KuppingerCole Report
Leadership Compass
By John Tolbert

Enterprise Authentication Solutions

This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the Enterprise Authentication market segment, product/service functionality, relative market share, and innovative approaches to providing modern solutions in this space.

1 Introduction

As the number and severity of data breaches rise, businesses, governments, and other organizations seek to improve the authentication experience and r ...

Login Get full Access

1.1 Market Segment

This market segment is mature and common feature sets are stable, but vendors are frequently introducing innovations in authenticator technologies and ...

Login Get full Access

1.2 Delivery models

In the Enterprise Authentication market, solutions are offered as SaaS, PaaS, and for on-premises deployment. Pure-play SaaS solutions are often multi ...

Login Get full Access

1.3 Required Capabilities

Various technologies support all the different requirements customers are facing today. The requirements are:

  • Support multiple authenticator types ...
Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Leadership Compass. The Leadership Co ...

The Enterprise Authentication market segment continues to grow in size and number of vendors. There is a wide range of vendor types. The overall leade ...

Product Leadership, or in some cases Service Leadership, is where we examine the functional strength and completeness of services.

The Product Lea ...

Innovation Leaders are those vendors that are delivering cutting edge products, not only at customer request but also because they are driving the tec ...

Market Leadership is a combined measure of customers, managed users, partners, the geographic distribution of customers, support, and partners, and ov ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader but for a vendor ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views contrasts Product Leadership and Market Leadership

This chart shows how well vendors are doing in the market relative to product strength. Vendors below the line have a weaker market position than expe ...

Login Get full Access

3.2 The Product/Innovation Matrix

This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...

The Technology Leaders are Ping Identity, ForgeRock, IBM, Transmit Security, Okta, Micro Focus, Microsoft, Entrust, and Pirean. The vendors in the top ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Finally, we consider the intersection of Innovation and Market Position. The Big Ones are Microsoft, Ping Identity, IBM, ForgeRock, Entrust, and Okta. ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products and/or services we have analyzed within this KuppingerCole Leadership Compass on Enterprise ...

Login Get full Access

Table 1: Comparative overview of the ratings for the product capabilities

In addition, we provide in Table 2 an overview which also contains four additional ratings for the vendor, going beyond the product view provided in the previous section. While the rating for Financial Strength applies to the vendor, the other ratings apply to the product.

Table 2: Comparative overview of the ratings for vendors

Login Get full Access

5 Product/service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 CyberArk

CyberArk was established in 1999 in Boston and is listed on the NASDAQ. They acquired Idaptive, a spin-off of Centrify, in mid-2020. Their combined of ...

Login Get full Access

5.2 EmpowerID

EmpowerID was founded in Ohio in 2005. They are privately held and have offices in the DACH region of the EU as well. In addition to the products list ...

Login Get full Access

5.3 Entrust

Privately held Entrust, formerly known as Entrust Datacard, was founded in 1969. Entrust Identity is the unified authentication portfolio: IntelliTrus ...

Login Get full Access

5.4 ForgeRock

ForgeRock is a leading venture-backed IAM vendor, headquartered in the Bay Area but with many offices around the world. ForgeRock supports most major ...

Login Get full Access

5.5 HID Global

HID Global is a subsidiary of ASSA ABLOY Group AB of Stockholm. HID Global’s US headquarters is in Austin, TX. HID Global has IAM solutions, and als ...

Login Get full Access

5.6 IBM

IBM has renamed and branded their IAM and IDaaS solution to Security Verify from Cloud Identity. It can be used for B2B, B2C, and B2E use cases. The S ...

Login Get full Access

5.7 Micro Focus

Micro Focus is an IT software vendor with products covering many aspects of security and IAM, as well as application development, collaboration platfo ...

Login Get full Access

5.8 Microsoft

Redmond, WA headquartered Microsoft is well-known for operating systems, office automation, and cloud infrastructure. Azure Active Directory (Azure AD ...

Login Get full Access

5.9 MobileIron

MobileIron was founded in the Bay Area in 2007. Zero Sign-On is their authentication product, and they also have UEM and Mobile Threat Defense solutio ...

Login Get full Access

5.10 Okta

Okta, founded in 2009 in San Francisco, is a leading IDaaS provider. Their Identity Cloud solution is SaaS-delivered, operating out of multiple global ...

Login Get full Access

5.11 Ping Identity

Ping Identity has been a trailblazer in identity federation and access management since it was established in 2002. Ping Identity has grown substantia ...

Login Get full Access

5.12 Pirean

Pirean was founded in 2002 with offices in London and Sydney. In 2018, Pirean was acquired by Exostar, an IAM and collaboration solutions provider for ...

Login Get full Access

5.13 RSA Security

RSA was founded in 1982 and is headquartered in Bedford, MA. RSA Security was divested from Dell Technologies and acquired by a consortium of private ...

Login Get full Access

5.14 SAASPASS

Privately held SAASPASS was formed in 2013 in San Francisco. Their product portfolio is centered on providing modern, passwordless authentication serv ...

Login Get full Access

5.15 Symantec (was acquired by Broadcom Inc.)

Symantec, now a division of Broadcom, has a long history in cybersecurity and IAM. Symantec offers their VIP authentication, Advanced Authentication, ...

Login Get full Access

5.16 Thales

Thales is a global leader in the aerospace, defense, and transport industries. Thales also has cybersecurity and IAM products, including the heritage ...

Login Get full Access

5.17 Transmit Security

Transmit Security was founded in 2013 and is headquartered in Tel Aviv, Israel, and has US headquarters in Boston, Massachusetts. The company is self- ...

Login Get full Access

5.18 WSO2

WSO2 was founded in 2005. They are an open-source IAM solution provider. Their target market is identity architects and developers who can take advant ...

Login Get full Access

6 Vendors and Market Segments to watch

Aside from the vendors covered in detail in this Leadership Compass document, we also observe other vendors in the market that we find interesting. So ...

Login Get full Access

6.1 Amazon Cognito

Amazon offers enterprise authentication functionality with Cognito. Cognito supports OAuth, OIDC, and SAML for federation. Cognito was originally buil ...

Login Get full Access

6.2 Callsign

Callsign is a mid-stage venture-backed company that was founded in London in 2012. Their solution, Intelligence Driven Authentication, is a multi-face ...

Login Get full Access

6.3 Cisco Secure Access by Duo

Cisco acquired Duo Security in 2018, a veteran multi-factor authentication vendor and one of the leading providers of access security solutions. Cisc ...

Login Get full Access

6.4 ESET Secure Authentication

ESET is a well-respected vendor of cybersecurity solutions, headquartered in Bratislava, Slovakia and with offices around the world. ESET Secure Authe ...

Login Get full Access

6.5 Optimal IdM

Optimal IdM was founded in 2005 and is headquartered in Florida. Optimal IDM offers OptimalCloud which provides SSO, MFA, Federation capabilities for ...

Login Get full Access

6.6 TransUnion (iovation)

Portland, OR-based iovation was founded in 2004. It was acquired by TransUnion in May of 2018. The company provides an integrated MFA and fraud reduct ...

Login Get full Access

6.7 United Security Partners

USP is a Swiss-based vendor of security solutions. Their Secure Entry Server combines access management, federation, authorization, network access con ...

Login Get full Access

6.8 Veridium

Veridium was founded in London in 2017. They’re a series B startup specializing in passwordless authentication. Their solutions serve both consumer ...

Login Get full Access

Methodology

Copyright

©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top