Magic Quadrant for Identity and Access Management as a Service, Worldwide
|
|
- Liliana Dorsey
- 8 years ago
- Views:
Transcription
1 G Magic Quadrant for Identity and Access Management as a Service, Worldwide Published: 4 June 2015 Analyst(s): Gregg Kreizman, Neil Wynne Large vendor entrants in 2014 began to make their presence felt. Webcentric but shallow-function services are in high demand. Vendors that can deliver deeper functionality for IGA and legacy application support, including niche vendors, may be the best for your needs. Strategic Planning Assumption By 2019, 25% of IAM purchases will use the IDaaS delivery model up from less than 10% in Market Definition/Description A vendor in the identity and access management as a service (IDaaS) market delivers a predominantly cloud-based service in a multitenant or dedicated and hosted delivery model that brokers core identity governance and administration (IGA), access and intelligence functions to target systems on customers' premises and in the cloud. This Magic Quadrant rates vendors on their ability to be global, general-purpose identity and access management (IAM) service providers for multiple use cases. The vendors in this Magic Quadrant must provide some level of functionality in all of the following IAM functional areas: IGA: At a minimum, the vendor's service is able to automate synchronization (adds, changes and deletions) of identities held by the service or obtained from customers' identity repositories to target applications and other repositories. The vendor also must provide a way for customers' administrators to manage identities directly through an IDaaS administrative interface, and allow users to reset their passwords. In addition, vendors may offer deeper functionality, such as supporting identity life cycle processes, automated provisioning of accounts among heterogeneous systems, access requests (including self-service), and governance over user access to critical systems via workflows for policy enforcement, as well as for access certification processes. Additional capabilities may include role management and access certification.
2 Access: Access includes user authentication, single sign-on (SSO) and authorization enforcement. At a minimum, the vendor provides authentication and SSO to target applications using Web proxies and federation standards. Vendors also may offer ways to vault and replay passwords to get to SSO when federation standards are not supported by the applications. Most vendors offer additional authentication methods. Identity log monitoring and reporting: At a minimum, the vendor logs IGA and access events, makes the log data available to customers for their own analysis, and provides customers with a reporting capability to answer the questions, "Who has been granted access to which target systems and when?" and "Who has accessed those target systems and when?" Page 2 of 37 Gartner, Inc. G
3 Magic Quadrant Figure 1. Magic Quadrant for Identity and Access Management as a Service, Worldwide Source: Gartner (June 2015) Vendor Strengths and Cautions CA Technologies CA Technologies delivers IDaaS under its CA Secure Cloud brand. CA Secure Cloud includes Web application SSO, adaptive authentication and identity administration. The service supports user Gartner, Inc. G Page 3 of 37
4 provisioning to cloud and on-premises systems, including legacy applications. Self-service requests, approval workflows and delegated administration are all supported. The service can be delivered completely from the cloud or in a hybrid model. CA has global regional partners that deliver their own branded versions of IDaaS, underpinned by CA Secure Cloud. Strengths CA Secure Cloud provides greater functional depth for user administration than Web-centric providers. Solid delegated administration and provisioning workflows are provided. The Advanced Authentication SaaS provides adaptive authentication options. CA has a history of successfully leveraging global partners to deliver its solutions and services worldwide. CA's extensive product and service portfolio, as well as its sales and support channels, favors the company in the Overall Viability criterion. CA's portfolio of IAM software and IDaaS can be combined for complex functionality and usecase support, and CA has a broad set of user provisioning connectors to leverage for cloud and legacy application support. Cautions CA has not gained traction in the market and is resetting its strategy. Customers have demanded customized implementations, which is not a design goal for CA Secure Cloud. CA's pricing was above average for Web-centric pricing scenarios. CA Secure Cloud does not yet support password vaulting and forwarding for SSO for target systems that do not support federation standards. This feature is roadmapped. CA Secure Cloud lacks language internationalization, and the interfaces are provided in English only. Centrify Centrify's Identity Service includes Web-centric IDaaS and enterprise mobility management (EMM). The IDaaS portion of the offering provides Web application SSO using federation standards or password vaulting and forwarding, user provisioning, and reporting. The integrated mobility capabilities provide many of the features of stand-alone EMM vendors. Notable features include security configuration and enforcement, device X.509 certificate issuance and renewal, remote device location and wiping, and application containerization. Strengths The EMM features are the strongest in the IDaaS market, and Centrify has a strong relationship with Samsung. Centrify hosts Samsung's own IDaaS offering, and Centrify leverages the Page 4 of 37 Gartner, Inc. G
5 Samsung Knox containerization capability. Centrify added fingerprint biometric support for Apple and Samsung devices in Centrify added privileged account management as an IDaaS offering, and strengthened its support for on-premises applications. Centrify significantly expanded the set of applications for which it can provide user provisioning and license management. The service and on-premises proxy component can be configured to keep some or all identity data on-premises in Active Directory and not replicate it to the cloud. Cloud identity storage is optional. Reporting and analysis features for all events handled by the service are wide-ranging and customizable. Cautions Centrify does not provide business-to-consumer (B2C) or B2B IDaaS offerings. As with other Web-centric IDaaS providers, Centrify does not provide user provisioning workflow or identity governance features. The user provisioning and identity synchronization components are in the early stages of maturity. Bugs have been reported, and Centrify is addressing them with fixes. Marketing programs have been significantly bolstered in 2015; however, brand awareness in IDaaS continues to lag primary competitors. Centrify is facing increased competition from larger vendors. Covisint Covisint is the longest-standing IDaaS vendor in the market. The company may not be well-known among prospects in some industries, geographies and small businesses due to its early focus on larger enterprises. Moreover, Covisint's functionality is often "white-labeled" by its customers. Covisint got its start in the automotive industry and provided integration broker, portal and identity services to support supply chain connectivity. The company has grown those lines of business into other industries. Its work in the automotive industry and in supporting vehicle identities also has helped it build foundation services that can be used in other Internet of Things (IoT) applications. In addition, the company has a history of working through tough integration issues with demanding customers. Strengths Covisint provides strong identity assurance features, with several ID proofing vendor integrations and support for several authentication methods its own and those from third parties. Gartner, Inc. G Page 5 of 37
6 Covisint IDM includes user administration workflow abilities and capable administrative delegation, along with access certification features. The vendor provides deep identity federation and provisioning integration functions using standards and proprietary techniques. Covisint has shown leadership in support of IoT initiatives, particularly in the automotive industry, and IoT is stated as a strong focus going forward. Covisint added a data center in Germany to support customers there, and to grow its presence in the region. Covisint made its service granularly accessible through APIs; it has rearchitected the service to make it more easily implemented in public or private cloud, and to support white labeling. Cautions Although it can support employee-to-saas scenarios, Covisint's focus on large customers with enterprise B2B use cases will make it a less likely choice for small or midsize businesses (SMBs) that are seeking only employee-to-saas use-case support. The scenario pricing that Covisint provided for this research was high for most scenarios, compared with competitors. Covisint is not profitable and has had negative net income since completely separating from Compuware in Although still selling through a direct sales team, Covisint's channel partner strategy to supply its platform as a service (PaaS) to other service providers as a white-labeled service although it could be profitable for the vendor is risky because it could disintermediate Covisint from customers. Exostar Exostar entered the IDaaS market when it was formed by a community of aerospace and defense companies to support their IAM needs related to supply chain. Exostar also created a secure collaboration platform based on top of Microsoft SharePoint, and now it delivers secure , file transfer and WebEx services. The company augments its core services with identity proofing through third parties, but also provides a video "in person" identity proofing service using subjects' webcams for interviews. In addition, Exostar delivers public-key infrastructure (PKI) and one-time password (OTP) token credential management services. Exostar provides IAM that is fully cloudbased, or it can join community participants to the hub via a gateway. Exostar's target market is large companies with cross-organizational collaboration requirements. Exostar views IDaaS as a critical component of its offering, but primarily in the context of helping it to deliver its overall business collaboration capabilities. Strengths Exostar is a long-standing IDaaS vendor, and is one of the few small vendors that is profitable. Page 6 of 37 Gartner, Inc. G
7 Because of its legacy in highly secure markets, Exostar has strict audit requirements to ensure that conditions for security and industry compliance issues are met. The identity proofing capabilities also are unique in this market, and Exostar's identity services are certified by the U.S. government and the SAFE-BioPharma Association. In 2014 and early 2015, Exostar expanded its vertical industry support to the healthcare and airline industries, and within life sciences. Exostar is delivering similar sets of IAM and collaboration functionality to them, with an emphasis on these communities' needs for intellectual property protection. The company has strong customer relationships, and reference customers report that Exostar is a solid partner for implementation, as well as for incorporating customer requirements into its roadmap. Exostar has strong B2B federation and administration capabilities, and it can handle data exchanges in support of complex business agreements for its established communities. In 2014, Exostar added an entitlements management framework to enable user provisioning and the provisioning of application-specific features using customizable workflow components. Cautions The company and its offerings are not geared toward the broader general-purpose IAM market, which would focus on enterprise users' access to SaaS applications, or on consumers' inbound access to enterprises' applications as primary use cases. Rather, Exostar's target market is large companies with cross-organizational collaboration requirements. Authentication and SSO integration features are limited compared with vendors that support general-purpose SSO use cases. Password vaulting and forwarding, as well as social registration and login, are not supported. Exostar provides IDaaS functions to users in multiple geographies, but these users and their companies are predominantly using the services at the behest of Exostar's anchor tenants in aerospace and defense and in life sciences. Exostar picked up a customer in Japan, but otherwise, there is not a strong international presence for Exostar customers and data centers, nor is there broad internalization support. Fischer International Fischer International, a pure-play IAM provider, was one of the first vendors to deliver IDaaS. Fischer's capabilities are available in IDaaS, dedicated hosted, managed or on-premises software delivery models. Fischer provides functionally deep user administration and fulfillment capabilities, some governance functionality, privileged account management, and federated SSO. Strengths Reference customers rate the product and support highly. Gartner, Inc. G Page 7 of 37
8 Fischer's experience and technical capabilities enable it to support IAM functions for legacy onpremises applications in addition to SaaS applications. User administration functionality is deep, with strong connector support to a variety of directories, databases and applications, and access certification features are included. Fischer International emphasizes configuration of out-of-the-box features rather than scripting and custom development. This results in rapid deployment times relative to other deep functionality vendors. However, prospects must ensure that this type of implementation can meet their business process requirements. Fischer's scenario pricing is among the lowest, and references find that this provides solid value for the money. Cautions Despite Fischer's long tenure in the IDaaS market, its brand recognition, market penetration and overall growth have been low compared with its competitors. The focus of Fischer's marketing and sales on the U.S. geographic market and higher education vertical industry has limited the company's growth in other geographies and vertical industries. Access management is limited to SSO, without the authorization enforcement capabilities found in other IDaaS access services. Native mobile application support is not included in the product. IBM This is IBM's first year on the IDaaS Magic Quadrant. In 2014, IBM purchased Lighthouse Security Group, a vendor that delivered its IDaaS underpinned by IBM software. Lighthouse Security Group was evaluated in the 2014 "Magic Quadrant for Identity and Access Management as a Service." IBM has rebranded the offering as Cloud Identity Service, which is provided in a multitenant model. However, components of the service can be delivered in a dedicated model. With the acquisition, IBM can bring its significant resources and relationships to bear in order to advance Cloud Identity Service along with its other offerings. Strengths IBM's functional offering is deep and aligns with the functionality provided by IBM's software deployed on-premises. IBM's offering will be made deeper with the planned incorporation of the functionality obtained through the acquisition of CrossIdeas' IGA capabilities, as well as the integration of Fiberlink's MaaS360 mobile device management (MDM) capabilities. IBM's acquisition of Lighthouse Security Group and its breadth of resources should appeal to customers that are risk-averse and have concerns with smaller vendors. IBM has geographically expanded its data center locations, and IBM's support and professional services organizations are supporting Cloud Identity Service. Page 8 of 37 Gartner, Inc. G
9 The company has some very large customers and can demonstrate high scalability. Cautions Customers report that Cloud Identity Service can take significant effort to go live. This is partly due to the complex nature of projects that IBM takes on for larger customers. IBM will need to deliver a service offering that is more configurable and easy to implement, without requiring significant professional services, in order to compete down-market. While indicators point to the growth of IBM's offering, new clients have not yet translated into references. Despite pricing reductions in 2015, IBM's pricing for several use-case scenarios was among the highest. Ilantus Ilantus provides IDaaS in a dedicated hosted tenant model. The company began as an IAM system integrator, and has experience with traditional large-vendor IAM stacks. It offers four functional services: Identity Express for identity administration, Compliance Express for access governance, Sign On Express for SSO and Password Express for password management. This is Ilantus' first year on the IDaaS Magic Quadrant. Strengths Ilantus' customer references gave the vendor high marks for implementation, support and rapid deployments. Its solutions have been deployed by companies in most vertical industries, and its IGA functionality helps Ilantus support regulated industries. Ilantus' feature set and pricing are strong for the midmarket, which is its current "sweet spot" for customer acquisition. Ilantus' Sign On Express for SSO provides SSO to thick-client applications, in addition to the Web-architected applications that other vendors support. Cautions The company has low penetration in the global IDaaS market. Ilantus has been in the U.S. market as a system integrator since 2000, but has not advanced its IDaaS offerings there or in Europe. However, Ilantus has good penetration in India, and has a foothold in other Asia/Pacific countries in which English is widely spoken. Similar to other small vendors, Ilantus lacks brand recognition, so it will need to step up marketing efforts and sales channel development in order to expand more rapidly. Gartner, Inc. G Page 9 of 37
10 Ilantus demonstrates an understanding of market trends, but its roadmap plans are incremental and mostly designed to keep the service on par with current competitors' capabilities. Building IGA connectors for custom applications is time-consuming and prolongs projects, according to reference customers. Ilantus' federated access to Microsoft Office 365 SSO features lacks Microsoft's rich client support that other IDaaS vendors have. However, Sign On Express for SSO can provide this functionality for Windows clients. iwelcome Netherlands-based iwelcome provides its IDaaS in a dedicated single-tenant delivery model to allow for customization and customer branding. Its offering is heavily based on open-source software and includes authentication, SSO, federation, self-service registration, and user provisioning support for on-premises and SaaS applications. iwelcome has a specific focus on larger enterprise customers with complex requirements. Strengths iwelcome is the only established IDaaS vendor rated in this Magic Quadrant with headquarters located in continental Europe. As a result, it has an early-mover advantage in that region. iwelcome has strong capabilities in access management particularly in authentication method, federation protocol and identity repository support. iwelcome has grown a significant portion of its business by supporting B2C use cases, and owes this success to consumer-oriented features such as supporting multiple authentication methods, social registration and login, configurability of the user experience, and customer portal integration. iwelcome expanded its API support for more functions and added attribute provisioning and validation. Customers can enable or disable these capabilities through the administrative interface. During 2014 and early 2015, the company made advancements in authentication method support, and added identity intelligence features, role administration and provisioning, and System for Cross-Domain Identity Management (SCIM) support. Cautions iwelcome lacks delegated administration. It also lacks core identity governance features (such as access certification and recertification), and its provisioning approval workflow capabilities are minimal. iwelcome relies on integration with customers' established IGA toolsets. The company's overall customer base is small compared with most competitors, although the company grew the business proportionately well for its size during Page 10 of 37 Gartner, Inc. G
11 In 2014, although iwelcome began to enhance its sales resources and marketing efforts internally and through partnerships in other European countries, these efforts will need to expand rapidly in order for the vendor to stay ahead. Support resources and customer engagement will need to expand as well. Existing customers report that the platform is reliable and performs well, but that technical support could be more responsive. Microsoft This is Microsoft's first year on the IDaaS Magic Quadrant. Microsoft entered the IDaaS market in May 2014 with its business-to-employee (B2E)-focused Azure Active Directory services. There are three service levels; the Premium offering provides features that are in line with other Web-centric IDaaS providers, and includes licenses for Microsoft Identity Manager (MIM) that are to be used with customers' on-premises systems. Microsoft also offers Azure Active Directory Premium as part of its Enterprise Mobility Suite, along with Microsoft Intune and Azure Rights Management. Strengths Microsoft joined an established IDaaS market, and was able to leverage its current and substantial customer base particularly Office 365 customers to add Azure Active Directory to contracts. The company has broad and deep marketing, sales and support capabilities. Microsoft already has demonstrated high scalability with Azure Active Directory. The service underpins other Microsoft Azure services. Microsoft has a strong international presence for its service offerings, and continues to expand its infrastructure as a service (IaaS) presence worldwide. The company is able to leverage data sources and machine learning to support intelligence functions, such as identifying known bad IP addresses and devices to help prevent fraudulent activity. Microsoft's strategy demonstrates a strong understanding of technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward. Cautions Microsoft does not yet provide a B2C IDaaS offering. It is planned for Microsoft's on-premises "bridge" components are Active Directory Federation Services and Azure Active Directory Sync. Customers must implement and manage these two components on their own. Microsoft's Azure AD Connect (similar to other IDaaS vendors' approaches), which will combine these functions, is now in preview. While Azure Active Directory Premium includes access licenses for MIM, customers are responsible for managing that implementation themselves, or with the help of third parties. Gartner, Inc. G Page 11 of 37
12 Microsoft can provide user provisioning to some cloud apps; however, Web-centric competitors have a lead in terms of the number of apps they can provision to, as well as the depth of SaaS fulfillment that supports the provisioning of roles, groups and other attributes. Microsoft can provide provisioning and SSO for enterprise users to social media sites, and has APIs and software development kits (SDKs) for social media support; however, the service does not yet provide packaged social registration and sign-on to Azure Active Directory or target systems. Okta Okta's IDaaS offering is delivered multitenant, with lightweight on-premises components for repository and target system connectors. IDaaS is Okta's core business. Okta delivers basic identity administration and provisioning capabilities, access management for Web-architected applications using federation or password vaulting and forwarding, and reporting. Okta also provides phone-asa-token authentication capabilities. Okta added Mobility Management in Strengths The company's marketing and sales strategies have been effective, as demonstrated by brand recognition and an increased volume of customers. Okta's customer base grew significantly in 2014 and early Okta's continued investment in its API set has led to the delivery of Okta Identity Platform for developers to support integrations with customers' applications and workflows. Gartner again received numerous references, and has confirmed predominantly positive experiences. Okta's investments in mobility management have begun to bear fruit; customers are beginning to use the fundamental MDM functionality integrated with IDaaS to support functions such as mobile SSO, device access policies and device PIN reset. Okta has maintained high, if not perfect, availability. Cautions Okta can synchronize identities from enterprise directories, and has added delegated administration functionality; however, the vendor does not have user provisioning approval workflow beyond one level, nor does it have identity governance features. Okta's canned and custom reporting capabilities are limited. Okta does not yet support the use of social identities for registration and logon. These capabilities were in beta test at the time of publication. Okta's current customer base is predominantly located in the U.S., as are its data centers, but Okta has invested in European and Asia/Pacific expansion in terms of sales and data center location strategies. Okta is facing increased competition from larger vendors. Page 12 of 37 Gartner, Inc. G
13 OneLogin OneLogin's service architecture is multitenant, and lightweight integration components are used for on-premises connections. IDaaS is OneLogin's core business. OneLogin also markets a federated search capability that allows customers to search for content across connected applications, and for these users to be authenticated automatically when search results are returned and selected. Strengths OneLogin significantly expanded its customer base in 2014 and early 2015, and has some large customers. OneLogin has taken a standards-based approach to native mobile application integration, and is one of the vendors that champions the OpenID Native Applications Working Group (NAPPS) specifications. OneLogin has started improving its global sales by expanding its sales organization and developing its channel partnerships. OneLogin secured a third round of venture funding that will help it expand. References were mostly solid, and appreciated the support they received from OneLogin. Cautions OneLogin faces increased competition from larger competitors. OneLogin lacks its own deep user administration and provisioning and identity governance functionalities. OneLogin had some issues with service availability in However, it handled those issues well with customers and is improving the resilience of its service. OneLogin maintains a singular focus on IDaaS, but has not developed a strategy for other product offerings. This could make it difficult to compete against vendors with broader offerings. Ping Identity The PingOne service is a multitenant Web-centric offering. Ping Identity provides a lightweight selfservice bridge component to integrate a customer's Active Directory to the service, and also uses the well-established PingFederate product as the on-premises bridge component for customers when broad protocol and directory support are needed. In addition, PingAccess can be deployed to support proxy access to internal Web applications and APIs. PingID is offered to provide phone-asa-token authentication methods. Gartner, Inc. G Page 13 of 37
14 Strengths By leveraging the PingFederate technology for the bridge component, Ping can provide SSO by integrating with a variety of identity repositories, existing customer access management systems and target application systems. Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support, via its many service provider customers. Ping Identity has shown strong leadership in identity standards development, as well as openness in working with customers and competitors to evolve the standards. Ping Identity has broad vertical and geographic market penetration through its value-added reseller (VAR) and system integrator partner networks; also, it has made inroads with managed service providers that can offer PingOne functionality. Cautions PingOne is one of the services with strong access features, but very lightweight IGA capabilities. User self-service access request, provisioning workflow and most identity governance features are missing. PingOne has lagged its primary competitors in brand recognition and customer adoption. Ping Identity's reporting capabilities are weak compared with its competitors. Language internationalization features for the administrative and user interfaces are lacking relative to competitors; however, they are improving, with versions becoming available for Ping Identity's target markets later in SailPoint SailPoint IdentityNow was developed predominantly in-house, and features access request and provisioning, access certification, password management, and SSO service elements. The architecture is multitenant and can deliver services completely in the cloud, or it can be bridged to enterprise environments to support on-premises applications. Strengths SailPoint's legacy of providing strong on-premises IGA has helped it deliver a subset of the functionality from the IdentityIQ product in IdentityNow. The more full-featured IdentityIQ can be delivered as a hosted managed service through partners as an alternative. This helps SailPoint strongly support employee-facing use cases. SailPoint's full complement of provisioning connectors provides fulfillment capabilities to a wide variety of identity repositories and target systems, and significant product updates have been made to the password management functionality. SailPoint provides SSO options that include federated SSO and password vaulting and forwarding. Page 14 of 37 Gartner, Inc. G
15 SailPoint has a broad geographic presence for sales and support as a foundation for selling its IDaaS, and it has added data centers in Europe and Sydney, with other Asia/Pacific data centers roadmapped for The company is profitable, and Thoma Bravo became a majority owner in SailPoint, thereby bringing additional resources to the vendor. Cautions SailPoint's IDaaS market share is growing, but still small. IdentityNow does not support social identity use cases. IdentityNow is limited in its ability to support delegated administration for B2B use cases, but this feature is roadmapped for SailPoint has strong VAR and system integration partner sets, but it is just beginning to leverage them for IDaaS market penetration. Salesforce Salesforce provides Salesforce Identity as part of its Salesforce PaaS. It sells Identity as an independent service offering, but also includes Identity for established Salesforce customers. Identity Connect is Salesforce's on-premises bridge component that is sold separately. The service includes the baseline functionality required for inclusion, as well as social registration and login, federation gateway functionality, and deep access request and user provisioning workflow functionality. Strengths Salesforce is able to place commoditization pressure on the market by including IDaaS functionality in its core offering, thereby providing incentives to keep its substantial customer base from being drawn to alternatives. Salesforce Identity takes advantage of the deep access request and approval workflow functionality inherent in the Salesforce platform. Salesforce's strategy demonstrates a strong understanding of technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward. Salesforce Identity has strong social media and identity standards support. Cautions Salesforce does not support password vaulting and forwarding capabilities for SSO. Salesforce Identity does not provide proxy-based access to on-premises Web applications. Gartner, Inc. G Page 15 of 37
16 The bridge component of Salesforce Identity does not provide the ability to synchronize cloud directory changes to enterprise directories. Professional services are needed to deliver this functionality. Despite Salesforce's considerable PaaS market presence and recent awareness campaigns, Salesforce Identity's brand is not yet well-known in the market. The service is in its second year of availability. Simeio Solutions Simeio Solutions provides a mixture of dedicated hosted and on-premises managed service offerings. Its services are underpinned by products from other well-established IAM software vendors, which allows Simeio to provide Web access management (WAM), identity administration, access request, role and compliance, privileged account management, data loss prevention, risk intelligence, IT governance, risk and compliance services, and directory services. Strengths Simeio's use of major IAM stack vendors' technologies provides it with an arsenal of products that delivers deep functional support for Web and legacy applications. The same vendor partnerships provide referrals to Simeio for customer acquisitions. Simeio also became Dell's exclusive as-a-service provider for Dell's IAM offerings. Simeio's Identity Intelligence Center provides actionable insight into patterns of usage among users that may exist across multiple vendor identity sources and other security systems. Simeio's history as an integrator has given it the experience to help customers plan, design and integrate their IDaaS offerings. A significant portion of Simeio's staff serves in professional services roles. Simeio continues to enhance its administration and user interfaces as abstraction layers among the multiple underpinning vendors' technologies to help with consistency and time to value with implementations. Simeio's service-based roots have enabled it to have a positive cash flow since its inception. A recently announced private equity investment should allow Simeio to further accelerate its growth. Simeio has a good spread in its vertical industry and geographic representation; references highlighted Simeio as a good partner and rated it highly overall. Cautions Simeio's organization and its overall customer base grew in 2014 and early 2015, but not as rapidly as we would have expected, given its relationship with Dell. Simeio's use of OEM software requires the incorporation of these third-party vendors' software licensing costs in its offerings. This tends to make Simeio's pricing high, even for pure Web application use cases. Page 16 of 37 Gartner, Inc. G
17 Simeio is still relatively unknown in the IDaaS marketplace, but is slowly building its customer base and brand awareness, thanks to vendor partners, some of which are also competitors. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Added Microsoft, Ilantus and Salesforce were added to the Magic Quadrant this year. Also, IBM was added because it acquired Lighthouse Security Group. Dropped Symplified's intellectual property and some of its people were acquired by RSA, The Security Division of EMC; therefore, Symplified was dropped from the Magic Quadrant. RSA has just announced its Via offering, which leverages Symplified's technology, but RSA did not meet customer and revenue inclusion criteria for this Magic Quadrant. In addition, Lighthouse Security Group was dropped because it was acquired by IBM. Other Vendors of Note There has been some Gartner client interest in two vendors that specialize in social identity integration: Gigya and Janrain. However, neither one met the IAM functional inclusion criteria for this Magic Quadrant, notably in the IGA functional areas. Pirean and Wipro did not meet the financial or market penetration criteria for this Magic Quadrant. However, these vendors have functionally deep IAM offerings, and also have international headquarters, which may help them to be considered as alternatives to U.S.-based companies. Bitium offers a Web-centric IDaaS, but it did not meet the revenue criteria for inclusion in this Magic Quadrant. Intermedia offers AppID, but it did not meet the customer and revenue criteria for inclusion in this Magic Quadrant. Gartner, Inc. G Page 17 of 37
18 Inclusion and Exclusion Criteria The vendor must provide a minimum level of functionality in all the IAM functional areas outlined in the Market Definition/Description section. Vendors that deliver only one or two of these core IAM functions as a service, such as authentication only, were not covered as part of this research. The following additional inclusion criteria were used. Longevity of offering: Each IDaaS offering has been generally available since at least 31 December 2014 and is in use in multiple customer production environments. Origination of offering: The offering is manufactured and operated by the vendor, or is a significantly modified version obtained through an OEM relationship. (We discount any service offering that has merely been obtained without significant functional modification through a licensing agreement from another vendor for example, as part of a reseller/partner or serviceprovider agreement.) Number of customers and end users (including customers of third-party service providers and their end users): As of 31 December 2014, the vendor had: More than 20 different active customer organizations using its IDaaS offerings in a production environment. Revenue attributed to fees for IDaaS service usage that was greater than $4 million for the year ending 31 December Verifiability: Customer references must be available. Evaluation Criteria Ability to Execute Product or Service The service's overall architecture, with emphasis on the service's global availability and resiliency features, and its flexibility to support on-premises identity repositories and cloud-only implementations. The level of support and expertise required by customers to help maintain the components. The extent to which a service's functions are exposed via APIs for customers' system integration. Security and privacy: The physical and logical controls implemented by the vendor and any underpinning IaaS provider; security for on-premises bridge components and connections between the bridge and the IDaaS; controls for data security, particularly regarding personal information; and vendors' third-party certifications received for the services. Page 18 of 37 Gartner, Inc. G
19 The variety of on-premises identity repositories that can be supported, and the quality of integration with same. The depth and breadth of IGA functionality: Access request. Access approval workflow depth and functionality. Access certification. Attribute discovery and administration. Administrative access enforcement for example, to identify, alert and prevent inappropriate access. Provisioning create, read, update, delete (CRUD) user identities and entitlements to target systems. Configuring target system connectors. The depth and breadth of access functionality: User authentication methods supported. Breadth of SSO support for target systems. Federation standards. Support for mobile endpoints and native mobile application integration. Authorization enforcement. The depth and breadth of identity monitoring and reporting: Canned reporting. Customized reporting. Data export to on-premises systems. Analytics. Integration with Microsoft Office 365, Microsoft SharePoint, customers' on-premises VPNs and WAM systems. Deployment requirements, such as speed of proof of concept and deployment, customer staffing requirements, and factors that add complexity and may affect speed to deployment and staffing. Overall Viability Overall financial health. Gartner, Inc. G Page 19 of 37
20 Success in the IDaaS market in terms of the number and size of customer implementations. This aspect is heavily weighted. The vendor's likely continued presence in the IDaaS market. Sales Execution/Pricing The vendor's capabilities in such areas as deal management and presales support, and the overall effectiveness of the sales channel, including VARs and integrators. The vendor's track record in competitive wins and business retention. Pricing over a number of different scenarios. This aspect is heavily weighted. Market Responsiveness/Record The vendor's demonstrated ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act and market dynamics change. How the vendor can meet customers' evolving IDaaS needs over a variety of use cases. How the vendor has embraced standards initiatives in the IDaaS and adjacent market segments, and responded to relevant regulation and legislation. Marketing Execution The clarity, quality, creativity and efficacy of programs designed to deliver the vendor's message in order to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This mind share can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. For example: Marketing activities and messaging. Visibility in the press, social media and other outlets. Vendor's appearance in vendor selection exercises, based on Gartner-client interactions. Brand depth and equity. Customer Experience Customer relationship and services. Customer satisfaction program. Customer references: This evaluation subcriterion was weighted heavily and included input from vendor-supplied references, as well as unsolicited feedback from Gartner-client interactions. Page 20 of 37 Gartner, Inc. G
21 Operations People that is, the size of the organization and the track record of key staff members. Quality and security processes. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product or Service Overall Viability Sales Execution/Pricing Market Responsiveness/Record Marketing Execution Customer Experience Operations Weighting High Medium High Medium Medium High Low Source: Gartner (June 2015) Completeness of Vision Market Understanding Understanding customer needs: Methods, the effects of the Nexus of Forces (cloud, mobile, social and information) and the IoT. The future of IDaaS and the vendor's place in the market. Also, the vendor's views on top technological, nontechnological and regulatory changes in the market. Marketing Strategy Communication and brand awareness: The clarity, differentiation and performance management of the vendor's marketing messages and campaigns. The appropriateness of the vendor's use of events, social media, other online media and traditional media as part of its marketing efforts. Sales Strategy The vendor's strategy for selling its IDaaS offerings that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates, which extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Gartner, Inc. G Page 21 of 37
22 Offering (Product) Strategy The vendor's approach to developing and delivering its IDaaS offerings, which meet customers' and prospects' needs with respect to their key selection criteria, the needs created by the Nexus of Forces and other market dynamics. Also, the vendor's ability to exploit the Nexus of Forces to improve its IDaaS products and services. The strength of the vendor's roadmap, and how the vendor will increase the competitive differentiation of its IDaaS and ancillary services. Business Model The soundness and logic of the vendor's underlying business proposition: The vendor's views of key strengths and weaknesses relative to competitors. Recent company milestones. Path chosen for future growth. Vertical/Industry Strategy Customer breadth and penetration into various industries and sizes of customer organizations. Views of industry trends and special needs. Strategy for expanding IDaaS adoption in different industries. Innovation Foundational technological and nontechnological innovations. Recent and planned innovations. Organizational culture and how it affects innovation. Geographic Strategy Global geographic reach of customer base and trends. Strategy for expanded geographic customer acquisition. Global nature of technical support and professional services, and language internationalization for administrative and user interfaces. Page 22 of 37 Gartner, Inc. G
23 Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Weighting Medium Medium Medium High Medium Low High Low Source: Gartner (June 2015) Quadrant Descriptions Leaders Leaders in the IDaaS market generally have made strong customer gains. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery. Leaders typically demonstrate solid customer satisfaction with overall IDaaS capabilities and/or related service and support. Challengers Challengers also show strong execution, and have significant sales and brand presence. However, they have not shown the Completeness of Vision for IDaaS that Leaders have. Rather, their vision and execution for technology, methodology and/or means of delivery tend to be more focused on or restricted to specific functions, platforms, geographies or services. Challengers' clients are relatively satisfied, but ask for additional functionality, more timely support and higher service levels than are currently delivered. There are no Challengers in this Magic Quadrant. Visionaries Vendors in the Visionaries quadrant provide products that meet many IDaaS client requirements, but they may not have the market penetration to execute as Leaders do. Visionaries are noted for their innovative approach to IDaaS technology, methodology and/or means of delivery. They may see IDaaS as a key part of a much broader service portfolio. They often may have unique features, and Gartner, Inc. G Page 23 of 37
24 may be focused on a specific industry or specific set of use cases. In addition, they have a strong vision for the future of the market and their place in it. Niche Players Niche Players provide IDaaS technology that is a good match for specific use cases. They may focus on specific industries or have a geographically limited footprint, but they can actually outperform many competitors. Vendors in this quadrant often have relatively fewer customers than competitors, but they may have large customers as well as a strong IDaaS feature set. Pricing might be considered too high for the value provided by some niche vendors. Inclusion in this quadrant, however, does not reflect negatively on the vendor's value in the more narrowly focused service spectrum. Niche solutions can be very effective in their areas of focus. Context Vendors rated in this Magic Quadrant come from distinctly different backgrounds. Their pedigrees vary greatly, as do their abilities to provide IAM functional depth and support for different use cases. Their aspirations for servicing customers by geography, industry and customer-size segmentation also vary. Clients are strongly cautioned not to use vendors' positions in the Magic Quadrant graphic (see Figure 1) as the sole source for determining a shortlist of vendors. Vendors were evaluated with regard to their ability to provide a general set of IAM functionalities across multiple use cases, and in multiple geographies and industries, and to do so by providing solid value for money as perceived by their customers. All vendors covered in this Magic Quadrant have succeeded in providing customers with services that meet their needs. However, client requirements particularly those for IAM functional depth, speed to implementation, geographic coverage and price are most likely to strongly affect their choices for a shortlist: 1. Clients focused on Web-architected application targets, employee-to-saas and consumerfacing needs should strongly consider Centrify, Microsoft, Okta, OneLogin, Ping Identity and Salesforce. These vendors also have experience with SMBs, even as they aspire to move upmarket to serve larger clients and have begun to do so. Currently, however, these vendors have limited IGA abilities. They tend to lack multilevel provisioning approval workflows, as well as identity governance features such as access certification, segregation of duties violation detection, or role engineering and certification. These vendors' provisioning connectors for legacy application targets also are lacking. 2. Clients that need more functional depth in IGA and legacy on-premises application targets should strongly consider CA Technologies, Covisint, Fischer International, IBM, Ilantus, Simeio Solutions and SailPoint. European clients especially may be interested in iwelcome. More of these vendors also provide dedicated hosted instances of their offerings as options. 3. Clients that need IAM served as part of a community of interest or an industry consortium should strongly consider Covisint and Exostar. These vendors have a history of providing IAM in a hub configuration that is designed to support collaboration among participants, or to serve Page 24 of 37 Gartner, Inc. G
Magic Quadrant for Identity and Access Management as a Service
G00260221 Magic Quadrant for Identity and Access Management as a Service Published: 2 June 2014 Analyst(s): Gregg Kreizman The IDaaS market is still in its early days. Vendors come from distinctly different
More informationMagic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
More informationAbility to Execute. What You Need to Know
1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact
More informationCase Study & POC & Demos Information
Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,
More informationConnecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5
This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management
More informationCloud User and Access Management
KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationMagic Quadrant for Client Management Tools
Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged
More informationExtend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
More informationPick Your Identity Bridge
Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management
More informationKeynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson
Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationUnlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
More informationSaaS / Managed Services Market trends and adoption challenges
SaaS / Managed Services Market trends and adoption challenges Jason Forrest Hollis Security Asia Pacific & Japan 2013 CA All rights reserved Legal Notice Copyright 2013 CA All rights reserved All trademarks,
More informationTechnology Day 2015 Xylos
Stay in control of your identity with Azure Active Directory (Premium) Technology Day 2015 Xylos Robin Vermeirsch Sr. IT consultant CCM Azure Active Directory Introduction Competence Center Messaging (CCM)
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationIDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment
IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Ping Identity IDC MARKETSCAPE
More informationMagic Quadrant for Identity Governance and Administration
G00261633 Magic Quadrant for Identity Governance and Administration Published: 12 January 2015 Analyst(s): Felix Gaehtgens, Brian Iverson, Steve Krapes The IGA market is transforming legacy, on-premises
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationIdentity and Access. Management in Cloud. December 21, 2012
Identity and Access Management in Cloud December 21, 2012 Agenda 1. Identity and Access Management (IAM) 2. What is Cloud 3. Operating Models 4. Risk and Challenges 5. Vendors Landscape 1 Identity and
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationRealizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationIDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment
IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Covisint IDC MARKETSCAPE
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationThe Forrester Wave : B2E Cloud IAM, Q2 2015
For: Security & Risk Professionals The Forrester Wave : B2E Cloud IAM, Q2 2015 by Andras Cser and Merritt Maxim, June 29, 2015 Key Takeaways OneLogin And Okta Lead The Pack Forrester s research uncovered
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationEnterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report
More informationAuthentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
More informationEXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported
More informationMagic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
More informationEXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger January 2015 by Martin Kuppinger mk@kuppingercole.com January 2015 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationMagic Quadrant for CRM Service Providers, North
Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationCloud Computing: What IT Professionals Need to Know
Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.
More informationThe Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs
April 2014 The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs CHANNEL ASSESSMENT Contents The Identity Management Conundrum 1 Identity & Access Management Value
More informationWIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
More informationCustomer Identity and Access Management (CIAM) Buyer s Guide
Customer Identity and Access Management (CIAM) Buyer s Guide Shifting Marketplace Over the last five years, there has been a major shift in how enterprises need to look at and secure customer identities
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationCloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document
Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationStatement of Direction
Microsoft Dynamics NAV Statement of Direction Product strategy and roadmap for Microsoft Dynamics NAV Date: May 2012 www.microsoft.com/dynamics/nav Page 1 CONTENTS Welcome... 3 Overview of Microsoft Dynamics
More informationMagic Quadrant for Client Management Tools
G00247238 Magic Quadrant for Client Management Tools Published: 9 April 2013 Analyst(s): Terrence Cosgrove The client management tool market is maturing and evolving to adapt to consumerization, desktop
More informationThe 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
More informationMagic Quadrant for Enterprise Content Management 18 October 2012
Magic Quadrant for Enterprise Content Management 18 October 2012 Uptake of ECM offerings remains strong as organizations harness content to drive key business applications. Process-centric solutions, social
More informationIdentity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services
Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
More informationHow to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment
WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationMitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0
Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0 Contents MITEL PROFESSIONAL SERVICES DELIVERY METHODOLOGY... 2 CUSTOMER NEEDS... 2 ENGAGING
More informationCA Technologies Strategy and Vision for Cloud Identity and Access Management
WHITE PAPER CLOUD IDENTITY AND ACCESS MANAGEMENT CA TECHNOLOGIES STRATEGY AND VISION FEBRUARY 2013 CA Technologies Strategy and Vision for Cloud Identity and Access Management Sumner Blount Merritt Maxim
More informationSix Best Practices for Cloud-Based IAM
a best practices guide Six Best Practices for Cloud-Based IAM Making Identities Work Securely in the Cloud Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Executive
More informationIdentity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationIs Your Identity Management Program Protecting Your Federal Systems?
Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to
More information2013 North American Audio Conferencing Services Growth Leadership Award
2013 2013 North American Audio Conferencing Services Growth Leadership Award 2013 Frost & Sullivan 1 We Accelerate Growth Growth Leadership Award Audio Conferencing Services North America, 2013 Frost &
More informationMagic Quadrant for IT Vendor Risk Management
(http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The
More informationVMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
More informationManaged service provider Bell Techlogix shines its BEAM to differentiate
Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting
More informationIssue 2. New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS)
Issue 2 New Paradigms of Digital Identity: Authentication and Authorization as a Service (AuthaaS) Introduction 2 Introduction 3 The Digital Identity Ecosystem 6 New Models of Authentication/ Authorization
More informationWhite Pages Managed Service Solution Rapid Global Directory Implementation. White Paper
White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationCloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
More informationMagic Quadrant for Sales Force Automation
Magic Quadrant for Sales Force Automation 15 July 2014 ID:G00263071 Analyst(s): Robert P. Desisto VIEW SUMMARY Sales application managers will find that improvements in the viability of SAP and Oracle
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationThe Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
More informationIdentity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019
Brochure More information from http://www.researchandmarkets.com/reports/3104619/ Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Description:
More informationThree Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-3waysad-113012 Table
More information2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance
More informationWhite. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationTrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
More informationAzure Active Directory
Azure Active Directory Your Cloud Identity Brian Mansure Azure Specialist bmansure@enpointe.com Agenda What Azure Active Directory is What Azure Active Directory is not Hybrid Identity Features Roadmap
More information2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
More informationMagic Quadrant for Storage Professional and Support Services
Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and
More informationClosing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
More informationEMA Radar for Private Cloud Platforms: Q1 2013
EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)
More informationTRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
More informationGlinda Cummings World Wide Tivoli Security Product Manager
Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!
More informationOVERVIEW OF MICROSOFT AZURE
Hybrid Cloud Solution to Increase Business Value CloudLink is a hybrid cloud solution that interacts with existing onpremises ERP systems. With the hybrid approach, we can leverage the on-premises software
More informationVendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution.
Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine
More informationWhite Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services
World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationa best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud
a best practices guide Six Best Practices for Cloud-Based Identity Management Services Making Identities Work Securely in the Cloud Figure 1 Cloud-based applications you might be using Identity and access
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More information