Access Management and Federation

Size: px
Start display at page:

Download "Access Management and Federation"

Transcription

1 KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger September 2013 Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market. by Martin Kuppinger September 2013 Leadership Compass Access Management & Federation By KuppingerCole

2 Content 1 Management Summary Methodology Product Rating Vendor Rating Vendor Coverage Market Segment Specific features analyzed Market Leaders Product Leaders Innovation Leaders Product Evaluation ForgeRock OpenAM Products at a glance The Market/Product Matrix The Product/Innovation Matrix The Innovation/Market Matrix Federation leaders vs. Access Management leaders The Identity Federation/Product Matrix The Web Access Management/Product Matrix Overall Leadership the combined view Cloud-based offerings Vendors and Market Segments to watch Copyright Page 2 of 30

3 Content Tables Table 13: ForgeRock OpenAM major strengths and weaknesses Table 14: ForgeRock OpenAM rating Table 27: Comparative overview of the ratings for the product capabilities Table 28: Comparative overview of the ratings for vendors Content Figures Fig. 1: The Computing Troika Fig. 2: Supporting the Extended Enterprise helps organizations addressing major business challenges Fig. 3: Dealing with all types of user populations will require both federation and locally managed user accounts Fig. 4: Federation and Web Access Management Fig. 5: Market leaders in the market segment Fig. 6: Product leaders in the Access Management/Federation market segment Fig. 7: Innovation leaders in the Access Management/Federation market segment Fig. 8: The Market/Product Matrix Fig. 9: The Product/Innovation Matrix Fig. 10: The Innovation/Market Matrix Fig. 11: The Identity Federation/Product Matrix Fig. 12: The Web Access Management/Product Matrix Fig. 13: The Overall Leadership rating for the market segment Related Research: Scenario: The Future of Authentication August 2012 Product Report: Evidian Identity & Access Manager October 2011 Vendor Report: NetIQ the complete portfolio October 2012 Leadership Compass: Identity Provisioning October 2012 Leadership Compass: Access Governance March 2013 Page 3 of 30

4 1 Management Summary With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended Enterprise. While Web Access Management technologies are well established and Identity Federation has also been around for years, we have observed a tremendous growth in interest and adoption of these technologies recently. Customers and specifically their business departments are requesting solutions. IT has to react and create a standard infrastructure for dealing with all the different requirements of communication and collaboration in the Extended Enterprise. In consequence, Access Management and Federation are moving from tactical IT challenges towards strategic infrastructure elements that enable business agility. There are a number of vendors in that market segment. Most of them provide solutions for both Web Access Management and Identity Federation. The major players in that market segment are covered within this. This Leadership Compass provides an overview and analysis of the Web Access Management and Identity Federation market segment, sometimes referred to as Access Management/Federation. Technologies typically support both Web Access Management as a gateway approach, sitting in front of standard applications and doing authentication and authorization for backend applications, and Identity Federation. Identity Federation is strategically the more important concept; however support of existing applications frequently favors the use of traditional Web Access Management. In addition, some Access Management solutions add features such as self-registration of users. Overall, the breadth of functionality is growing rapidly. Support for social logins such as Facebook or Google+, standard support for established Cloud Service Providers, and the support for new federation and related standards such as OAuth 2.0 or OpenID Connect are just some of the examples for new features found in products. The entire market segment is still evolving rapidly and we expect to see more changes within the next few years. However, given the surging demand of businesses, organizations now have to start with implementing a standard infrastructure for. This KuppingerCole Leadership Compass provides an overview of the leading vendors in that market segment. Besides the established vendors providing complete IAM (Identity and Access Management) product portfolios, there are some smaller vendors with interesting offerings and also specialists purely focusing on that part of the IAM market. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit for a particular customer and his requirements. However, this Leadership Compass will help identifying those vendors customers should look at more closely. Page 4 of 30

5 2 Methodology KuppingerCole s Leadership Compass is a tool that provides an overview of a particular IT market segment and identifies the leader in that market segment. It is the compass that assists you in identifying the vendors and products in a particular market segment which you should consider for product decisions. It should be noted that it is inadequate to pick vendors based only on the information provided within this report. Customers must always define their specific requirements and analyze in greater detail what they need. This report does not provide any recommendations for picking a vendor for a specific customer scenario. This can be done only based on a more thorough and comprehensive analysis of customer requirements and a more detailed mapping of these requirements to product features, i.e. a complete assessment. We look at four types of leaders: Product Leaders: Product Leaders identify the leading-edge products in the particular market segment. These products deliver to a large extent what we expect from products in that market segment. They are mature. Market Leaders: Market Leaders are vendors which have a large, global customer base and a strong partner network to support their customers. A lack of global presence or breadth of partners can prevent a vendor from becoming a Market Leader. Innovation Leaders: Innovation Leaders are those vendors which are driving innovation in the particular market segment. They provide several of the most innovative and upcoming features we hope to see in the particular market segment. Overall Leaders: Overall Leaders are identified based on a combined rating, looking at the strength of products, the market presence, and the innovation of vendors. Overall Leaders might have slight weaknesses in some areas but become an Overall Leader by being above average in most areas. For every area, we distinguish between three levels of products: Leaders: This identifies the leaders as defined above. Leaders are products which are exceptionally strong in particular areas. Challengers: This level identifies products which are not yet leaders but have specific strengths which might make them leaders. Typically these products are also mature and might be leading-edge when looking at specific use cases and customer requirements. Followers: This group contains products which lag behind in some areas, such as a limited feature set or only a regional presence. The best of these products might have specific strengths, making them a good or even best choice for specific use cases and customer requirements but are of limited value in other situations. Page 5 of 30

6 In addition, we have defined a series of matrixes which Compare ratings, for example the rating for innovation against the one for the overall product capabilities, thus identifying highly innovative vendors which are taking a slightly different path than established vendors, but also established vendors which no longer lead in innovation. These additional matrixes provide additional viewpoints on the vendors and should be considered when picking vendors for RfIs (Request for Information), long lists, etc. in the vendor/product selection process. add additional views by comparing the product rating to other feature areas. This is important because not all customers need the same product features, depending on their current situation and specific requirements. Based on these additional matrixes, customers can evaluate which vendor fits best to their current needs but is also promising regarding its overall capabilities. The latter is important given that a product typically not only should address a pressing challenge but become a sustainable solution. It is about helping now and being good enough for the next steps and future requirements. Here these additional matrixes come into play. Thus, the provides a multi-dimensional view on vendors and their products. Our rating is based on a broad range of input and a long experience in that market segment. Input consists of experience from KuppingerCole advisory projects, feedback from customers using the products, product documentation, a questionnaire sent out before creating the KuppingerCole Leadership Compass, and other sources. 3 Product Rating KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Leadership Compass Reports, KuppingerCole Product Reports, and KuppingerCole Vendor Reports. KuppingerCole uses a standardized rating to provide a quick overview on our perception of the products or vendors. Providing a quick overview of the KuppingerCole rating of products requires an approach combining clarity, accuracy, and completeness of information at a glance. KuppingerCole uses the following categories to rate products: Security Functionality Integration Interoperability Usability Security security is measured by the degree of security within the product. Information Security is a key element and requirement in the KuppingerCole IT Model (#70129 Scenario Understanding IT Service and Security Management). Thus, providing a mature approach to security and having a well-defined internal security concept are key factors when evaluating products. Shortcomings such as having no or only a very coarse-grained, internal authorization concept are understood as weaknesses in security. Page 6 of 30

7 Known security vulnerabilities and hacks are also understood as weaknesses. The rating then is based on the severity of such issues and the way a vendor deals with them. Functionality this is measured in relation to three factors. One is what the vendor promises to deliver. The second is the state of the industry. The third factor is what KuppingerCole would expect the industry to deliver to meet customer requirements. In mature market segments, the state of the industry and KuppingerCole expectations usually are virtually the same. In emerging markets they might differ significantly, with no single vendor meeting the expectations of KuppingerCole, thus leading to relatively low ratings for all products in that market segment. Not providing what customers can expect on average from vendors in a market segment usually leads to a degradation of the rating, unless the product provides other features or uses another approach which appears to provide customer benefits. Integration integration is measured by the degree in which the vendor has integrated the individual technologies or products in the portfolio. Thus, when we use the term integration, we are referring to the extent in which products interoperate with themselves. This detail can be uncovered by looking at what an administrator is required to do in the deployment, operation, management and discontinuation of the product. The degree of integration is then directly related to how much overhead this process requires. For example: if each product maintains its own set of names and passwords for every person involved, it is not well integrated. And if products use different databases or different administration tools with inconsistent user interfaces, they are not well integrated. On the other hand, if a single name and password can allow the admin to deal with all aspects of the product suite, then a better level of integration has been achieved. Interoperability interoperability also can have many meanings. We use the term interoperability to refer to the ability of a product to work with other vendors products, standards, or technologies. In this context it means the degree to which the vendor has integrated the individual products or technologies with other products or standards that are important outside of the product family. Extensibility is part of this and measured by the degree to which a vendor allows its technologies and products to be extended for the purposes of its constituents. We think Extensibility is so important that it is given equal status so as to insure its importance and understanding by both the vendor and the customer. As we move forward, just providing good documentation is inadequate. We are moving to an era when acceptable extensibility will require programmatic access through a well-documented and secure set of APIs. Refer to the Open API Economy Document (#70352 Advisory Note: The Open API Economy) for more information about the nature and state of extensibility and interoperability. Usability accessibility refers to the degree in which the vendor enables the accessibility to its technologies and products to its constituencies. This typically addresses two aspects of usability the end user view and the administrator view. Sometimes just good documentation can create adequate accessibility. However, overall we have strong expectations regarding well integrated user interfaces and a high degree of consistency across user interfaces of a product or different products of a vendor. We also expect vendors to follow common, established approaches to user interface design. Page 7 of 30

8 We focus on security, functionality, integration, interoperability, and usability for the following key reasons: Increased People Participation Human participation in systems at any level is the highest area of both cost and potential breakdown for any IT endeavor. Lack of Security, Functionality, Integration, Interoperability, and Usability Lack of excellence in any of these areas will only result in increased human participation in deploying and maintaining IT systems. Increased Identity and Security Exposure to Failure Increased People Participation and Lack of Security, Functionality, Integration, Interoperability, and Usability not only significantly increase costs, but inevitably lead to mistakes and breakdowns. This will create openings for attack and failure. Thus when KuppingerCole evaluates a set of technologies or products from a given vendor, the degree of product Security, Functionality, Integration, Interoperability, and Usability which the vendor has provided is of highest importance. This is because lack of excellence in any or all of these areas will lead to inevitable identity and security breakdowns and weak infrastructure. 4 Vendor Rating For vendors, additional ratings are used as part of the vendor evaluation. The specific areas we rate for vendors are Innovativeness Market position Financial strength Ecosystem Innovativeness this is measured as the capability to drive innovation in a direction which aligns with the KuppingerCole understanding of the particular market segment(s) the vendor is in. Innovation has no value by itself but needs to provide clear benefits to the customer. However, being innovative is an important factor for trust in vendors, because innovative vendors are more likely to remain leading-edge. An important element of this dimension of the KuppingerCole ratings is the support of standardization initiatives if applicable. Driving innovation without standardization frequently leads to lock-in scenarios. Thus active participation in standardization initiatives adds to the positive rating of innovativeness. Innovativeness, despite being part of the vendor rating, looks at the innovativeness in the particular market segment analyzed in this. Market position measures the position the vendor has in the market or the relevant market segments. This is an average rating over all markets in which a vendor is active, e.g. being weak in one segment doesn t necessarily lead to a very low overall rating. This factor takes into account the vendor s presence in major markets. Again, while being part of the vendor rating, this mainly looks at the market position in the particular market segment analyzed in this. Thus a very large vendor might not be a market leader in the particular market segment we are analyzing. Page 8 of 30

9 Financial strength even while KuppingerCole doesn t consider size to be a value in itself, financial strength is an important factor for customers when making decisions. In general, publicly available financial information is an important factor therein. Companies which are venture-financed are in general more likely to become an acquisition target, with massive risks for the execution of the vendor s roadmap. Ecosystem this dimension looks at the ecosystem of the vendor for the particular product covered in this Leadership Compass document. It focuses mainly on the partner base of a vendor and the approach the vendor takes to act as a good citizen in heterogeneous IT environments. Again, please note that in documents, most of these ratings apply to the specific product and market segment covered in the analysis, not to the overall rating of the vendor. 5 Vendor Coverage KuppingerCole tries to include all vendors within a specific market segment in their Leadership Compass documents. The scope of the document is global coverage, including vendors which are only active in regional markets such as Germany, the US, or the APAC region. However, there might be vendors which don t appear in a Leadership Compass document due to various reasons: Limited market visibility: There might be vendors and products which are not on our radar yet, despite our continuous market research and work with advisory customers. This usually is a clear indicator of a lack in Market Leadership. Denial of participation: Vendors might decide on not participating in our evaluation and refuse to become part of the Leadership Compass document. KuppingerCole tends to include their products anyway as long as sufficient information for evaluation is available, thus providing a comprehensive overview of leaders in the particular market segment. Lack of information supply: Products of vendors which don t provide the information we have requested for the Leadership Compass document will not appear in the document unless we have access to sufficient information from other sources. Borderline classification: Some products might have only a small overlap with the market segment we are analyzing. In these cases we might decide not to include the product in that KuppingerCole Leadership Compass. The target is providing a comprehensive view of the products in a market segment. KuppingerCole will provide regular updates on their Leadership Compass documents. For this Leadership Compass document, all major vendors we approached responded to the questionnaire. However, there are a number of point offerings in the market that have a limited market visibility and were not included in the leadership analysis for this. Some of these vendors are listed in the final section of this document and might become part of the next edition of this document, depending on how they evolve. Page 9 of 30

10 6 Market Segment Access Management and Identity Federation are frequently still seen as separate segments in the IT market. However, when looking at the business problems to be solved, these technologies are inseparable. The business challenge to solve is supporting the Extended Enterprise. Business demands support for business processes incorporating external partners and customers. They demand access to external systems and rapid onboarding of externals for controlled and compliant access to internal systems. They request access to external services such as Cloud services. IT has to provide an infrastructure for this Extended Enterprise, both for incoming and outgoing access; both for customers and other externals such as business partners; and both for existing and new on-premise applications and cloud services. Fig. 1: The Computing Troika pushes organizations to create an IT Infrastructure that goes beyond the perimeter of the organization. Various drivers have led to this situation. At the core is the need for agility in a complex competitive landscape. Business models have to adapt more rapidly than ever before. Supply chains include more suppliers and become increasingly more complex, with reduced vertical integration in manufacturing. Customers today expect that they have access to far more information at their vendor s systems than ever before. While organizations always had these external relations, the density has changed as well as the need for IT support of the Extended Enterprise. All three major trends that affect today s IT - the Computing Troika of Cloud Computing, Mobile Computing, and Social Computing - stand for a shift towards an open, integrated enterprise that is extended beyond the perimeter of the organization itself. Whether you tend to name this the Extended Enterprise or opt for Connected Enterprise does not matter. It is about the need for connecting today s on-premise IT with the outer world in various ways. Page 10 of 30

11 Fig. 2: Supporting the Extended Enterprise helps organizations addressing major business challenges. Various technologies support all the different requirements customers are facing today. The requirements are Use Cloud Services: Enabling an organization to flexibly use cloud services, with maximum control of the internal and external identities using this service and the access rights they have. Access Business Partner Systems: Enable your employees to have controlled access to business partner systems with flexible onboarding and full compliance; ensure that you meet the liability agreements etc. that you have with your business partners. Collaborate in Industry Networks: Participate in industry networks such as healthcare professional networks, allowing the re-use of identities on such networks and the controlled access by your own employees to the network as well as by network members to your systems. Support new Working Models: Support new working models with freelancers, mobile workers, and other forms of collaboration. Onboarding of Business Partners: Allow your business partners to flexibly access your systems in a controlled, compliant way. Customer Interaction: Integrate your customers, support different types of identities such as social logins and self-registered identities, and extend your business processes to the customer. Enabling this shift in IT from the traditional, internal-facing approach towards an open IT infrastructure supporting the Extended Enterprise requires various new technologies. Amongst these technologies are new types of cloud-based directory services, various other types of Cloud services including Cloud Identity Services, and improved technologies for authentication and authorization, such as risk- and context-based Access Management, also sometimes called adaptive authentication and authorization. However, the foundation is Access Management and Identity Federation which allows managing access to applications. (Web) Access Management is a rather traditional approach that puts a layer in front of web applications that takes over authentication and usually coarse-grained authorization management. That type of application also can provide services such as HTTP header injection to add authorization information to the HTTP header that then is used by the backend application. Some tools also support APIs for authorization calls to the system. Page 11 of 30

12 Identity Federation, on the other hand, allows splitting authentication and authorization between an IdP (Identity Provider) and a Service Provider (SP) or Relying Party (RP). The communication is based on protocols. Backends need to be enabled for Identity Federation in one way or another, sometimes by using the Web Access Management tool as the interface. Identity Federation can be used in various configurations, including federating from internal directories and authentication services to Cloud Service Providers or between different organizations. Thus, these services are the foundation for enabling the various customer requirements mentioned above enabling the Extended Enterprise without support for Access Management/Federation will not work. In other words: These technologies are enabling technologies for business requirements such as agility, compliance, innovation (for instance by enabling new forms of collaboration in industry networks or by adding more flexibility in the R&D supply chain), and the underlying collaboration & communication. Fig. 3: Dealing with all types of user populations will require both federation and locally managed user accounts. The Extended Enterprise means that organizations have to deal with more and larger user populations than ever before. Beyond the employees and some externals that have been managed in internal systems so far, more business partners, customers, and even potential customers are added. They shall have access to systems, either on-premise or in the cloud. While some of the digital identities representing these persons are managed in the organization s own, internal directories, others will be federated in from external Identity Providers or will be managed by means of Cloud Directories. Thus, especially Identity Federation is a technology that is essential for any organization. It allows the enterprise to deal with the external identities and all the different user populations. Page 12 of 30

13 Fig. 4: Federation and Web Access Management are essential technologies to connect all types of users to all types of applications Web Access Management, on the other hand, comes into play for managing access to on-premise applications that do not support Identity Federation. While some vendors support lightweight integration to Identity Federation for such applications, in many cases customers will still rely on an upstream layer for authentication and authorization provided by a Web Access Management solution. Based on our view on the market and the current demand, we opted for looking at both traditional Web Access Management and Identity Federation features in this Leadership Compass document. This view is underpinned by the fact that a number of vendors already have integrated their formerly separate offerings into a single product or at least a tightly integrated suite. Some few vendors either only support Identity Federation or still deliver two separate products. In the latter case, we have combined the separate products in our rating. Two of the vendors we have covered in this Leadership Compass document also provide cloud-based Identity Federation services Ping Identity and RSA Security. We have covered these offerings in this document in a separate section, without including them into the Leadership Compass rating. The reason is that these solutions have functional differences. A direct comparison thus would not make sense. There are also various vendors providing some form of Access Management or Identity Federation as a Cloud-based service, such as Okta, Symplified, or Microsoft with its new Azure Active Directory. These offerings will be covered in separate documents. They can add value to on-premise approaches for Access Management and Identity Federation and play an important role in overall strategies but fit into other market segments. Some of these offerings are covered in the final section of this documents where we look at other vendors on our watchlist. Page 13 of 30

14 7 Specific features analyzed When evaluating the products, besides looking at the aspects of overall functionality size of the company number of customers number of developers partner ecosystem licensing models platform support we also considered several specific features. These include: User Stores/Directories Federation support User self services Backend integration Security models Deployment models Here we are looking at the breadth and flexibility of support for user stores such as directory services that can be used by the Web Access Management and IdP capabilities of the products. We also look for support of virtual directory services, allowing for flexibly combining various user stores. It also includes capabilities for supporting strong and flexible (versatile) authentication of users. Clearly one of the most important criteria is the support for federation protocols such as SAML 2.0, OAuth 2.0, and others. Particularly for Web Access Management, user self service capabilities such as registration and password reset are another important feature that we analyze. Besides supporting federation-enabled backends, there is a need for supporting existing applications. Integration with such applications, be it through APIs, HTTP header injection, or other technologies, is an important criterion for this analysis. Both the internal security model of the tools and the ability for fine-grain, secure management of access policies of users are important features for products in this category. In today s IT environments, flexibility in deployment models is of high importance. We looked at support for soft appliance, hard appliance, and Cloud/MSP deployment models. Customization The less you need to code and the more you can configure, the better that s the simple equation we took into account around customization. However, we also looked for features like a transport system to segregate development, test, and production environments. Notably, copying configuration files does not count for a transport system. Page 14 of 30

15 Analytical capabilities Multi tenancy Advanced analytical capabilities beyond reporting, using standard BI (Business Intelligence) technology or other advanced approaches are becoming increasingly important. With respect to this product category, our main emphasis is on integration with existing SIEM solutions. Given the increasing number of cloud deployments, but also specific requirements in multi-national and large organizations, support for multitenancy is highly recommended. The support for these functions is added to our evaluation of the products. We ve also looked at specific USPs (Unique Selling Propositions) and innovative features of products which distinguish them from other offerings available in the market. 8 Market Leaders Based on our evaluation of the products, we ve identified (as mentioned above) different types of leaders in the market segment. The market leaders are shown in figure 5. Fig. 5: Market leaders in the market segment [Note: There is only a horizontal axis. Vendors to the right are positioned better.]. The market is affected by a situation where several very large software vendors compete with a large number of smaller vendors. Some of them are acting only regionally, while others such as Ping Identity and ForgeRock have a global presence. Market leadership is mainly a hint at the overall position of the vendor regarding the number and size of customers, its strength in sales, and its partner ecosystem. We expect Market Leaders to be leaders on a global basis. Companies which are strong in a specific geographic region but sell little or nothing to other major regions are not considered market leaders. The same holds true for the vendor s partner ecosystem without global scale in the partner ecosystem, we don t rate vendors as Market Leaders. Market Leadership is an indicator of the ability of vendors to execute on projects. However, this depends on other factors as well. Small vendors might well be able to execute in their home base. Page 15 of 30

16 Small vendors are sometimes more directly involved in projects, which can be positive or negative the latter, if it leads to branches in product development, which aren t managed well. Besides that, the success of projects depends on many other factors, including the quality of the system integrator so even large vendors with a good ecosystem might fail in projects. It has to be noted that this Market Leadership rating doesn t allow any conclusion about whether the products of the different vendors fit the customer requirements. 9 Product Leaders The second view we provide is about product leadership. That view is mainly based on the analysis of product features and the overall capabilities of the various products. Fig. 6: Product leaders in the Access Management/Federation market segment [Note: There is only a horizontal axis. Vendors to the right are positioned better.]. Here it has to be noted that several products that appear more to the left side frequently gained their rating because they take a different approach to compared to the leading vendors. Ergon Informatik and AdNovum Informatik, both vendors from Switzerland, have entered the market, providing what they call Web Application Firewalls, i.e. reverse proxy capabilities etc. They have added other functionality and increasingly are becoming full-play vendors in the market, while not being featureequal to the market leaders in all areas. On the other hand, IBM is integrating these features with Web Application Firewall capabilities in its new appliance, to provide an integrated security gateway solution, i.e. consolidating formerly separated offerings here. Again, to select a product it is important to look at the specific features and map them to the customer requirements. There are sufficient examples where products that weren t feature leaders still were the better fit for specific customer scenarios. Page 16 of 30

17 10 Innovation Leaders The third angle we took when evaluating products was about innovation. Innovation is, from our perspective, a key distinction in IT market segments. Innovation is what customers require to receive new releases that meet new requirements. Thus, a look at innovation leaders is also important, beyond analyzing product features. Fig. 7: Innovation leaders in the Access Management/Federation market segment [Note: There is only a horizontal axis. Vendors to the right are positioned better.]. Again, in some cases products that appear more to the left of that figure do not necessarily fail in innovation but are focused on specific requirements or highly focused approaches Some vendors have demonstrated a significant amount of innovation in recent time, driving standards evolution forward. Others are innovative with respect to new features such as backend integration or integration with Enterprise Single Sign-On or Web Application Firewalls. Overall, this view reflects the fact that there is still a lot of innovation happening in the market, with significant room for some of the vendors to enhance their offerings. 11 Product Evaluation This section contains a quick rating for every product we ve included in this KuppingerCole Leadership Compass document. For many of the products there are additional KuppingerCole Product Reports and KuppingerCole Executive View Reports available, providing more detailed information. Page 17 of 30

18 11.1 ForgeRock OpenAM ForgeRock is the leading Open Source provider in the IAM space. Their offering for Web Access Management and Identity Federation is named OpenAM. The product provides comprehensive support for the Access Management/Federation requirements. All ForgeRock products are based on a common stack, the ForgeRock Open Identity Stack. Strengths/Opportunities Strong features for Identity Federation. Very broad support for various authentication methods, strong security and authorization model. Broad platform support. Weaknesses/Threats More advanced functionalities in selfregistration and user management might require OpenIDM in addition. Still relatively small partner ecosystem. Table 13: ForgeRock OpenAM major strengths and weaknesses. OpenAM is the leading open source solution in the area of. The products are freely available; however, for production use a subscription is required. The product offers a comprehensive set of features in both Identity Federation and Web Access Management, with various ways of supporting existing web applications. In the area of Identity Federation, all relevant standard protocols are supported. It offers great multi-platform support, for user stores, operating systems, and databases. It also offers broad support for various authentication mechanisms. The authorization model is based on a policy engine. Policies are stored in a central policy store. This approach allows for implementing both coarsegrained and fine-grained policies. The product also offers basic features for user self-service, including registration and password management. However, ForgeRock recommends using their OpenIAM product for more complex requirements. Given that both products are based on a common stack, this is fairly straightforward. However, it will affect licensing cost. Security Functionality Integration Interoperability Usability strong positive positive positive positive positive Table 14: ForgeRock OpenAM rating. ForgeRock is venture-financed and currently investing heavily in product development. This will result in rapidly improving the (already good) capabilities of the product. The partner ecosystem of ForgeRock is still rather small but we expect to see significant growth on a global basis in this area. Overall, ForgeRock OpenAM is an interesting alternative to the established products in the Access Management and Federation market segment. Page 18 of 30

19 12 Products at a glance Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in table 27. Product Security Functionality Integration Interoperability Usability AdNovum Nevis Suite positive positive neutral positive positive Atos DirX Access strong positive positive strong positive neutral positive CA SiteMinder/CA SiteMinder Federation strong positive strong positive strong positive positive strong positive EmpowerID SSO Manager positive positive positive positive strong positive Ergon Airlock/Medusa positive neutral positive neutral positive Evidian Web Access Manager positive positive strong positive positive positive ForgeRock OpenAM strong positive positive positive positive positive IBM Security Access Management Solution positive positive positive positive strong positive NetIQ Access Manager positive positive positive positive positive Oracle Access Management Suite Plus strong positive strong positive positive positive strong positive Ping Identity PingFederate positive strong positive positive strong positive strong positive RSA Access Manager/Federated Identity Manager positive positive positive positive positive Ubisecure IAM Suite positive positive positive positive positive Table 27: Comparative overview of the ratings for the product capabilities. Page 19 of 30

20 In addition we provide in table 28 an overview which also contains four additional ratings for the vendor, going beyond the product view provided in the previous section. While the rating for Financial Strength applies to the vendor, the other ratings apply to the product. Vendor Innovativeness Market Position Financial Strength Ecosystem AdNovum neutral weak neutral weak Atos neutral neutral neutral neutral CA Technologies positive strong positive positive positive EmpowerID neutral neutral neutral neutral Ergon neutral neutral neutral weak Evidian neutral neutral neutral neutral ForgeRock positive positive neutral positive IBM positive positive strong positive strong positive NetIQ positive positive positive strong positive Oracle positive strong positive strong positive strong positive Ping Identity positive positive positive positive RSA positive positive positive positive Ubisecure neutral weak weak neutral Table 28: Comparative overview of the ratings for vendors. Table 28 requires some additional explanation in case that a vendor has got a critical rating. In the area of Innovativeness, this rating is applied if vendors provide none or very few of the more advanced features we have been looking for in that analysis, like support for multi-tenancy, shopping cart approaches for requesting access, advanced analytical capabilities, and others. However, in this analysis all vendors scored at least neutral regarding this criterion. The critical ratings are applied for Market Position in the case of vendors which have a very limited visibility (with that particular product and in general) outside of regional markets like France or Germany or even within these markets. Usually the number of existing customers is also limited in these cases. In the area of Financial Strength, this rating applies in case of a lack of information about financial strength or for vendors with a very limited customer base, but also based on some other criteria. This doesn t imply that the vendor is in a critical financial situation; however the potential for massive investments for quick growth appears to be limited. On the other hand, it s also possible that vendors with better ratings might fail and disappear from the market. Finally, a critical rating regarding Ecosystem applies to vendors which have no or a very limited ecosystem with respect to numbers and regional presence. That might be company policy, to protect the own consulting and system integration business. However our strong believe is that growth and successful market entry of companies into a market segment relies on strong partnerships. Page 20 of 30

21 12.1 The Market/Product Matrix Fig. 8: The Market/Product Matrix. Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of overperformers when comparing Market Leadership and Product Leadership. Beyond that analysis, we have compared the position of vendors regarding combinations of our three major areas of analysis, i.e. market leadership, product leadership, and innovation leadership. That analysis provides additional information. These comparisons, for instance, use the rating in Product Leadership on the horizontal axis and relate it with the rating in other areas, which is shown on the vertical axis. The result is split into four quadrants. The upper right quadrant contains products with strength both in the product rating and in the second rating we ve looked at in the particular matrix, e.g. innovation. The lower right quadrant contains products that are overall strong but are lacking in the dimension shown on the vertical axis. For example, this can be products that have strong technical capabilities but are relatively new to the market, resulting in a small customer base. The upper left quadrant contains products which are typically below average in the product rating but have specific strengths regarding the second dimension we look at in the particular matrix. They might be highly innovative or very mature and established, but not being leading edge when looking at the product rating. Finally, there is the lower left quadrant that contains products suffering on both axes. However, these products might have specific strengths that are highly valuable for some specific use cases. In that comparison it becomes clear which vendors are better positioned in our analysis of Product Leadership compared to their position in the Market Leadership analysis. Vendors above the line are sort of overperforming in the market. It comes as no surprise that these are mainly the very large vendors, while vendors below the line frequently are innovative but focused on specific regions. Page 21 of 30

22 We ve defined four segments of vendors to help in classifying them: Market Leaders: Strong Potentials: Market Performers: Specialists: This segment contains vendors which have a strong position in our categories of Product Leadership and Market Leadership. These vendors have an overall strong to excellent position in the market. This segment includes vendors which have strong products, being ranked high in our Product Leadership evaluation. However, their market position is not as good. That might be due to various reasons, like a regional focus of the vendors or the fact that they are niche vendors in that particular market segment. Here we find vendors which have a stronger position in Market Leadership than in Product Leadership. Typically such vendors have a strong, established customer base due to other market segments they are active in. In that segment we typically find specialized vendors which have in most cases specific strengths but neither provide full coverage of all features which are common in the particular market segment nor count among the software vendors with overall very large portfolios The Product/Innovation Matrix Fig. 9: The Product/Innovation Matrix. Vendors below the line are less innovative, vendors above the line are, compared to the current Product Leadership positioning, more innovative. This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between the two views with few exceptions. This distribution and correlation is typical for mature markets with a significant number of established vendors plus a number of smaller vendors. Page 22 of 30

23 Again we ve defined four segments of vendors. These are Technology Leaders: Establishment: Innovators: Me-toos: This group contains vendors which have technologies which are strong regarding their existing functionality and which show a good degree of innovation. In that segment we typically find vendors which have a relatively good position in the market but don t perform as strong when it comes to innovation. However, there are exceptions if vendors take a different path and focus on innovations which are not common in the market and thus do not count that strong for the Innovation Leadership rating. Here we find highly innovative vendors with a limited visibility in the market. It is always worth having a look at this segment because vendors therein might be a fit especially for specific customer requirements. This segment mainly contains those vendors which are following the market. There are exceptions in the case of vendors which take a fundamentally different approach to providing specialized point solutions. However, in most cases this is more about delivering what others have already created The Innovation/Market Matrix Fig. 10: The Innovation/Market Matrix. Vendors below the line are performing well in the market compared to their relatively weak position in the Innovation Leadership rating, while vendors above the line show based on their ability to innovate, the biggest potential for improving their market position. The third relation shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innovation Leaders. This might impose a risk for their future position in the market, depending on how they improve their Innovation Leadership position. On the other hand, vendors which are highly innovative have a good chance for improving their market position but might also fail, especially in the case of smaller vendors. Page 23 of 30

24 The four segments we have defined here are Big Ones: Top Sellers: Hidden Gems: Point Vendors: These are market leading vendors with a good to strong position in Innovation Leadership. This segment mainly includes large software vendors. In that segment we find vendors which have an excellent market position compared to their ranking in the Innovation Leadership rating. That can be caused by a strong sales force or by selling to a specific community of customer customers, i.e. a loyal and powerful group of contacts in the customer organizations. Here we find vendors which are more innovative than would be expected when looking at their Market Leadership rating. These vendors have a strong potential for growth, however they also might fail in delivering on that potential. Nevertheless this group is always worth a look due to their specific position in the market. In that segment we find vendors which typically either have point solutions or which are targeting specific groups of customers, like SMBs, with solutions focused on these, but not necessarily covering all requirements of all types of customers and thus not being amongst the Innovation Leaders. These vendors might be attractive if their solution fits the specific customer requirements. 13 Federation leaders vs. Access Management leaders When looking at it becomes obvious that there is not a unique approach to solving the customers challenges. There are different ways of architecting the Access Management/Federation environment. There are different challenges, some more focused on solving access of employees or some externals to internal web applications, some more focused on complex federation scenarios or access to Cloud Services. There are also situations that are more focused on service provider environments, federating in customers or citizens. This situation is true for most market segments in IT. There is not the single solution which is best suited for every customer. Depending on where customers are today and where their major requirements are today, they might look for different entry points into a market segment. For, that means, for instance, that some customers will look more for products that are strong in traditional Web Access Management, while others will focus mainly on Identity Federation. Regardless of where customers start, they should choose a solution which supports the overall Access Management and Federation requirements at a good level. Page 24 of 30

25 To support picking the right entry into, we ve added two more charts, looking at the products from different perspectives: The Identity Federation/Product matrix relates the overall product ratings and the specific strength in Identity Federation. Thus, vendors that are particularly strong in Identity Federation appear at the top, while vendors with shortcomings in that area appear more to the bottom. The stronger the overall product capabilities are, the more to the right in the matrix vendors appear. The Web Access Management/Product matrix is the logical counterpart, focusing on the particular strength in traditional Web Access Management. Thus, vendors that are particularly strong in Web Access Management appear at the top, while vendors with shortcomings in that area appear more to the bottom. The stronger the overall product capabilities are, the more to the right in the matrix vendors appear The Identity Federation/Product Matrix Fig. 11: The Identity Federation/Product Matrix. This matrix shows that most vendors already have strong support for Identity Federation requirements, with Ping Identity being the recognized leader in that particular area. However, other vendors in the upper right quadrant also provide strong to leading-edge capabilities in that area, supporting most customer requirements. Page 25 of 30

26 13.2 The Web Access Management/Product Matrix Fig. 12: The Web Access Management/Product Matrix. In this matrix it becomes clear that most vendors have good support for Web Access Management, with relatively little variance between the various vendors. That especially holds true for the vendors in the upper right quadrant, with the possible exception of Ping Identity that shows some shortcomings but also good workarounds for traditional Web Access Management challenges Overall Leadership the combined view Finally, we ve put together the three different ratings for leadership, i.e. Market Leadership, Product Leadership, and Innovation Leadership and created an Overall Leadership rating. This is shown below in figure 13. Fig. 13: The Overall Leadership rating for the market segment [Note: There is only a horizontal axis. Vendors to the right are positioned better.]. Page 26 of 30

LEADERSHIP COMPASS by Martin Kuppinger January 2014. Enterprise Single Sign-On. KuppingerCole Report

LEADERSHIP COMPASS by Martin Kuppinger January 2014. Enterprise Single Sign-On. KuppingerCole Report KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger January 2014 Leaders in innovation, product features, and market reach for Enterprise Single Sign-On. Your Compass for finding the right path

More information

LEADERSHIP COMPASS by Martin Kuppinger January 2014. Enterprise Single Sign-On. KuppingerCole Report

LEADERSHIP COMPASS by Martin Kuppinger January 2014. Enterprise Single Sign-On. KuppingerCole Report KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger January 2014 Leaders in innovation, product features, and market reach for Enterprise Single Sign-On. Your Compass for finding the right path

More information

Cloud User and Access Management

Cloud User and Access Management KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud

More information

VENDOR REPORT by Martin Kuppinger April 2013. Atos DirX. KuppingerCole

VENDOR REPORT by Martin Kuppinger April 2013. Atos DirX. KuppingerCole KuppingerCole VENDOR REPORT by Martin Kuppinger April 2013 Identity, Security, and Risk Management as part of a broad solution portfolio. Industry focus and integration as reason for an IAM Business Case

More information

Identity Provisioning

Identity Provisioning KuppingerCole Leadership Compass by Martin Kuppinger October 2012 Identity Provisioning Leaders in innovation, product features, and market reach for Identity Provisioning. Your compass for finding the

More information

LEADERSHIP COMPASS. Infrastructure as a Service. KuppingerCole Report

LEADERSHIP COMPASS. Infrastructure as a Service. KuppingerCole Report KuppingerCole Report LEADERSHIP COMPASS by Mike Small March 2015 This report provides an overview and analysis of the market for Infrastructure as a Service (IaaS). IaaS provides basic computing resources

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5 This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management

More information

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing

More information

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

EXECUTIVE VIEW. KuppingerCole Report. Content. Related Research

EXECUTIVE VIEW. KuppingerCole Report. Content. Related Research KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski February 2015 by Alexei Balaganski ab@kuppingercole.com February 2015 Content 1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges...

More information

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger January 2015 by Martin Kuppinger mk@kuppingercole.com January 2015 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Interoperate in Cloud with Federation

Interoperate in Cloud with Federation Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole. KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single

More information

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape

More information

Identity and Access. Management in Cloud. December 21, 2012

Identity and Access. Management in Cloud. December 21, 2012 Identity and Access Management in Cloud December 21, 2012 Agenda 1. Identity and Access Management (IAM) 2. What is Cloud 3. Operating Models 4. Risk and Challenges 5. Vendors Landscape 1 Identity and

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the

More information

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3104619/ Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Description:

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

On the Radar: ForgeRock

On the Radar: ForgeRock Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

WHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14

WHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013

More information

SaaS / Managed Services Market trends and adoption challenges

SaaS / Managed Services Market trends and adoption challenges SaaS / Managed Services Market trends and adoption challenges Jason Forrest Hollis Security Asia Pacific & Japan 2013 CA All rights reserved Legal Notice Copyright 2013 CA All rights reserved All trademarks,

More information

5 Pillars of API Management with CA Technologies

5 Pillars of API Management with CA Technologies 5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud.

An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud. Partnering in the Cloud 2015 ISV REPORT An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud. Partnering

More information

Build Your Mobile Strategy Not Just Your Mobile Apps

Build Your Mobile Strategy Not Just Your Mobile Apps Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need

More information

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment Sally Hudson Terry Frazier This IDC MarketScape Excerpt features: Ping Identity IDC MARKETSCAPE

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Protecting the keys to your kingdom against cyber-attacks and insider threats

Protecting the keys to your kingdom against cyber-attacks and insider threats KuppingerCole Report WHITEPAPER by Martin Kuppinger November 2015 Protecting the keys to your kingdom against cyber-attacks and insider threats All organizations today are under constant attack, and high-privilege

More information

7 things to ask when upgrading your ERP solution

7 things to ask when upgrading your ERP solution Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

Application Security Made in Switzerland

Application Security Made in Switzerland Application Security Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is

More information

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things PRODUCT BRIEF OpenAM Delivering secure access for customers, applications, devices and things Introduction Identity and access management is going through a new golden age. CEOs are pushing growth as their

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.

TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended. Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide

More information

The organization decided that creating a more robust approach to customerfacing identity management represented a strategic opportunity.

The organization decided that creating a more robust approach to customerfacing identity management represented a strategic opportunity. BUYER CASE STUDY BuyerPulse Buyer Case Study: McKesson Utilizing Open Source IAM: Benefits in Cost, Customization, and Integration Sally Hudson Susan Funke Chris Skall Global Headquarters: 5 Speen Street

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror

More information

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security

More information

Ubisecure. White Paper Series. e-service Maturity Model

Ubisecure. White Paper Series. e-service Maturity Model Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use

More information

Identity and Access Management for the Cloud

Identity and Access Management for the Cloud Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.

More information

Increase the Security of Your Box Account With Single Sign-On

Increase the Security of Your Box Account With Single Sign-On A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

See what cloud can do for you.

See what cloud can do for you. See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

IBM API Management Overview. 2014 IBM Corporation

IBM API Management Overview. 2014 IBM Corporation IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential

More information

Helping organizations secure and govern application services for SOA, Web and the Cloud

Helping organizations secure and govern application services for SOA, Web and the Cloud Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA

More information

Perceptions of Cloud Service Providers Who s Who and Where in the Cloud

Perceptions of Cloud Service Providers Who s Who and Where in the Cloud Perceptions of Cloud Service Providers Who s Who and Where in the Cloud Janel Garvin Founder, Evans Data Corporation Cloud computing is the 2009 evolution of what used to be called web-based computing

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

Reducing Application Cost and Risk through Centralized SOA Security

Reducing Application Cost and Risk through Centralized SOA Security Reducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article compares centralized and decentralized application security models.

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

Worldwide Advanced and Predictive Analytics Software Market Shares, 2014: The Rise of the Long Tail

Worldwide Advanced and Predictive Analytics Software Market Shares, 2014: The Rise of the Long Tail MARKET SHARE Worldwide Advanced and Predictive Analytics Software Market Shares, 2014: The Rise of the Long Tail Alys Woodward Dan Vesset IDC MARKET SHARE FIGURE FIGURE 1 Worldwide Advanced and Predictive

More information

Evaluation of SOA Vendors A Technical White Paper from Firstservis

Evaluation of SOA Vendors A Technical White Paper from Firstservis Evaluation of SOA Vendors A Technical White Paper from Firstservis Author: Alexander Roussekov, Senior SOA Architect, Firstservis Pty Ltd. Abstract This paper describes a SOA Vendors Evaluation Methodology

More information

Six Best Practices for Cloud-Based IAM

Six Best Practices for Cloud-Based IAM a best practices guide Six Best Practices for Cloud-Based IAM Making Identities Work Securely in the Cloud Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Executive

More information

EXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole.

EXECUTIVE VIEW MYDIGIPASS.COM. KuppingerCole Report. by Alexei Balaganski August 2013. by Alexei Balaganski ab@kuppingercole. KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski August 2013 by Alexei Balaganski ab@kuppingercole.com August 2013 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...

More information

Brochure More information from http://www.researchandmarkets.com/reports/3186483/

Brochure More information from http://www.researchandmarkets.com/reports/3186483/ Brochure More information from http://www.researchandmarkets.com/reports/3186483/ Business Intelligence and Analytics Software Market by Segment, by Services, by Deployment Mode, by Org. Size, by Verticals,

More information

The State of Application Delivery in 2015

The State of Application Delivery in 2015 The State of Application Delivery in 2015 a report by F5 f5.com/soad 1 Introduction F5 surveyed customers from more than 300 organizations (of all sizes) across a broad spectrum of vertical markets such

More information

Assessing Your Business Analytics Initiatives

Assessing Your Business Analytics Initiatives Assessing Your Business Analytics Initiatives Eight Metrics That Matter WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 The Metrics... 1 Business Analytics Benchmark Study.... 3 Overall

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

The Global Cloud IAM Software market is expected to grow at a Compounded Annual Growth Rate (CAGR) of 35.76% during the forecasted period 2015-2020.

The Global Cloud IAM Software market is expected to grow at a Compounded Annual Growth Rate (CAGR) of 35.76% during the forecasted period 2015-2020. Brochure More information from http://www.researchandmarkets.com/reports/3421419/ Global Cloud Identity and Access Management Software Market - By End User Industry, Vendors and Geography Market Shares,

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

NextLabs Rights Management Platform

NextLabs Rights Management Platform KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger October 2015 Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting

More information

An Enterprise Architect s Guide to API Integration for ESB and SOA

An Enterprise Architect s Guide to API Integration for ESB and SOA An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

API Management Introduction and Principles

API Management Introduction and Principles API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common

More information

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution.

Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution. Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL

The ODCA, Helix Nebula and Federated Identity Management. Mick Symonds Principal Solutions Architect Atos Managed Services NL The ODCA, Helix Nebula and Federated Identity Management Principal Solutions Architect Atos Managed Services NL Agenda The Open Data Center Alliance Helix Nebula Federated Identity Management as a service

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

How To Integrate With Salesforce Crm

How To Integrate With Salesforce Crm Introduction Turbo-Charge Salesforce CRM with Dell Integration Services By Chandar Pattabhiram January 2010 Fueled by today s fiercely competitive business environment, IT managers must deliver rapid,

More information