Magic Quadrant for Identity and Access Management as a Service

Size: px
Start display at page:

Download "Magic Quadrant for Identity and Access Management as a Service"

Transcription

1 G Magic Quadrant for Identity and Access Management as a Service Published: 2 June 2014 Analyst(s): Gregg Kreizman The IDaaS market is still in its early days. Vendors come from distinctly different backgrounds, and there are significant variances among providers with regard to IAM functional depth and support provided for different use cases. Niche vendors may be the best for your needs. Strategic Planning Assumption By the end of 2017, 20% of IAM purchases will use the IDaaS delivery model, up from less than 10% in Market Definition/Description A vendor in the identity and access management as a service (IDaaS) market delivers a predominantly cloud-based service, in a multitenant or dedicated and hosted delivery model, that brokers core identity governance and administration, access and intelligence functions to target systems on customers' premises and in the cloud. This Magic Quadrant rates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases. The vendors in this Magic Quadrant must provide some level of functionality in all of the following IAM functional areas. Identity governance and administration (IGA): At minimum, the vendor's service is able to automate synchronization (adds, changes and deletions) of identities held by the service or obtained from customers' identity repositories to target applications and other repositories. The vendor must also provide a way for customers' administrators to administer identities directly through an IDaaS administrative interface. Vendors may also offer deeper functionality, such as identity life cycle processes, automated provisioning of accounts among heterogeneous systems, access requests (including self-service) and governance over user access to critical systems via workflows for policy enforcement, as well as for access certification processes. Additional capabilities may include role management, role and entitlements mining, identity analytics, and reporting.

2 Access: Access includes user authentication, single sign-on (SSO) and authorization enforcement. At a minimum, the vendor provides authentication and SSO to target applications using Web proxies and federation standards. Vendors may also offer ways to vault and replay passwords to get to SSO when federation standards are not supported by the applications. Intelligence: At a minimum, intelligence means that the vendor logs IGA and access events, makes that log data available to customers for their own analysis, and also provides customers with a reporting capability to answer the questions, "Who has been granted access to which target systems and when?" and "Who has accessed those target systems and when?" Page 2 of 34 Gartner, Inc. G

3 Magic Quadrant Figure 1. Magic Quadrant for Identity and Access Management as a Service Source: Gartner (June 2014) Gartner, Inc. G Page 3 of 34

4 Vendor Strengths and Cautions CA Technologies CA Technologies delivers IDaaS under its CloudMinder brand. CA Technologies entered the IDaaS market when it acquired Arcot Systems in CloudMinder includes Web application SSO, adaptive authentication and identity administration. The service supports user provisioning to cloud and on-premises systems, including legacy applications. Self-service requests, approval workflows and delegated administration are all supported. The services architecture can be delivered completely from the cloud or in a hybrid model. CA has global regional partners that deliver their own branded version of IDaaS that is underpinned by CA CloudMinder. CA Technologies is also covered in IGA, user authentication and Web access management (WAM) Magic Quadrants and MarketScopes. Strengths CloudMinder Identity provides greater functional depth for user administration than Web-centric providers. Solid delegated administration and provisioning workflows are provided. The Advanced Authentication service provides adaptive authentication options, and includes functions such as device fingerprinting. CA's partnership programs are significant, and they will leverage global partners to support broad industry and geographic market penetration. CA's extensive product and service portfolio, sales and support channels favor the company in the Overall Viability criterion. CA's portfolio of IAM software and IDaaS can be combined for complex functionality and use case support, and CA has a broad set of user provisioning connectors to leverage for cloud and legacy application support. Cautions CA moved slowly toward providing IDaaS, and had a late start in the market relative to competitors that are newer to the broader IAM market. Its customer acquisition is behind that of major competitors, but CA has made decent customer gains in the past nine months. CA's offering is geared toward large customers; smaller businesses will likely seek alternatives. The service does not yet support password vaulting and forwarding for SSO for target systems that do not support federation standards. This feature is road-mapped. The platform lacks language internationalization, and the interfaces are provided in English only. Centrify Centrify entered the IDaaS market in late Centrify sells IDaaS as part of its User Suite offering that includes mobile device and application management. The IDaaS portion of the offering Page 4 of 34 Gartner, Inc. G

5 provides Web application SSO using federation standards or password vaulting and forwarding. User provisioning is provided for Microsoft Office 365, and other provisioning connectors are roadmapped. The integrated Centrify for Mobile capabilities provide many of the features of stand-alone enterprise mobility management vendors. Notable features include security configuration and enforcement, device certificate issuance and renewal, remote device location and wiping, and application containerization. Strengths The enterprise mobility management features are unique in the market, and Centrify has a strong relationship with Samsung. Centrify hosts Samsung's own offering, and Centrify leverages the Samsung Knox containerization capability. Administrative interfaces are provided for Web browsers, mobile devices, and through Active Directory Users and Computers interfaces. The service has broad international language support. The service and on-premises proxy bridge component can be configured to keep some or all identity data on-premises in Active Directory and not replicate it to the cloud. Cloud identity storage is optional. Reporting and analysis features for all events handled by the service are wide-ranging and customizable. Cautions The number of SaaS application targets for user provisioning is very limited relative to competitors, and provisioning support is not provided for on-premises applications. Active Directory is the only supported on-premises identity store. Access management for on-premises applications requires the customer to have SAML federation capability. Brand awareness in IDaaS has lagged; however, this is being addressed through enhanced marketing efforts. Covisint Covisint is the longest-standing IDaaS vendor in the market. The company may not be well-known among prospects in some industries, geographies and small businesses due to its early focus on larger enterprises. Moreover, Covisint's functionality is often "white-labeled" by its customers. Covisint got its start in the automotive industry and provided integration broker, portal and identity services to support supply chain connectivity. The company has grown those lines of business into other industries. Its work in the automotive industry and supporting vehicle identities has also helped it build foundation services that can be used in other Internet of Things applications. Gartner, Inc. G Page 5 of 34

6 Covisint's IDaaS features solid functional depth. The company also has a history of working through tough integration issues with demanding customers. Strengths Covisint provides strong identity assurance features, with several ID proofing vendor integrations and support for several authentication methods its own and those from third parties. The service includes user administration workflow capabilities and capable administrative delegation, along with access certification features. The vendor provides deep identity federation and provisioning integration functions using standards and proprietary techniques. Covisint had its initial public offering in 2013 and has strong financial backing. Cautions Although it can support employee-to-saas scenarios, Covisint's focus on large customers with enterprise, B2B use cases will make it a less likely choice for small and midsize businesses (SMBs) looking only for support of the employee-to-saas use case. Covisint's scenario pricing provided for this research was high compared with competitors. Brand awareness is lacking outside of North America, but Covisint is working to address this. Exostar Exostar entered the market when it was formed by a community of aerospace and defense companies to support their IAM needs related to supply chain. Exostar also created a secure collaboration platform based on top of Microsoft SharePoint, and now delivers secure , file transfer and WebEx services. Exostar has broadened its industry support to include life science, finance and IT services companies, and is delivering similar sets of community-centric IAM and collaboration functionality with an emphasis on this community's needs for intellectual property protection. The company augments its core services with identity proofing through third parties, but also provides a video "in person" identity proofing service using subjects' webcams for interviews. Exostar also delivers public-key infrastructure (PKI) and one-time password (OTP) credential management services. Exostar provides IAM that is fully cloud-based, or it can join community participants to the hub via a gateway. Strengths Exostar is one of the few small IDaaS vendors that is profitable. Exostar offers identity proofing and authentication methods to meet the high identity assurance requirements of its customers. Because of its legacy in highly secure markets, Exostar has strict audit requirements to ensure that requirements for security and industry compliance issues are met. Page 6 of 34 Gartner, Inc. G

7 Exostar can cross-sell its collaboration platform and IAM. The company has strong customer relationships, and reference customers report that Exostar is a solid partner for implementation as well as for incorporating customer requirements into Exostar's road map. Exostar has strong B2B federation and administration capabilities, and it can handle data exchanges in support of complex business agreements for its established communities. Cautions Exostar has performed well in targeting industry communities with high identity assurance requirements. However, the company and its offerings are not currently geared toward the broader general purpose IAM market that would focus on enterprise users' access to SaaS applications or consumer inbound access to enterprises' applications as primary use cases. Exostar's target market is large companies with cross-organizational collaboration requirements. Exostar views IDaaS as a critical component of its offering, but primarily in the context of helping it deliver its overall business collaboration capabilities. User provisioning approval workflow features are coarse-grained, with a limited number of allowed approvers. Connector support to on-premises applications is limited to targets that support LDAP and SOAP. Authentication and SSO integration features are limited compared with vendors that support general purpose SSO use cases. Password vaulting and forwarding, and social registration and login are not supported. Exostar provides IDaaS functions to users in multiple geographies, but these users and their companies are predominantly using the services at the behest of Exostar's anchor tenants in aerospace and defense and life sciences. There is not a strong international presence in terms of core customers, Exostar data centers and internalization support. The company's scenario pricing was among the highest of all vendors. Fischer International Identity Fischer International Identity, a pure-play IAM provider, was one of the first vendors to deliver IDaaS. Fischer's capabilities are available in IDaaS, dedicated hosted, managed, or on-premises software delivery models. Fischer's International Identity is also covered in "Magic Quadrant for Identity Governance and Administration." Fischer provides feature depth in user administration and fulfillment, some governance functionality, privileged account management, and federated SSO. Strengths Fischer is one of the few small IDaaS vendors that is profitable. Fischer's experience and technical capabilities enables it to support IAM functions to legacy onpremises applications in addition to SaaS applications. Gartner, Inc. G Page 7 of 34

8 User administration functionality is deep, with strong connector support to a variety of directories, databases and applications. Access certification features are included. Fischer's scenario pricing is among the lowest, and references find their pricing to provide solid value for the money. Cautions Despite Fischer's long tenure in the IDaaS market and its solid customer growth, the company's brand recognition, market penetration and overall growth has been low compared with its competitors. The focus of Fischer's marketing and sales on the U.S. geographic market and higher education vertical has limited the company's growth in other geographies and verticals. Access management is limited to single sign-on, without the coarse-grained authorization enforcement found in other IDaaS access services. OpenID Connect and OAuth support is not provided, and could hinder Fischer's ability to support native mobile and social use cases. However, these capabilities have been roadmapped by the company. iwelcome Netherlands-based iwelcome was spun off from system integration firm Everett. iwelcome's IDaaS offering became generally available in iwelcome provides its IDaaS in a dedicated single tenant delivery model to allow for customization and customer branding. Its offering is heavily based on open-source software and includes authentication, SSO, federation, self-service registration, and user provisioning support for on-premises and SaaS applications. Strengths iwelcome is the only established IDaaS vendor with headquarters in continental Europe. As a result it has early-mover advantage in that region. Its services are underpinned by open-source technology, with strengths in access management particularly in authentication method, federation protocol and identity repository support. Early work with government and quasi-government organizations has pushed iwelcome to address high security requirements and to be certified against ISO and Dutch government standards. Most of iwelcome's functionalities are API-accessible. Page 8 of 34 Gartner, Inc. G

9 Cautions iwelcome lacks delegated administration. However, this feature set is road-mapped for some time in iwelcome lacks core identity governance features such as access certification and recertification, and provisioning approval workflow capabilities are minimal. These features are road-mapped for The company's overall customer base is small compared with most competitors, although iwelcome picked up large customers early. iwelcome's focus on the European market is a strength for the near term, but may be a weakness as other vendors deliver services within the region that meet data protection and privacy requirements. Lighthouse Security Group Lighthouse Security Group delivers its Lighthouse Gateway service in a multitenant model. However, components of the service can be delivered in a dedicated model. Lighthouse's service is underpinned by IBM's governance, administration and access management software. Lighthouse has overlaid IBM's technology with an extensive services layer designed to ease the implementation and ongoing administration of IBM's software for multiple clients. Strengths Lighthouse's functional offering is deep and aligns with the functionality provided by IBM's software deployed on-premises. The company has won some very large customers and can demonstrate high scalability. Lighthouse has an implementation methodology that is designed to bring customers on as rapidly as possible while working through a potentially complex set of design issues. Lighthouse has aligned itself with IBM's Global Technology Services group as its partner. Lighthouse also uses IBM's SoftLayer infrastructure as a service (IaaS). Both of these relationships should help Lighthouse expand outside of the U.S. Cautions Customers report that the service works well; however, it can take significant effort to go live. This is in part due to the complex nature of projects that Lighthouse takes on for larger customers. Lighthouse's current customers are U.S.-based, and the company is in the process of establishing its presence in other geographies. Lighthouse's pricing for several use case scenarios was among the highest. Despite having some small customers in its portfolio, Lighthouse will have to develop reduced pricing and rapid Gartner, Inc. G Page 9 of 34

10 implementation for a core set of basic functionality to compete downmarket with other vendors in this space. Okta Okta's IDaaS offering is delivered multitenant, with lightweight on-premises components for repository and target systems connectors. The service was developed entirely by Okta and was generally available in IDaaS is Okta's core business. Okta delivers basic identity administration and synchronization capabilities, access management for Web-architected applications using federation or password vaulting and forwarding, and reporting. Okta has invested in technology that will provide mobile native application support and other mobile security features. Strengths Okta has demonstrated its ability to rapidly onboard customers from proof of concept to production. The company's marketing and sales strategies have been effective, demonstrated by brand recognition and an increased volume of customers. Okta has made the majority of its functions available through RESTful APIs to support integrations with customers' applications and workflows. References have been numerous, and they indicate high customer satisfaction. Okta has a large number of preconnected applications. Cautions Okta can synchronize identities from enterprise directories, but the vendor does not have user provisioning approval workflow beyond one level, nor does it have identity governance features. Okta captures essential log data for administration and access, and exposes this data for customers to use for reporting. However, the service's canned and custom reporting capabilities are limited. Okta does not yet support the use of social identities for registration and logon. Okta's current customer base is predominantly located in the U.S. Administrative interfaces will need to be internationalized and sales and support channels will need to grow to support these regions. Okta also requires use of the cloud to store some identity attributes. OneLogin OneLogin's IDaaS service has been available since The service's architecture is multitenant, and lightweight integration components are used for on-premises connections. The service was developed entirely by OneLogin, and IDaaS is OneLogin's core business. OneLogin also markets a federated search capability that allows customers to search for content across connected applications and to be authenticated automatically when search results are returned and selected. Page 10 of 34 Gartner, Inc. G

11 Strengths OneLogin has a large number of preconnected applications. They support multiple authentication methods, including out-of-band push modes of OTP and X.509 authentication based on OneLogin's supplied public-key infrastructure (PKI). OneLogin has made good inroads into Europe and Asia/Pacific by virtue of its partner network and ability to host customer data in geographically acceptable data centers. OneLogin has built customer relationship capital through its "freemium" customer offerings and SAML toolkit for service providers. References were solid and appreciated the support they received from OneLogin. OneLogin's scenario pricing was among the lowest compared with competitors. Cautions OneLogin has trailed its closest competitors in brand recognition and, therefore, customer acquisition. OneLogin has secured a recent round of venture funding that will help it expand. However, it has taken on less venture capital than its nearest competitors. OneLogin lacks its own deep user administration and provisioning and identity governance functionality. However, it partners with RSA Identity Management and Governance (formerly known as RSA Aveksa) for this functionality. While the log data and reporting functions are capable and customizable, references report that improvement is needed with regard to ease of customization. Ping Identity The PingOne service became available in The service is multitenant and based predominantly on the vendor's own intellectual property. However, the company also leverages OEM partnerships for identity intelligence, and it recently acquired mobile authentication vendor accells to provide enhanced authentication capabilities. Ping Identity provides a lightweight self-service bridge component to integrate a customer's Active Directory to the service, and also uses the wellestablished PingFederate product as the underpinning of the on-premises bridge component for customers when broad protocol and directory support are needed. Strengths By leveraging the PingFederate technology for the bridge component, Ping can offer extensive integration capabilities with a variety of identity repositories, existing customer access management systems and target application systems. Gartner, Inc. G Page 11 of 34

12 Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Ping has shown strong leadership in identity standards development, as well as openness in working with customers and competitors to evolve the standards. Ping's established customer base has been leveraged to enhance and grow the PingOne IdaaS business, and Ping Identity has broad vertical and geographic market penetration through its value added reseller (VAR) and system integrator (SI) partner networks. Its acquisition of accells will help Ping Identity respond to the heightened need for adaptive mobile access. Cautions PingOne is one of the services with strong access features, but very lightweight IGA capabilities. Provisioning workflow and most identity governance features are missing. Ping Identity is playing catch-up with other vendors in API-enabling their service for administration and intelligence features, but does include APIs for SaaS SSO integration, new user registration, provisioning, native mobile SSO and log retrieval. Reporting capabilities are weak compared with competitors. Language internationalization features for the administrative and user interfaces are lacking relative to competitors. SailPoint SailPoint IdentityNow is the newest IDaaS offering covered in this research; the service became generally available in October It was developed in-house and features access request and provisioning, access certification, password management, and SSO service elements. The architecture is multitenant and can deliver services completely in the cloud or can be bridged to enterprise environments. SailPoint provides the option to host its traditional on-premises IdentityIQ product in the cloud. Strengths SailPoint's legacy of providing strong on-premises IGA has helped the company deliver a subset of the functionality from the IdentityIQ product in IdentityNow. The more full-featured IdentityIQ can be cloud-delivered as an alternative. SailPoint's full complement of provisioning connectors provides fulfillment capabilities to a wide variety of identity repositories and target systems. SailPoint provides the full set of SSO options that include federated SSO and password vaulting and forwarding. SailPoint has broad geographic presence for sales and support as a foundation for selling its IDaaS. Page 12 of 34 Gartner, Inc. G

13 The company is profitable. Cautions Because SailPoint's offering is relatively new to the market, it has a small customer base, with several implementations just beginning. IdentityNow does not support OAuth or OpenID Connect and social identity use cases. IdentityNow is limited in its abilities to support delegated administration. SailPoint has a strong VAR and system integration partner set, but it has not yet been brought to bear to help sell the new offering. Simeio Solutions Simeio Solutions began delivering its Business Ready Cloud IdaaS in The vendor provides a mixture of dedicated hosted and on-premises managed service offerings. Its services are underpinned by products from other well-established IAM software vendors, which allows Simeio to provide WAM, identity administration, access request, role and compliance, risk intelligence and IT governance, risk and compliance (GRC), and directory services. Strengths Simeio's use of major IAM stack vendors' technologies provides it with an arsenal of products that provides deep functional support for Web and legacy applications. Simeio's Identity Intelligence Center provides actionable insight into patterns of usage among users that may exist across multiple vendor identity sources and other security systems. The same vendor partnerships provide referrals to Simeio for customer acquisitions. Simeio's history as an integrator has given it the experience to help customers plan, design and integrate their IDaaS offerings. A significant portion of Simeio's staff serve in professional service roles. Simeio's service-based roots have enabled it to have a positive cash flow since its inception. Simeio has a good spread in its vertical industry representation. Cautions Simeio has a customer with a very large consumer-facing implementation and high volume of users. However, Simeio's overall customer base is small relative to its competitors. Simeio's use of OEM software requires the incorporation of these third-party vendors' software licensing costs in its offering. This tends to make Simeio's pricing high, even for pure Web application use cases. Gartner, Inc. G Page 13 of 34

14 Simeio is relatively unknown in the IDaaS marketplace, and is slowly building its customer base and brand awareness based on vendor partners, some of which are also competitors. Simeio's references consider it a very good partner. However, there are often complex customer business and technical requirements, and these requirements can drive high complexity in the implementations and increase time to implement, which can diminish customer perceptions of value for money. Symplified Symplified entered the IDaaS market in It provides WAM, including federated SSO and SSO using password vaulting and forwarding, user provisioning, and reporting functions. Symplified's architecture is weighted toward on-premises components. Administrative functions are performed in the cloud, but policy decisions and enforcement actions are handled in the on-premises-based Identity Router. However, the Identity Router can be hosted on Amazon Web Services. Symplified's IDaaS is based on its own intellectual property. Strengths The Identity Router's architecture and features have allowed customers to overcome some complex on-premises Web application integrations that could not be done with competitors' offerings. Symplified's architecture keeps personal data local to the customer and not on the cloud platform. Symplified's Identity Router uses a proxy architecture that allows it to capture detailed data on all user interactions with target systems. Symplified's overall pricing was among the lowest compared with its competitors. Cautions Despite Symplified's early entry into the market and aggressive initial marketing campaigns, the company's focus shifted downmarket and it lost momentum and brand recognition relative to its competitors. Symplified's customer base is small compared with its competitors. Symplified's user provisioning functionality is shallow, and the number of SaaS targets integrated with their service is relatively low when compared with its competitors. Despite the ability to collect very detailed data on user-to-application interactions, customers have found the reporting capability to be lacking. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or Page 14 of 34 Gartner, Inc. G

15 MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Because this is a new Magic Quadrant, no vendors have been added or dropped. Other Vendors of Note Two vendors, salesforce.com and Microsoft, did not meet the inclusion criteria for this Magic Quadrant. Salesforce.com was not able to provide user provisioning connections to target systems in time to meet the IGA functional requirements, and Microsoft did not have a generally available and separately priced IDaaS offering until April 2014, well after the December 2013 deadline set for this Magic Quadrant. (See the Inclusion and Exclusion Criteria section.) Gartner believes that both of these vendors have the potential to significantly impact the IDaaS market. They will be the subject of future Gartner research. There has been some Gartner client interest in two vendors that specialize in social identity integration Gigya and Janrain. However, neither one met the IAM functional inclusion criteria for this Magic Quadrant, notably in the IGA functional areas. These vendors specialize in IAM for consumer-facing implementations. As IDaaS vendors add social identity registration and login functions to their offerings, Gigya and Janrain's social registration and login functionality may be in less demand. However, these vendors provide value for other consumer marketing functions, such as gamification (in Gigya's case) and analytics. Retail and media companies, in particular, may strongly consider Gigya and Janrain for their consumer-facing needs. Ilantus Technologies, Pirean and Wipro did not meet the financial or market penetration criteria for this Magic Quadrant. However, these vendors have functionally deep IAM offerings, and also have international headquarters, which may help them to be considered as alternatives to U.S.-based companies. Inclusion and Exclusion Criteria The vendor must provide a minimum level of functionality in all of the following IAM functional areas outlined in the Market Definition/Description section. Vendors that deliver only one or two of these core IAM functions as a service, such as authentication only, were not covered as part of this research. The following additional inclusion criteria were used. Longevity of offering: Each IDaaS offering has been generally available since at least November 2013 and is in use in multiple customer production environments. Origination of offering: The offering is manufactured and operated by the vendor, or is a significantly modified version obtained through an OEM relationship. (We discount any service Gartner, Inc. G Page 15 of 34

16 offering that has merely been obtained without significant functional modification through a licensing agreement from another vendor for example, as part of a reseller/partner or serviceprovider agreement.) Number of customers and end users (including customers of third-party service providers and their end users): As of 31 December 2013, the vendor had: More than 20 different active customer organizations using the vendor's IDaaS offerings in a production environment. Revenue attributed to fees for IDaaS service usage that is greater than $4,000,000 for the year ending 31 December Verifiability: Customer references must be available. Evaluation Criteria Ability to Execute Table 1. Ability to Execute Evaluation Criteria Criteria Product or Service Overall Viability Sales Execution/Pricing Market Responsiveness/Record Marketing Execution Customer Experience Operations Weight High Medium High Medium Medium High Low Source: Gartner (June 2014) Product or Service The service's overall architecture, with emphasis on the service's global availability and resiliency features, and its flexibility to support on-premises identity repositories and cloud-only implementations. The level of support and expertise required by customers to help maintain the components. The extent to which a service's functions are exposed via APIs for customers' system integration. Page 16 of 34 Gartner, Inc. G

17 Security and privacy The physical and logical controls implemented by the vendor and any underpinning infrastructure as a service provider, security for on-premises bridge components and connections between the bridge and the IDaaS, controls for data security particularly regarding personal information and vendors' third party certifications received for the services. The variety of on-premises identity repositories that can be supported, and the quality of integration with same. The depth and breadth of IGA functionality: Access request Access approval workflow depth and functionality Access certification Attribute discovery and administration Administrative access enforcement for example, to identify, alert and prevent inappropriate access Provisioning create, read, update and delete (CRUD) user identities and entitlements to target systems Configuring target system connectors The depth and breadth of access functionality: User authentication methods supported Breadth of SSO support for target systems Federation standards Support for mobile endpoints and native mobile application integration Authorization enforcement The depth and breadth of identity intelligence: Canned reporting Customized reporting Data export to on-premises systems Analytics Integration with Microsoft Office 365, Microsoft SharePoint, customer's on-premises VPNs and WAM systems. Gartner, Inc. G Page 17 of 34

18 Deployment requirements such as speed of proof of concept and deployment, customer staffing requirements and factors that add complexity and may affect speed to deployment and staffing. Overall Viability Overall financial health. Success in the IDaaS market in terms of number and size of customer implementations. This aspect is heavily weighted. The vendor's likely continued presence in the IDaaS market. Sales Execution/Pricing The vendor's capabilities in such areas as deal management, presales support, and the overall effectiveness of the sales channel, including value-added resellers and integrators. The vendor's track record in competitive wins and business retention. Pricing over a number of different scenarios. This aspect is heavily weighted. Market Responsiveness/Record The vendor's demonstrated ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, and market dynamics change. How the vendor can meet customers' evolving IDaaS needs over a variety of use cases. How the vendor has embraced standards initiatives in the IDaaS and adjacent market segments and responded to relevant regulation and legislation. Marketing Execution The clarity, quality, creativity and efficacy of programs designed to deliver the vendor's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This mind share can be driven by a combination of publicity, promotional initiatives, thought leadership, word-of-mouth and sales activities. Marketing activities and messaging Visibility in the press, social media and other outlets Vendor's appearance in vendor selection exercises based on Gartner client interactions Brand depth and equity Customer Experience Customer relationship and services. Page 18 of 34 Gartner, Inc. G

19 Customer satisfaction program. Customer references This evaluation subcriterion was weighted heavily and included input from vendor supplied references, as well as unsolicited feedback from Gartner client interactions. Operations People The size of organization and track record of key staff. Quality and security processes. Completeness of Vision Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Weighting Medium Medium Medium High Medium Low High Low Source: Gartner (June 2014) Market Understanding Understanding customer needs Methods, and the effects of the Nexus of Forces (cloud, mobile, social and information). The future of IDaaS and the vendor's place in the market. Vendors' views on top technological, nontechnological and regulatory changes in the market. Marketing Strategy Communication and brand awareness The clarity, differentiation and performance management of the vendor's marketing messages and campaigns. Gartner, Inc. G Page 19 of 34

20 The appropriateness of the vendor's use of events, social media, other online media and traditional media as part of its marketing efforts. Sales Strategy The vendor's strategy for selling its IDaaS offerings that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy The vendor's approach to developing and delivering its IDaaS offerings that meet customers' and prospects' needs with respect to their key selection criteria, the needs created by the Nexus of Forces, and other market dynamics. The vendor's ability to exploit the Nexus of Forces to improve its IDaaS products and services. The strength of the vendor's road map and how the vendor will increase the competitive differentiation of its IDaaS and ancillary services. Business Model The soundness and logic of the vendor's underlying business proposition. Vendor's views of key strengths and weaknesses relative to competitors Recent company milestones Path chosen for future growth Vertical/Industry Strategy Customer breadth and penetration in various industries and sizes of customer organizations. Views of industry trends and special needs. Strategy for expanding IDaaS adoption in different industries. Innovation Foundational technological and nontechnological innovations. Recent and planned innovations. Organizational culture and how it affects innovation. Geographic Strategy Global geographic reach of customer base and trends. Strategy for expanded geographic customer acquisition. Page 20 of 34 Gartner, Inc. G

21 Global nature of technical support and professional services and language internationalization for administrative and user interfaces. Quadrant Descriptions Leaders Leaders in the IDaaS market have generally made strong customer gains. They provide feature sets that are appropriate for current customer use case needs. Leaders also show evidence of superior vision and execution for anticipated requirements related to technology, methodology or means of delivery. Leaders typically demonstrate solid customer satisfaction with overall IDaaS capabilities and/or related service and support. Challengers Challengers also show strong execution, and have significant sales and brand presence. However, they have not shown Completeness of Vision for IDaaS that Leaders have. Rather, their vision and execution for technology, methodology and/or means of delivery tend to be more focused or restricted to specific platforms, geographies or services. The clients of Challengers are relatively satisfied, but ask for additional IGA and intelligence features as the vendors mature. Visionaries Vendors in the Visionaries quadrant provide products that meet many IDaaS client requirements, but may not have the market penetration to execute as Leaders do. Visionaries are noted for their innovative approach to IDaaS technology, methodology and/or means of delivery. They often may have unique features, and may be focused on a specific industry or specific set of use cases, and they have a strong vision for the future of the market and their places in it. Niche Players Niche Players provide IDaaS technology that is a good match for specific uses, cases or methodology. They may focus on specific industries or have a geographically limited footprint, but they can actually outperform many competitors. Vendors in this quadrant often have relatively fewer customers than competitors, but may have large customers and have a strong IDaaS feature set. Pricing might be considered too high for the value provided by some vendors. Inclusion in this quadrant, however, does not reflect negatively on the vendor's value in the more narrowly focused service spectrum. Niche solutions can be very effective in their area of focus. Context Vendors rated in this Magic Quadrant come from distinctly different backgrounds. Vendors' pedigrees vary greatly, as do their abilities to provide IAM functional depth and support for different Gartner, Inc. G Page 21 of 34

22 use cases. Their aspirations for servicing customers by geography, industry and customer size segmentation also vary. Clients are strongly cautioned not to use vendors' positions in the Magic Quadrant graphic as the sole source for determining a shortlist of vendors to consider. Vendors were evaluated with regard to their abilities to provide a general set of IAM functionalities across multiple use cases, and in multiple geographies and industries, and to do so by providing solid value for money as perceived by their customers. All vendors covered in this Magic Quadrant have succeeded in providing customers with services that meet their needs. However, client requirements, particularly those for IAM functional depth, speed to implementation, geographic coverage and price will most likely strongly affect the choice for a shortlist. 1. Clients focused on Web-architected application targets, employee-to-saas and consumerfacing needs should strongly consider Centrify, Okta, OneLogin, Ping Identity and Symplified. These vendors also have experience with small and midsize businesses (SMBs), even as these vendors aspire to move upmarket to serve larger clients and have begun to do so. Note that these vendors currently have limited IGA abilities. They tend to lack multilevel provisioning approval workflows and, in most cases, delegated administration, as well as identity governance features such as access certification, segregation of duties violation detection, or role engineering and certification. These vendors' provisioning connectors for legacy application targets will also be lacking. 2. Clients with needs for more functional depth in IGA, legacy on-premises application targets should strongly consider CA Technologies, Covisint, Fischer International Identity, Lighthouse Security Group, Simeio Solutions and SailPoint. European clients may especially be interested in iwelcome. More of these vendors also provide dedicated hosted instances of their offerings as options. 3. Clients who have needs for IAM served as part of a community of interest or industry consortium should strongly consider Covisint and Exostar. These vendors have a history of providing IAM in a hub configuration designed to support collaboration among participants or to serve the community's common business partners for access to a set of community owned applications. Exostar is also recommended for clients with needs for secure collaboration services on top of IDaaS. Clients should generally expect more complex, time-consuming and costly implementations when they have requirements for IGA functional depth, and legacy (non-web-architected) on-premises application targets. These requirements generally indicate a stronger need for IAM process and data modeling and target system integration functions, such as connector development and configuration. System integrators have been needed when clients implemented traditional IAM software suites with these types of requirements. Several of the vendors in listed above in item No. 2 come from system integration backgrounds. IDaaS customers should expect best practices and operational excellence from these companies due to their familiarity with the software components that underlie the solutions. There should be some deployment and integration efficiency gains relative to do-it-yourself approaches. Dedicated per-client IAM infrastructure also drives up the cost of the offering relative to multitenant offerings. The cost of underlying IAM third-party software licenses may also drive up the overall costs of the implementation. Page 22 of 34 Gartner, Inc. G

23 Security Gartner clients rightly express concerns with regard to data security and protection of enterprise users' passwords when IDaaS is being considered. The following are generally true for IDaaS security practices, with some exceptions: Some user identity data will be held in the cloud. Most commonly, this data includes first and last name and address. Some vendors, such as Centrify and Symplified, require no user attributes to be held in the cloud, with the assumption that all data needed for provisioning users to SaaS application targets are held in the on-premises directory and can be accessed by the vendors' bridge components. Centrify offers on-premises-only or hybrid cloud implementation, and the hybrid implementation requires some identity data to reside in the cloud. Ping Identity's solution works similarly. Generally, as the number of attributes needed to provision users' accounts grows, that data must minimally pass through vendors' IDaaS services to be provisioned to SaaS targets. A cloud-only implementation of IDaaS will have to hold all of these attributes. Data is encrypted in transit over networks. However, one exception is that passwords are sent in the clear when being transmitted to target systems when federation is not supported and Secure Sockets Layer (SSL) is not used between browser and target system. This is essentially the same as when a user's browser interacts directly with an application without IDaaS controlling the access. Also, SSL is usually used for SaaS sign-on flows whether an IDaaS is brokering the access or not. Identity data in the vendor's cloud is encrypted at rest. Vendors have different strategies for managing encryption keys. Most vendors generate different encryption key pairs for each customer's instance of the service, and there is variance in how those keys are managed. The keys may be technically under the customer's strict control, or the vendors' operations staff may control the keys. In the latter case, these vendors claim that their personnel will have other controls in place to ensure that there is no inappropriate use of these keys. On-premises bridge components will use SSL/Transport Layer Security (TLS) to communicate with the service, and many of the vendors will require no inbound firewall port to be opened to support this. Communications are initiated outbound from the bridge. Almost all providers use infrastructure as a service (IaaS) providers, rather than their own operations centers, to host their offerings. All vendors maintain some type of third-party security certification, as do the IaaS providers that host the IDaaS. SSAE 16 SOC 1 or SOC 2 are common. ISO is rare, but some vendors have stated plans to achieve ISO/IEC certification. Availability The use of IDaaS may introduce a single point of failure. IDaaS vendors have generally taken care to architect their services with network and system redundancy features, and to host their services on IaaS that has been provisioned with sufficient redundancy to guarantee adherence to the IDaaS Gartner, Inc. G Page 23 of 34

24 vendor's service-level agreements. IDaaS vendors have also generally architected their on-premises bridge components to be implemented redundantly if the customers choose to do so. Nevertheless, a major system failure with the IDaaS can potentially leave customers temporarily without access to the applications that IDaaS serves. Organizations face similar risks when they manage their own IAM services, and components such as federation servers fail. Clients that choose to accept the risks of using IDaaS should have emergency business continuity process in place that includes these steps: Bring up any available in-house federation technology and federate to key target systems if possible. If federation services are not available, then temporarily turn off federation at target systems to fall back to password-based authentication. Issue temporary passwords for all target application accounts that can support password authentication. Fall back to manual user provisioning processes. Data Residency Most of the vendors covered in this research are U.S.-based. Gartner clients from other countries may have concerns about employees', business partners' and customers' personal data that could be held in the cloud. Despite the use of local or regional data centers to host services and data, international clients may still be concerned about the U.S. government's ability get access to the data. This is currently a risk that clients must evaluate and determine if it is acceptable or not. We recommend the following for clients who intend to use IDaaS, but have concerns about U.S. providers. Have the vendor prove Safe Harbor certification or, preferably, require the vendor to sign the EU's model contracts on privacy. Require your sole ownership of encryption keys if possible, and evaluate the controls associated with the development and operations staff and their access to the keys. If these recommendations do not provide enough comfort, then Gartner recommends evaluation of IDaaS providers in suitable jurisdictions. Pricing Gartner asked vendors to provide "street" price quotes for several use case and volume usage scenarios. Vendors were cautioned against providing list prices. Vendors were asked to provide all costs, including startup costs, over a three-year subscription period. Three of the most commonly required scenarios are included below, with range of costs and averages. Page 24 of 34 Gartner, Inc. G

25 Scenarios 1 and 2: 1,000- and 10,000-Employee Workforces, Web-Architected Applications Number of users: 1,000 in the workforce ("any" staff), who use the service several times daily. Endpoints: Company-owned PCs; approximately 60% Windows Active Directory and 10% Mac OS X, 30% mix of Apple and Android tablets and smartphones. User location: Could be anywhere a mix of on-premises corporate LAN and external use cases. All identities and attribute data held in Active Directory. Support to: Five externally hosted (SaaS) applications and five internal Web applications targets. Allow the company's administrator to directly administer users' identities, and provision these to Active Directory. Subsequently and automatically provision accounts to the five SaaS applications, with the assumption that there is an available provisioning API for all five, and that the vendor has already created provisioning connectors for three of the five applications. Two of the applications need connectors created for the customer. User self-service application access request, administrator approval, and subsequent provisioning as described above, and user self-service password reset. User authentication to the service and SSO to all target applications, three using SAML federation and two using password vaulting and forwarding, support for identity provider initiated federated SSO to your service based on an Active Directory authentication, and service-provider-initiated redirect authentication for an externally located user who connects to SaaS first and to support authentication against your service and corporate Active Directory. Reporting for all administrative and access events. We requested pricing for two variants. Scenario 1 included support of the above requirements for 1,000 internal users. Scenario 2 included support of the above requirements for 10,000 users and with the added requirement that 5,000 of those users be provided with SMS or voice-based onetime password authentication. The average three-year cost for the 1,000-user scenario was $151,149. The average three-year cost of the 10,000-user scenario was $571,879. In both scenarios, vendors who had significant gaps in the required functionality were removed from the average calculation, as were the high pricing and low pricing that were significantly out of line with the other vendors' pricing. Scenario 3 100,000-User Consumer- and Business-Facing Implementation 100,000 external consumers (50,000 individual consumer users and 50,000 business partners' users from 100 companies). Gartner, Inc. G Page 25 of 34

26 Average usage: Once per month per user. Endpoints: Any endpoint with a Web browser from any location. Access to three internal on-premises Web applications, and two SaaS applications. Identity data for the on-premises applications to use will be held in an on-premises LDAPexposed directory. Self-service user administration and password reset. Delegated user administration for business partner administrators to administer to their own users. Administrators can grant or deny access for their users to any of the five applications. Automated user provisioning to any approved application with the assumption that all targets have a provisioning API available and the vendor has not yet created a connector for any of these applications. User authentication and SSO for all users to all applications. Acceptance of Facebook and LinkedIn identities for initial consumer registration, account linking, and subsequent login to the service and subsequent SSO to a customer's applications. Five of the largest business partners must have support for federated authentication to your applications using SAML and be based on user authentication at the business partner's own internal identity provider. Reporting for all administration and access events. There was wide variance in the pricing for this scenario. The average among all vendors was $1,111,043 over three years. However, there was wide disparity between two groups of vendors. There was a group of eight vendors that could deliver the functionality for an average price of $389,863. The higher priced group of five vendors averaged a price of $2,409,167. Pricing for consumer-facing implementations is in its early days, and vendors are at various stages of maturity in responding realistically to these requests from customers. In all cases, clients are strongly encouraged to understand their own total costs of ownership for managing the same IAM functions in-house so that these costs can be compared with IDaaS pricing. Gartner also collected pricing data for other scenarios, including those requiring more indepth IGA functionality and legacy on-premises application support. Pricing was highly variable for these implementations. Clients interested in these scenarios should contact Gartner for more information. Trends What key trends are shaping the IDaaS market and how will the market evolve? Shallow Gets Deeper, Slow Gets Faster Web-centric IDaaS vendors have made solid gains at the lower ends of the market, and for supporting the employee-to-cloud use case. As these vendors have moved upmarket, they find that Page 26 of 34 Gartner, Inc. G

27 larger organizations tend to have existing IAM software solutions in place. These prospects, which may wish to extend their current implementation with IDaaS, or which are hoping to replace their on-premises solution, tend to have needs for deeper IGA functionality than the Web-centric vendors typically provide. These prospects also tend to require integration with legacy architected systems and a variety of directories and databases. This is forcing shallow-function, Web-centric IDaaS vendors to add deeper functionality and integration capabilities to their road maps. Conversely, the IDaaS vendors with deeper IAM functionality and integration capabilities tend toward implementations that are larger and more complex, and do not have their offerings pricetuned for rapid handling of the downmarket Web-centric use cases. These vendors will need to provide a streamlined, rapidly deployable offering for these use cases if they wish to gain a piece of the SMB markets. Mobile Support Gets Better IDaaS vendors' native mobile application support is a frontier capability, particularly for authentication and SSO. Several IDaaS vendors support a portal-like interface on mobile devices for Web applications that are under IDaaS management. IDaaS vendors' support for customers' and third-party native apps is nascent. IDaaS vendors began supporting customers' mobile apps by offering software development kits (SDKs). With these SDKs, customers can develop their apps using the IDaaS vendor's SDK, which will provide authentication to the IDaaS vendor's service. Centrify provides this approach, but it also supports a containerization approach and provides MDM features as part of its offering. Okta has invested in technology that will provide mobile native application support and other mobile security features. Ping Identity acquired accells to provide push out-of-band authentication as part of its service. However, Ping Identity is also one of the vendors leading the efforts at the OpenID Connect Native Applications (NAPPS) Working Group to develop a standards-based approach to supporting authentication and SSO for multiple native apps. OneLogin and Symplified are also participating in this working group, and other vendors have shown interest. If this working group is successful, then customers should have a standardized approach for getting authentication and SSO functions for native mobile apps, and should have easier portability for these apps in terms of switching IDaaS vendors or even moving to on-premises access managers that support the standards. Containerization approaches will remain proprietary but will offer customers security protections beyond authentication and SSO, such as data security, jailbreak detection and security policy enforcement. IDaaS Becomes Part of Other Services Salesforce.com and Microsoft have entered the IDaaS market and are positioning their IDaaS offerings as components of their broader PaaS portfolio. Intermedia, a relatively smaller provider of hosted Microsoft products and unified communications services, acquired IDaaS vendor SaaSID in Intermedia has incorporated the acquired functionality into a service that can be purchased stand-alone or with other Intermedia services. Gartner, Inc. G Page 27 of 34

28 IDaaS vendors are in various stages of maturity in providing API-based access to their services. We are also noting that several IDaaS vendors are beginning to tout their services' directory integration with other sources of identity, such as salesforce.com, Google, Microsoft and Workday. Thus, IDaaS has a future of supporting traditional enterprise needs as well as supporting service-toservice needs for example, use cases where enterprise CRM systems call an IDaaS to create an identity and then provision that identity to several systems within the enterprise and on SaaS applications ("See Provisioning User Accounts to Cloud Applications"). Several IAM functions will commoditize. SSO is well on its way to commoditization, and IGA and intelligence functions will take a bumpy and winding road to commoditization. User self-service access request and profile management, password reset, access approvals and account provisioning to Web centric targets, and canned and customized reporting will commoditize first. More advanced IGA and analytics features will take longer. Clients should expect overall downward pricing pressure in the market for the next three years. On-Premises Replacement Wholesale replacement of traditional on-premises IAM software stacks that are serving multiple use cases for large enterprises has been relatively rare. These on-premises implementations are longstanding, tend to be well-staffed, and have been deployed to support legacy architected systems not just Web-architected and SaaS apps. Nevertheless, there are vendors who can support multiple use cases and have software with deep functionality that can be cloud-delivered and are capable of replacing legacy on-premises IAM tools. These vendors have been conservatively building businesses to do just that, and more customers are starting to use them. However, these kinds of deals are an order of magnitude less in number than the more popular and easy-to-deliver Web-centric IDaaS deals. Full-featured IDaaS implementations that support legacy applications can be deployed more rapidly and can remove some of the complexity of traditional software deployments. Integration with legacy systems, multistep approval workflows, access certification and other IGA functions prevalent in mature IAM implementations still take time to plan, design and implement, and they add costs to implementations. Decisions to outsource complex IAM implementations aren't made easily. Therefore, enterprises considering a build or extend versus outsource decision should focus on two key areas. 1. Inhibitors to successful on-premises IAM adoption or issues with the current implementation that would potentially be alleviated or circumvented by the move to IDaaS, such as: Inappropriate staffing levels or skills Organizational battles over duplicative IAM implementations, obtained through mergers, acquisitions or independent organizational buying decisions Insufficient planning prior to tool selection and implementation Project scope creep Poor operational efficiency by IAM, resulting in too much time taken for IAM functions Page 28 of 34 Gartner, Inc. G

29 Poor operational effectiveness by IAM, resulting in audit findings for access violations With the exception of inappropriate staffing levels or skills, these inhibitors will not be automatically resolved by switching to IDaaS. There are often root causes for these inhibitors that have nothing to do with the delivery model for IAM, and these issues must be addressed with solid IAM program governance. IDaaS may simply help go around the problems or alleviate some of them. 2. Total cost of ownership. There is no free lunch. Clients who judge IDaaS as too expensive may not have done their homework in terms of understanding the full costs of managing onpremises IAM. These costs include: Fully burdened staff costs for implementers, operations staff and a portion of the help desk personnel Software investment costs and ongoing maintenance Estimated patch and upgrade costs Infrastructure and operations for resilient implementations and business continuity Both of these areas will be explored more fully in future Gartner research. Market Overview Gartner's inaugural Magic Quadrant for Identity Access Management as a Service underscores a market in its early days that is largely driven by Web application use cases. The IDaaS market was originally fueled by SMBs that made SaaS the predominant applications delivery model. Most of their applications were already in the cloud, and they preferred to buy rather than build infrastructure. In turn, SaaS applications became new identity silos each with their own administration, authentication and event-logging capabilities. IDaaS vendors can create connections one time to SaaS vendors for purposes of authentication, SSO and account management (when SaaS vendors provide APIs to allow this). These connections can then be reused for new clients. This relieves the IDaaS customers of having to create these connections themselves. IDaaS vendors can also bridge to customers' on-premises identity and authentication services, and use data held or removed from there (such as directory group or organizational unit membership) to provision and deprovision accounts on SaaS targets. This automation saves the effort of manually provisioning and deprovisioning accounts, and can also help with avoiding orphaned and active accounts on SaaS that can leave enterprises vulnerable and paying for unused accounts. In the last few years, vendors that can broker all the functions between enterprise users and SaaS have become appealing to organizations of all sizes. Cloud security and data residency concerns, however, are often key factors in evaluating IDaaS vendors. The growth of the IDaaS market has been driven by the following factors: Gartner, Inc. G Page 29 of 34

30 The need to instill IAM disciplines for SaaS applications The need to gain faster time to value over traditional on-premises software The desire to avoid IAM implementation failures The desire to reduce IAM talent costs in design, implementation and support Gartner estimates the market size at year-end 2013 to be $215 million. This is slightly lower than our mid-2013 forecast of $230 million. Gartner believes the data collected in 2013 indicated higher revenue for some vendors that inappropriately allocated revenue from other parts of their businesses to IDaaS. The 2013 estimate does not include revenue from vendors that provide single function IDaaS offerings for example, authentication-as-a-service vendors. However, revenue from authentication-as-a-service vendors was believed to be approximately $220 million in 2013 that is, 10% of a $2.2 billion user authentication market. Authentication as a service is a simple function to deliver compared with multifunction IDaaS. The latter will take longer to grow as a percentage of the overall IAM market. Gartner predicts that multifunction IDaaS will be the preferred delivery model for IAM for 20% of IAM purchases by the end of 2017, up from less than 10% in Over the past few years, Web-centric IDaaS vendors have made solid gains at the lower ends of the market, supporting the employee-to-cloud use case. As these vendors have moved upmarket, they find larger organizations tend to have IAM solutions in place and have deeper IGA functionality needs than Web-centric vendors can provide. These prospects also require integration with legacy architected systems. This is forcing shallow-function, Web-centric IDaaS vendors to add deeper functionality and integration capabilities to their road maps. Conversely, IDaaS vendors with deeper IAM functionality and integration capabilities tend toward larger, complex implementations, and do not have price-tuned offerings for rapid handling of Web-centric use cases. These vendors will need to provide a streamlined, rapidly deployable offering for these use cases if they wish to gain a piece of the SMB market. The employee-to-cloud use case drove growth in the early IDaaS market, and this use case still predominates. Some larger organizations are also "peeling off" the part of their IAM needs that are served by IDaaS, even when those organizations may own IGA and access tools that could be extended to the cloud. For this use case, IDaaS is being viewed as a quick win, and sometimes as a way to standardize a solution for one part of the enterprise IAM problem space. However, use case needs are changing, and vendors are being asked to take on more than the employee-to-cloud scenario. More customers are driving IDaaS vendors to support consumer inbound access to enterprise and consumer-facing systems a use case that has traditionally been supported by onpremises user self-service registration and WAM tools. Consequently, some IDaaS vendors are finding it necessary to implement consumer- and B2B-friendly pricing and prove they can scale to high volumes of users. Other key trends include better mobile support and IDaaS as part of other services such as PaaS offerings (see the Context section of this research for a deeper analysis of mobile and PaaS trends, a closer look at security and data residency concerns, and information on pricing). Page 30 of 34 Gartner, Inc. G

31 Gartner Recommended Reading Some documents may not be available as part of your current Gartner subscription. "How Gartner Evaluates Vendors and Markets in Magic Quadrants and MarketScopes" "Magic Quadrant for User Authentication" "Magic Quadrant for Identity Governance and Administration" "MarketScope for Web Access Management" "Provisioning User Accounts to Cloud Applications" "How to Get to Single Sign-On, 2014 Update" Evidence The following sources were used in the creation of this research: Gartner client interactions Phone interviews and online surveys for vendor-provided references A comprehensive vendor survey that aligned with the evaluation criteria Secondary research services to support the overall viability evaluation criteria Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Gartner, Inc. G Page 31 of 34

32 Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Page 32 of 34 Gartner, Inc. G

33 Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Gartner, Inc. G Page 33 of 34

34 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT USA Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. Page 34 of 34 Gartner, Inc. G

Magic Quadrant for Identity and Access Management as a Service, Worldwide

Magic Quadrant for Identity and Access Management as a Service, Worldwide G00265376 Magic Quadrant for Identity and Access Management as a Service, Worldwide Published: 4 June 2015 Analyst(s): Gregg Kreizman, Neil Wynne Large vendor entrants in 2014 began to make their presence

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Pick Your Identity Bridge

Pick Your Identity Bridge Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Ping Identity IDC MARKETSCAPE

More information

The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs

The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs April 2014 The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs CHANNEL ASSESSMENT Contents The Identity Management Conundrum 1 Identity & Access Management Value

More information

Cloud User and Access Management

Cloud User and Access Management KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com [email protected] Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger January 2015 by Martin Kuppinger [email protected] January 2015 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...

More information

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported

More information

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-3waysad-113012 Table

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

How To Choose A Cloud Computing Solution

How To Choose A Cloud Computing Solution WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Covisint IDC MARKETSCAPE

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-top8-113012

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information

Avoid the Hidden Costs of AD FS with Okta

Avoid the Hidden Costs of AD FS with Okta Okta White paper Avoid the Hidden Costs of AD FS with Okta Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-adfs-031413 Table of Contents 1 Challenges of

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Six Best Practices for Cloud-Based IAM

Six Best Practices for Cloud-Based IAM a best practices guide Six Best Practices for Cloud-Based IAM Making Identities Work Securely in the Cloud Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Executive

More information

Identity in the Cloud

Identity in the Cloud White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

White paper Contents

White paper Contents Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Management Challenges of Software

More information

ENTERPRISE CONTENT MANAGEMENT. Which one is best for your organisation?

ENTERPRISE CONTENT MANAGEMENT. Which one is best for your organisation? ENTERPRISE CONTENT MANAGEMENT Which one is best for your organisation? INFORMATION MANAGEMENT Information management environments are comprised of legacy information resident in line of business applications,

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

Chartis RiskTech Quadrant for Model Risk Management Systems 2014 Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant

More information

Cloud SSO and Federated Identity Management Solutions and Services

Cloud SSO and Federated Identity Management Solutions and Services Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

Improving the Microsoft enterprise. network for public cloud connectivity

Improving the Microsoft enterprise. network for public cloud connectivity Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness

More information

Magic Quadrant for IT Vendor Risk Management

Magic Quadrant for IT Vendor Risk Management (http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Magic Quadrant for Enterprise Content Management 18 October 2012

Magic Quadrant for Enterprise Content Management 18 October 2012 Magic Quadrant for Enterprise Content Management 18 October 2012 Uptake of ECM offerings remains strong as organizations harness content to drive key business applications. Process-centric solutions, social

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

How To Manage A Plethora Of Identities In A Cloud System (Saas)

How To Manage A Plethora Of Identities In A Cloud System (Saas) TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

Access Management and Federation

Access Management and Federation KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger September 2013 Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding

More information

Cloud Computing: What IT Professionals Need to Know

Cloud Computing: What IT Professionals Need to Know Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Addressing Cloud Computing Security Considerations

Addressing Cloud Computing Security Considerations Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft

More information

Magic Quadrant for Storage Professional and Support Services

Magic Quadrant for Storage Professional and Support Services Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and

More information

Interactive Gartner Magic Quadrant and Gartner Critical Capabilities

Interactive Gartner Magic Quadrant and Gartner Critical Capabilities Interactive Gartner Magic Quadrant and Gartner Critical Capabilities The Gartner Magic Quadrant is established and proven, providing top global organizations with a snapshot of a market to guide their

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Magic Quadrant for Identity Governance and Administration

Magic Quadrant for Identity Governance and Administration G00261633 Magic Quadrant for Identity Governance and Administration Published: 12 January 2015 Analyst(s): Felix Gaehtgens, Brian Iverson, Steve Krapes The IGA market is transforming legacy, on-premises

More information

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,

More information

Identity Management Overview. Bill Nelson [email protected] Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson [email protected] Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

5 Things to Look for in a Cloud Provider When it Comes to Security

5 Things to Look for in a Cloud Provider When it Comes to Security 5 Things to Look for in a Cloud Provider When it Comes to Security In This Paper Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud Understand the

More information

Customer Identity and Access Management (CIAM) Buyer s Guide

Customer Identity and Access Management (CIAM) Buyer s Guide Customer Identity and Access Management (CIAM) Buyer s Guide Shifting Marketplace Over the last five years, there has been a major shift in how enterprises need to look at and secure customer identities

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Verio enables cloud service brokerage with VerioCatalyst

Verio enables cloud service brokerage with VerioCatalyst Verio enables cloud service brokerage with VerioCatalyst Analyst: Agatha Poon 30 Aug, 2013 Verio has been in controlled beta since April, but recently announced the commercial availability of its channel-oriented

More information