KuppingerCole Report
Leadership Compass
By Richard Hill

Identity Governance & Administration 2021

The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Lifecycle Management and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for successful IGA deployments.

1 Introduction / Executive Summary

Identity Governance and Administration (IGA) combines the traditional User Access Provisioning (UAP) and Identity and Access Governance (IAG) markets. While many vendors today offer combined capabilities to qualify as IGA vendors, a few, especially the new entrants, provide either Identity Lifecycle Management (ILM) or Access Governance capabilities to cater to specific needs of the organizations.

The IGA vendors differ in the depth and breadth of functionalities offered and thus can be classified as either provisioning or governance focused. This KuppingerCole Leadership Compass provides an overview of the IGA market with notable vendors and their products or service offerings in the market.

From our interaction with organizations of varied IAM maturity across the industry verticals, we note that while some are still looking for an Identity Lifecycle Management solution with limited or no Access Governance capabilities, many others demand a strong Access Governance solution. The latter is mostly the case when organizations already have Identity Lifecycle Management in place or when their starting point is Access Governance. One of the adoption patterns we have observed in the market is where fulfilment through Identity Lifecycle Management is achieved via a managed service, and Access Governance is run by and within the organization itself to retain absolute control over governance functions. There are several other adoption patterns witnessed in the market where customer's immediate requirements are limited to either Identity Lifecycle Management or Access Governance but do not demand an IGA solution. In most other cases where there is a need for both, IGA products are preferred over provisioning or governance 'only' solutions to achieve the desired mix of capabilities. This is generally true for greenfield IAM implementations that have a need for both Identity Lifecycle Management and Access Governance capabilities. It is important that organizations scope their IGA requirements well before starting to evaluate IGA products that differ in the strength of IGA functionalities making most of them better aligned for either provisioning or governance focused deployments.

Based on the adoption trends, changing customer priorities, and deployment patterns, we decided to center on Identity Governance and Administration holistically to help security leaders identify relevant IAM market segments and subsequently shortlist the most appropriate technology vendors based on their immediate IAM priorities. In this Identity Governance and Administration Leadership Compass, the primary focus is on the vendors that offer both Identity Lifecycle Management and Access Governance capabilities, either as a common product or separate but integrable product components to deliver capabilities across the IGA spectrum.

This IGA Leadership Compass is complemented by two other Leadership Compass documents - LC IGA for SMBs (small and midsize businesses) that identifies and focuses on functional and operational IGA requirements of SMBs that are different in both objective and magnitude than large organizations. The other Leadership Compass is LC IAM Suites that focuses on comprehensive IAM suites and evaluates vendors for their completeness and functional depth of IAM portfolios to include core and even adjacent IAM capabilities such as Privilege Management, Enterprise SSO, Identity Federation, Web Access Management, API Gateways, Fraud Detection and Prevention etc. in addition to IGA as an integrated offering.

With these various LCs, we aim to provide CISOs and security leaders responsible for IAM the most practical and relevant information that they need to evaluate technology vendors based on the specific use-case requirements, whether these are IGA-driven, provisioning focused, governance focused, focused on comprehensive IAM suites or a combination of these.

1.1 Highlights

  • This Leadership Compass evaluates over 20% more IGA product vendors over the previous year.

  • The IGA market is growing, and although maturing ...

Login Get full Access

1.2 Market Segment

Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets. Where Identi ...

Login Get full Access

1.3 Delivery Models

This Leadership Compass is focused on products that are offered in on-premises deployable form, either at the customer's site or deployed and offered ...

Login Get full Access

1.4 Required Capabilities

During our evaluation of IGA vendors for the purpose of representation in this Leadership Compass, we look at several evaluation criteria including bu ...

Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not only be based on the information provided in a KuppingerCole Leadership Compass. The Leadership Co ...

Login Get full Access

2.1 Overall Leadership

When looking at the Leader segment in the Overall Leadership rating, we see a picture that is a typical representation of very mature markets, where a ...

Login Get full Access

2.2 Product Leadership

Product Leadership is the first specific category examined below. This view is mainly based on the analysis of service features and the overall capabi ...

Product Leadership, or in this case Service Leadership, is where we examine the functional strength and completeness of services.

As Identity Gover ...

Login Get full Access

2.3 Innovation Leadership

Next, we examine innovation in the marketplace. Innovation is, from our perspective, a key capability in all IT market segments. Customers require ...

We rated less than half of vendors as Innovation Leaders in the Identity Governance and Administration (IGA) market. Given the maturity of IGA solutio ...

Login Get full Access

2.4 Market Leadership

Lastly, we analyze Market Leadership. This is an amalgamation of the number of customers, number of transactions evaluated, ratio between customers ...

The Market Leadership evaluation paints a different picture of vendors. With a group of leading, well-established IGA players, many others are new ent ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for a product leader, but for a vendor ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views contrasts Product Leadership and Market Leadership.

Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of "overperfor ...

Login Get full Access

3.2 The Product/Innovation Matrix

This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative.

Her ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Market Leadership positioning, less innovative.

Vend ...

Login Get full Access

4 Products and Vendors at a Glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on Fraud Reduction Intelligenc ...

Login Get full Access

Table 1: Comparative overview of the ratings for the product capabilities

In addition, we provide in Table 2 an overview which also contains four ad ...

Login Get full Access

Table 2: Comparative overview of the ratings for vendors

Login Get full Access

5 Product/Vendor evaluation

This section contains a quick rating for every product/service we've included in this KuppingerCole Leadership Compass document. For many of the produ ...

Login Get full Access

5.1 Avalon Solutions 360

Established in 2010, Avalon Solutions 360 is a privately held Mexican software company specializing in IAM and Governance solutions. singular_id is it ...

Login Get full Access

5.2 Avatier

Avatier, based in California (US), is one of the few IGA vendors that have exhibited innovative changes to adapt to evolving market demands in the rec ...

Login Get full Access

5.3 Beta Systems

Beta Systems, based in Germany, offers Garancy IAM Suite consisting of Identity Manager, User Center, Process Center, System Center, Recertification C ...

Login Get full Access

5.4 Broadcom Inc.

Broadcom, an American manufacturer of semiconductor and infrastructure software products company, acquired CA Technologies in late 2018 and acquired t ...

Login Get full Access

5.5 EmpowerID

Founded in 2005 and based in Ohio (US), it provides multiple products in a suite and offers EmpowerID as its IGA product. The EmpowerID Identity and A ...

Login Get full Access

5.6 E-Trust

E-Trust is a privately held company founded in 1999 with its headquarters in Brazil. E-Trust started with a focus on information security. Later in 20 ...

Login Get full Access

5.7 Evidian (was acquired by Atos)

Since 2015, Evidian has been part of the Digital Security Service Line at Atos, a global digital services company, headquartered in France. Evidian is ...

Login Get full Access

5.8 Evolveum

Evolveum is an Open Source IAM vendor based in Slovakia. Their midPoint product is provided for free but needs a subscription for professional service ...

Login Get full Access

5.9 Fischer International Identity

Fischer Identity offers Fischer Identity Suite comprising several modules available as a bundled offering to deliver a broad range of IGA capabilities ...

Login Get full Access

5.10 ForgeRock

ForgeRock is a leading, venture-backed IAM vendor headquartered in San Francisco, CA but with many offices worldwide. ForgeRock supports most major IA ...

Login Get full Access

5.11 Hitachi ID Systems

Bravura Identity is part of the Hitachi ID Bravura Security Fabric, all of which is built on a common platform. Bravura Identity supports identity lif ...

Login Get full Access

5.12 IBM

IBM has been evolving its IGA product line over the years. For years, IBM Security/Tivoli Identity Manager (ISIM/ITIM) had been one of the more mature ...

Login Get full Access

5.13 ideiio

ideiio is a reasonably new vendor in the IGA space; spun out from ProofID -- an IAM professional services provider and system integrator based in Manc ...

Login Get full Access

5.14 Ilantus Technologies

Ilantus, which started as a system integrator, has grown to provide offerings targeted at multiple customer types. Compact Identity offers a risk-awar ...

Login Get full Access

5.15 ILEX International

ILEX, a French vendor, offers Meibo Identity Management as its primary Identity Governance and Administration platform, aimed at allowing customers th ...

Login Get full Access

5.16 Micro Focus

UK-based Micro Focus offers an Identity and Access Management Platform as a set of solutions that include Identity Governance and Administration, Acce ...

Login Get full Access

5.17 Nexis

Founded in 2009 and based in Regensburg, Germany, Nexis started with NEXIS Controle, first released in 2014, which builds used a plug-and-play approac ...

Login Get full Access

5.18 Omada

Omada, headquartered in Denmark, counts among the established providers of solutions for IGA. Omada provides Omada Identity as an on-premises solution ...

Login Get full Access

5.19 One Identity

One Identity, a Quest Software business established in 2004, and based in California, provides an identity-centric security strategy with a broad and ...

Login Get full Access

5.20 Oracle

Oracle Identity Governance (OIG) Suite is the on-premise offering within Oracle\'s IAM portfolio. Oracle Identity Governance is Oracle\'s primary IGA ...

Login Get full Access

5.21 SailPoint

Established in 2005 with headquarters in Austin, Texas, SailPoint started as a vendor specialized in Access Governance and made heavy investments in I ...

Login Get full Access

5.22 SAP

With SAP's established IAM portfolio, along with CIAM capabilities from the acquisition of Gigya a few years back, it shows its continued commitment t ...

Login Get full Access

5.23 Saviynt

Founded in 2010 and based in California (US), Saviynt offers a platform - Enterprise Identity Cloud (EIC), made of five different Identity Governance ...

Login Get full Access

5.24 SecurEnds

SecurEnds is an Access Management vendor with their Credential Entitlement Management (CEM) solution offering an alternative to traditional Identity G ...

Login Get full Access

5.25 SecurID

SecurID, an RSA business, is a provider of authentication, lifecycle management, and identity governance security solutions. SecurID Governance & Life ...

Login Get full Access

5.26 Simeio Solutions

Based in Atlanta, Georgia (US), Simeio Solutions observed significant growth when shifting from its IAM system integration business into a full-fledge ...

Login Get full Access

5.27 Soffid

Based in Spain and established in 2013, Soffid IAM is a single platform that provides an open-source Identity and Access Management (IAM) and Single S ...

Login Get full Access

6 Vendors to Watch

Login Get full Access

6.1 Accenture Memority

Accenture Memority is provided by a unit within Accenture Security, delivering an IDaaS solution. Memority started as an independent software vendor a ...

Login Get full Access

6.2 Clear Skye

Founded in 2016, Clear Skye is a small privately-owned company headquartered in the San Francisco Bay area. The Clear Skye IGA solution is built on an ...

Login Get full Access

6.3 Imprivata

Imprivata is a digital identity company focused primarily on healthcare. Imprivata Identity Governance is a healthcare-specific identity governance an ...

Login Get full Access

6.4 Kapstone

Founded in 2013 with headquarters on the east coast in the northeastern US, Kapstone released its Access Review product with Day Zero Application Onbo ...

Login Get full Access

6.5 Pirean

Pirean is a medium-sized company founded in 2002 with offices in London and Sydney. Their company provides a Consumer and Workforce IDaaS platform wit ...

Login Get full Access

6.6 Systancia

Systancia offers an Access Management platform that includes multiple products within a suite to secure end user\'s digital workspace. The platform in ...

Login Get full Access

6.7 Tools4ever

Tools4ever is a Dutch software company that started in the SMB market segment but has grown its portfolio to a level where it can also serve the IAM r ...

Login Get full Access

6.8 Tuebora

Tuebora, based in California, offers Tuebora Governance as its primary IGA product. One of the earliest IGA vendors to leverage machine learning techn ...

Login Get full Access

6.9 Usercube

Founded in 2009, Usercube is a French software company delivering an IAM solution based on the Microsoft technology platform with capabilities solely ...

Login Get full Access

6.10 Atos DirX Identity

Atos, having acquired Evidian indirectly via the Groupe Bull acquisition, has also acquired the former Siemens Business Services which includes the Si ...

Login Get full Access

Methodology

Copyright

©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksÔ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top