KuppingerCole Report
Whitepaper
By Paul Fisher

The Future of IAM Lies in the Cloud and as a Service

IAM software and tools have traditionally been installed and run on-premises by the organization itself. In recent years, the growth in identities operating across cloud and digital services has seen vendors offering IAM solutions as a service to assist with this growing complexity and concomitant security challenge. This IDaaS market, with its ease of adoption and cloud-native integrations, is slowly overtaking the on-premises IAM market. But even while the flexibility, security and scalability of IDaaS makes sense for many businesses, a third option is becoming popular. This is IDaaS designed by a third-party integrator using best of breed identity components to build an IAM solution that is bespoke to operational and budgetary requirements and can also be operated by the integrator if the customer chooses.
By Paul Fisher
pf@kuppingercole.com

Commissioned by iC Consult

1 Introduction

At its most fundamental, Identity and Access Management (IAM) software provides secure access to services, applications and data centres located acros ...

Login Get full Access

2 Highlights

  • Why for IAM to operate at maximum efficiency it should be designed as part of an Identity Fabric model based on KuppingerCole's principle.

  • A ...

Login Get full Access

3 Identity and Access Management in a digital landscape

It is clear to KuppingerCole that Identity is central to the efficient and secure operation of digitally transformed businesses. After all, in the exp ...

Login Get full Access

3.1 The Identity Fabric and IAM

KuppingerCole has identified that for complex, modern enterprises to operate closer to optimal efficiency, and for employees to achieve greater produc ...

Login Get full Access

3.2 The complications and the challenges for IAM in digital environments

While the Identity Fabric remains the model for IAM, many organizations will find themselves already challenged by the demands of access management as ...

Login Get full Access

3.2.1 Numerous authentication protocols add to IAM challenges

Authentication is a core component of Identity and Access Management (IAM) and enabled by several different protocols on which the authentication and ...

Login Get full Access

3.2.2 Changing traditional attitudes to managing identities in business environments

As identities multiply, organizations need to rethink their approach to IAM. With the increase in demand for secure access and authentication right ac ...

Login Get full Access

4 The Advantages of IDaaS for business

IAM is shifting from an IT security-based exercise and a supporting function for the business to one that sits at its core and dynamically facilitates ...

Login Get full Access

5 IDaaS delivery services from iC Consult

iC Consult is a specialist IAM integrator that for nearly 25 years has provided IAM solutions to organizations looking to shift Identity Management to ...

Login Get full Access

5.1 Two levels of IDaaS from iC Consult

iC Consult offers two IDaaS solutions as part of its consultancy services. For those customers that are new to IDaaS or IAM it offers standard IDaaS w ...

Login Get full Access

5.2 iC Consult Service Layers: Identity and Access Management as a Managed Service

The Service Layers platform takes the IDaaS model a stage further by offering the IAM consultancy services described above but delivers the final IAM ...

Login Get full Access

6 Recommendations

KuppingerCole Analysts believe that IAM must evolve to become a background service akin to a utility that is easy to consume and flexible in supportin ...

Login Get full Access

Copyright

©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top