Buyer’s Compass: Access Management
Content of Figures
1 How to Use the Buyer’s Compass
This KuppingerCole Buyer’s Compass on Access Management solutions provides information about
- Use Cases
- Functional Selection Criteria
- Non-funct ...
2 Market Segments Defined
Access Management refers to the group of capabilities targeted at supporting organizations' access management requirements traditionally found within ...
Although traditional on-premises Access Management solutions have focused on WAM & Identity Federation solutions in the past, KuppingerCole sees a con ...
Login Free 30-day Select Access Get full Access3 Top 4 Use Cases
Use Cases | Description |
---|---|
Web Access Management | Many organizations need to deliver basic authentication and authorization for vario ... |
4 Top 20 Selection Criteria - Functional
IAM leaders must perform a detailed evaluation and assessment of Access Management providers. The functional selection criteria presented in the table ...
Login Free 30-day Select Access Get full Access5 Top 10 Selection Criteria – Non-functional
Aside from the functional selection criteria listed above, there are a number of non-functional criteria to take into account when deciding on an appr ...
Login Free 30-day Select Access Get full Access6 Use Cases / Selection Criteria Matrix
Having identified the most important use cases and selection criteria for Access Management vendors, this section provides a matrix that maps use case ...
These criteria need to be adapted to your business and operational requirements. KuppingerCole Advisory Services can support organizations with adapti ...
Login Free 30-day Select Access Get full Access7 Top 5 Prerequisites - Technical
Whether you transition from an on-premises Access Management deployment to an IDaaS approach or start anew with an IDaaS implementation, you will stil ...
Login Free 30-day Select Access Get full Access8 Top 10 Prerequisites - Organizational
A successful Access Management vendor selection depends on more than the technology itself, and organizational factors should not be neglected. The fo ...
Login Free 30-day Select Access Get full Access9 Top 10 Questions to ask the Vendors
In addition to asking about specific features, other questions are worth asking vendors. The following questions help in understanding the maturity of ...
Login Free 30-day Select Access Get full Access10 Related Research
Advisory Note: Redefining Access Governance - Beyond annual recertification – 72579
Advisory Note: KRIs and KPI for Access Governance – 72559
Advisory Note: Maturity Level Matrixes for Identity and Access - 70738
Architecture Blueprint: Access Governance and Privilege Management - 79045
Leadership Compass: Infrastructure as a Service - 80035
Leadership Compass: Identity Governance & Administration (IGA) - 80063
Leadership Compass: Access Governance - 80098
Leadership Compass: Cloud Access Security Brokers - 70614
Leadership Compass: Access Management and Federation – 71147
Leadership Compass: Identity as a Service: Cloud-based Provisioning, Access Governance, and Federation (IDaaS B2E) – 70319
Whitepaper: A Lean Approach on Identity & Access Governance - 80048