KuppingerCole Report
Leadership Compass
By Martin Kuppinger, Anmol Singh

Access Governance & Intelligence

Leaders in innovation, product features, and market reach for access governance & intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

1 Introduction

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadersh ...

Login Get full Access

1.1 Market Segment

Access Governance & Intelligence is an IAM focused risk management discipline that facilitates involvement of business in the overall management of ac ...

To achieve this, features for role management, policy management, rule definition and analysis, workflows as well as additional functionality are requ ...

Login Get full Access

1.2 Delivery models

This Leadership Compass is focused on products that predominantly run on-premises, either at the customer site or hosted by a Managed Service Provider ...

Login Get full Access

1.3 Required Capabilities

When evaluating the products, we look at various aspects, including:

  • overall functionality
  • size of the company
  • number of customers
  • number o ...
Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not be only based on the comparison provided by a KuppingerCole Leadership Compass. The Leadership Com ...

Login Get full Access

2.1 Overall Leadership

When looking at the Overall Leader segment in the Overall Leadership rating, we see a picture that is common for mature market segments, where a signi ...

Login Get full Access

2.2 Product Leadership

The first of the three specific Leadership ratings is about Product Leadership. This view is mainly based on the analysis of product/service features ...

Product Leadership is the view where we look specifically at the functional strength and completeness of products. As access governance is an establis ...

Login Get full Access

2.3 Innovation Leadership

Another angle we take when evaluating products/services concerns innovation. Innovation is, from our perspective, a key capability in IT market segmen ...

Again, we rate several vendors as Innovation Leaders in the access governance market. Given the maturity of access governance, the amount of innovatio ...

Login Get full Access

2.4 Market Leadership

Here we look at Market Leadership qualities based on certain market criteria including but not limited to the number of customers, the partner ecosyst ...

In the Market Leaders rating, we get a somewhat different picture. While there is a group of leading, well-established players, others are rated low, ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for, say, a product leader, but for a ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views looks at Product Leadership and Market Leadership.

Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of “overperf ...

Login Get full Access

3.2 The Product/Innovation Matrix

The second view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation be ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative.

Her ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line are performing well in the market compared to their relative weak position in the Innovation Leadership rating, while vendors b ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on access governance. Aside fr ...

Login Get full Access

4.1 Ratings at a glance

Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in table 1.

Login Get full Access

In addition, we provide in table 2 an overview which also contains four additional ratings for the vendor, going beyond the product view provided in t ...

Login Get full Access

Table 2 requires some additional explanation regarding the “critical” rating.

In Innovativeness, this rating is applied if vendors provide none, or ...

Login Get full Access

5 Product/Service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 Avatier

Avatier, based in California (US), has evolved from a vendor that focused primarily on providing smart user interfaces, but lacked the underlying dept ...

Login Get full Access

5.2 Beta Systems

Beta Systems, based in Germany, offers Garancy IAM suite comprising of several modules including Garancy Identity Manager for provisioning, ProcessCen ...

Login Get full Access

5.3 Brainwave GRC

Brainwave, based in France, is a relatively new entrant in the market. Founded in 2010, the company offers Brainwave Identity GRC as its primary ident ...

Login Get full Access

5.4 CA Technologies (was acquired by Broadcom Inc. in 2018/11)

CA Technologies is among the largest infrastructure software vendors worldwide and offers a broad portfolio of products in the IAM market segment, inc ...

Login Get full Access

5.5 E-Trust

E-Trust, based in Brazil, offers Horacius Identity & Governance as the common platform for identity provisioning and access governance. Also available ...

Login Get full Access

5.6 EmpowerID

EmpowerID, based in Ohio (US), offers EmpowerID as its primary identity provisioning and access governance product. Built on Microsoft technology, Emp ...

Login Get full Access

5.7 Evidian (was acquired by Atos)

Evidian, based in France, is part of Atos which is one of the leading IT service providers in Europe. Evidian has been in the IAM business for many ye ...

Login Get full Access

5.8 Fischer International Identity

Fischer International offers Fischer Identity Suite comprising of several modules available as a bundled offering. Its primary module responsible for ...

Login Get full Access

5.9 Hitachi ID Systems

Hitachi ID provides a product named Identity Manager, which is a mature solution for managing identities and their access. It integrates access govern ...

Login Get full Access

5.10 IBM

IBM Security Identity Governance & Intelligence (ISIGI) is the successor of former IBM Security/Tivoli Identity Manager (ISIM/ITIM) and one of the mor ...

Login Get full Access

5.11 Micro Focus

UK based Micro Focus offers Identity Governance as its primary product for access governance capabilities which integrates well with Identity Manager. ...

Login Get full Access

5.12 Nexis

Nexis, based in Germany, offers Nexis Controle as its combined identity provisioning and access governance offering. Controle, first released in 2014, ...

Login Get full Access

5.13 Omada

Omada, a Danish vendor, provides the Omada Identity Suite as integrated access governance and identity provisioning product. Omada focuses on making g ...

Login Get full Access

5.14 One Identity

One Identity, based in California, is a Quest Software business. It owns the IAM portfolio that came from Dell Software. One Identity Manager, which h ...

Login Get full Access

5.15 Oracle

Oracle Identity Governance (OIG) Suite is the on premise offering within Oracle’s IAM portfolio. It includes Oracle Identity Analytics (OIA), which ...

Login Get full Access

5.16 Pirean

Pirean is a UK-based software company that is not yet well-known outside of their home market but shows strong potential. Their Access:One offering co ...

Login Get full Access

5.17 RSA Security

RSA, a leading provider of security solutions, offers RSA Identity Governance and Lifecycle as its combined offering for both identity provisioning an ...

Login Get full Access

5.18 SailPoint

SailPoint originally started as a vendor specialized in access governance. However, since 2010 they have made strategic personnel and technology inves ...

Login Get full Access

5.19 SAP

SAP has established a considerable IAM portfolio over the past years and its recent acquisition of Gigya shows its continued commitment to grow and co ...

Login Get full Access

5.20 Saviynt

Saviynt, based in California (US), offers Saviynt Security Manager as its combined offering for identity provisioning and access governance. Relativel ...

Login Get full Access

5.21 SecureAuth

SecureAuth + Core Security, based in Atlanta, is the newly formed entity from the merger of SecureAuth, Courion and SecureReset. Core Security has evo ...

Login Get full Access

5.22 Systancia

Systancia is a France based IT security company that originally started as an identity provisioning provider for healthcare industry. They recently me ...

Login Get full Access

5.23 Tools4ever

Tools4ever is a Dutch software company that started in the SMB market segment but has grown its portfolio to a level where it can also serve the IAM r ...

Login Get full Access

6 Vendors to watch out for Access Governance

Besides the vendors covered in details in this Leadership Compass document, we come across some other vendors in the market that also offer credible a ...

Login Get full Access

6.1 Atos

Atos, having acquired Evidian indirectly via the Groupe Bull acquisition, has also acquired the former Siemens Business Services, which include the Si ...

Login Get full Access

6.2 Avanpost

Avanpost, based in Russia, primarily offers identity provisioning capabilities as part of its IAM product, but only limited access governance features ...

Login Get full Access

6.3 Cion Systems

Cion Systems offers a range of identity provisioning and access governance tools aimed at Active Directory. They have multiple components serving spec ...

Login Get full Access

6.4 Deep Identity

Singapore-based Deep Identity, a part of Temesak Management Services group of companies, offers several IAM products with Deep IACM (Identity Audit ...

Login Get full Access

6.5 FSP

FSP, based in Germany, provides an integrated IGA solution named “IGA Suite ORG”. As an integrated suite, the product covers both identity provisi ...

Login Get full Access

6.6 Identity Automation

Identity Automation is another system integrator turned identity software provider. Based on the experience and expertise from the integration busines ...

Login Get full Access

6.7 Ilantus

India based Ilantus Technologies is a specialized vendor in the IAM domain. Originally a system integrator and a managed IAM service provider, it has ...

Login Get full Access

6.8 Imprivata

Imprivata, a provider of healthcare access management solutions acquired Caradigm, which is a GE healthcare company focused on delivering identity lif ...

Login Get full Access

6.9 iSM Secu-Sys

iSM Secu-Sys, based in Germany, offers bi-cube with a focus on identity provisioning capabilities. In addition to common workflow and policy management, bi-cube offers integrated SOD and DAG (Data access governance) capabilities. Also available in SaaS delivery format, iSM bi-cube makes a good choice for small to mid-sized organizations with requirements of detailed identity provisioning integrated with access governance for common scenarios focused at SOD and DAG. iSM Secu-Sys has limited visibility beyond the local markets but is investing considerably in building awareness and a stronger partner ecosystem beyond home territory.

6.10 ITconcepts

ITconcetps leverages Cognitum as a development platform for IAM solutions that allows organizations to quickly create IAM solutions, based on own requ ...

Login Get full Access

6.11 ITMC Soft

Founded by a group of IAM experts, ITMC offers IDM365 as its primary offering focused at ease of use and reduced deployment complexity. Delivering a s ...

Login Get full Access

6.12 Microsoft

Microsoft’s offering in the identity provisioning market segment is the Microsoft Identity Manager 2016 (MIM). The product is an upgraded and integr ...

Login Get full Access

6.13 Ogitix

Ogitix is a German company that provides an IAM solution targeted at the SMB market, with focus on the local market. It provides some interesting capa ...

Login Get full Access

6.14 OpenIAM

OpenIAM counts amongst the lesser known vendors in the IAM market with a limited but growing market potential. Offered primarily in hardware appliance ...

Login Get full Access

6.15 Propentus

Propentus, a Finnish software vendor offers Propentus United Identity which takes an HR-based approach to identity and access management. With a stron ...

Login Get full Access

6.16 SmartIAM

SmartAIM is a Dutch vendor offering SmartAIM Authorization Management Suite with several optional modules covering most identity provisioning and acce ...

Login Get full Access

6.17 Usercube

Usercube is a French software company that primarily offers an identity provisioning solution built on .NET framework. With user intuitive interface f ...

Login Get full Access

6.18 Tuebora

Tuebora, based in California, offers Tuebora Governance as its provisioning and governance product. Tuebora combines identity provisioning and access ...

Login Get full Access

6.19 WSO2

WSO2, headquartered in Palo Alto, California offers a platform for securing IT infrastructure and applications based on SOA (Service Oriented Architec ...

Login Get full Access

7 Related Research

Executive View: Beta Systems Garancy IAM Suite - 71530
Executive View: Beta Systems Garancy Recertification Center - 71315
Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811
Executive View: CA Privileged Access Manager - 71264
Executive View: Evidian Identity & Access Manager - 70871
Executive View: Hitachi ID IAM Suite - 72543
Executive View: IBM Security Identity Governance and Intelligence - 71113
Executive View: IBM QRadar Security Intelligence Platform - 72515
Executive View: IBM Privileged Identity Manager - 71557
Executive View: IBM Cloud Security Enforcer - 71523
Executive View: Micro Focus Privileged Account Manager - 71314
Executive View: Nexis Controle 3.0 - 72535
Executive View: Omada Identity Suite - 70301
Executive View: Omada Identity Suite v11.1 - 70835
Executive View: One Identity Manager v7.0.1 - 70894
Executive View: RSA SecurID® Access - 70323
Executive View: RSA NetWitness Suite - 72516
Executive View: SailPoint IdentityIQ - 71319
Executive View: SailPoint SecurityIQ - 70849
Executive View: SAP HANA Platform Security - 70272
Executive View: SAP Fraud Management - 71182
Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117
Executive View: SAP Enterprise Threat Detection - 71181
Executive View: Saviynt Identity Governance and Administration (IGA) 2.0 - 71506
Leadership Compass: Privilege Management - 72330
Leadership Compass: CIAM Platforms - 70305
Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141
Leadership Compass: Cloud IAM/IAG - 71121
Leadership Compass: identity provisioning - 70949
Leadership Compass: Enterprise Key and Certificate Management - 70961
Leadership Compass: Access Management and Federation - 70790
Leadership Compass: Access Governance - 70735



©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.