Access Management
Content of Figures
- Figure 1 The enterprise requires access to systems, either on-premise or in the cloud, for all types of user populations
- Figure 2 The increasingly connected enterprise ecosystem
- Figure 3 The Overall Leadership rating for the Access Management market segment
- Figure 4 Product Leaders in the Access Management market segment
- Figure 5 Innovation Leaders in the Access Management market segment
- Figure 6 Market Leaders in the Access Management market segment
- Figure 7 The Market/Product Matrix.
- Figure 8 The Product/Innovation Matrix.
- Figure 9 The Innovation/Market Matrix
1 Introduction
Access Management refers to the group of capabilities targeted at supporting an organizations' access management requirements traditionally found with ...
Although traditional on-premises Access Management solutions have focused on WAM & Identity Federation solutions in the past, KuppingerCole sees a con ...
Login Get full Access1.1 Market Segment
Access Management and Identity Federation are still frequently seen as separate segments in the IT market. However, when looking at the business probl ...
IDaaS Access Management (AM) offers a springboard for most organizations to start using foundational IAM elements delivered from the cloud and move th ...
Login Get full Access1.2 Delivery models
Increasingly there is a clear trend in the market to move Access Management solutions from an on-premises delivery model to a cloud delivery model. An ...
Login Get full Access1.3 Required Capabilities
When evaluating the products, we start by looking at standard criteria such as:
- overall functionality
- size of the company
- number of customers ...
2 Leadership
Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Leadership Compass. The Leadership Co ...
When looking at the Leader segment in the Overall Leadership rating, we see a picture that is a typical representation of mature markets, where many v ...
Product Leadership is where we examine the functional strength and completeness of services. Since Access Management (AM) is continuously evolving pr ...
We have rated roughly a third of the vendors as Innovation Leaders in the Access Management (AM) market. Given the maturity of Access Management solut ...
With a strong market position, successful execution, and strengthened Access Management (AM) product features, Microsoft and IBM are out front leading ...
Login Get full Access3 Correlated View
While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...
Login Get full Access3.1 The Market/Product Matrix
The first of these correlated views contrasts Product Leadership and Market Leadership
Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of “overperf ...
Login Get full Access3.2 The Product/Innovation Matrix
This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...
Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative.
Her ...
Login Get full Access3.3 The Innovation/Market Matrix
The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...
Vendors above the line perform well in the market compared to their relatively weaker position in the Innovation Leadership rating. In contrast, vendo ...
Login Get full Access4 Products and Vendors at a glance
This section provides an overview of the various products and services we have analyzed within this KuppingerCole Leadership Compass on Access Managem ...
Login Get full AccessRatings at a glance
Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in the foll ...
Login Get full AccessIn addition, we provide in the second table an overview which also contains four additional ratings for the vendor, going beyond the product view prov ...
Login Get full AccessThis table requires some additional explanation regarding the “critical” rating.
In Innovativeness, this rating is applied if vendors provide none o ...
Login Get full Access5 Product/service evaluation
This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...
Login Get full Access5.1 Broadcom Inc.
Broadcom, a publicly-traded semiconductor and infrastructure software products company, acquired the Symantec Enterprise business in November of 2019. ...
Login Get full Access5.2 Cloudentity
Cloudentity is a privately held identity and access management company headquartered in Seattle, WA. The company introduced its CIAM.next platform in ...
Login Get full Access5.3 Curity
Curity is a provider of API-driven identity management solutions based in Stockholm, Sweden. The company focuses on providing identity services for AP ...
Login Get full Access5.4 CyberArk
CyberArk, known for its Privileged Access Management (PAM) solution, acquired the Idaptive identity platform in mid-2020. In January 2019, Idaptive wa ...
Login Get full Access5.5 EmpowerID
Based in Ohio (US), EmpowerID offers multiple products in a suite which includes EmpowerID Password Management, Group Management, Dynamic Group Manage ...
Login Get full Access5.6 Ergon
Ergon Airlock is a single product with multiple services within a suite. The suite includes a WAF, API Gateway, cIAM, and 2FA authentication that leve ...
Login Get full Access5.7 Evidian (was acquired by Atos)
Based in France, Evidian is a dedicated business branch of the ATOS group within its Cybersecurity division since 2015, one of the leading IT service ...
Login Get full Access5.8 ForgeRock
ForgeRock is a leader in the IAM space, providing a single integrated suite based on their Identity Platform. ForgeRock Access Management delivers cor ...
Login Get full Access5.9 Forum Systems
Forum Systems is a privately held, employee-owned company with independent engineering based in Needham, MA. Since the very beginning, the company off ...
Login Get full Access5.10 IBM
IBM Security Verify is a well-established product in the market. IBM also has one of the largest customer bases of all vendors in this market segment, ...
Login Get full Access5.11 Ilantus Technologies
Ilantus, which started as a system integrator, has moved to provide offerings targeted at different customer types. Compact Identity is a fully integr ...
Login Get full Access5.12 LoginRadius
LoginRadius is a VC-backed CIAM vendor based in Vancouver, Canada. LoginRadius has a full-featured CIAM offering that is continually adding capabiliti ...
Login Get full Access5.13 Micro Focus
Micro Focus NetIQ Access Manager is a mature and widely deployed product on the market and was the first vendor in the market to integrate Identity Fe ...
Login Get full Access5.14 Microsoft
Microsoft offers Azure Active Directory (Azure AD) as its primary IDaaS Access Management platform. Azure AD Connect helps connecting on-premises Acti ...
Login Get full Access5.15 NEVIS Security AG
NEVIS Security provides Identity and Access Management (IAM) security solutions protecting 80% of Switzerland’s e-banking transactions. Nevis has ov ...
Login Get full Access5.16 Okta
Based in San Francisco, California (US), Okta offers a cloud identity platform targeted at the workforce and customer identity management. Okta's work ...
Login Get full Access5.17 OneLogin
OneLogin was founded in 2009 and is headquartered in the San Francisco Bay Area, and were one of the first vendors to enter the IDaaS market. OneLogin ...
Login Get full Access5.18 Optimal IdM
Established in 2005, Optimal IdM is an SMB company headquartered in Lutz, Florida, in the U.S, with other regional offices in the U.S. and Melbourne, ...
Login Get full Access5.19 Oracle
Based in Texas, Oracle, the leading provider of Cloud infrastructure, database management and enterprise resource planning software, and since 2016, O ...
Login Get full Access5.20 Ping Identity
Ping Identity was founded in 2002 and based in Denver, Colorado (US). Ping Identity started with a primary focus in the area of Identity Federation. S ...
Login Get full Access5.21 RSA Security
RSA, formerly part of Dell Technologies, has been recently acquired by the Symphony Technology Group and is now an independent company. RSA is a leadi ...
Login Get full Access5.22 SecureAuth
SecureAuth has been in the market since 2005 and is headquartered in Irvine, CA. The company aims to enable responses by bringing the telemetry of acc ...
Login Get full Access5.23 Simeio Solutions
Based in Atlanta, Georgia (US), Simeio Solutions witnessed significant growth when shifting from its IAM system integration business into a full-fledg ...
Login Get full Access5.24 Soffid
Based in Spain and established in 2013, Soffid IAM provides an open-source Identity and Access Management (IAM) and Single Sign-On (SSO) solution. Sof ...
Login Get full Access5.25 Thales
The Thales Group, based in France, recently completed the acquisition of Gemalto, which brought SafeNet Trusted Access to its portfolio as its primary ...
Login Get full Access5.26 Ubisecure
Ubisecure is a Finland based company established in 2002 with a customer base primarily in the Nordic region. Their Identity Platform is delivered as ...
Login Get full Access5.27 WSO2
WSO2 Identity Server is based on open source and provides a single solution that contains IAM capabilities including SSO, Identity federation, strong ...
Login Get full Access6 Vendors and Market Segments to watch
Aside from the vendors covered in detail in this Leadership Compass document, we also observe other vendors in the market that we find interesting. So ...
Login Get full Access6.1 1Kosmos
1Kosmos was founded in 2018 and is headquartered in New Jersey. The company is small but self-funded and profitable. They address the consumer and wor ...
Login Get full Access6.2 Authlete
Founded in 2015, Authlete is a small company located in Tokyo, Japan. Authlete offers OAuth 2.0 and OpenID solutions by giving developers the ability ...
Login Get full Access6.3 Avoco Secure
AvocoSecure is a privately-owned UK company offering Cloud and CIAM services. The Avoco Trust Platform API is a toolkit providing extended ecosystem f ...
Login Get full Access6.4 F5 Networks
Established in 1996, F5 Networks has a strong presence with large companies in North America with a presence in other countries. F5 Networks' offers t ...
Login Get full Access6.5 Identity Automation
Founded in 2004 and headquartered in Huston, Texas, Identity Automation introduced its RapidIdentity IAM solution later in 2010. In 2018, Identity Aut ...
Login Get full Access6.6 Pirean
Pirean was founded in 2002 with offices in London and Sydney. In 2018, Pirean was acquired by Exostar, an IAM and collaboration solutions provider for ...
Login Get full Access6.7 PortSys
PortSys is a privately funded company that was founded in 2008 and based in Marlborough, Massachusetts. PortSys started out building security applianc ...
Login Get full Access6.8 Signicat
Founded in 2006, Signicat has offices in the Netherlands covering Belgium and Luxemburg as well in the UK. Signicat customers are based in the EMEA re ...
Login Get full Access6.9 SSO Easy
SSO Easy a privately owned US based company headquartered in Quincy, Massachusetts, with offices in New York and Australia. EasyConnect is SSO Easy's ...
Login Get full Access6.10 United Security Providers (USP)
Founded in 1994, United Security Providers (USP) is a Swiss software vendor and service provider with offices in Bern (headquarters), Zurich, London, ...
Login Get full Access7 Related Research
Executive View: AdNovum NEVIS Security Suite - 80066
Executive View: Curity Identity Server - 80159
Executive View: EmpowerID - 70297
Executive View: Evidian Identity & Access Management - 70872
Executive View: ForgeRock Access Management - 80319
Executive View: Forum Systems Sentry and Identity Federation - 72511
Executive View: IBM Security Access Manager (ISAM) - 79066
Executive View: IBM Cloud Identity - 79065
Executive View: Ilantus Compact Identity - 80177
Executive View: Microsoft Azure Active Directory - 80401
Executive View: Okta Cloud IAM Platform - 70887
Executive View: Optimal IdM - Optimal Cloud - 80162
Executive View: Oracle Identity Cloud Service - 80156
Executive View: SecureAuth IdP - 71327
Executive View: Signicat - 72537
Executive View: Simeio IAM for SMB - 79071
Executive View: Symantec Privileged Access Manager - 80331
Executive View: Thales Vormetric Application Crypto Suite - 79069
Executive View: Ubisecure Identity Platform - 79072
Executive View: WSO2 Identity Server - 80060
Leadership Compass: Access Governance & Intelligence - 80098
Leadership Compass: Access Management & Federation - 71147
Leadership Compass: API Management and Security - 70311
Leadership Compass: Cloud-based MFA Solutions - 70967
Leadership Compass: Consumer Authentication - 80061
Leadership Compass: IDaaS Access Management - 79016
Leadership Compass: Identity API Platforms - 79012
Market Compass: Web Application Firewalls - 70324
Whitepaper: ForgeRock Identity Platform capabilities for Authentication under PSD2 - 79080
Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289
Whitepaper: Preparing for PSD2 technical requirements using RSA solutions - 79062