenIAM has been in the IAM market since 2008. They moved from an open source model to a model which mandatorily involves a commercial component and o ...Login Get full Access
6.7 SecureAuth IP
SecureAuth has been in the market since 2006 and headquartered in Irvine, CA. Their strength is not only providing Web Access Management and Identity ...Login Get full Access