Magic Quadrant for Identity and Access Management as a Service, Worldwide

Size: px
Start display at page:

Download "Magic Quadrant for Identity and Access Management as a Service, Worldwide"

Transcription

1 G Magic Quadrant for Identity and Access Management as a Service, Worldwide Published: 4 June 2015 Analyst(s): Gregg Kreizman, Neil Wynne Large vendor entrants in 2014 began to make their presence felt. Webcentric but shallow-function services are in high demand. Vendors that can deliver deeper functionality for IGA and legacy application support, including niche vendors, may be the best for your needs. Strategic Planning Assumption By 2019, 25% of IAM purchases will use the IDaaS delivery model up from less than 10% in Market Definition/Description A vendor in the identity and access management as a service (IDaaS) market delivers a predominantly cloud-based service in a multitenant or dedicated and hosted delivery model that brokers core identity governance and administration (IGA), access and intelligence functions to target systems on customers' premises and in the cloud. This Magic Quadrant rates vendors on their ability to be global, general-purpose identity and access management (IAM) service providers for multiple use cases. The vendors in this Magic Quadrant must provide some level of functionality in all of the following IAM functional areas: IGA: At a minimum, the vendor's service is able to automate synchronization (adds, changes and deletions) of identities held by the service or obtained from customers' identity repositories to target applications and other repositories. The vendor also must provide a way for customers' administrators to manage identities directly through an IDaaS administrative interface, and allow users to reset their passwords. In addition, vendors may offer deeper functionality, such as supporting identity life cycle processes, automated provisioning of accounts among heterogeneous systems, access requests (including self-service), and governance over user access to critical systems via workflows for policy enforcement, as well as for access certification processes. Additional capabilities may include role management and access certification.

2 Access: Access includes user authentication, single sign-on (SSO) and authorization enforcement. At a minimum, the vendor provides authentication and SSO to target applications using Web proxies and federation standards. Vendors also may offer ways to vault and replay passwords to get to SSO when federation standards are not supported by the applications. Most vendors offer additional authentication methods. Identity log monitoring and reporting: At a minimum, the vendor logs IGA and access events, makes the log data available to customers for their own analysis, and provides customers with a reporting capability to answer the questions, "Who has been granted access to which target systems and when?" and "Who has accessed those target systems and when?" Page 2 of 37 Gartner, Inc. G

3 Magic Quadrant Figure 1. Magic Quadrant for Identity and Access Management as a Service, Worldwide Source: Gartner (June 2015) Vendor Strengths and Cautions CA Technologies CA Technologies delivers IDaaS under its CA Secure Cloud brand. CA Secure Cloud includes Web application SSO, adaptive authentication and identity administration. The service supports user Gartner, Inc. G Page 3 of 37

4 provisioning to cloud and on-premises systems, including legacy applications. Self-service requests, approval workflows and delegated administration are all supported. The service can be delivered completely from the cloud or in a hybrid model. CA has global regional partners that deliver their own branded versions of IDaaS, underpinned by CA Secure Cloud. Strengths CA Secure Cloud provides greater functional depth for user administration than Web-centric providers. Solid delegated administration and provisioning workflows are provided. The Advanced Authentication SaaS provides adaptive authentication options. CA has a history of successfully leveraging global partners to deliver its solutions and services worldwide. CA's extensive product and service portfolio, as well as its sales and support channels, favors the company in the Overall Viability criterion. CA's portfolio of IAM software and IDaaS can be combined for complex functionality and usecase support, and CA has a broad set of user provisioning connectors to leverage for cloud and legacy application support. Cautions CA has not gained traction in the market and is resetting its strategy. Customers have demanded customized implementations, which is not a design goal for CA Secure Cloud. CA's pricing was above average for Web-centric pricing scenarios. CA Secure Cloud does not yet support password vaulting and forwarding for SSO for target systems that do not support federation standards. This feature is roadmapped. CA Secure Cloud lacks language internationalization, and the interfaces are provided in English only. Centrify Centrify's Identity Service includes Web-centric IDaaS and enterprise mobility management (EMM). The IDaaS portion of the offering provides Web application SSO using federation standards or password vaulting and forwarding, user provisioning, and reporting. The integrated mobility capabilities provide many of the features of stand-alone EMM vendors. Notable features include security configuration and enforcement, device X.509 certificate issuance and renewal, remote device location and wiping, and application containerization. Strengths The EMM features are the strongest in the IDaaS market, and Centrify has a strong relationship with Samsung. Centrify hosts Samsung's own IDaaS offering, and Centrify leverages the Page 4 of 37 Gartner, Inc. G

5 Samsung Knox containerization capability. Centrify added fingerprint biometric support for Apple and Samsung devices in Centrify added privileged account management as an IDaaS offering, and strengthened its support for on-premises applications. Centrify significantly expanded the set of applications for which it can provide user provisioning and license management. The service and on-premises proxy component can be configured to keep some or all identity data on-premises in Active Directory and not replicate it to the cloud. Cloud identity storage is optional. Reporting and analysis features for all events handled by the service are wide-ranging and customizable. Cautions Centrify does not provide business-to-consumer (B2C) or B2B IDaaS offerings. As with other Web-centric IDaaS providers, Centrify does not provide user provisioning workflow or identity governance features. The user provisioning and identity synchronization components are in the early stages of maturity. Bugs have been reported, and Centrify is addressing them with fixes. Marketing programs have been significantly bolstered in 2015; however, brand awareness in IDaaS continues to lag primary competitors. Centrify is facing increased competition from larger vendors. Covisint Covisint is the longest-standing IDaaS vendor in the market. The company may not be well-known among prospects in some industries, geographies and small businesses due to its early focus on larger enterprises. Moreover, Covisint's functionality is often "white-labeled" by its customers. Covisint got its start in the automotive industry and provided integration broker, portal and identity services to support supply chain connectivity. The company has grown those lines of business into other industries. Its work in the automotive industry and in supporting vehicle identities also has helped it build foundation services that can be used in other Internet of Things (IoT) applications. In addition, the company has a history of working through tough integration issues with demanding customers. Strengths Covisint provides strong identity assurance features, with several ID proofing vendor integrations and support for several authentication methods its own and those from third parties. Gartner, Inc. G Page 5 of 37

6 Covisint IDM includes user administration workflow abilities and capable administrative delegation, along with access certification features. The vendor provides deep identity federation and provisioning integration functions using standards and proprietary techniques. Covisint has shown leadership in support of IoT initiatives, particularly in the automotive industry, and IoT is stated as a strong focus going forward. Covisint added a data center in Germany to support customers there, and to grow its presence in the region. Covisint made its service granularly accessible through APIs; it has rearchitected the service to make it more easily implemented in public or private cloud, and to support white labeling. Cautions Although it can support employee-to-saas scenarios, Covisint's focus on large customers with enterprise B2B use cases will make it a less likely choice for small or midsize businesses (SMBs) that are seeking only employee-to-saas use-case support. The scenario pricing that Covisint provided for this research was high for most scenarios, compared with competitors. Covisint is not profitable and has had negative net income since completely separating from Compuware in Although still selling through a direct sales team, Covisint's channel partner strategy to supply its platform as a service (PaaS) to other service providers as a white-labeled service although it could be profitable for the vendor is risky because it could disintermediate Covisint from customers. Exostar Exostar entered the IDaaS market when it was formed by a community of aerospace and defense companies to support their IAM needs related to supply chain. Exostar also created a secure collaboration platform based on top of Microsoft SharePoint, and now it delivers secure , file transfer and WebEx services. The company augments its core services with identity proofing through third parties, but also provides a video "in person" identity proofing service using subjects' webcams for interviews. In addition, Exostar delivers public-key infrastructure (PKI) and one-time password (OTP) token credential management services. Exostar provides IAM that is fully cloudbased, or it can join community participants to the hub via a gateway. Exostar's target market is large companies with cross-organizational collaboration requirements. Exostar views IDaaS as a critical component of its offering, but primarily in the context of helping it to deliver its overall business collaboration capabilities. Strengths Exostar is a long-standing IDaaS vendor, and is one of the few small vendors that is profitable. Page 6 of 37 Gartner, Inc. G

7 Because of its legacy in highly secure markets, Exostar has strict audit requirements to ensure that conditions for security and industry compliance issues are met. The identity proofing capabilities also are unique in this market, and Exostar's identity services are certified by the U.S. government and the SAFE-BioPharma Association. In 2014 and early 2015, Exostar expanded its vertical industry support to the healthcare and airline industries, and within life sciences. Exostar is delivering similar sets of IAM and collaboration functionality to them, with an emphasis on these communities' needs for intellectual property protection. The company has strong customer relationships, and reference customers report that Exostar is a solid partner for implementation, as well as for incorporating customer requirements into its roadmap. Exostar has strong B2B federation and administration capabilities, and it can handle data exchanges in support of complex business agreements for its established communities. In 2014, Exostar added an entitlements management framework to enable user provisioning and the provisioning of application-specific features using customizable workflow components. Cautions The company and its offerings are not geared toward the broader general-purpose IAM market, which would focus on enterprise users' access to SaaS applications, or on consumers' inbound access to enterprises' applications as primary use cases. Rather, Exostar's target market is large companies with cross-organizational collaboration requirements. Authentication and SSO integration features are limited compared with vendors that support general-purpose SSO use cases. Password vaulting and forwarding, as well as social registration and login, are not supported. Exostar provides IDaaS functions to users in multiple geographies, but these users and their companies are predominantly using the services at the behest of Exostar's anchor tenants in aerospace and defense and in life sciences. Exostar picked up a customer in Japan, but otherwise, there is not a strong international presence for Exostar customers and data centers, nor is there broad internalization support. Fischer International Fischer International, a pure-play IAM provider, was one of the first vendors to deliver IDaaS. Fischer's capabilities are available in IDaaS, dedicated hosted, managed or on-premises software delivery models. Fischer provides functionally deep user administration and fulfillment capabilities, some governance functionality, privileged account management, and federated SSO. Strengths Reference customers rate the product and support highly. Gartner, Inc. G Page 7 of 37

8 Fischer's experience and technical capabilities enable it to support IAM functions for legacy onpremises applications in addition to SaaS applications. User administration functionality is deep, with strong connector support to a variety of directories, databases and applications, and access certification features are included. Fischer International emphasizes configuration of out-of-the-box features rather than scripting and custom development. This results in rapid deployment times relative to other deep functionality vendors. However, prospects must ensure that this type of implementation can meet their business process requirements. Fischer's scenario pricing is among the lowest, and references find that this provides solid value for the money. Cautions Despite Fischer's long tenure in the IDaaS market, its brand recognition, market penetration and overall growth have been low compared with its competitors. The focus of Fischer's marketing and sales on the U.S. geographic market and higher education vertical industry has limited the company's growth in other geographies and vertical industries. Access management is limited to SSO, without the authorization enforcement capabilities found in other IDaaS access services. Native mobile application support is not included in the product. IBM This is IBM's first year on the IDaaS Magic Quadrant. In 2014, IBM purchased Lighthouse Security Group, a vendor that delivered its IDaaS underpinned by IBM software. Lighthouse Security Group was evaluated in the 2014 "Magic Quadrant for Identity and Access Management as a Service." IBM has rebranded the offering as Cloud Identity Service, which is provided in a multitenant model. However, components of the service can be delivered in a dedicated model. With the acquisition, IBM can bring its significant resources and relationships to bear in order to advance Cloud Identity Service along with its other offerings. Strengths IBM's functional offering is deep and aligns with the functionality provided by IBM's software deployed on-premises. IBM's offering will be made deeper with the planned incorporation of the functionality obtained through the acquisition of CrossIdeas' IGA capabilities, as well as the integration of Fiberlink's MaaS360 mobile device management (MDM) capabilities. IBM's acquisition of Lighthouse Security Group and its breadth of resources should appeal to customers that are risk-averse and have concerns with smaller vendors. IBM has geographically expanded its data center locations, and IBM's support and professional services organizations are supporting Cloud Identity Service. Page 8 of 37 Gartner, Inc. G

9 The company has some very large customers and can demonstrate high scalability. Cautions Customers report that Cloud Identity Service can take significant effort to go live. This is partly due to the complex nature of projects that IBM takes on for larger customers. IBM will need to deliver a service offering that is more configurable and easy to implement, without requiring significant professional services, in order to compete down-market. While indicators point to the growth of IBM's offering, new clients have not yet translated into references. Despite pricing reductions in 2015, IBM's pricing for several use-case scenarios was among the highest. Ilantus Ilantus provides IDaaS in a dedicated hosted tenant model. The company began as an IAM system integrator, and has experience with traditional large-vendor IAM stacks. It offers four functional services: Identity Express for identity administration, Compliance Express for access governance, Sign On Express for SSO and Password Express for password management. This is Ilantus' first year on the IDaaS Magic Quadrant. Strengths Ilantus' customer references gave the vendor high marks for implementation, support and rapid deployments. Its solutions have been deployed by companies in most vertical industries, and its IGA functionality helps Ilantus support regulated industries. Ilantus' feature set and pricing are strong for the midmarket, which is its current "sweet spot" for customer acquisition. Ilantus' Sign On Express for SSO provides SSO to thick-client applications, in addition to the Web-architected applications that other vendors support. Cautions The company has low penetration in the global IDaaS market. Ilantus has been in the U.S. market as a system integrator since 2000, but has not advanced its IDaaS offerings there or in Europe. However, Ilantus has good penetration in India, and has a foothold in other Asia/Pacific countries in which English is widely spoken. Similar to other small vendors, Ilantus lacks brand recognition, so it will need to step up marketing efforts and sales channel development in order to expand more rapidly. Gartner, Inc. G Page 9 of 37

10 Ilantus demonstrates an understanding of market trends, but its roadmap plans are incremental and mostly designed to keep the service on par with current competitors' capabilities. Building IGA connectors for custom applications is time-consuming and prolongs projects, according to reference customers. Ilantus' federated access to Microsoft Office 365 SSO features lacks Microsoft's rich client support that other IDaaS vendors have. However, Sign On Express for SSO can provide this functionality for Windows clients. iwelcome Netherlands-based iwelcome provides its IDaaS in a dedicated single-tenant delivery model to allow for customization and customer branding. Its offering is heavily based on open-source software and includes authentication, SSO, federation, self-service registration, and user provisioning support for on-premises and SaaS applications. iwelcome has a specific focus on larger enterprise customers with complex requirements. Strengths iwelcome is the only established IDaaS vendor rated in this Magic Quadrant with headquarters located in continental Europe. As a result, it has an early-mover advantage in that region. iwelcome has strong capabilities in access management particularly in authentication method, federation protocol and identity repository support. iwelcome has grown a significant portion of its business by supporting B2C use cases, and owes this success to consumer-oriented features such as supporting multiple authentication methods, social registration and login, configurability of the user experience, and customer portal integration. iwelcome expanded its API support for more functions and added attribute provisioning and validation. Customers can enable or disable these capabilities through the administrative interface. During 2014 and early 2015, the company made advancements in authentication method support, and added identity intelligence features, role administration and provisioning, and System for Cross-Domain Identity Management (SCIM) support. Cautions iwelcome lacks delegated administration. It also lacks core identity governance features (such as access certification and recertification), and its provisioning approval workflow capabilities are minimal. iwelcome relies on integration with customers' established IGA toolsets. The company's overall customer base is small compared with most competitors, although the company grew the business proportionately well for its size during Page 10 of 37 Gartner, Inc. G

11 In 2014, although iwelcome began to enhance its sales resources and marketing efforts internally and through partnerships in other European countries, these efforts will need to expand rapidly in order for the vendor to stay ahead. Support resources and customer engagement will need to expand as well. Existing customers report that the platform is reliable and performs well, but that technical support could be more responsive. Microsoft This is Microsoft's first year on the IDaaS Magic Quadrant. Microsoft entered the IDaaS market in May 2014 with its business-to-employee (B2E)-focused Azure Active Directory services. There are three service levels; the Premium offering provides features that are in line with other Web-centric IDaaS providers, and includes licenses for Microsoft Identity Manager (MIM) that are to be used with customers' on-premises systems. Microsoft also offers Azure Active Directory Premium as part of its Enterprise Mobility Suite, along with Microsoft Intune and Azure Rights Management. Strengths Microsoft joined an established IDaaS market, and was able to leverage its current and substantial customer base particularly Office 365 customers to add Azure Active Directory to contracts. The company has broad and deep marketing, sales and support capabilities. Microsoft already has demonstrated high scalability with Azure Active Directory. The service underpins other Microsoft Azure services. Microsoft has a strong international presence for its service offerings, and continues to expand its infrastructure as a service (IaaS) presence worldwide. The company is able to leverage data sources and machine learning to support intelligence functions, such as identifying known bad IP addresses and devices to help prevent fraudulent activity. Microsoft's strategy demonstrates a strong understanding of technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward. Cautions Microsoft does not yet provide a B2C IDaaS offering. It is planned for Microsoft's on-premises "bridge" components are Active Directory Federation Services and Azure Active Directory Sync. Customers must implement and manage these two components on their own. Microsoft's Azure AD Connect (similar to other IDaaS vendors' approaches), which will combine these functions, is now in preview. While Azure Active Directory Premium includes access licenses for MIM, customers are responsible for managing that implementation themselves, or with the help of third parties. Gartner, Inc. G Page 11 of 37

12 Microsoft can provide user provisioning to some cloud apps; however, Web-centric competitors have a lead in terms of the number of apps they can provision to, as well as the depth of SaaS fulfillment that supports the provisioning of roles, groups and other attributes. Microsoft can provide provisioning and SSO for enterprise users to social media sites, and has APIs and software development kits (SDKs) for social media support; however, the service does not yet provide packaged social registration and sign-on to Azure Active Directory or target systems. Okta Okta's IDaaS offering is delivered multitenant, with lightweight on-premises components for repository and target system connectors. IDaaS is Okta's core business. Okta delivers basic identity administration and provisioning capabilities, access management for Web-architected applications using federation or password vaulting and forwarding, and reporting. Okta also provides phone-asa-token authentication capabilities. Okta added Mobility Management in Strengths The company's marketing and sales strategies have been effective, as demonstrated by brand recognition and an increased volume of customers. Okta's customer base grew significantly in 2014 and early Okta's continued investment in its API set has led to the delivery of Okta Identity Platform for developers to support integrations with customers' applications and workflows. Gartner again received numerous references, and has confirmed predominantly positive experiences. Okta's investments in mobility management have begun to bear fruit; customers are beginning to use the fundamental MDM functionality integrated with IDaaS to support functions such as mobile SSO, device access policies and device PIN reset. Okta has maintained high, if not perfect, availability. Cautions Okta can synchronize identities from enterprise directories, and has added delegated administration functionality; however, the vendor does not have user provisioning approval workflow beyond one level, nor does it have identity governance features. Okta's canned and custom reporting capabilities are limited. Okta does not yet support the use of social identities for registration and logon. These capabilities were in beta test at the time of publication. Okta's current customer base is predominantly located in the U.S., as are its data centers, but Okta has invested in European and Asia/Pacific expansion in terms of sales and data center location strategies. Okta is facing increased competition from larger vendors. Page 12 of 37 Gartner, Inc. G

13 OneLogin OneLogin's service architecture is multitenant, and lightweight integration components are used for on-premises connections. IDaaS is OneLogin's core business. OneLogin also markets a federated search capability that allows customers to search for content across connected applications, and for these users to be authenticated automatically when search results are returned and selected. Strengths OneLogin significantly expanded its customer base in 2014 and early 2015, and has some large customers. OneLogin has taken a standards-based approach to native mobile application integration, and is one of the vendors that champions the OpenID Native Applications Working Group (NAPPS) specifications. OneLogin has started improving its global sales by expanding its sales organization and developing its channel partnerships. OneLogin secured a third round of venture funding that will help it expand. References were mostly solid, and appreciated the support they received from OneLogin. Cautions OneLogin faces increased competition from larger competitors. OneLogin lacks its own deep user administration and provisioning and identity governance functionalities. OneLogin had some issues with service availability in However, it handled those issues well with customers and is improving the resilience of its service. OneLogin maintains a singular focus on IDaaS, but has not developed a strategy for other product offerings. This could make it difficult to compete against vendors with broader offerings. Ping Identity The PingOne service is a multitenant Web-centric offering. Ping Identity provides a lightweight selfservice bridge component to integrate a customer's Active Directory to the service, and also uses the well-established PingFederate product as the on-premises bridge component for customers when broad protocol and directory support are needed. In addition, PingAccess can be deployed to support proxy access to internal Web applications and APIs. PingID is offered to provide phone-asa-token authentication methods. Gartner, Inc. G Page 13 of 37

14 Strengths By leveraging the PingFederate technology for the bridge component, Ping can provide SSO by integrating with a variety of identity repositories, existing customer access management systems and target application systems. Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support, via its many service provider customers. Ping Identity has shown strong leadership in identity standards development, as well as openness in working with customers and competitors to evolve the standards. Ping Identity has broad vertical and geographic market penetration through its value-added reseller (VAR) and system integrator partner networks; also, it has made inroads with managed service providers that can offer PingOne functionality. Cautions PingOne is one of the services with strong access features, but very lightweight IGA capabilities. User self-service access request, provisioning workflow and most identity governance features are missing. PingOne has lagged its primary competitors in brand recognition and customer adoption. Ping Identity's reporting capabilities are weak compared with its competitors. Language internationalization features for the administrative and user interfaces are lacking relative to competitors; however, they are improving, with versions becoming available for Ping Identity's target markets later in SailPoint SailPoint IdentityNow was developed predominantly in-house, and features access request and provisioning, access certification, password management, and SSO service elements. The architecture is multitenant and can deliver services completely in the cloud, or it can be bridged to enterprise environments to support on-premises applications. Strengths SailPoint's legacy of providing strong on-premises IGA has helped it deliver a subset of the functionality from the IdentityIQ product in IdentityNow. The more full-featured IdentityIQ can be delivered as a hosted managed service through partners as an alternative. This helps SailPoint strongly support employee-facing use cases. SailPoint's full complement of provisioning connectors provides fulfillment capabilities to a wide variety of identity repositories and target systems, and significant product updates have been made to the password management functionality. SailPoint provides SSO options that include federated SSO and password vaulting and forwarding. Page 14 of 37 Gartner, Inc. G

15 SailPoint has a broad geographic presence for sales and support as a foundation for selling its IDaaS, and it has added data centers in Europe and Sydney, with other Asia/Pacific data centers roadmapped for The company is profitable, and Thoma Bravo became a majority owner in SailPoint, thereby bringing additional resources to the vendor. Cautions SailPoint's IDaaS market share is growing, but still small. IdentityNow does not support social identity use cases. IdentityNow is limited in its ability to support delegated administration for B2B use cases, but this feature is roadmapped for SailPoint has strong VAR and system integration partner sets, but it is just beginning to leverage them for IDaaS market penetration. Salesforce Salesforce provides Salesforce Identity as part of its Salesforce PaaS. It sells Identity as an independent service offering, but also includes Identity for established Salesforce customers. Identity Connect is Salesforce's on-premises bridge component that is sold separately. The service includes the baseline functionality required for inclusion, as well as social registration and login, federation gateway functionality, and deep access request and user provisioning workflow functionality. Strengths Salesforce is able to place commoditization pressure on the market by including IDaaS functionality in its core offering, thereby providing incentives to keep its substantial customer base from being drawn to alternatives. Salesforce Identity takes advantage of the deep access request and approval workflow functionality inherent in the Salesforce platform. Salesforce's strategy demonstrates a strong understanding of technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward. Salesforce Identity has strong social media and identity standards support. Cautions Salesforce does not support password vaulting and forwarding capabilities for SSO. Salesforce Identity does not provide proxy-based access to on-premises Web applications. Gartner, Inc. G Page 15 of 37

16 The bridge component of Salesforce Identity does not provide the ability to synchronize cloud directory changes to enterprise directories. Professional services are needed to deliver this functionality. Despite Salesforce's considerable PaaS market presence and recent awareness campaigns, Salesforce Identity's brand is not yet well-known in the market. The service is in its second year of availability. Simeio Solutions Simeio Solutions provides a mixture of dedicated hosted and on-premises managed service offerings. Its services are underpinned by products from other well-established IAM software vendors, which allows Simeio to provide Web access management (WAM), identity administration, access request, role and compliance, privileged account management, data loss prevention, risk intelligence, IT governance, risk and compliance services, and directory services. Strengths Simeio's use of major IAM stack vendors' technologies provides it with an arsenal of products that delivers deep functional support for Web and legacy applications. The same vendor partnerships provide referrals to Simeio for customer acquisitions. Simeio also became Dell's exclusive as-a-service provider for Dell's IAM offerings. Simeio's Identity Intelligence Center provides actionable insight into patterns of usage among users that may exist across multiple vendor identity sources and other security systems. Simeio's history as an integrator has given it the experience to help customers plan, design and integrate their IDaaS offerings. A significant portion of Simeio's staff serves in professional services roles. Simeio continues to enhance its administration and user interfaces as abstraction layers among the multiple underpinning vendors' technologies to help with consistency and time to value with implementations. Simeio's service-based roots have enabled it to have a positive cash flow since its inception. A recently announced private equity investment should allow Simeio to further accelerate its growth. Simeio has a good spread in its vertical industry and geographic representation; references highlighted Simeio as a good partner and rated it highly overall. Cautions Simeio's organization and its overall customer base grew in 2014 and early 2015, but not as rapidly as we would have expected, given its relationship with Dell. Simeio's use of OEM software requires the incorporation of these third-party vendors' software licensing costs in its offerings. This tends to make Simeio's pricing high, even for pure Web application use cases. Page 16 of 37 Gartner, Inc. G

17 Simeio is still relatively unknown in the IDaaS marketplace, but is slowly building its customer base and brand awareness, thanks to vendor partners, some of which are also competitors. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Added Microsoft, Ilantus and Salesforce were added to the Magic Quadrant this year. Also, IBM was added because it acquired Lighthouse Security Group. Dropped Symplified's intellectual property and some of its people were acquired by RSA, The Security Division of EMC; therefore, Symplified was dropped from the Magic Quadrant. RSA has just announced its Via offering, which leverages Symplified's technology, but RSA did not meet customer and revenue inclusion criteria for this Magic Quadrant. In addition, Lighthouse Security Group was dropped because it was acquired by IBM. Other Vendors of Note There has been some Gartner client interest in two vendors that specialize in social identity integration: Gigya and Janrain. However, neither one met the IAM functional inclusion criteria for this Magic Quadrant, notably in the IGA functional areas. Pirean and Wipro did not meet the financial or market penetration criteria for this Magic Quadrant. However, these vendors have functionally deep IAM offerings, and also have international headquarters, which may help them to be considered as alternatives to U.S.-based companies. Bitium offers a Web-centric IDaaS, but it did not meet the revenue criteria for inclusion in this Magic Quadrant. Intermedia offers AppID, but it did not meet the customer and revenue criteria for inclusion in this Magic Quadrant. Gartner, Inc. G Page 17 of 37

18 Inclusion and Exclusion Criteria The vendor must provide a minimum level of functionality in all the IAM functional areas outlined in the Market Definition/Description section. Vendors that deliver only one or two of these core IAM functions as a service, such as authentication only, were not covered as part of this research. The following additional inclusion criteria were used. Longevity of offering: Each IDaaS offering has been generally available since at least 31 December 2014 and is in use in multiple customer production environments. Origination of offering: The offering is manufactured and operated by the vendor, or is a significantly modified version obtained through an OEM relationship. (We discount any service offering that has merely been obtained without significant functional modification through a licensing agreement from another vendor for example, as part of a reseller/partner or serviceprovider agreement.) Number of customers and end users (including customers of third-party service providers and their end users): As of 31 December 2014, the vendor had: More than 20 different active customer organizations using its IDaaS offerings in a production environment. Revenue attributed to fees for IDaaS service usage that was greater than $4 million for the year ending 31 December Verifiability: Customer references must be available. Evaluation Criteria Ability to Execute Product or Service The service's overall architecture, with emphasis on the service's global availability and resiliency features, and its flexibility to support on-premises identity repositories and cloud-only implementations. The level of support and expertise required by customers to help maintain the components. The extent to which a service's functions are exposed via APIs for customers' system integration. Security and privacy: The physical and logical controls implemented by the vendor and any underpinning IaaS provider; security for on-premises bridge components and connections between the bridge and the IDaaS; controls for data security, particularly regarding personal information; and vendors' third-party certifications received for the services. Page 18 of 37 Gartner, Inc. G

19 The variety of on-premises identity repositories that can be supported, and the quality of integration with same. The depth and breadth of IGA functionality: Access request. Access approval workflow depth and functionality. Access certification. Attribute discovery and administration. Administrative access enforcement for example, to identify, alert and prevent inappropriate access. Provisioning create, read, update, delete (CRUD) user identities and entitlements to target systems. Configuring target system connectors. The depth and breadth of access functionality: User authentication methods supported. Breadth of SSO support for target systems. Federation standards. Support for mobile endpoints and native mobile application integration. Authorization enforcement. The depth and breadth of identity monitoring and reporting: Canned reporting. Customized reporting. Data export to on-premises systems. Analytics. Integration with Microsoft Office 365, Microsoft SharePoint, customers' on-premises VPNs and WAM systems. Deployment requirements, such as speed of proof of concept and deployment, customer staffing requirements, and factors that add complexity and may affect speed to deployment and staffing. Overall Viability Overall financial health. Gartner, Inc. G Page 19 of 37

20 Success in the IDaaS market in terms of the number and size of customer implementations. This aspect is heavily weighted. The vendor's likely continued presence in the IDaaS market. Sales Execution/Pricing The vendor's capabilities in such areas as deal management and presales support, and the overall effectiveness of the sales channel, including VARs and integrators. The vendor's track record in competitive wins and business retention. Pricing over a number of different scenarios. This aspect is heavily weighted. Market Responsiveness/Record The vendor's demonstrated ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act and market dynamics change. How the vendor can meet customers' evolving IDaaS needs over a variety of use cases. How the vendor has embraced standards initiatives in the IDaaS and adjacent market segments, and responded to relevant regulation and legislation. Marketing Execution The clarity, quality, creativity and efficacy of programs designed to deliver the vendor's message in order to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This mind share can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. For example: Marketing activities and messaging. Visibility in the press, social media and other outlets. Vendor's appearance in vendor selection exercises, based on Gartner-client interactions. Brand depth and equity. Customer Experience Customer relationship and services. Customer satisfaction program. Customer references: This evaluation subcriterion was weighted heavily and included input from vendor-supplied references, as well as unsolicited feedback from Gartner-client interactions. Page 20 of 37 Gartner, Inc. G

21 Operations People that is, the size of the organization and the track record of key staff members. Quality and security processes. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product or Service Overall Viability Sales Execution/Pricing Market Responsiveness/Record Marketing Execution Customer Experience Operations Weighting High Medium High Medium Medium High Low Source: Gartner (June 2015) Completeness of Vision Market Understanding Understanding customer needs: Methods, the effects of the Nexus of Forces (cloud, mobile, social and information) and the IoT. The future of IDaaS and the vendor's place in the market. Also, the vendor's views on top technological, nontechnological and regulatory changes in the market. Marketing Strategy Communication and brand awareness: The clarity, differentiation and performance management of the vendor's marketing messages and campaigns. The appropriateness of the vendor's use of events, social media, other online media and traditional media as part of its marketing efforts. Sales Strategy The vendor's strategy for selling its IDaaS offerings that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates, which extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Gartner, Inc. G Page 21 of 37

22 Offering (Product) Strategy The vendor's approach to developing and delivering its IDaaS offerings, which meet customers' and prospects' needs with respect to their key selection criteria, the needs created by the Nexus of Forces and other market dynamics. Also, the vendor's ability to exploit the Nexus of Forces to improve its IDaaS products and services. The strength of the vendor's roadmap, and how the vendor will increase the competitive differentiation of its IDaaS and ancillary services. Business Model The soundness and logic of the vendor's underlying business proposition: The vendor's views of key strengths and weaknesses relative to competitors. Recent company milestones. Path chosen for future growth. Vertical/Industry Strategy Customer breadth and penetration into various industries and sizes of customer organizations. Views of industry trends and special needs. Strategy for expanding IDaaS adoption in different industries. Innovation Foundational technological and nontechnological innovations. Recent and planned innovations. Organizational culture and how it affects innovation. Geographic Strategy Global geographic reach of customer base and trends. Strategy for expanded geographic customer acquisition. Global nature of technical support and professional services, and language internationalization for administrative and user interfaces. Page 22 of 37 Gartner, Inc. G

23 Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Weighting Medium Medium Medium High Medium Low High Low Source: Gartner (June 2015) Quadrant Descriptions Leaders Leaders in the IDaaS market generally have made strong customer gains. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery. Leaders typically demonstrate solid customer satisfaction with overall IDaaS capabilities and/or related service and support. Challengers Challengers also show strong execution, and have significant sales and brand presence. However, they have not shown the Completeness of Vision for IDaaS that Leaders have. Rather, their vision and execution for technology, methodology and/or means of delivery tend to be more focused on or restricted to specific functions, platforms, geographies or services. Challengers' clients are relatively satisfied, but ask for additional functionality, more timely support and higher service levels than are currently delivered. There are no Challengers in this Magic Quadrant. Visionaries Vendors in the Visionaries quadrant provide products that meet many IDaaS client requirements, but they may not have the market penetration to execute as Leaders do. Visionaries are noted for their innovative approach to IDaaS technology, methodology and/or means of delivery. They may see IDaaS as a key part of a much broader service portfolio. They often may have unique features, and Gartner, Inc. G Page 23 of 37

24 may be focused on a specific industry or specific set of use cases. In addition, they have a strong vision for the future of the market and their place in it. Niche Players Niche Players provide IDaaS technology that is a good match for specific use cases. They may focus on specific industries or have a geographically limited footprint, but they can actually outperform many competitors. Vendors in this quadrant often have relatively fewer customers than competitors, but they may have large customers as well as a strong IDaaS feature set. Pricing might be considered too high for the value provided by some niche vendors. Inclusion in this quadrant, however, does not reflect negatively on the vendor's value in the more narrowly focused service spectrum. Niche solutions can be very effective in their areas of focus. Context Vendors rated in this Magic Quadrant come from distinctly different backgrounds. Their pedigrees vary greatly, as do their abilities to provide IAM functional depth and support for different use cases. Their aspirations for servicing customers by geography, industry and customer-size segmentation also vary. Clients are strongly cautioned not to use vendors' positions in the Magic Quadrant graphic (see Figure 1) as the sole source for determining a shortlist of vendors. Vendors were evaluated with regard to their ability to provide a general set of IAM functionalities across multiple use cases, and in multiple geographies and industries, and to do so by providing solid value for money as perceived by their customers. All vendors covered in this Magic Quadrant have succeeded in providing customers with services that meet their needs. However, client requirements particularly those for IAM functional depth, speed to implementation, geographic coverage and price are most likely to strongly affect their choices for a shortlist: 1. Clients focused on Web-architected application targets, employee-to-saas and consumerfacing needs should strongly consider Centrify, Microsoft, Okta, OneLogin, Ping Identity and Salesforce. These vendors also have experience with SMBs, even as they aspire to move upmarket to serve larger clients and have begun to do so. Currently, however, these vendors have limited IGA abilities. They tend to lack multilevel provisioning approval workflows, as well as identity governance features such as access certification, segregation of duties violation detection, or role engineering and certification. These vendors' provisioning connectors for legacy application targets also are lacking. 2. Clients that need more functional depth in IGA and legacy on-premises application targets should strongly consider CA Technologies, Covisint, Fischer International, IBM, Ilantus, Simeio Solutions and SailPoint. European clients especially may be interested in iwelcome. More of these vendors also provide dedicated hosted instances of their offerings as options. 3. Clients that need IAM served as part of a community of interest or an industry consortium should strongly consider Covisint and Exostar. These vendors have a history of providing IAM in a hub configuration that is designed to support collaboration among participants, or to serve Page 24 of 37 Gartner, Inc. G

Magic Quadrant for Identity and Access Management as a Service

Magic Quadrant for Identity and Access Management as a Service G00260221 Magic Quadrant for Identity and Access Management as a Service Published: 2 June 2014 Analyst(s): Gregg Kreizman The IDaaS market is still in its early days. Vendors come from distinctly different

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5 This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management

More information

Cloud User and Access Management

Cloud User and Access Management KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

Pick Your Identity Bridge

Pick Your Identity Bridge Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

SaaS / Managed Services Market trends and adoption challenges

SaaS / Managed Services Market trends and adoption challenges SaaS / Managed Services Market trends and adoption challenges Jason Forrest Hollis Security Asia Pacific & Japan 2013 CA All rights reserved Legal Notice Copyright 2013 CA All rights reserved All trademarks,

More information

Technology Day 2015 Xylos

Technology Day 2015 Xylos Stay in control of your identity with Azure Active Directory (Premium) Technology Day 2015 Xylos Robin Vermeirsch Sr. IT consultant CCM Azure Active Directory Introduction Competence Center Messaging (CCM)

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Ping Identity IDC MARKETSCAPE

More information

Magic Quadrant for Identity Governance and Administration

Magic Quadrant for Identity Governance and Administration G00261633 Magic Quadrant for Identity Governance and Administration Published: 12 January 2015 Analyst(s): Felix Gaehtgens, Brian Iverson, Steve Krapes The IGA market is transforming legacy, on-premises

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

Identity and Access. Management in Cloud. December 21, 2012

Identity and Access. Management in Cloud. December 21, 2012 Identity and Access Management in Cloud December 21, 2012 Agenda 1. Identity and Access Management (IAM) 2. What is Cloud 3. Operating Models 4. Risk and Challenges 5. Vendors Landscape 1 Identity and

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

Sun and Oracle: Joining Forces in Identity Management

Sun and Oracle: Joining Forces in Identity Management Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

More information

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Covisint IDC MARKETSCAPE

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

The Forrester Wave : B2E Cloud IAM, Q2 2015

The Forrester Wave : B2E Cloud IAM, Q2 2015 For: Security & Risk Professionals The Forrester Wave : B2E Cloud IAM, Q2 2015 by Andras Cser and Merritt Maxim, June 29, 2015 Key Takeaways OneLogin And Okta Lead The Pack Forrester s research uncovered

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger January 2015 by Martin Kuppinger mk@kuppingercole.com January 2015 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Cloud Computing: What IT Professionals Need to Know

Cloud Computing: What IT Professionals Need to Know Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.

More information

The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs

The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs April 2014 The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs CHANNEL ASSESSMENT Contents The Identity Management Conundrum 1 Identity & Access Management Value

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

Customer Identity and Access Management (CIAM) Buyer s Guide

Customer Identity and Access Management (CIAM) Buyer s Guide Customer Identity and Access Management (CIAM) Buyer s Guide Shifting Marketplace Over the last five years, there has been a major shift in how enterprises need to look at and secure customer identities

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Statement of Direction

Statement of Direction Microsoft Dynamics NAV Statement of Direction Product strategy and roadmap for Microsoft Dynamics NAV Date: May 2012 www.microsoft.com/dynamics/nav Page 1 CONTENTS Welcome... 3 Overview of Microsoft Dynamics

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools G00247238 Magic Quadrant for Client Management Tools Published: 9 April 2013 Analyst(s): Terrence Cosgrove The client management tool market is maturing and evolving to adapt to consumerization, desktop

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Magic Quadrant for Enterprise Content Management 18 October 2012

Magic Quadrant for Enterprise Content Management 18 October 2012 Magic Quadrant for Enterprise Content Management 18 October 2012 Uptake of ECM offerings remains strong as organizations harness content to drive key business applications. Process-centric solutions, social

More information

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0

Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0 Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0 Contents MITEL PROFESSIONAL SERVICES DELIVERY METHODOLOGY... 2 CUSTOMER NEEDS... 2 ENGAGING

More information

CA Technologies Strategy and Vision for Cloud Identity and Access Management

CA Technologies Strategy and Vision for Cloud Identity and Access Management WHITE PAPER CLOUD IDENTITY AND ACCESS MANAGEMENT CA TECHNOLOGIES STRATEGY AND VISION FEBRUARY 2013 CA Technologies Strategy and Vision for Cloud Identity and Access Management Sumner Blount Merritt Maxim

More information

Six Best Practices for Cloud-Based IAM

Six Best Practices for Cloud-Based IAM a best practices guide Six Best Practices for Cloud-Based IAM Making Identities Work Securely in the Cloud Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Executive

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

Is Your Identity Management Program Protecting Your Federal Systems?

Is Your Identity Management Program Protecting Your Federal Systems? Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to

More information

2013 North American Audio Conferencing Services Growth Leadership Award

2013 North American Audio Conferencing Services Growth Leadership Award 2013 2013 North American Audio Conferencing Services Growth Leadership Award 2013 Frost & Sullivan 1 We Accelerate Growth Growth Leadership Award Audio Conferencing Services North America, 2013 Frost &

More information

Magic Quadrant for IT Vendor Risk Management

Magic Quadrant for IT Vendor Risk Management (http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The

More information

VMware Hybrid Cloud. Accelerate Your Time to Value

VMware Hybrid Cloud. Accelerate Your Time to Value VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external

More information

Managed service provider Bell Techlogix shines its BEAM to differentiate

Managed service provider Bell Techlogix shines its BEAM to differentiate Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting

More information

Issue 2. New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS)

Issue 2. New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) Issue 2 New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) Introduction 2 Introduction 3 The Digital Identity Ecosystem 6 New Models of Authentication/ Authorization

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Cloud SSO and Federated Identity Management Solutions and Services

Cloud SSO and Federated Identity Management Solutions and Services Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity

More information

Magic Quadrant for Sales Force Automation

Magic Quadrant for Sales Force Automation Magic Quadrant for Sales Force Automation 15 July 2014 ID:G00263071 Analyst(s): Robert P. Desisto VIEW SUMMARY Sales application managers will find that improvements in the viability of SAP and Oracle

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3104619/ Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Description:

More information

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-3waysad-113012 Table

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

Azure Active Directory

Azure Active Directory Azure Active Directory Your Cloud Identity Brian Mansure Azure Specialist bmansure@enpointe.com Agenda What Azure Active Directory is What Azure Active Directory is not Hybrid Identity Features Roadmap

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

Magic Quadrant for Storage Professional and Support Services

Magic Quadrant for Storage Professional and Support Services Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and

More information

Closing the Biggest Security Hole in Web Application Delivery

Closing the Biggest Security Hole in Web Application Delivery WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security

More information

EMA Radar for Private Cloud Platforms: Q1 2013

EMA Radar for Private Cloud Platforms: Q1 2013 EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)

More information

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

OVERVIEW OF MICROSOFT AZURE

OVERVIEW OF MICROSOFT AZURE Hybrid Cloud Solution to Increase Business Value CloudLink is a hybrid cloud solution that interacts with existing onpremises ERP systems. With the hybrid approach, we can leverage the on-premises software

More information

Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution.

Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution. Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine

More information

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

a best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud

a best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud a best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud Figure 1 Cloud-based applications you might be using Identity and access

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information