CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02

Size: px
Start display at page:

Download "CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02"

Transcription

1 IGG J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how to improve the data integrity and security of their enterprises. Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access management market in Enterprises and vendors will focus on Active Directory in Extranet Access Management Overview What Is an Extranet? An intranet is an internal network based on Web technology, most often used by enterprises for informational purposes, such as distribution of internal information, notification of vacancies, or displaying internal directories and organizational charts. An intranet will usually have links to the Internet and must therefore be protected from unauthorized access. A group of interconnected intranets for instance, between a company and its suppliers is commonly referred to as an extranet. Extranet Access Management Gartner defines extranet access management products as solutions that provide a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data. The business rules may be authorizations in a security sense, entitlements in a legal/contractual sense or personalization in a marketing sense. As the use of enterprise portal products increases, integration between user access management and portal personalization features grow in importance. Larger enterprises with multiple Internet domain names, as well as distributor or hub-and-spoke business-to-business extranets, require multidomain single sign-on and distributed user management capabilities. Performance, scalability and availability become critical as extranet access management solutions are relied upon for production applications both inside and outside the firewall. Market Trends in 2002 and 2003 Economic Impact on Extranet Access Management Uncertain economic conditions and a vastly reduced number of extranet and e-business rollouts dominated the extranet access management market in Most extranet access management Gartner Entire contents 2003 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 activity was related to IS organizations attempting to reduce their operational costs of managing user access to externally exposed applications (primarily business-to-business) and Intranet-based applications and portals. That focus has changed product demands to more integration with Active Directory and employee-oriented applications, such as PeopleSoft and Siebel Systems, and has increased demand for provisioning integration and channel strategies. Funding for extranet access management deployment comes from flat IT budgets, and pricing pressure has been intense. Standards Activity There was much noise, but less action, on the standards front in The Liberty Alliance released its Liberty 1.0 specification, which extended the Security Assertions Markup Language (SAML). The Organization for the Advancement of Structured Information Systems (OASIS) approved the SAML specification. Major extranet access management vendors, and several other product vendors, announced SAML support in their products. Microsoft publicly stated that it would support several forms of identity tokens, including SAML and Kerberos, in the Web Services Security (WS-Security) extensions to the Simple Object Access Protocol that Microsoft and IBM had developed and turned over to OASIS as a royalty-free standard. The Liberty Alliance announced that it would support WS-Security in Liberty 2.0. However, Microsoft has not detailed plans for direct support of SAML in Windows authentication and access control mechanisms, such as Passport. Liberty and Passport Outlook Gartner research shows that financial services companies, which are the most-likely early adopters of federated identity services such as Liberty and Passport, had no near-term ( ) plans to adopt either service. Gartner believes that the initial wave of Liberty/Passport deployment will be in the 1H04 time frame and will be driven by business-to-business services. That forecast, combined with increased market attention on reducing the cost of managing internally focused applications, places Active Directory-centric solutions in a strong position for the future because enterprise identities are tightly bound to Windows PC and network logins. Unless economic conditions make a strong turnaround and invigorated e-business rollouts are driven more by business units than IS organizations, Gartner expects that the focus on Active Directory will dominate the market through Extranet Access Management Factors Most enterprise demand for extranet access management involved internal applications as IS organizations attempted to support a wide range of applications that were developed during the past several years. In 2002, most extranet access management product advancements involved integration with provisioning capabilities to provide workflow functions for automating user

3 management actions across applications. Integration can lead to fewer administrators required to support a given user population across large numbers of applications, but it often is yet another peruser fee that sometimes exceeds the cost of the user access management product. Consolidation among provisioning, extranet access management and platform vendors will drive the per-seat costs down as long as the flat economy continues in These factors caused some changes in vendor positioning in Gartner s Extranet Access Management 2H02 Magic Quadrant (see Figure 4). Figure 4 Extranet Access Management 2H02 Magic Quadrant Challengers Leaders IBM Ability to Execute Novell Netegrity Oblix RSA Security Entrust Secure Computing Entegrity Open Network Technologies A Wipro Baltimore Technologies As of January 2003 Niche Players Visionaries Source: Gartner Research Completeness of Vision Leaders Netegrity Netegrity abandoned its attempt to move beyond being a pure-play extranet access management vendor and announced that it would no longer offer the DataChannel portal product. Netegrity s large installed base, wide channel support and strong customer service capabilities provided advantages as IT spending slumped. However, the DataChannel acquisition forced Netegrity to compete with a wide array of portal and application server vendors, in addition to competing with other extranet access management providers. In late 2002, Netegrity announced a Web services transaction management product, TransactionMinder, as well as a core identity management product that will

4 compete with Oblix CoreID. However, Netegrity s long-delayed migration to the provisioning space has yet to bear fruit. IBM IBM has continued to execute its strategy of embedding Tivoli Access Manager (formerly Policy Director) into IBM s dominant products, such as WebSphere and MQSeries. WebSphere s strong position in the application server and portal market gives Tivoli Access Manager a strong advantage in the enterprise space. IBM s acquisition of Access360 enables it to accelerate the deployment of integrated provisioning capabilities via Tivoli Identity Manager across its product line. IBM s major weakness is a limited set of integration partners. Oblix Oblix made considerable progress in market strength and the completeness of its extranet access management offering in Oblix has been the primary beneficiary of the channel conflicts that Gartner forecast that Netegrity would experience after its acquisition of DataChannel. Oblix gained strong integration and business alliances with BMC Software, Plumtree Software and other vendors. Oblix s NetPoint product has been deployed successfully by large enterprises, with high marks by its customers for performance and after-sales support. Challengers Novell Novell made limited progress in advancing its ichain product in It mainly focused on rationalizing the Novell line of security products with a marketing and branding campaign. Novell s ichain 2.2 release should make it a more-competitive offering, but Novell will bring features to market more than a year after most of its competitors. ichain continues to be a cost-effective choice for enterprises that make extensive use of Novell s other products. However, it has limited channel support outside of Novell s base. Visionaries RSA Security RSA Security has completed the stabilization of Securant extranet access management software and the integration of Clear Trust into its product line. Because of its strength in the remote access token space, RSA Security has a strong worldwide channel and support structure. However, that strength has limited RSA Security s effectiveness in signing integration partners in the portal and application server space, where SecurID tokens are not a major factor. Entrust Entrust has moved away from enterprise infrastructure-based public-key infrastructure toward applications that integrate strong security (secure messaging and Web services). It has positioned GetAccess as a key product offering. Entrust has less visibility than RSA Security in the extranet access management market, mainly because of limited channel support. However, Entrust can build on a reputation for high-quality software and solid support.

5 Open Network Technologies Open Network Technologies made some important alliance deals with Microsoft s consulting services and Waveset in the provisioning space in Microsoft will push Open Network s DirectorySmart product to bridge Unix environments with Active Directory deployments. Although this will increase Open Network s visibility and deal flow, this type of relationship is a two-edged sword, as CyberSafe found out several years ago becoming associated with Windows-only deployments can cause a small vendor to be excluded from consideration by large enterprises. Niche Players Baltimore Technologies and Entegrity Baltimore Technologies and Entegrity dropped in their ability to execute because their financial status, partnering and visibility were reduced. They remain strong technology choices for niche environments. Secure Computing Secure Computing has developed PremierAccess to support its hardware token product. PremierAccess provides base rules-and-roles functionality, uniform resource locator protection and integration hooks. Although this offering does not compete with more-mature products in functionality, the tight integration with Secure Computing s token products makes it a solid choice for Secure Computing token customers. Therefore, we ve added Secure Computing to the Magic Quadrant. Wipro Wipro gained some enterprise wins and is a viable option, especially for enterprises that use Wipro s integration services. Not on the Map Gartner has removed or omitted the following vendors from the Magic Quadrant: Vasco Data Security s financial challenges will require it to focus on fewer product offerings. It has shown no evidence that it intends to advance its Vacman product. Microsoft has no product offering in this space, although it announced that its TrustBridge technology should be available when.net Server ships in 1H03. Gartner believes that Microsoft will position TrustBridge as.net Server features that, along with Commerce Server.NET, can be used to build an extranet access management solution for environments that use Active Directory or all- Windows servers. However, this will not occur until Computer Associates International released a 1.0 product for extranet access management in 4Q02, which is too new to market to be evaluated for the Magic Quadrant. Its etrust Web Access Control product is based on the Security for Open Systems technology that Computer Associates previously acquired from Memco Software.

6 Sun Microsystems Directory Server Access Management Edition never really became a product. It has been re-branded as the Sun ONE Identity Server 5.1, but it has experienced limited deployment. Calendra, based in France, offers Directory Manager for developing Lightweight Directory Access Protocol-centric applications. However, it doesn t provide much out-of-the-box functionality for integration with the typical applications that enterprises have developed. Secure Sockets Layer-based remote access vendors, such as Neoteris, SafeWeb, Netilla Networks and others, also offer some form of access control to Web-based applications. However, they don t support the variety of applications, Web servers and management capabilities that are required for effective extranet access management products. PassGo Technologies was re-established as a separate company in a management buyout from Symantec. PassGo acquired all of Symantec s authentication and access management products, including the WebThority extranet access management product. PassGo will need to demonstrate significant investment in advancing WebThority product capabilities and channel support for it to be a viable enterprise choice. Bottom Line The extranet access management market has broadened beyond extranets, and Gartner will consider this expansion in future research. Enterprises should continue to emphasize ease of integration when investing in extranet access management solutions. Written by Edward Younker,Research Products Analytical sources: John Pescatore and Ray Wagner, Gartner Research For related Inside Gartner articles, see: CIO Update: Answer Six Key Questions, Improve Internet Security, 6 November 2002

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Magic Quadrant for a Fading PKI Market, 2003

Magic Quadrant for a Fading PKI Market, 2003 Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by

More information

SSL VPN 1H03 Magic Quadrant

SSL VPN 1H03 Magic Quadrant Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment

More information

Job Scheduling Magic Quadrant Reflects New Challenges

Job Scheduling Magic Quadrant Reflects New Challenges Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some

More information

Magic Quadrant for Application Platform Suites, 2Q03

Magic Quadrant for Application Platform Suites, 2Q03 Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses

Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses Article 16 April 2003 Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses In the Gartner CRM Suites Magic Quadrant for North American Midsize Businesses, Onyx Software, Pivotal

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Vendor Classification

Vendor Classification Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.

More information

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

CIO Update: The Gartner Firewall Magic Quadrant for 2H02 IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market

More information

SAN Management Software Magic Quadrant

SAN Management Software Magic Quadrant Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition

More information

Magic Quadrant for Integrated Document Management, 2003

Magic Quadrant for Integrated Document Management, 2003 Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

Management Update: CRM Success Lies in Strategy and Implementation, Not Software

Management Update: CRM Success Lies in Strategy and Implementation, Not Software IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)

More information

Management Update: Gartner s 2003 Learning Management System Magic Quadrant

Management Update: Gartner s 2003 Learning Management System Magic Quadrant IGG-02262003-01 J. Lundy Article 26 February 2003 Management Update: Gartner s 2003 Learning Management System Magic Quadrant Demand for learning management systems increased in 2002, and so did the number

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

Partner Relationship Management: 2003 Magic Quadrant

Partner Relationship Management: 2003 Magic Quadrant Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,

More information

2003 Enterprise Backup/Restore Magic Quadrant

2003 Enterprise Backup/Restore Magic Quadrant Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk

More information

Business Applications and Infrastructure Entwined

Business Applications and Infrastructure Entwined Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue

More information

Strategic Sourcing Magic Quadrant Criteria: An Explanation

Strategic Sourcing Magic Quadrant Criteria: An Explanation Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.

More information

Federated Identity in the Enterprise

Federated Identity in the Enterprise www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember

More information

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.

More information

Business Intelligence: The European Perspective

Business Intelligence: The European Perspective Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

SIEM and IAM Technology Integration

SIEM and IAM Technology Integration SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security

More information

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability). Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications

More information

The Identity and Access Management Market Landscape

The Identity and Access Management Market Landscape Research Publication Date: 7 November 2003 ID Number: COM-21-4534 The Identity and Access Management Market Landscape Roberta J Witty Integrating identity and access management components into an overall

More information

Management Update: How to Implement a Successful ERP II Project

Management Update: How to Implement a Successful ERP II Project IGG-09252002-02 B. Zrimsek, P. Phelan Article 25 September 2002 Management Update: How to Implement a Successful ERP II Project Gartner provides insights and recommendations on how enterprises can make

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters

Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters IGG-09112002-02 H. Dresner Article 11 September 2002 Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters Although the business intelligence (BI) market continues to ride out the

More information

Strategic Sourcing Applications Magic Quadrant, 1Q03

Strategic Sourcing Applications Magic Quadrant, 1Q03 Markets, D. Hope-Ross, C. Eschinger, A. Kyte Research Note 17 March 2003 Strategic Sourcing Applications Magic Quadrant, 1Q03 Strategic sourcing applications are emerging, despite market immaturity. Applications

More information

National Student Clearinghouse's Web Services Network

National Student Clearinghouse's Web Services Network Case Studies, B. Lheureux Research Note 3 January 2003 National Student Clearinghouse's Web Services Network NSC provides access to U.S.-based college and university student records via electronic data

More information

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures

More information

The Business Rule Engine 2003 Magic Quadrant

The Business Rule Engine 2003 Magic Quadrant Markets, J. Sinur Research Note 7 April 2003 The Business Rule Engine 2003 Magic Quadrant Business rule engines are moving toward maturity. In 2003, they will support business agility when called on to

More information

ORACLE FUSION MIDDLEWARE PROFILE

ORACLE FUSION MIDDLEWARE PROFILE ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

SAML:The Cross-Domain SSO Use Case

SAML:The Cross-Domain SSO Use Case SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Server Vendors' High-Availability Services: Magic Quadrant

Server Vendors' High-Availability Services: Magic Quadrant Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the

More information

Troux Configuration Management Software

Troux Configuration Management Software Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information

More information

Implementing Business Portal in an Extranet Environment

Implementing Business Portal in an Extranet Environment Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Windows Server 2003 Active Directory: Perspective

Windows Server 2003 Active Directory: Perspective Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows

More information

Patch management point solution. Platform. Patch Management Point Solution

Patch management point solution. Platform. Patch Management Point Solution Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations

More information

Single Sign-On Systems

Single Sign-On Systems Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Research Seminar in Telecommunications Business I T-109.501 Single Sign-On Systems 19.11.2002 Tomi Määttänen 45342K

More information

PLM Eclipses CPC as a Software Market

PLM Eclipses CPC as a Software Market Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle

More information

SAML: The Secret to Centralized Identity Management

SAML: The Secret to Centralized Identity Management 1 of 7 1/10/2007 9:05 AM December 2004 http://www.intelligententerprise.com/showarticle.jhtml?articleid=54200324 SAML: The Secret to Centralized Identity Management Complicated by too many systems, too

More information

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing

More information

EMEA CRM Analytics Suite Magic Quadrant 3Q02

EMEA CRM Analytics Suite Magic Quadrant 3Q02 Markets, J. Radcliffe, G. Herschel Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant 3Q02 SAS Institute leverages its strength in analytics to take the lead in the immature CRM analytics

More information

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant. Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core

More information

Magic Quadrant for Data Center Outsourcing, 4Q03

Magic Quadrant for Data Center Outsourcing, 4Q03 Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Management Update: The Importance of Developing a CRM Strategy

Management Update: The Importance of Developing a CRM Strategy IGG-10302002-03 J. Kirkby Article 30 October 2002 Management Update: The Importance of Developing a CRM A customer relationship management (CRM) strategy states how to turn a customer base into an intangible

More information

The PC life cycle configuration management Market Overview

The PC life cycle configuration management Market Overview Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration

More information

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Management Update: The Cornerstones of Business Intelligence Excellence

Management Update: The Cornerstones of Business Intelligence Excellence G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY

More information