Identity Provisioning
|
|
|
- Scott Henderson
- 9 years ago
- Views:
Transcription
1 KuppingerCole Leadership Compass by Martin Kuppinger October 2012 Identity Provisioning Leaders in innovation, product features, and market reach for Identity Provisioning. Your compass for finding the right path in the market. KuppingerCole Scenario The Future of Authentication Report No.: 70341
2 KuppingerCole Leadership Compass Identity Provisioning by Martin Kuppinger October 2012 Content 1. Management Summary Methodology Product Rating Vendor Rating Vendor Coverage Market Segment Specific features analyzed Market Leaders Product Leaders Innovation Leaders Product evaluation Atos DirX Identity Avatier Identity and Access Risk Management Suite Beta Systems SAM Enterprise Identity Management Suite CA IdentityMinder Courion Access Risk Management Suite CrossIdeas IDEAS econet cmatrix Evidian Identity & Access Manager Fischer Automated Role & Account Management ForgeRock OpenIDM Hitachi ID Management Suite IBM Security Identity Manager Page 2 of 49
3 11.13 ILEX Meibo/MPP ism bi-cube Microsoft Forefront Identity Manager Identity Manager from NetIQ Omada Identity Suite (based on Microsoft FIM) Oracle Identity Manager Quest One Identity Manager SailPoint IdentityIQ SAP NetWeaver Identity Management The Dot Net Factory EmpowerID Products at a glance Related Research Documents Product Report: CrossIdeas IDEAS July 2012 Product Report: Quest One Identity Manager Dec Advisory Note: The Open API Economy Dec Vendor Report: Fischer International Nov Vendor Report: Courion Nov Scenario: Understanding Identity and Access Management Oct Product Report: SailPoint IdentityIQ Oct Product Report: Evidian Identity & Access Manager Oct Product Report: DirX Identity Oct Technology Report: Access Governance Architectures March 2011 Page 3 of 49
4 1. Management Summary Identity Provisioning is still one of the core segments of the overall IAM market. Thus it comes to no surprise that this segment is more crowded by vendors than virtually all the other IAM market segments. This Leadership Compass provides an overview and analysis of the Identity Provisioning market segments. It shows that there are several established vendors with mature solutions, but also some very interesting smaller or regional vendors with a good potential for growth and for delivering what customers require. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit. However, this Leadership Compass will help identifying those vendors customers should have a closer look at. Page 4 of 49
5 2. Methodology KuppingerCole Leadership Compass is a tool which provides an overview of a particular IT market segment and identifies the leader in that market segment. It is the compass which assists you in identifying the vendors and products in a particular market segment which you should consider for product decisions. It should be noted that it is inadequate to pick vendors based only on the information provided within this report. Customers must always define their specific requirements and analyze in greater detail what they need. This report doesn t provide any recommendations for picking a vendor for a specific customer scenario. This can be done only based on a more thorough and comprehensive analysis of customer requirements and a more detailed mapping of these requirements to product features, i.e. a complete assessment. We look at four types of leaders: Product Leaders: Product Leaders identify the leading-edge products in the particular market segment. These products deliver to a large extent what we expect from products in that market segment. They are mature. Market Leaders: Market Leaders are vendor which have a large, global customer base and a strong partner network to support their customers. A lack in global presence or breadth of partners can prevent a vendor from becoming a Market Leader. Innovation Leaders: Innovation Leaders are those vendors which are driving innovation in the particular market segment. They provide several of the most innovative and upcoming features we hope to see in the particular market segment. Overall Leaders: Overall Leaders are identified based on a combined rating, looking at the strength of products, the market presence, and the innovation of vendors. Overall Leaders might have slight weaknesses in some areas but become an Overall Leader by being above average in all areas. For every area, we distinguish between three levels of products: Leaders: This identifies the leaders as defined above. Leaders are products which are exceptionally strong in particular areas or overall. Challengers: This level identifies products which are not yet leaders but have specific strengths which might make them leaders. Typically these products are also mature and might be leading-edge when looking at specific use cases and customer requirements. Followers: This group contains products which lag behind in some areas, such as a limited feature set or only a regional presence. The best of these products might have specific strengths, making them a good or even best choice for specific use cases and customer requirements but are of limited value in other situations. Page 5 of 49
6 Our rating is based on a broad range of input and a long experience in that market segment. Input consists of experience from KuppingerCole advisory projects, feedback from customers using the products, product documentation, a questionnaire sent out before creating the KuppingerCole Leadership Compass, and other sources. Page 6 of 49
7 3. Product Rating KuppingerCole as an analyst company regularly does evaluations of products and vendors. The results are, amongst other types of publications and services, published in the KuppingerCole Leadership Compass Reports, KuppingerCole Product Reports, and KuppingerCole Vendor Reports. KuppingerCole uses a standardized rating to provide a quick overview on our perception of the products or vendors. Providing a quick overview of the KuppingerCole rating of products requires an approach combining clarity, accuracy, and completeness of information at a glance. KuppingerCole uses the following categories to rate products: Security Interoperability Functionality Usability Integration Security security is measured by the degree of security within the product. Information Security is a key element and requirement in the KuppingerCole IT Model (#70129 Scenario Understanding IT Service and Security Management). Thus, providing a mature approach to security and having a well-defined internal security concept are key factors when evaluating products. Shortcomings such as having no or only a very coarse-grained, internal authorization concept are understood as weaknesses in security. Known security vulnerabilities and hacks are also understood as weaknesses. The rating then is based on the severity of such issues and the way a vendor deals with them. Functionality this is measured in relation to three factors. One is what the vendor promises to deliver. The second is the status of the industry. The third factor is what KuppingerCole would expect the industry to deliver to meet customer requirements. In mature market segments, the status of the industry and KuppingerCole expectations usually are virtually the same. In emerging markets they might differ significantly, with no single vendor meeting the expectations of KuppingerCole, thus leading to relatively low ratings for all products in that market segment. Not providing what customers can expect on average from vendors in a market segment usually leads to a degradation of the rating, unless the product provides other features or uses another approach which appears to provide customer benefits. Integration integration is measured by the degree in which the vendor has integrated the individual technologies or products in the portfolio. Thus, when we use the term integration, we are referring to the extent in which products interoperate with themselves. This detail can be uncovered by looking at what an administrator is required to do in the deployment, operation, management and discontinuation of the product. The degree of integration is then directly related to how much overhead this process requires. For example: if each product maintains its own set of names and passwords for every person involved, it is not well integrated. And if products use different databases or different administration tools with inconsistent user interfaces, they are not well integrated. On the other hand, if a single name and password can allow the admin to deal with all aspects of the product suite, then a better level of integration has been achieved. Page 7 of 49
8 Interoperability interoperability also can have many meanings. We use the term interoperability to refer to the ability of a product to work with other vendors products, standards, or technologies. In this context it means the degree to which the vendor has integrated the individual products or technologies with other products or standards that are important outside of the product family. Extensibility is part of this and measured by the degree to which a vendor allows its technologies and products to be extended for the purposes of its constituents. We think Extensibility is so important that it is given equal status so as to insure its importance and understanding by both the vendor and the customer. As we move forward, just providing good documentation is inadequate. We are moving to an era when acceptable extensibility will require programmatic access through a well-documented and secure set of APIs. Refer to the Open API Economy Document (#70352 Advisory Note: The Open API Economy) for more information about the nature and state of extensibility and interoperability. Usability accessibility refers to the degree in which the vendor enables the accessibility to its technologies and products to its constituencies. This typically addresses two aspects of usability the end user view and the administrator view. Sometimes just good documentation can create adequate accessibility. However, overall we have strong expectations regarding well integrated user interfaces and a high degree of consistency across user interfaces of a product or different products of a vendor. We also expect vendors to follow common, established approaches to user interface design. We focus on security, functionality, integration, interoperability, and usability for the following key reasons: Increased People Participation Human participation in systems at any level is the highest area of cost and potential breakdown for any IT endeavor. Lack of Security, Functionality, Integration, Interoperability, and Usability Lack of excellence in any of these areas will only result in increased human participation in deploying and maintaining IT systems. Increased Identity and Security Exposure to Failure Increased People Participation and Lack of Security, Functionality, Integration, Interoperability, and Usability not only significantly increase costs, but inevitably lead to mistakes and breakdowns. This will create openings for attack and failure. Thus when KuppingerCole evaluates a set of technologies or products from a given vendor, the degree of product Security, Functionality, Integration, Interoperability, and Usability which the vendor has provided is of highest importance. This is because lack of excellence in any or all of these areas will lead to inevitable identity and security breakdowns and weak infrastructure. Page 8 of 49
9 4. Vendor Rating For vendors, additional ratings are used as part of the vendor evaluation. The specific areas we rate for vendors are Innovativeness Financial strength Market position Ecosystem Innovativeness this is measured as the capability to drive innovation in a direction which aligns with the KuppingerCole understanding of the particular market segment(s) the vendor is in. Innovation has no value by itself but needs to provide clear benefits to the customer. However, being innovative is an important factor for trust in vendors, because innovative vendors are more likely to remain leading-edge. An important element of this dimension of the KuppingerCole ratings is the support of standardization initiatives if applicable. Driving innovation without standardization frequently leads to lock-in scenarios. Thus active participation in standardization initiatives adds to the rating of innovativeness. Market position measures the position the vendor has in the market or the relevant market segments. This is an average rating over all markets in which a vendor is active, e.g. being weak in one segment doesn t lead to a very low overall rating. This factor takes into account the vendor s presence in major markets. Financial strength even while KuppingerCole doesn t consider size to be a value by itself, financial strength is an important factor for customers when making decisions. In general, publicly available financial information is an important factor therein. Companies which are venture-financed are in general more likely to become an acquisition target, with massive risks for the execution of the vendor s roadmap. Ecosystem this dimension looks at the ecosystem of the vendor. It focuses mainly on the partner base of a vendor and the approach the vendor takes to act as a good citizen in heterogeneous IT environments. Page 9 of 49
10 5. Vendor Coverage KuppingerCole tries to include all vendors within a specific market segment in their Leadership Compass documents. The scope of the document is global coverage, including vendors which are only active in regional markets like Germany or the US. However, there might be vendors which don t appear in a Leadership Compass document due to various reasons: Limited market visibility: There might be vendors and products which are not on our radar yet, despite our continuous market research and work with advisory customers. This usually is a clear indicator of a lack in Market Leadership. Denial of participation: Vendors might decide on not participating in our evaluation and refuse to become part of the Leadership Compass document. KuppingerCole tends to include their products anyway as long as sufficient information for evaluation is available, thus providing a comprehensive overview of leaders in the particular market segment. Lack of information supply: Products of vendors which don t provide the information we have requested for the Leadership Compass document will not appear in the document unless we have access to sufficient information from other sources. Borderline classification: Some products might have only small overlap with the market segment we are analyzing. In these cases we might decide not to include the product in that KuppingerCole Leadership Compass. The target is providing a comprehensive view of the products in a market segment. KuppingerCole will provide regular updates on their Leadership Compass documents. Page 10 of 49
11 6. Market Segment This KuppingerCole Leadership Compass looks at the category of Identity Provisioning systems. Identity Provisioning products as we know them today are mostly organized around those four components: Connectors Workflow engine Reconciliation engine coupled with a repository engine Form generator to handle graphical user interface Identity Provisioning products today typically provide some basic, sometimes also some more evolved, access governance functionality. This includes, for example, role management and reporting. Other typical features are user self-service, delegated administration, and password management. In addition to this, configurable workflows for request procedures and approvals are a key element. It is impossible to understand Identity Provisioning complexity without having a quick look backward. Most historical Identity Provisioning products in the market date back to the late 1990 s and early 2000 s. They were designed back then and have evolved over time. That was the time of central authentication repositories and metadirectories, and the area of three-tier web architectures. In fact those years fit with the explosion of distributed systems IT departments had to handle. On one hand the number of systems (servers, desktops, applications, network hardware, etc.) to control was growing exponentially, while the number of skilled system administrators wasn t growing at the same rate. On the other hand the number of requests from business units to add new users, grant privileges, enforces policies etc. was exploding. Last but not least everything had to be executed faster and faster and served at a lower cost. As a result early Identity Provisioning systems were designed to help automate systems administration of IT. Before Identity Provisioning, it was common to wait days or even weeks for a user to get an account on a mainframe resource or application. With Identity Provisioning, business owners became able to serve enduser requests almost in real time from a small web interface, this without asking the permission of any IBM mainframe administrator. For those reasons, the first Identity Provisioning systems started to focus on connectivity with targeted systems: how to populate a user on an IBM-3270, how to enable someone on Cisco's VPN, Obviously as soon as the system administration bottleneck was handled, the problem moved to the next level. As it was now simple to grant access to any resource, users had accounts on multiple systems, and the issue moved from how do I grant access to John on this or that system? to how do I control what John has access to?. To verify that grants were given on purpose, Identity Provisioning introduces the concept of workflow to verify authorizations before accepting a request. Then in order to keep track of allocated resources a central repository was built, couple with a reconciliation engine. Page 11 of 49
12 Last but not least as requests were now handled directly by business owners or endusers, traditional command lines became a no go option and a friendly GUI interface became one of the most important components of any Identity Provisioning implementation. In recent years, compliance and basic access governance functions became a must have feature. Many regulations such as Sarbanes-Oxley, Gramm-Leach-Bliley, EU Privacy Protection Directive, etc. moved the responsibility of enforcing identity management policies from system and business administrators to the top management. As a direct result, key requirement for Identity Provisioning moved from how to quickly enable my business? to how to make sure no one can sue me? That put new challenges on Identity Provisioning. With Access Governance, a new product category appeared that somewhat overlaps and somewhat integrates with classical Identity Provisioning (#70,219 Access Governance Architectures). While it remains obvious that whatever some vendors claim the provisioning requirement is not going to be disappear any time soon, but will continue to change. When looking at Identity Provisioning in that Leadership Compass, our expectations are that products provide mature basic capabilities as defined at the beginning of this section plus sufficient role management and basic access recertification capabilities. We don t necessarily expect full Access Governance functionality, i.e. access analytics, recertification, risk management, and related features. We also don t expect what some vendors call Access Intelligence, i.e. advanced analytical capabilities beyond what is commonly found in Access Governance products. We also expect products to provide a strong and flexible internal security model, flexibility in customization, and other standard features any software product should provide like the ability not to lose customizations when updating a product. Page 12 of 49
13 7. Specific features analyzed When evaluating the products, besides looking at the aspects of overall functionality partner ecosystem size of the company licensing models number of customers number of developers traditional core features of Identity Provisioning we also considered some specific features. These include: Connector toolkit Heritage of connectors ESB interfaces SRM interfaces SPML/SCIM support Deployment models Customization A toolkit for simple creation of custom connectors to target systems is highly recommended. Having connectors as OEM components or provided by partners is considered a risk for ongoing support and available know-how at the vendor. Having interfaces to ESBs (Enterprise Service Bus) adds architectural options for integrating Identity Provisioning with existing systems and for connecting to target systems. We expect that systems provide out-of-the-box integration to leading SRM (Service Request Management) systems for manual fulfillment of provisioning requests. Support for these two standards (Service Provisioning Markup Language/ System for Cross-domain Identity Management) is highly recommended. Supporting different deployment models like hard/soft appliances and cloud deployment gives customer a broader choice. Systems that require little or no coding and that support scripting or, if programming is required, a range of programming languages, are preferred. Authentication mechanisms We expect Identity Provisioning systems to support different types of authentication to the system, including strong authentication options, to limit the risk of fraud using these systems. Internal security model All systems are required to have a sufficiently strong and fine-grained internal security model. Page 13 of 49
14 Multi tenancy Role/SoD concept Shopping cart paradigm Given the increasing number of cloud deployments, but also specific requirements in multi-national and large organizations, support for multi-tenancy is highly recommended. Provisioning should be feasible based on role concepts and with support for the definition of SoD rules (Segregation of Duties), despite the fact that Access Governance tools are increasingly used on top of Identity Provisioning. These approaches are pretty popular for simplifying the access request management process by using shopping cart paradigms familiar to the users. The support for these functions is added to our evaluation of the products. We ve also looked at specific USPs (Unique Selling Propositions) and innovative features of products which distinguish them from other offerings available in the market. Page 14 of 49
15 8. Market Leaders Based on our evaluation of the products, we ve identified (as mentioned above) different types of leaders in the Identity Provisioning market segment. The market leaders are shown in figure 1. Fig. 1: Market leaders in the Identity Provisioning market segment. The market is affected by a situation where several very large software vendors compete with a large number of smaller vendors, which, frequently, are only acting regionally. Market leadership is mainly a hint at the overall position of the vendor, its strength in sales, and its partner ecosystem. It has to be noted that this doesn t allow any conclusion about whether the products of the different vendors fit to the customer requirements. Page 15 of 49
16 9. Product Leaders The second view we provide is about product leadership. That view is mainly based on the analysis of product features and the overall capabilities of the various products. Fig. 2: Product leaders in the Identity Provisioning market segment. Here it has to be noted that products which appear more at the left side frequently gained their rating because they take another approach to Identity Provisioning than usual. That is particularly true for vendors like CrossIdeas, Ilex, econet, Avatier, or even Evidian. Again, to select a product it is important to look at the specific features and map them to the customer requirements. There are sufficient examples where products which weren t feature leaders still were the better fit for specific customer scenarios. Page 16 of 49
17 10. Innovation Leaders The third angle we took when evaluating products was about innovation. Innovation is, from our perspective, a key capability in IT market segments. Innovation is what customers require to receive new releases that meet new requirements. Thus, a look at innovation leaders is also important, beyond analyzing product features. Fig. 3: Innovation leaders in the Identity Provisioning market segment. Again, in some cases products which appear more to the left of that figure do not necessarily fail in innovation but are focused on specific requirements or very focused approaches, like Evidian with their focus on a more complete solution for SMBs and their tight integration of Access Management, Single Sign-On, and Identity Provisioning or Ilex with their toolset approach for quickly developing IAM applications plus a specific solution for the needs of SMBs. Page 17 of 49
18 11. Product evaluation This section contains a quick rating for every product we ve included in this KuppingerCole Leadership Compass document. For many of the products there are additional KuppingerCole Product Reports available, providing more detailed information. Page 18 of 49
19 11.1 Atos DirX Identity Atos IT Solutions and Services acquired the former Siemens SIS (IT Solutions and Services) unit. As part of this acquisition, the DirX products became part of the Atos portfolio. DirX Identity is the Identity Provisioning solution within that portfolio. The product is well established in the market, with several very large installations. It is sort of a standard Identity Provisioning product covering the classical features commonly found in that market segment, like connectors to target systems, workflow functionality, role management, and additional access governance capabilities. In addition, Atos provides a number of vertical integrations for industries like Facility Management and Healthcare, based on the specific domain knowledge and with technical integrations. Strengths/Opportunities Mature, well established product with proven ability to execute in very large scale deployments Strong role- and rule-based approach for provisioning Consistent use of web services for interoperability Weaknesses/Threats Room for improvement regarding flexibility of integrated Access Governance features No support for enterprise bus concepts Table 1: Atos DirX Identity major strengths and weaknesses. Besides the neutral usability rating which is mainly caused by limitations in delivery models and above average need for programming in customization, the product rating overall is. The product has strong capabilities in core provisioning features including connectivity to target systems and scalability and high-availability features. It also provides a strong role management approach. Based on the long history in role management, the concepts implemented in that area are very mature and leadingedge. Atos has added additional capabilities for a more flexible management beyond roles, based, for example, on organizational structures and using rules to manage entitlements. Main features are exposed via web services, which allows for simple interoperability. Security Functionality Integration Interoperability Usability strong neutral Table 2: Atos DirX Identity rating. Overall, Atos DirX Identity is a mature and feature-rich product. Atos provides its own managed services and has a worldwide presence. The partner ecosystem is fairly limited. Page 19 of 49
20 11.2 Avatier Identity and Access Risk Management Suite Avatier is a vendor which follows a different approach than most other vendors in the Identity Provisioning market. The different components of its offering focus on providing a simple and familiar experience to end users along with an easy-to-use graphical configuration interface for administrators. The latest innovation feature support for new types of mobile devices and a shopping cart approach for requesting access, assets and other resources. Overall, the paradigm is very much driven by a service request-oriented approach and a high degree of user centrism while still providing broad support for automation. The focus is clearly on a configuration approach providing lower time-to-value compared to more complex solutions. Strengths/Opportunities Innovative, highly user-centric approach on Identity Provisioning. Fast implementation focusing on end user service requests. Weaknesses/Threats Some lack of support for authentication mechanism or multi-tenancy. Very limited partner ecosystem. No significant footprint outside of North America. Table 3: Avatier Identity and Access Risk Management Suite major strengths and weaknesses. This makes the Avatier solution an interesting alternative to common approach on Identity Provisioning. However it will not suit the needs of all customers. Security is good but some features like a broad support for different, strong authentication mechanisms is lacking as well as multi-tenancy support. Avatier clearly is one of the products which either fit to what customers are looking for or not it is different but worth having a look at. A shortcoming of Avatier clearly is their very limited partner ecosystem. Avatier claims that the simplicity of the solution reduces this requirement. Security Functionality Integration Interoperability Usability neutral Table 4: Avatier Identity and Access Risk Management Suite rating. Overall, Avatier Identity and Access Risk Management Suite is an interesting choice for several customers, taking another approach to Identity Provisioning than most of the other products. Currently, the vendor has no significant footprint outside of North America. Page 20 of 49
21 11.3 Beta Systems SAM Enterprise Identity Management Suite Beta Systems is a German vendor, offering its SAM Enterprise Identity Management Suite for many years now. The company has a significant customer base, with some focus on the finance industry. It is sort of a standard Identity Provisioning product covering the classical features commonly found in that market segment, like connectors to target systems, workflow functionality, and role management. Beta Systems recently started improving the integrated Access Governance/Intelligence functionality. Strengths/Opportunities Very mature approach to role management Connector approach with tight application integration, supporting also Dynamic Authorization Management Strong support for mainframe environments Weaknesses/Threats Based on several components with some conceptual differences Just starting adding Access Governance and Intelligence functionality Table 5: Beta Systems SAM Enterprise Identity Management Suite major strengths and weaknesses. Beta Systems SAM Enterprise Identity Management Suite supports a broad range of platforms, with exceptionally strong support for mainframe environments. Over the course of the last few years, Beta Systems has enhanced the functionality significantly, partially by adding components acquired or licensed from other vendors. That results in a slight lack of integration at the administrative level. However, user interfaces are well integrated. The company is just starting to add enhanced Access Governance and Intelligence functionality. However, support for role management is strong, based on a long experience. Besides this Beta Systems is one of the few vendors offering connectors with tight application integration, allowing applications to request authorization decisions at runtime and thus enabling Dynamic Authorization Management as an integrated feature. Security Functionality Integration Interoperability Usability strong strong neutral Table 6: Beta Systems SAM Enterprise Identity Management Suite rating. Overall, Beta Systems SAM Enterprise Identity Management Suite is a mature and feature-rich product. Beta Systems has a presence in major markets and a sufficient partner ecosystem. Page 21 of 49
22 11.4 CA IdentityMinder CA Technologies is amongst the largest infrastructure software vendors worldwide and offers a broad portfolio of products in the IAM market segment, including CA IdentityMinder (formerly CA Identity Manager) as its solution for Identity Provisioning. This tool is built on different tools CA Technologies had developed and acquired over time. The current version is well integrated and provides the full feature set to be expected from Identity Provisioning solutions. Strengths/Opportunities Mature product with a broad range of features and good integration of these Tight integration with other CA products including CA GovernanceMinder (Access Governance) Large customer base Weaknesses/Threats Requires CA SiteMinder for advanced internal security features like different authentication mechanisms Relatively small number of partners in ecosystem but strong own service offerings Table 7: CA IdentityMinder major strengths and weaknesses. Based on the long history of the product and the market position of CA Technologies, it is no surprise that CA has done a large number of deployments of CA IdentityMinder. As a consequence, there is - besides a mature and rich feature set - a number of additional solutions from CA Services available which add to this functionality. Like some other vendors, CA Technologies is following a concept which tries to avoid too many redundancies between the products in its portfolio. Thus most Access Governance features are part of CA GovernanceMinder, whilst CA SiteMinder acts as sort of the first line of defense when it comes to security. This approach is not uncommon and has its strengths (when building on the entire ecosystem) and potential weaknesses (when requiring just one of the products but some functionality beyond its core features). Security Functionality Integration Interoperability Usability strong strong Table 8: CA IdentityMinder rating. Overall, CA IdentityMinder is a mature product with tight integration into a suite of products. CA Technologies has a global presence but only a fairly small number of specialized partners; however the company has own service offerings on a global scale. Page 22 of 49
23 11.5 Courion Access Risk Management Suite Courion is a vendor which has evolved from supporting specific problems especially around password synchronization towards a company with a suite covering major areas of IAM today. The Courion Access Risk Management Suite is their integrated offering which includes the provisioning capabilities but also adds advanced Access Governance and Access Risk Management capabilities on top of that. Courion has chosen to extend the reach of its main product beyond core provisioning and take the path of providing a more comprehensive suite covering several capabilities. Strengths/Opportunities Broad, integrated feature set for provisioning and access governance Mature provisioning capabilities Good connectivity also with more complex platforms like mainframe environments Weaknesses/Threats No significant footprint in the market outside of North America Suite approach might provide more functionality than required (but is modular) Table 9: Courion Access Risk Management Suite major strengths and weaknesses. Courion has opted for an approach which focuses on providing a broad set of features and enhancing Identity Provisioning beyond its traditional scope. Given that the suite is sufficiently modular, that allows customers to rely on portions of this feature set if required. Classical provisioning capabilities are strong, with a significant number of connectors also covering the more complex target platforms. Courion also provides exceptionally strong integration with other elements of IT infrastructure like SIEM platforms etc. Security Functionality Integration Interoperability Usability strong strong Table 10: Courion Access Risk Management Suite rating. Overall, Courion has a very strong product offering with a broad feature set. Their major weakness is the lack of an ecosystem and footprint outside of the North American market. Page 23 of 49
24 11.6 CrossIdeas IDEAS CrossIdeas is an Italian vendor which started as part of the largest Italian system integrator, Engineering spa. They have been in the market for several years now. Originally they provided a Dynamic Authorization Management system for externalizing authorization decisions from applications. Over time, strong role management and overall Access Governance capabilities have been added. Recently, CrossIdeas beyond connecting to other provisioning tools started adding its own connectors. Thus they also can directly provision to target systems now. However, they didn t start as provisioning tool from scratch but took another, rather uncommon way. Strengths/Opportunities Excellent business-oriented framework for managing access, including full Access Governance Integration with Dynamic Authorization Management, beyond static provisioning Weaknesses/Threats Limited number of own connectors, just started building their connector framework Very small but growing partner ecosystem Different approach than classical provisioning, based on Access Governance capabilities, will not fit to every use case Table 11: CrossIdeas IDEAS major strengths and weaknesses. Due to its history, IDEAS is not a typical Identity Provisioning solution. However, having some provisioning capabilities available now qualifies them as a newcomer in this market, which is moving towards providing increased Access Governance capabilities anyway. Besides their strong features in that area with a very businesscentric approach, tying well into existing business processes, a rather rare feature in that market segment is the tight integration with Dynamic Authorization Management, allowing it to externalize authorization decisions instead of just statically provisioning access controls to target systems. On the other hand, their connector framework as of now is somewhat limited so customers have to carefully evaluate whether this is what they require. Security Functionality Integration Interoperability Usability strong neutral neutral neutral neutral Table 12: CrossIdeas IDEAS rating. Overall, IDEAS is more an Access Governance and Dynamic Authorization Management tool with some provisioning capabilities. Thus it depends on the customer requirements whether this is a good fit for their provisioning needs or not. Page 24 of 49
25 11.7 econet cmatrix The German software vendor econet entered the Identity Provisioning market with another approach than most of the other vendors. Their product econet cmatrix is titled an Identity & Services Manager, not only providing access controls but also the management of IT services like mail services, telephony, and others a user requires. Thus their provisioning scope is larger than what most other vendors focus on. On the other hand, their reach towards a multitude of platforms is somewhat limited in contrast to other vendors. Strengths/Opportunities Service provisioning beyond access controls, including accounts etc. out-of-the-box. Lightweight offering for SMB customers. Service Management-oriented approach. Weaknesses/Threats No MSP/cloud offerings available yet. Processes frequently require coding. Limited presence in the market, small partner ecosystem. Table 13: econet cmatrix major strengths and weaknesses. In general, econet is following an approach which is closer to Service Request Management (SRM) than that which most other vendors offer. The target is to provide everything to the user that the user requires, based on defined processes and integrated with audit capabilities. However, if customers need specific processes beyond the standard processes which will be the case in most large environments coding is virtually inevitable. Besides this, market presence is rather limited and as of now focused mainly on Germany. Security Functionality Integration Interoperability Usability strong neutral Table 14: econet cmatrix rating. Overall, econet cmatrix provides an interesting set of features which should suit many customer scenarios well, due to their focus on provisioning all types of services. However, market presence is somewhat limited and customization shouldn t be underestimated. Page 25 of 49
26 11.8 Evidian Identity & Access Manager The French vendor Evidian is part of Groupe Bull, one of the leading European IT companies. Evidian has been in the IAM business for many years. Their product, Identity & Access Manager, has been developed over a number of years and provides a good set of features in Identity Provisioning. The target market of Evidian is mid-sized businesses for whom they provide an integrated solution with all major features required. These go beyond pure Identity Provisioning, allowing customers to implement an integrated approach for core IAM requirements. Notably, Evidian has in its fairly large customer base also several very large accounts, not being limited to smaller deployments. Strengths/Opportunities Established product with good feature set in core functionality. Excellent integration to Evidian SSO/Access Management solutions. Integrated offering with a consistent concept for managing identities and access. Weaknesses/Threats Limited deployment models. Conceptual approach might not be a perfect fit to some customer requirements. No ESB and SRM integration out-of-thebox. Table 15: Evidian Identity & Access Manager major strengths and weaknesses. Evidian has developed a tightly integrated product which covers all major aspects of Identity Provisioning. It is focused on providing a consistent set of processes for users. Besides the core provisioning capability, the product is tightly integrated with the SSO (Single Sign-On) and Access Management solutions offered by Evidian. A shortcoming is the lack of cloud/msp deployment models and appliance offerings. There is also a lack of advanced integration, like support for ESB (Enterprise Service Bus) concepts or SRM (Service Request Management) integration out-of-the-box. On the other hand the product can use existing external workflow systems. The product allows a quick start for many scenarios, especially in medium-sized business. However it might not be the perfect fit for some customer scenarios. Security Functionality Integration Interoperability Usability strong neutral Table 16: Evidian Identity & Access Manager rating. Overall, Evidian delivers a mature product with a strong feature set and a wellthought out conceptual approach. The company is mainly focused on the European markets. Page 26 of 49
27 11.9 Fischer Automated Role & Account Management Fischer International Identity is a vendor which is different from all other provisioning vendors in that the company focuses on SaaS delivery models for IAM as their main approach and core competency. The product is available for on-premise deployment as well but the entire architecture has been defined for SaaS deployments, requiring only a gateway at the customer s sites. However, this approach suits well also for onpremise. Based on that concept, full multi-tenancy is a logical design principle of the solution. Strengths/Opportunities SaaS delivery model as standard option. No coding required, customization is done via configuration and graphical design components. Well-defined user interfaces for quickstart deployments. Weaknesses/Threats No ESB support yet, SaaS approach is more difficult to integrate. User interfaces might not suit every organization s needs. Table 17: Fischer Automated Role & Account Management major strengths and weaknesses. Their SaaS delivery model is supported by several MSPs, including Wipro as a global partner. Due to their SaaS approach, the clear focus is on providing a large set of features, well-defined standard configurations, and avoiding programming. There is no need for coding, but sometimes intensive configuration is needed. Besides that there are graphical tools for designing user interfaces and workflows. For companies looking for tight and flexible integration with existing IT solutions, the SaaS approach might become an inhibitor. Even for on-premise deployments, the ETL-based approach for interoperability might be too limited in more complex scenarios. Despite the good out-of-the-box user interfaces, they might not suit every customer s needs pure customization might hit its limits. The partner ecosystem of Fischer is still somewhat limited in size but growing and based on few global, engaged partners. Security Functionality Integration Interoperability Usability strong strong Table 18: Fischer Automated Role & Account Management rating. Overall, Fischer provides an interesting approach to Identity Provisioning. SaaS deployments are interesting, however they might not suit the needs of every customer, including global organizations with legal requirements regarding the data held outside of the organization. Page 27 of 49
28 11.10 ForgeRock OpenIDM ForgeRock is a company providing open source IAM solutions. One of their products is OpenIDM 2.0, an open source provisioning solution. This is not built on the former Sun Identity Manager/Oracle Waveset product but leverages the OpenICF connector framework which adopted the former Sun Microsystems open source project Identity Connector Framework. The product has a somewhat limited capability with several features still missing. Nevertheless it may be an option for companies looking for open source solutions only or focusing on approaches which they can greatly customize to suit specific needs. The product strategy for OpenIDM is focused on a one stack approach with integration to other products and lightweight APIs for easy, accessible adoption. This might suit the needs of customers which need to heavily customize or very tightly integrate a provisioning tool with existing IT environments. Strengths/Opportunities Open source product for Identity Provisioning. Broad set of connectors based on OpenICF framework. Weaknesses/Threats Somewhat limited set of features. Very limited partner ecosystem and deployment models as of now. No support for role management. Table 19: ForgeRock OpenIDM major strengths and weaknesses. ForgeRock provides a basic Identity Provisioning solution as of now. There are some fundamental features missing, including support for role management approaches. ForgeRock claims that this limitation can be addressed by mimicking it through their rule-based concept, however that would be fairly complex in most organizations. The partner ecosystem is also limited, as well as deployment options. A strength is the breadth of available connectors based on the open source OpenICF project and, for some customers, the fact that the product is open source and flexible to integrate and customize. Security Functionality Integration Interoperability Usability neutral neutral Table 20: ForgeRock OpenIDM rating. Overall, ForgeRock OpenIDM can not currently be considered a leading-edge solution in the market. The product mainly will attract customers looking for an open source approach to Identity Provisioning. Page 28 of 49
29 11.11 Hitachi ID Management Suite Hitachi ID provides a product called ID Management Suite which is a mature solution for managing identities and their access. It integrates Access Governance features, including SoD (Segregation of Duty) support and certification features. The product builds on an open, flexible architecture. The price to pay for that flexibility might be an above average effort for coding when it comes to customization. Hitachi ID provides a well-defined model for segregation of code and customizations, allowing retaining customizations beyond release changes. Strengths/Opportunities Good support for Access Governance features. Mature solution supporting Identity Provisioning requirements. Tight integration with Microsoft SharePoint and Windows Explorer. Weaknesses/Threats No shopping cart paradigm supported. Customization might require above average coding. Limited footprint outside of North America. Table 21: Hitachi ID Management Suite major strengths and weaknesses. In general, the product provides a mature set of features, delivering what customers typically need. However, the architecture and access control model have to be carefully reviewed to understand whether they suit the needs of the organization. The architecture provides high flexibility and scalability and is well-thought out. On the other hand customization needs might be above average and some features like shopping cart paradigms are not supported out of the box. The SoD approach implemented ensures that SoD violations and the impact of changes are handled correctly at all layers in a multi-layered role/entitlement model which is not the case with all products in the market. Some specific strengths are the integration with Microsoft SharePoint and Windows Explorer, allowing users to directly request access on resources from these environments. Security Functionality Integration Interoperability Usability strong neutral Table 22: Hitachi ID Management Suite rating. Overall, Hitachi ID Management Suite is an interesting product with a well-thought architecture and feature set, providing good flexibility. It thus is an interesting alternative to established products. The vendor still has a limited footprint outside of North America. Page 29 of 49
30 11.12 IBM Security Identity Manager IBM Security Identity Manager, formerly known as IBM Tivoli Identity Manager (ITIM), is one of the most established products in the market. The name change is due to the formation of an IBM Security Business Unit. Thus several Tivoli products have been shifted to that new unit and the brand name has changed. However, it is still the same well-known product. IBM has a very large installed base, ranging amongst the top 5 vendors in the worldwide market in that aspect. Strengths/Opportunities Mature product with good support for standard feature set. Strong support for different target systems. Integration with User Activity Monitoring. Weaknesses/Threats Workflow and role management based on separate components. No multi-tenancy support yet. Table 23: IBM Security Identity Manager major strengths and weaknesses. IBM Security Identity Manager is an established product supporting a broad range of different target systems with deep integration. With the new role management capabilities and enhanced workflow capabilities based on another IBM product (former Lombardi) IBM has addressed some of the functional shortcomings of former releases. However, the price to pay is an increased number of different components which have to work together. IBM provides out-of-the-box integration, nevertheless there are several components at the system-level which needs to be handled. Another critical aspect is the lack of real multi-tenancy support. On the other hand, IBM Security Identity Manager is integrated with User Activity Monitoring features and Governance capabilities of other IBM solutions, fitting well into more comprehensive concepts of overall governance and security. Security Functionality Integration Interoperability Usability strong neutral Table 24: IBM Security Identity Manager rating. Overall, IBM Security Identity Manager is a mature offering. IBM has added several new features, but at the price of of having a set of like external workflow systems. These are integrated out-of-the-box, however his still leads to increased complexity of the overall environment customers need to handle. Page 30 of 49
31 11.13 ILEX Meibo/MPP ILEX is a French vendor which provides two different but tightly related tools in the area of Identity and Access Management. Both are somewhat different from other provisioning approaches in that the main idea is to provide a tool which allows customers to quickly create an Identity Management solution. Thus the products are no exact fit for the product category of Identity Provisioning but might be very interesting for specific customer requirements. The underlying tool is named Meibo. The second solution is a customized solution with standard features called MPP (Meibo People Pack) and is based on Meibo. MPP is clearly targeted at the SMB market. Strengths/Opportunities Flexible tool for creating custom Identity Management solutions. Integration with SSO/Access Management solution. Out-of-the-box solutions targeted on SMBs and industry-specific solution for Healthcare available. Weaknesses/Threats Limited feature set available out-of-thebox in MPP (SMB product). Meibo is a tool, not a solution. Very limited visibility outside of France. Table 25: ILEX Meibo/MPP major strengths and weaknesses. The approach of Meibo is interesting, however besides the low-end solution of MPP this is more about a tool for creating custom Identity Management solutions like management or request interfaces to existing directories than about a typical Identity Provisioning product. Thus, it might be complementary to existing Identity Provisioning products when it comes to building custom add-ons. Its strength is the tight integration with the Access Management and Single Sign-On solutions offered by ILEX. There is also a Role Management tool available now which allows to design role management applications which can be natively plugged into other Meibo solutions. Security Functionality Integration Interoperability Usability neutral Table 26: ILEX Meibo/MPP rating. Overall, ILEX Meibo should be considered more an add-on to existing Identity Provisioning solutions, while the MPP product might be a fit for SMBs. As an add-on and to implement custom solutions, Meibo could provide significant value even in existing IAM deployments. Page 31 of 49
32 11.14 ism bi-cube ism is a German vendor which offers an Identity Provisioning solution with a wellthought out approach to role management and processes. In contrast to other vendors, ism also delivers out-of-the-box standard processes for setting up provisioning. Overall, the conceptual strength of ism is considerable. However, that also might become a limiting factor in projects given that the methodology and customer requirements have to be a good fit. Strengths/Opportunities Broad set of functionality provided. Well-thought role model and delivery of standard processes. Support for different deployment models. Weaknesses/Threats Conceptual approach needs to be well understood. Very small partner ecosystem. No footprint in the market outside of Germany and Austria. Table 27: ism bi-cube major strengths and weaknesses. A aspect of the product clearly is that it delivers a broad set of functionality based on a well-thought conceptual approach and methodology. Specific strengths are the role model and, as mentioned above, the standard processes provided. Another strength is that ism supports a broad range of deployment models, including cloud deployments, and supports multi-tenancy. On the other hand there is a lack of integration partners and of visibility outside of the local markets. Security Functionality Integration Interoperability Usability strong neutral Table 28: ism bi-cube rating. Overall, ism bi-cube is an interesting product offering, but with limited visibility in the market. Customers have to understand the conceptual approach taken by ism which provides strong flexibility but is rather specific. Page 32 of 49
33 11.15 Microsoft Forefront Identity Manager Microsoft s offering in the Identity Provisioning market segment is the Microsoft Forefront Identity Manager (FIM), which has been recently extended with Access Governance capabilities that have been acquired in an asset deal from BHOLD. The product is pretty popular in Windows/Active Directory centric environments where it has its strengths. Despite the addition of Access Governance capabilities, FIM still follows a relatively technical approach to Identity Provisioning with focus more on synchronization than on workflows. Strengths/Opportunities Microsoft recently has added Access Governance functionality. Strong integration with Windows/Active Directory environments. Weaknesses/Threats Coding is required in many situations. Still a pretty technical approach on Identity Provisioning. Enterprise level workflow and integration partially relies on 3 rd party products or customization. Table 29: Microsoft Forefront Identity Manager major strengths and weaknesses. With the addition of the BHOLD functionality Microsoft makes a significant step forward. However, these are in fact two different products with significant conceptual differences. It will take some while for deeper integration. A shortcoming of FIM is that it requires coding in many situations, more frequently than many other products in the market. Besides this, due to its concept, simple user interfaces and workflow-driven approaches frequently are implemented by either customization or using 3 rd party products. Security Functionality Integration Interoperability Usability strong neutral neutral neutral Table 30: Microsoft Forefront Identity Manager rating. Overall, Microsoft FIM is mainly an option either as part of some integrated provisioning products, focusing on Windows/Active Directory environments or environments which are heavily Windows/Active Directory-centric. Another option is deployment together with additional 3rd party solutions adding missing features. Page 33 of 49
34 11.16 Identity Manager from NetIQ Identity Manager from NetIQ is the former Novell Identity Manager which became part of NetIQ after the acquisition of Novell by The Attachmate Group. The product is amongst the ones with the largest user bases globally. It is very mature, supporting a broad range of target systems with specific connectors. Identity Manager is clearly targeted as an Identity Provisioning product with integrated role management and reporting capabilities. NetIQ also offers a stand-alone Access Governance Suite that is tightly integrated with Identity Manager for full Access Governance capabilities. Strengths/Opportunities Very large customer base and ecosystem. Strong, mature functionality covering all major aspects of Identity Provisioning. Strong support for a variety of target systems. Weaknesses/Threats Limited out-of-the-box Access Governance functionality but tightly integrated with NetIQ Access Governance Suite. Rich functionality sometimes complex to understand. Table 31: Identity Manager from NetIQ major strengths and weaknesses. For extended Access Governance requirements, NetIQ offers its Access Governance suite which integrates Identity Manager with SailPoint IdentityIQ as the additional Access Governance product sold as NetIQ Access Governance Suite. When looking at Identity Manager and its functionality, the breadth of available functionality is somewhat complex when starting to work with the product. On the other hand, NetIQ provides sophisticated tools to create and manage the Identity Provisioning environment, which go well beyond what many other vendors are offering. Security Functionality Integration Interoperability Usability strong strong Table 32: Identity Manager from NetIQ rating. Overall, Identity Manager from NetIQ remains a leading-edge product in the Identity Provisioning market segment with its broad, mature functionality. Page 34 of 49
35 11.17 Omada Identity Suite (based on Microsoft FIM) Omada, a Danish vendor, provides the Omada Identity Suite. This product typically makes use of Microsoft Forefront Identity Manager (FIM) for integrating with backend systems. However this is not a mandatory component. Omada potentially also can use ESB (Enterprise Service Bus) integrations or connect to other provisioning systems. In the common deployment model, i.e. FIM environments, Omada not only adds a business layer to Microsoft FIM for workflows, role management, and other features but also provides its own connectors (management agents in the terms of Microsoft FIM) to connect to specific environments like SAP systems. These features can be provided for any other underlying technology as well. Due to the major enhancements the product delivers and due to its go-to-market independence, this product is covered in this document as a solution which typically is combined with FIM but separate from FIM. Strengths/Opportunities Significant enhancements for Microsoft FIM. Strong features in workflows and role management. Provides advanced SAP connectivity for Microsoft FIM environments. Weaknesses/Threats Some (increasing) overlap to Microsoft FIM added features. Dependency on Microsoft FIM or other solutions for fulfillment. Table 33: Omada Identity Suite major strengths and weaknesses. This approach has its strengths and weaknesses. Opting for Omada Identity Suite not necessarily but commonly implies opting for Microsoft FIM, requiring licensing of both products. In any case it requires an additional fulfillment layer. The features of Omada Identity Suite are potentially available for other fulfillment options (i.e. other provisioning solutions) but with no out-of-the-box integrations as of now. This might change over time and has been done by Omada on a project basis.. The strong support for SAP environments and the added features for workflows, role management, Access Governance, and other business-centric functions, on the other hand, is a strength. However, Microsoft FIM in its current release also adds some of these capabilities, leading to an increasing overlap with Omada Identity Suite. Still, using Omada Identity Suite reduces complexity in customizing FIM environments by providing out-of-the-box capabilities. Security Functionality Integration Interoperability Usability strong Table 34: Omada Identity Suite rating. Overall, Omada Identity Suite is a very interesting complement to Microsoft FIM and, in combination, leads to a strong offering in the Identity Provisioning market. Besides that the product might be used as an integration layer on top of other or multiple Identity Provisioning tools. Page 35 of 49
36 11.18 Oracle Identity Manager Oracle Identity Manager is the Identity Provisioning component within the Oracle IAM portfolio. It provides mature capabilities in that area which have again been significantly improved with the 11g R2 release. Oracle over the past years has acquired a lot of different products. However, the company had defined a clear strategy for integration and is successfully delivering on that strategy. Oracle has delivered successfully on that strategy. This includes providing a consistent approach to service interfaces and other integrations. A consequence of that strategy is that Oracle tries to avoid redundancies and overlap of products. Thus, in some areas other Oracle products might be required to provide specific functionality which is not uncommon for the IAM portfolios of large vendors. Strengths/Opportunities Mature, feature-rich product focused on Identity Provisioning. Clear separation of functionality from other modules of Oracle IAM portfolio. Very broad support for different environments and enterprise-level architectures. Weaknesses/Threats Depending on use cases there exist several dependencies on other components of the Oracle IAM portfolio. Table 35: Oracle Identity Manager major strengths and weaknesses. Oracle Identity Manager, being a powerful solution, has been considered a relatively complex product regarding installation, basic configuration, and customization. With the new release, Oracle has made significant progress in these areas. Important changes include an extensible data model. Customizations can be done without coding in many situations and are clearly segregated from Oracle code. Features like shopping cart approaches have been implemented. Still a shortcoming is the fact that some few connectors are OEMed, which might lead to issues regarding implementation support. On the other hand, Oracle Identity Manager gains by its enterprise-level design, supporting modern architectural concepts like externalized workflow systems and other features. Security Functionality Integration Interoperability Usability strong strong Table 36: Oracle Identity Manager rating. Overall, Oracle Identity Manager counts among the leading-edge products in the market. It provides a broad set of features focused on Identity Provisioning and good support for enterprise-level architectures, including external workflow systems. Page 36 of 49
37 11.19 Quest One Identity Manager Quest One Identity Manager came to the Quest portfolio through the acquisition of the German vendor Völcker Informatik. The tool formerly known as ActiveEntry is now a cornerstone of the entire Quest IAM portfolio. Quest One Identity Manager builds on a sophisticated, consistent concept which allows for fairly simple customization and manages all dependencies between different objects in a very advanced way. The standard user interfaces of the product are very well constructed. Customization is straightforward Strengths/Opportunities Innovative, user-friendly interfaces. Well-thought out, sophisticated architecture and concepts. Integrated shopping cart paradigm and other leading-edge features. Weaknesses/Threats Product concept must be understood different from standard approaches. Table 37: Quest One Identity Manager major strengths and weaknesses. The product convinces with some rather uncommon features. While shopping cart approaches can be found in an increasing number of products, other features like the ability to simulate the effect of changes or the ability to show the state of any point in time in the past are rather unique. Customization is fairly straightforward, mainly done through configuration or based on creating rules. However, the concept needs to be well understood given that it is different from typical approaches to Identity Provisioning. In addition, the consistent architecture might become a limitation in some cases for specific needs of customization. However, the flexibility for customization has been greatly increased over the past few years. Security Functionality Integration Interoperability Usability strong strong strong Table 38: Quest One Identity Manager rating. Overall the product is amongst the most interesting and unique offerings in the Identity Provisioning market. Page 37 of 49
38 11.20 SailPoint IdentityIQ SailPoint started as a vendor specialized in Access Governance. In 2010 it became a player in the Identity Provisioning market through by expanding its flagship product, IdentityIQ, to include Lifecycle Manager and Provisioning Engine. In 2011, SailPoint assumed the support and maintenance of BMC s ControlSA assets, further expanding its footprint in the provisioning market. The SailPoint IdentityIQ product now is a solution integrates Access Governance and Identity Provisioning capabilities into a single product. In contrast to most other vendors, SailPoint provides its own Identity Provisioning connector technology but also provides out-of-the-box connectivity to Identity Provisioning solutions of other vendors. Strengths/Opportunities Strong Access Governance capabilities. Integration capabilities with other provisioning systems and SRM out-of-thebox. User-friendly interfaces. Weaknesses/Threats No multi-tenancy support. Table 39: SailPoint IdentityIQ major strengths and weaknesses. Due to its origin in the Access Governance market, the IdentityIQ user interfaces are geared towards business users. The approach in general is very much business-driven and less technology-focused than what some of the classical vendors in that market provide. Besides supporting connectivity to target systems via Identity Provisioning, the product also directly supports integration with SRM (Service Request Management) tools. Amongst the shortcomings there is the lack of multi-tenancy support. Security Functionality Integration Interoperability Usability strong strong Positive Table 40: SailPoint IdentityIQ rating. Overall, the product is an interesting alternative to the standard approaches to Identity Provisioning and gains by its strong capabilities for integrating with different tools in that area plus the out-of-the-box Access Governance features. Page 38 of 49
39 11.21 SAP NetWeaver Identity Management SAP NetWeaver Identity Management is the Identity Provisioning product within the SAP NetWeaver portfolio. The product is based on the MaxWare acquisition, a Norwegian vendor. Since that acquisition SAP has greatly improved the product, especially through the addition of out-of-the-box integration with SAP business software. The company also developed several rapid deployment solutions especially for integration with different other SAP components. Integration with SAP GRC is also tight. SAP provides a number of own connectors but also relies on connectors of partners for several integrations. Strengths/Opportunities Strong integration with SAP business software, including standard rapid deployment options. Very flexible customization options. Tight integration with SAP GRC. Weaknesses/Threats Customization is typically required and can become complex. Customization might lead to issues for release changes. Standard user interfaces still not leadingedge. Table 41: SAP NetWeaver Identity Management major strengths and weaknesses. Customization of SAP NetWeaver Identity Management is very flexible. However, not all features are exposed via stable standard interfaces, even while the current version shows significant progress in that area and adds RESTful interfaces for user interface customization. That leads to a risk of customizations directly at the database level which are hard to handle when upgrading to new releases. In addition the need for customization is comparatively high. Another shortcoming, compared to leading-edge products in the market, is the standard user interface provided by SAP NetWeaver Identity Management. SAP has made progress in that area, however there remains room for improvement. Security Functionality Integration Interoperability Usability strong strong neutral Table 42: SAP NetWeaver Identity Management rating. Overall, SAP NetWeaver Identity Management is a good solution in Identity Provisioning. However, customers have to be careful regarding customization which is flexible but could become cumbersome over time. Page 39 of 49
40 11.22 The Dot Net Factory EmpowerID The Dot Net Factory EmpowerID takes a rather unique approach on Identity Provisioning. It is built from scratch on a Business Process Management/Workflow platform. All standard components rely on that platforms and customizations can be made using the same environment. That allows for great flexibility, while the product also delivers a broad set of out-of-the-box features. Strengths/Opportunities Unique, business process-based approach on Identity Provisioning. Functionality well beyond Identity Provisioning. Flexible customization. Weaknesses/Threats Might require more customization than other tools, but straightforward approach. Small partner ecosystem. Table 43: The Dot Net Factory EmpowerID major strengths and weaknesses. Customization of EmpowerID is very flexible, based on the approach chosen by The Dot Net Factory. The name implies that the technical platform is.net. The product delivers a very broad feature set for Identity and Access Management, going well beyond Identity Provisioning but with tight integration to these core features. That includes Dynamic Authorization Management capabilities and integrated Identity Federation features. Overall, support for new technologies and standards like OAuth, OpenID, RESTful APIs, or integrated STS (Secure Token Service) features is broad. However, the product also delivers a broad functionality for basic Identity Provisioning requirements. Security Functionality Integration Interoperability Usability strong Table 44: The Dot Net Factory EmpowerID rating. Overall, The Dot Net Factory EmpowerID is a very interesting and innovative solution. The approach taken might fit or not that needs to be evaluated. It is definitely worth to have a look at the product. Page 40 of 49
41 12. Products at a glance Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in table 45. Product Security Functionality Integration Interoperability Usability Atos DirX Identity strong neutral Avatier Identity and Access Risk Management Suite Beta Systems SAM Enterprise Identity Management Suite neutral strong strong neutral CA IdentityMinder strong strong Courion Access Risk Management Suite strong strong CrossIdeas IDEAS strong neutral neutral neutral neutral econet cmatrix strong neutral Evidian Identity & Access Manager strong neutral Fischer Automated Role & Account Management strong strong ForgeRock OpenIDM neutral neutral Hitachi ID Management Suite strong neutral IBM Security Identity Manager strong neutral ILEX Meibo/MPP neutral ism bi-cube strong neutral Microsoft Forefront Identity Manager strong neutral neutral neutral Identity Manager from NetIQ strong strong Omada Identity Suite (based on Microsoft FIM) strong Oracle Identity Manager strong strong Quest One Identity Manager strong strong strong SailPoint IdentityIQ strong strong SAP NetWeaver Identity Management strong strong neutral The Dot Net Factory EmpowerID strong Table 45: Comparative overview of the ratings for the product capabilities. Page 41 of 49
42 In addition we provide in table 46 an overview which also contains four additional ratings for the vendor, going beyond the product view provided in the previous section. While the rating for Financial Strength applies to the vendor, the other ratings apply to the product. Vendor Innovativeness Market Position Financial Strength Ecosystem Atos strong neutral Avatier strong neutral Beta Systems CA Technologies strong Courion neutral CrossIdeas neutral neutral neutral Econet neutral critical critical critical Evidian strong neutral Fischer International neutral neutral ForgeRock neutral neutral neutral neutral Hitachi ID neutral strong neutral IBM strong strong strong ILEX neutral critical neutral neutral ism critical neutral critical Microsoft neutral strong strong strong NetIQ strong strong strong Omada neutral neutral Oracle strong strong strong Quest Software strong strong SailPoint SAP strong The Dot Net Factory neutral neutral Table 46: Comparative overview of the ratings for vendors. Page 42 of 49
43 Table 46 requires some additional explanation regarding the critical rating. In the area of Innovativeness, this rating is applied if vendors provide none or very few of the more advanced features we have been looking for in that analysis, like support for multi-tenancy, shopping cart approaches for requesting access, and others. These ratings are applied for Market Position in the case of vendors which have a very limited visibility outside of regional markets like France or Germany or even within these markets. Usually the number of existing customers is also limited in these cases. In the area of Financial Strength, this rating applies in case of a lack of information about financial strength or for vendors with a very limited customer base, but also based on some other criteria. This doesn t imply that the vendor is in a critical financial situation; however the potential for massive investments for quick growth appears to be limited. On the other hand, it s also possible that vendors with better ratings might fail and disappear from the market. Finally, a critical rating regarding Ecosystem applies to vendors which have no or a very limited ecosystem with respect to numbers and regional presence. That might be company policy, to protect the own consulting and system integration business. However our strong believe is that growth and successful market entry of companies into a market segment relies on strong partnerships. Beyond that analysis, we ve compared the position of vendors regarding combinations of our three major areas of analysis, i.e. market leadership, product leadership, and innovation leadership. That analysis provides additional information. Page 43 of 49
44 Fig. 4: The Market/Product Matrix. Vendors below the line have a weaker market position than expected according to their product maturity. Vendors above the line are sort of overperformers when comparing Market Leadership and Product Leadership. In that comparison it becomes clear which vendors are better positioned in our analysis of Product Leadership compared to their position in the Market Leadership analysis. Vendors above the line are sort of overperforming in the market. It comes as no surprise that these are mainly the very large vendors, while vendors below the line frequently are innovative but focused on specific regions. We ve defined four segments of vendors to help in classifying them: Market Leaders: Strong Potentials: This segment contains vendors which have a strong position in our categories of Product Leadership and Market Leadership. These vendors have an overall strong to excellent position in the market. This segment includes vendors which have strong products, being ranked high in our Product Leadership evaluation. However, their market position is not as good. That might be caused by various reasons, like a regional focus of the vendors or the fact that they are niche vendors in that particular market segment. Page 44 of 49
45 Market Performers: Specialists: Here we find vendors which have a stronger position in Market Leadership than in Product Leadership. Typically such vendors have a strong, established customer base due to other market segments they are active in. In that segment we typically find specialized vendors which have in most cases specific strengths but neither provide full coverage of all features which are common in the particular market segment nor count among the software vendors with overall very large portfolios. Fig. 5: The Product/Innovation Matrix. Vendors below the line are less innovative, vendors above the line are, compared to the current Product Leadership positioning, more innovative. This view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation between the two views with few exceptions. This distribution and correlation is typical for mature markets with a significant number of established vendors plus a number of smaller vendors. Again we ve defined four segments of vendors. These are Technology Leaders: This group contains vendors which have technologies which are strong regarding their existing functionality and which show a good degree of innovation. Page 45 of 49
46 Establishment: Innovators: Me-toos: In that segment we typically find vendors which have a relatively good position in the market but don t perform as strong when it comes to innovation. However, there are exceptions if vendors take a different path and focus on innovations which are not common in the market and thus do not count that strong for the Innovation Leadership rating. Here we find highly innovative vendors with a limited visibility in the market. It is always worth having a look at this segment because vendors therein might be a fit especially for specific customer requirements. This segment mainly contains those vendors which are following the market. There are exceptions in the case of vendors which take a fundamentally different approach to provide specialized point solutions. However, in most cases this is more about delivering what others have already created. Fig. 6: The Innovation/Market Matrix. Vendors are performing well in the market compared to their relative weak position in the Innovation Leadership rating, while vendors above the line show based on their ability to innovate, the biggest potential for improving their market position. Page 46 of 49
47 The third relation shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innovation Leaders. This might impose a risk for their future position in the market, depending on how they improve their Innovation Leadership position. On the other hand, vendors which are highly innovative have a good chance for improving their market position but might also fail, especially in the case of smaller vendors. The four segments we have defined here are Big Ones: Top Sellers: Hidden Gems: Point Vendors: These are market leading vendors with a good to strong position in Innovation Leadership. This segment mainly includes large software vendors. In that segment we find vendors which have an excellent market position compared to their ranking in the Innovation Leadership rating. That can be caused by a strong sales force or by selling to a specific community of customer customers, i.e. a loyal and powerful group of contacts in the customer organizations. Here we find vendors which are more innovative than it would be expected when looking at their Market Leadership rating. These vendors have a strong potential for growth, however they also might fail in delivering on that potential. Nevertheless this group is always worth a look due to their specific position in the market. In that segment we find vendors which typically either have point solutions or which are targeting specific groups of customers like SMBs with solutions focused on these, but not necessarily covering all requirements of all types of customers and thus not being amongst the Innovation Leaders. These vendors might be attractive if their solution fits the specific customer requirements. Finally, we ve put together the three different ratings for leadership, i.e. Market Leadership, Product Leadership, and Innovation Leadership and created an Overall Leadership rating. This is shown below in figure 7. Page 47 of 49
48 Fig. 7: The Overall Leadership rating for the Identity Provisioning market segment. Again: Leadership doesn t automatically mean that these vendors are the best fit for a specific customer requirement. A thorough evaluation of these requirements and a mapping to the features provided by the vendor s products is mandatory Kuppinger Cole Ltd. All rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. KuppingerCole disclaim all warranties as to the adequacy, accuracy or to the completeness of information contained in this document. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. Page 48 of 49
49 The Future of Information Security Today. KuppingerCole supports IT professionals with outstanding expertise in defining IT strategies and in relevant decision making processes. As a leading analyst company KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business. Kuppinger Cole Ltd. Headquarters Arnheimer Str. 46 D Düsseldorf Germany Phone +49 (211) Fax +49 (211) KuppingerCole, founded in 2004, is a leading Europe-based analyst company for identity focused information security, both in classical and in cloud environments. KuppingerCole stands for expertise, thought leadership, and a vendor-neutral view on these information security market segments, covering all relevant aspects like Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), IT Risk Management, Authentication and Authorization, Single Sign-On, Federation, User Centric Identity Management, eid cards, Cloud Security and Management, and Virtualization. For further information, please contact [email protected] Page 49 of 49
Access Management and Federation
KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger September 2013 Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding
LEADERSHIP COMPASS by Martin Kuppinger January 2014. Enterprise Single Sign-On. KuppingerCole Report
KuppingerCole Report LEADERSHIP COMPASS by Martin Kuppinger January 2014 Leaders in innovation, product features, and market reach for Enterprise Single Sign-On. Your Compass for finding the right path
VENDOR REPORT by Martin Kuppinger April 2013. Atos DirX. KuppingerCole
KuppingerCole VENDOR REPORT by Martin Kuppinger April 2013 Identity, Security, and Risk Management as part of a broad solution portfolio. Industry focus and integration as reason for an IAM Business Case
EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings [email protected] October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
ObserveIT User Activity Monitoring
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on
2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance
Kuppinger Cole Virtual Conference The Three Elements of Access Governance
Kuppinger Cole Virtual Conference The Three Elements of Access Governance Martin Kuppinger, Kuppinger Cole [email protected] December 8th, 2009 This virtual conference is sponsored by Axiomatics and
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Protecting the keys to your kingdom against cyber-attacks and insider threats
KuppingerCole Report WHITEPAPER by Martin Kuppinger November 2015 Protecting the keys to your kingdom against cyber-attacks and insider threats All organizations today are under constant attack, and high-privilege
EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
Cloud User and Access Management
KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud
White paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Management Challenges of Software
WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things
WHITEPAPER ForgeRock Identity Management Identity lifecycle management for users, devices, and things Introduction Organizations of all sizes employ a variety of different approaches to manage identity
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
MICROSOFT HIGHER SOLUTION
SOLUTIONS AT A GLANCE United States Higher Education Gr Canyon University () is a private Gr Canyon has approximately University () 41,500 is students, a private 111 Christian full-time college faculty
EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger January 2015 by Martin Kuppinger [email protected] January 2015 Content 1 Introduction... 3 2 Product Description... 4 3 Strengths and Challenges...
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY Identity-centric Security: The ca Securecenter Portfolio How can you leverage the benefits of cloud, mobile, and social media, while protecting
secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT
OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential
CA Aion Business Rules Expert r11
PRODUCT sheet: CA AION BUSINESS RULES EXPERT r11 CA Aion Business Rules Expert r11 CA Aion Business Rules Expert r11 (CA Aion BRE) is an industry-leading system that automates and streamlines business
Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 The Importance of Identity for SaaS
G Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack
White Paper Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack 1. Overview 2. OpenAM 3. OpenIDM 4. OpenDJ 5. Getting Started Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity
Magic Quadrant for Identity Governance and Administration
G00261633 Magic Quadrant for Identity Governance and Administration Published: 12 January 2015 Analyst(s): Felix Gaehtgens, Brian Iverson, Steve Krapes The IGA market is transforming legacy, on-premises
Overview and Frequently Asked Questions
Overview and Frequently Asked Questions OVERVIEW Oracle is pleased to announce that we have completed our acquisition of Siebel Systems and we are now operating as one. As the leader in customer relationship
SAM Enterprise Identity Manager
SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
Select the right configuration management database to establish a platform for effective service management.
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things
WHITEPAPER OpenIDM Identity lifecycle management for users, devices, & things Introduction Organizations of all sizes employ a variety of different approaches to manage identity administration and provisioning
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
NextLabs Rights Management Platform
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger October 2015 Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting
midpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
Identity Management and Single Sign-On
Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
RSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
Embracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
SIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
When millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
EMA Radar for Workload Automation (WLA): Q2 2012
EMA Radar for Workload Automation (WLA): Q2 2012 By Torsten Volk, Senior Analyst Enterprise Management Associates (EMA) June 2012 Introduction Founded in 2004, Network Automation focuses on automating
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
BMC Software Cloud Service Lifecycle
BMC Software Cloud Service Lifecycle Riyadh, 15th May 2012 Dominic Wellington, Cloud & DCA Marketing Manager EMEA m [email protected] O +39 340 8165717 t @dwellington 1 To Achieve Success, Manage
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
MICROSOFT HIGHER EDUCATION CUSTOMER SOLUTION
SOLUTIONS AT A GLANCE Country United States Industry Higher Education Company Grand Canyon University (GCU) is a private Christian college located in Phoenix, Arizona. GCU has approximately 41,500 students,
Leveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
Problem Description Meeting Scheduling across Heterogeneous Calendar Systems and Organizational Borders
Problem Description Meeting Scheduling across Heterogeneous Calendar Systems and Organizational Borders Background Using electronic calendars has become the most prominent way of managing personal time.
TECHNOLOGY BRIEF CA Technologies Solutions for Identity, Credential, and Access Management Michael Liou CA Security Management
TECHNOLOGY BRIEF CA Technologies Solutions for Identity, Credential, and Access Management March 2011 CA Technologies solutions for identity, credential, and access management (ICAM) Michael Liou CA Security
CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
Identity Access Management Challenges and Best Practices
Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December
Simplify Identity Management with the CA Identity Suite
SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
The 7 Tenets of Successful Identity & Access Management
The 7 Tenets of Successful Identity & Access Management Data breaches. The outlook is not promising. Headlines practically write themselves as new breaches are uncovered. From Home Depot to the US Government
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
PROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
Office365 Adoption eguide. Identity and Mobility Challenges. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Office365 Adoption eguide Identity and Mobility Challenges Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Executive Summary Office 365 Adoption Accelerating Through the
Strategic Choices and Key Success Factors for Law Firms June, 2010. Alan Hodgart
Strategic Choices and Key Success Factors for Law Firms June, 2010 Alan Hodgart The Association of Danish Law Firms 1 Huron Consulting Group Inc. All rights reserved. Huron is a management consulting firm
Identity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil
Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil SaaS, PaaS, IaaS Powered by advancements in cloud technology, the X as a Service model has become exceptionally popular
An Application-Centric Infrastructure Will Enable Business Agility
An Application-Centric Infrastructure Will Enable Business Agility March 2014 Prepared by: Zeus Kerravala An Application-Centric Infrastructure Will Enable Business Agility by Zeus Kerravala March 2014
Business Process Management The Must Have Enterprise Solution for the New Century
Business Process Management The Must Have Enterprise Solution for the New Century 15200 Weston Parkway, Suite 106 Cary, NC 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-Mail: [email protected] WWW:
Data Warehouse Appliances: The Next Wave of IT Delivery. Private Cloud (Revocable Access and Support) Applications Appliance. (License/Maintenance)
Appliances are rapidly becoming a preferred purchase option for large and small businesses seeking to meet expanding workloads and deliver ROI in the face of tightening budgets. TBR is reporting the results
Securing your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
FREQUENTLY ASKED QUESTIONS. Oracle Applications Strategy
FREQUENTLY ASKED QUESTIONS Oracle Applications Strategy The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
IBM Workload Automation: Major Improvements in Hybrid Cloud Workload Management, Predictive Analytics and User Experience
Research Report IBM Workload Automation: Major Improvements in Hybrid Cloud Workload Management, Executive Summary Imagine the challenges involved in trying to manage application workflow across dozens
Microsoft SOA Roadmap
Microsoft SOA Roadmap Application Platform for SOA and BPM Thomas Reimer Enterprise Technology Strategist, SOA and BPM Microsoft Corporation (EMEA) Trends and Roadmap THE FUTURE OF DYNAMIC IT Market Trends
