KuppingerCole Report
Leadership Compass
By John Tolbert

Consumer Authentication

This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions.
By
jt@kuppingercole.com

1 Introduction

eCommerce businesses and other organizations that interact directly with end-users over the web are increasingly looking for better solutions for auth ...

This KuppingerCole Leadership Compass provides an overview of the leading vendors in this market segment. Picking solutions always requires a thorough ...

Login Get full Access

1.1 Market Segment

The Consumer Authentication market is growing, with some vendors offering mature solutions providing standard and deluxe features to support millions ...

Login Get full Access

1.2 Delivery models

In the Consumer Authentication market, solutions are offered as SaaS, or for on-premise or in-IaaS deployment. Pure-play SaaS solutions are multi-tena ...

Login Get full Access

1.3 Required Capabilities

Typical requirements seen in RFPs regarding consumer authentication include:

  • Deployment options: On-premise, cloud, or hybrid options.
  • Social lo ...
Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not be only based on the comparison provided by a KuppingerCole Leadership Compass. The Leadership Com ...

Login Get full Access

2.1 Overall Leadership

Entrust Datacard leads the pack, with ForgeRock, Akamai, SecureAuth, IBM, LoginRadius, and Ping Identity as Overall Leaders, showing strong ratings in ...

Login Get full Access

2.2 Product Leadership

Product Leadership is the first specific category examined below. This view is mainly based on the analysis of product/service features and the overal ...

Product Leadership, or in some cases Service Leadership, is where we examine the functional strength and completeness of products/services. Entrust D ...

Login Get full Access

2.3 Innovation Leadership

Next, we examine innovation in the marketplace. Innovation is, from our perspective, a key capability in all IT market segments. Customers require i ...

A sizable selection of vendors qualifies for Innovation Leader. The field is rapidly evolving, and business requirements are driving vendors to come u ...

Login Get full Access

2.4 Market Leadership

Lastly, we analyze Market Leadership. This is an amalgamation of the number of customers, number of managed identities, ratio between customers and ...

The Consumer Authentication market is growing, and there is still room for much more growth. Microsoft is at the pinnacle in terms of number of B2C cu ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views contrasts Product Leadership and Market Leadership.

Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of “overperf ...

Login Get full Access

3.2 The Product/Innovation Matrix

This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative.

Thi ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line are performing well in the market compared to their relatively weak position in the Innovation Leadership rating; while vendors ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on Consumer Authentication. As ...

Login Get full Access

4.1 Ratings at a glance

Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in Table 1.

Login Get full Access

In addition, we provide in Table 2 an overview which also contains four additional ratings for the vendor, going beyond the product view provided in t ...

Login Get full Access

5 Product / service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 AdNovum

AdNovum was founded in 1988 in Switzerland. They have expanded around Europe and to Singapore as well. nevisAuth is a separately licensable product wi ...

Login Get full Access

5.2 Akamai

Janrain was acquired by Akamai in early 2019. Janrain was launched in 2002 to provide user management and login capabilities for the social media mark ...

Login Get full Access

5.3 Auth0

Bellevue, WA based Auth0 is a rapidly growing B2B, CIAM and B2E IAM solution provider. Founded in 2013, they have been pioneering API-driven identity ...

Login Get full Access

5.4 Broadcom Inc.

Well known for enterprise IAM, Broadcom’s tightly integrated suite is also used for B2C authentication. Broadcom is promoting the legacy Layer 7 bra ...

Login Get full Access

5.5 Cloudentity

Cloudentity is headquartered in Seattle. In 2014, Cloudentity parlayed their IAM expertise from Syntegrity into a full-featured CIAM and IDaaS solutio ...

Login Get full Access

5.6 CoffeeBean Technology

CoffeeBean started up in 2008 in California with a focus on increasing ROI in marketing solutions. They began developing their consumer identity and m ...

Login Get full Access

5.7 Entrust Datacard

Entrust Datacard commands a large share of the global EMV market and has thousands of customers across the globe, serving millions of users, in both t ...

Login Get full Access

5.8 Ergon

Ergon Informatik, maker of the Airlock Secure Access Hub, was founded in 1984 in Zurich. It is an employee-owned company with a strong history of prov ...

Login Get full Access

5.9 Evidian

Evidian is a division of Atos, a large European IT service provider. The company provides a comprehensive portfolio in the area of IAM, as well as e-c ...

Login Get full Access

5.10 ForgeRock

ForgeRock is a leading, venture-backed IAM vendor, headquartered in the US but with many offices around the world. ForgeRock supports most major IAM s ...

Login Get full Access

5.11 IBM

Cloud Identity is IBM’s consumer authentication service, composed of the Trusteer Management Agent, Pinpoint Detect, Verify, Mobile SDK, and Rule En ...

Login Get full Access

5.12 iovation

Portland, OR based iovation was founded in 2004. It was acquired by TransUnion in mid-2018. The company provides an integrated MFA and fraud reduction ...

Login Get full Access

5.13 LoginRadius

Established in 2011, LoginRadius is a VC-backed CIAM vendor based in Vancouver, Canada. The company provides consumer authentication services for ente ...

Login Get full Access

5.14 Microsoft

Microsoft Azure Active Directory B2C is a cloud-based identity and access management service focused on facilitating business to consumer applications ...

Login Get full Access

5.15 Nok Nok

Nok Nok Labs is a privately held, venture-backed US company based in Palo Alto, California. It was founded in 2012 and is centered on providing secure ...

Login Get full Access

5.16 NRI Secure Technologies

NRI Secure Technologies, headquartered in Tokyo, provides security consulting and solutions. Uni-ID is their consumer authentication product, first de ...

Login Get full Access

5.17 Ping Identity

Ping Identity is a leading IAM and CIAM vendor, with a good reputation in identity federation and access management. PingFederate and PingID are their ...

Login Get full Access

5.18 Pirean

Pirean was founded in 2002 with offices in London and Sydney. In 2018, Pirean was acquired by Exostar, an IAM and collaboration solutions provider for ...

Login Get full Access

5.19 SAP

SAP Customer Data Cloud, formerly Gigya Identity Enterprise, is tightly integrated within the SAP platform. Their cloud-based service accommodates ove ...

Login Get full Access

5.20 SecureAuth

SecureAuth merged with Core Security in late 2017 and then split away again in 2019. SecureAuth is known for high security solutions for B2E. SecureAu ...

Login Get full Access

5.21 WSO2

WSO2 was founded in 2005. They are an open source IAM/CIAM solution provider. Their emphasis is on providing identity services like authentication ove ...

Login Get full Access

6 Vendors and Market Segments to watch

Aside from the vendors covered in detail in this Leadership Compass document, we also observe other vendors in the market that we find interesting. So ...

Login Get full Access

6.1 Amazon Cognito

Amazon offers some consumer authentication functionality with Cognito. Cognito supports OAuth, OIDC, and SAML for federation, allowing users to sign i ...

Login Get full Access

6.2 Avatier

California-based Avatier is a growing IAM and CIAM vendor. Their focus is on rapid deployment of basic IAM services to customers. Avatier has mostly b ...

Login Get full Access

6.3 AvocoSecure Trust Platform

AvocoSecure is a privately-owned UK company offering Cloud and Adaptive Authentication services. Their product is called Trust Platform. Trust Platfor ...

Login Get full Access

6.4 Curity AB

Curity AB was founded in Stockholm in 2015. They are focused on integrating with and extending existing IAM solutions with authentication. Beyond pas ...

Login Get full Access

6.5 Duo Security

Duo Security provides a scalable MFA solution that can support a small to enterprise-size user base. Duo Security focuses on reducing the complexity o ...

Login Get full Access

6.6 Fusion Auth

FusionAuth is single-tenant CIAM solution that can be deployed on-premises or in a private cloud. Its self-hosted option is free for unlimited users a ...

Login Get full Access

6.7 Singular Key

Singular Key offers a passwordless MFA service with developer-centric cloud-native authentication API & SDKs that facilitate deployment and allow user ...

Login Get full Access

6.8 Swivel Secure

Swivel Secure was founded in 2000 and is headquartered in the UK. They support some standards-based authentication methods and they offer some proprie ...

Login Get full Access

6.9 Ubisecure Identity Server

Based in Finland, Ubisecure offers an integrated product solution that delivers consumer authentication functionality. Most customers run Ubisecure on ...

Login Get full Access

6.10 UXP Systems

Toronto, Canada based UXP Systems offers Consumer IAM features in their User Lifecycle Management (ULM) Identity and Access Management module. ULM can ...

Login Get full Access

Methodology

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top