KuppingerCole Report
Leadership Compass
By Richard Hill

Access Management

This Leadership Compass provides insights to the leaders in innovation, product features, and market reach for Access Management on-premises, cloud, and hybrid platforms. Your compass for finding the right path in the market.

1 Introduction

Access Management refers to the group of capabilities targeted at supporting an organizations' access management requirements traditionally found with ...

Although traditional on-premises Access Management solutions have focused on WAM & Identity Federation solutions in the past, KuppingerCole sees a con ...

Login Get full Access

1.1 Market Segment

Access Management and Identity Federation are still frequently seen as separate segments in the IT market. However, when looking at the business probl ...

IDaaS Access Management (AM) offers a springboard for most organizations to start using foundational IAM elements delivered from the cloud and move th ...

Login Get full Access

1.2 Delivery models

Increasingly there is a clear trend in the market to move Access Management solutions from an on-premises delivery model to a cloud delivery model. An ...

Login Get full Access

1.3 Required Capabilities

When evaluating the products, we start by looking at standard criteria such as:

  • overall functionality
  • size of the company
  • number of customers
  • ...
Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Leadership Compass. The Leadership Co ...

When looking at the Leader segment in the Overall Leadership rating, we see a picture that is a typical representation of mature markets, where many v ...

Product Leadership is where we examine the functional strength and completeness of services. Since Access Management (AM) is continuously evolving pr ...

We have rated roughly a third of the vendors as Innovation Leaders in the Access Management (AM) market. Given the maturity of Access Management solut ...

With a strong market position, successful execution, and strengthened Access Management (AM) product features, Microsoft and IBM are out front leading ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views contrasts Product Leadership and Market Leadership

Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of “overperf ...

Login Get full Access

3.2 The Product/Innovation Matrix

This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative.

Her ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line perform well in the market compared to their relatively weaker position in the Innovation Leadership rating. In contrast, vendo ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products and services we have analyzed within this KuppingerCole Leadership Compass on Access Managem ...

Login Get full Access

Ratings at a glance

Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in the foll ...

Login Get full Access

In addition, we provide in the second table an overview which also contains four additional ratings for the vendor, going beyond the product view prov ...

Login Get full Access

This table requires some additional explanation regarding the “critical” rating.

In Innovativeness, this rating is applied if vendors provide none o ...

Login Get full Access

5 Product/service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 Broadcom Inc.

Broadcom, a publicly-traded semiconductor and infrastructure software products company, acquired the Symantec Enterprise business in November of 2019. ...

Login Get full Access

5.2 Cloudentity

Cloudentity is a privately held identity and access management company headquartered in Seattle, WA. The company introduced its CIAM.next platform in ...

Login Get full Access

5.3 Curity

Curity is a provider of API-driven identity management solutions based in Stockholm, Sweden. The company focuses on providing identity services for AP ...

Login Get full Access

5.4 CyberArk

CyberArk, known for its Privileged Access Management (PAM) solution, acquired the Idaptive identity platform in mid-2020. In January 2019, Idaptive wa ...

Login Get full Access

5.5 EmpowerID

Based in Ohio (US), EmpowerID offers multiple products in a suite which includes EmpowerID Password Management, Group Management, Dynamic Group Manage ...

Login Get full Access

5.6 Ergon

Ergon Airlock is a single product with multiple services within a suite. The suite includes a WAF, API Gateway, cIAM, and 2FA authentication that leve ...

Login Get full Access

5.7 Evidian (was acquired by Atos)

Based in France, Evidian is a dedicated business branch of the ATOS group within its Cybersecurity division since 2015, one of the leading IT service ...

Login Get full Access

5.8 ForgeRock

ForgeRock is a leader in the IAM space, providing a single integrated suite based on their Identity Platform. ForgeRock Access Management delivers cor ...

Login Get full Access

5.9 Forum Systems

Forum Systems is a privately held, employee-owned company with independent engineering based in Needham, MA. Since the very beginning, the company off ...

Login Get full Access

5.10 IBM

IBM Security Verify is a well-established product in the market. IBM also has one of the largest customer bases of all vendors in this market segment, ...

Login Get full Access

5.11 Ilantus Technologies

Ilantus, which started as a system integrator, has moved to provide offerings targeted at different customer types. Compact Identity is a fully integr ...

Login Get full Access

5.12 LoginRadius

LoginRadius is a VC-backed CIAM vendor based in Vancouver, Canada. LoginRadius has a full-featured CIAM offering that is continually adding capabiliti ...

Login Get full Access

5.13 Micro Focus

Micro Focus NetIQ Access Manager is a mature and widely deployed product on the market and was the first vendor in the market to integrate Identity Fe ...

Login Get full Access

5.14 Microsoft

Microsoft offers Azure Active Directory (Azure AD) as its primary IDaaS Access Management platform. Azure AD Connect helps connecting on-premises Acti ...

Login Get full Access

5.15 NEVIS Security AG

NEVIS Security provides Identity and Access Management (IAM) security solutions protecting 80% of Switzerland’s e-banking transactions. Nevis has ov ...

Login Get full Access

5.16 Okta

Based in San Francisco, California (US), Okta offers a cloud identity platform targeted at the workforce and customer identity management. Okta's work ...

Login Get full Access

5.17 OneLogin

OneLogin was founded in 2009 and is headquartered in the San Francisco Bay Area, and were one of the first vendors to enter the IDaaS market. OneLogin ...

Login Get full Access

5.18 Optimal IdM

Established in 2005, Optimal IdM is an SMB company headquartered in Lutz, Florida, in the U.S, with other regional offices in the U.S. and Melbourne, ...

Login Get full Access

5.19 Oracle

Based in Texas, Oracle, the leading provider of Cloud infrastructure, database management and enterprise resource planning software, and since 2016, O ...

Login Get full Access

5.20 Ping Identity

Ping Identity was founded in 2002 and based in Denver, Colorado (US). Ping Identity started with a primary focus in the area of Identity Federation. S ...

Login Get full Access

5.21 RSA Security

RSA, formerly part of Dell Technologies, has been recently acquired by the Symphony Technology Group and is now an independent company. RSA is a leadi ...

Login Get full Access

5.22 SecureAuth

SecureAuth has been in the market since 2005 and is headquartered in Irvine, CA. The company aims to enable responses by bringing the telemetry of acc ...

Login Get full Access

5.23 Simeio Solutions

Based in Atlanta, Georgia (US), Simeio Solutions witnessed significant growth when shifting from its IAM system integration business into a full-fledg ...

Login Get full Access

5.24 Soffid

Based in Spain and established in 2013, Soffid IAM provides an open-source Identity and Access Management (IAM) and Single Sign-On (SSO) solution. Sof ...

Login Get full Access

5.25 Thales

The Thales Group, based in France, recently completed the acquisition of Gemalto, which brought SafeNet Trusted Access to its portfolio as its primary ...

Login Get full Access

5.26 Ubisecure

Ubisecure is a Finland based company established in 2002 with a customer base primarily in the Nordic region. Their Identity Platform is delivered as ...

Login Get full Access

5.27 WSO2

WSO2 Identity Server is based on open source and provides a single solution that contains IAM capabilities including SSO, Identity federation, strong ...

Login Get full Access

6 Vendors and Market Segments to watch

Aside from the vendors covered in detail in this Leadership Compass document, we also observe other vendors in the market that we find interesting. So ...

Login Get full Access

6.1 1Kosmos

1Kosmos was founded in 2018 and is headquartered in New Jersey. The company is small but self-funded and profitable. They address the consumer and wor ...

Login Get full Access

6.2 Authlete

Founded in 2015, Authlete is a small company located in Tokyo, Japan. Authlete offers OAuth 2.0 and OpenID solutions by giving developers the ability ...

Login Get full Access

6.3 Avoco Secure

AvocoSecure is a privately-owned UK company offering Cloud and CIAM services. The Avoco Trust Platform API is a toolkit providing extended ecosystem f ...

Login Get full Access

6.4 F5 Networks

Established in 1996, F5 Networks has a strong presence with large companies in North America with a presence in other countries. F5 Networks' offers t ...

Login Get full Access

6.5 Identity Automation

Founded in 2004 and headquartered in Huston, Texas, Identity Automation introduced its RapidIdentity IAM solution later in 2010. In 2018, Identity Aut ...

Login Get full Access

6.6 Pirean

Pirean was founded in 2002 with offices in London and Sydney. In 2018, Pirean was acquired by Exostar, an IAM and collaboration solutions provider for ...

Login Get full Access

6.7 PortSys

PortSys is a privately funded company that was founded in 2008 and based in Marlborough, Massachusetts. PortSys started out building security applianc ...

Login Get full Access

6.8 Signicat

Founded in 2006, Signicat has offices in the Netherlands covering Belgium and Luxemburg as well in the UK. Signicat customers are based in the EMEA re ...

Login Get full Access

6.9 SSO Easy

SSO Easy a privately owned US based company headquartered in Quincy, Massachusetts, with offices in New York and Australia. EasyConnect is SSO Easy's ...

Login Get full Access

6.10 United Security Providers (USP)

Founded in 1994, United Security Providers (USP) is a Swiss software vendor and service provider with offices in Bern (headquarters), Zurich, London, ...

Login Get full Access

6.11 Atos DirX Access

Atos, having acquired Evidian indirectly via the Groupe Bull acquisition, has also acquired the former Siemens Business Services which includes the Si ...

Login Get full Access

7 Related Research

Executive View: AdNovum NEVIS Security Suite - 80066
Executive View: Curity Identity Server - 80159
Executive View: EmpowerID - 70297
Executive View: Evidian Identity & Access Management - 70872
Executive View: ForgeRock Access Management - 80319
Executive View: Forum Systems Sentry and Identity Federation - 72511
Executive View: IBM Security Access Manager (ISAM) - 79066
Executive View: IBM Cloud Identity - 79065
Executive View: Ilantus Compact Identity - 80177
Executive View: Microsoft Azure Active Directory - 80401
Executive View: Okta Cloud IAM Platform - 70887
Executive View: Optimal IdM - Optimal Cloud - 80162
Executive View: Oracle Identity Cloud Service - 80156
Executive View: SecureAuth IdP - 71327
Executive View: Signicat - 72537
Executive View: Simeio IAM for SMB - 79071
Executive View: Symantec Privileged Access Manager - 80331
Executive View: Thales Vormetric Application Crypto Suite - 79069
Executive View: Ubisecure Identity Platform - 79072
Executive View: WSO2 Identity Server - 80060
Leadership Compass: Access Governance & Intelligence - 80098
Leadership Compass: Access Management & Federation - 71147
Leadership Compass: API Management and Security - 70311
Leadership Compass: Cloud-based MFA Solutions - 70967
Leadership Compass: Consumer Authentication - 80061
Leadership Compass: IDaaS Access Management - 79016
Leadership Compass: Identity API Platforms - 79012
Market Compass: Web Application Firewalls - 70324
Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080
Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289
Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062

Methodology

Copyright

©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top