Cloud User and Access Management

Similar documents
Access Management and Federation

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

Connecting Users with Identity as a Service

LEADERSHIP COMPASS by Martin Kuppinger January Enterprise Single Sign-On. KuppingerCole Report

How to Get to Single Sign-On

SAML SSO Configuration

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Extend and Enhance AD FS

1 Introduction Product Description Strengths and Challenges Copyright... 5

Magic Quadrant for Identity and Access Management as a Service, Worldwide

ObserveIT User Activity Monitoring

Identity. Provide. ...to Office 365 & Beyond

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

The Forrester Wave : Identity And Access Management Suites, Q3 2013

Magic Quadrant for Identity and Access Management as a Service

Delivering value to the business with IAM

Interoperate in Cloud with Federation

VENDOR REPORT by Martin Kuppinger April Atos DirX. KuppingerCole

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

Microsoft Enterprise Mobility and Client Futures

Managing Access for External Users with ARMS

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

Centrify Cloud Connector Deployment Guide

Customer Identity and Access Management (CIAM) Buyer s Guide

Microsoft Enterprise Mobility Suite

SecureAuth homes in on BYOD management and mobile app access

The Forrester Wave : B2E Cloud IAM, Q2 2015

ipass Unlimited 1. Introduction 2. Challenges and Trends

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Connecting IdM services to SURFconext

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Implementing Microsoft Azure Infrastructure Solutions

NextLabs Rights Management Platform

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

Hybrid Cloud Identity and Access Management Challenges

Data Ingestion into Office 365

Roadmap to Solving Enterprise Mobility

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Increase the Security of Your Box Account With Single Sign-On

Enterprise Mobility Services

CA SiteMinder SSO Agents for ERP Systems

PROTECT YOUR WORLD. Identity Management Solutions and Services

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Pick Your Identity Bridge

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-On 2014 Vendor Assessment

Managing Office 365 Identities and Services

Optimizing Service Levels in Public Cloud Deployments

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Flexible Identity Federation

Six Best Practices for Cloud-Based IAM

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

MS 10978A Introduction to Azure for Developers

UnboundID sharpens focus on untapped opportunities in customer identity management GARRETT BEKKER

CA Single Sign-On Migration Guide

Identity Provisioning

The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Moving Beyond User Names & Passwords

AZP: Microsoft Azure Infrastructure for IT Professional

Protecting the keys to your kingdom against cyber-attacks and insider threats

Cloud SSO and Federated Identity Management Solutions and Services

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Managing Office 365 Identities and Services

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Course 20346: Managing Office 365 Identities and Services

Chapter 10. Cloud Security Mechanisms

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

How to Unlock Agility by Backing up to, from, and in the Cloud

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Designing for Office 365 Infrastructure

A Standards-based Mobile Application IdM Architecture

Identity and Access Management Memorial s Strategic Roadmap

Active Directory Integration WHITEPAPER

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Transcription:

KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market. by Martin Kuppinger Leadership Compass By KuppingerCole

Content 1. Management Summary... 5 2. Methodology... 10 3. Product Rating... 11 4. Vendor Rating... 13 5. Vendor Coverage... 14 6. Market Segment... 14 7. Specific features analyzed... 16 8. Market Leaders... 17 9. Product Leaders... 18 10. Innovation Leaders... 19 11. Product/service evaluation... 20 11.1 CA Technologies Secure Cloud (also known as CA CloudMinder)...21 11.2 Exostar LLC Managed Access Gateway (MAG) and Secure Access Manager (SAM)...22 11.3 iwelcome...23 11.4 Microsoft Azure Active Directory Premium...24 11.5 Okta, Inc....25 11.6 OneLogin...26 11.7 Ping Identity PingOne and PingFederate...27 11.8 Salesforce Identity and Salesforce Identity Connect...28 11.9 SecureAuth IdP...29 11.10 Telekom Internet Business Suite...30 12. Products at a glance... 31 12.1 Ratings at a glance...31 12.2 The Market/Product Matrix...32 12.3 The Product/Innovation Matrix...34 12.4 The Innovation/Market Matrix...35 13. Overall Leadership... 36 14. Vendors and Market Segments to watch... 38 14.1 Atos...38 14.2 Intel/McAfee...39 14.3 NetIQ...39 14.4 RSA...39 15. Copyright... 39 Page 2 of 40

Content Tables Table 1: CA CloudMinder major strengths and weaknesses... 21 Table 2: CA CloudMinder rating.... 21 Table 3: Exostar LLC Managed Access Gateway (MAG) and Secure Access Manager (SAM) major strengths and weaknesses.... 22 Table 4: Exostar LLC Managed Access Gateway (MAG) and Secure Access Manager (SAM) rating.... 22 Table 5: iwelcome major strengths and weaknesses.... 23 Table 6: iwelcome rating.... 23 Table 7: Microsoft Azure Active Directory Premium major strengths and weaknesses.... 24 Table 8: Microsoft Azure Active Directory Premium rating.... 24 Table 9: Okta major strengths and weaknesses.... 25 Table 10: Okta rating.... 25 Table 11: OneLogin major strengths and weaknesses.... 26 Table 12: OneLogin rating.... 26 Table 13: Ping Identity PingOne and PingFederate major strengths and weaknesses.... 27 Table 14: Ping Identity PingOne and PingFederate rating.... 27 Table 15: Salesforce Identity and Salesforce Identity Connect major strengths and weaknesses.... 28 Table 16: Salesforce Identity and Salesforce Identity Connect rating.... 28 Table 17: SecureAuth IdP major strengths and weaknesses.... 29 Table 18: SecureAuth IdP rating.... 29 Table 19: Telekom Internet Business Suite major strengths and weaknesses... 30 Table 20: Telekom Internet Business Suite rating.... 30 Table 21: Comparative overview of the ratings for the product capabilities.... 31 Table 22: Comparative overview of the ratings for vendors.... 32 Table of Figures Fig. 1: Overall Leaders in the market segment... 6 Fig. 2: Product Leaders in the market segment... 7 Fig. 3: Market Leaders in the market segment... 8 Fig. 4: Innovation Leaders in the market segment... 9 Fig. 5: The main building blocks of.... 15 Page 3 of 40

Fig. 6: Market leaders in the market segment.... 17 Fig. 7: Product leaders in the market segment.... 18 Fig. 8: Innovation leaders in the market segment.... 19 Fig. 9: The Market/Product Matrix... 33 Fig. 10: The Product/Innovation Matrix... 34 Fig. 11: The Innovation/Market Matrix... 35 Fig. 12: The Overall Leadership rating for the market segment.. 37 Related Research Advisory Note: Identity & Access Management/Governance Blueprint - 70839 Advisory Note: IAM Predictions and Recommendations 2014-2018 - 71120 Advisory Note: Secure your Cloud against Industrial Espionage - 70997 Advisory Note: Cloud IAM: More than just Single Sign-On to Cloud Applications - 71031 Advisory Note: The new ABC for IT: Agile Businesses Connected - 70998 Advisory Note: Connected Enterprise Step-by-step - 70999 Executive View: Cloud Standards Cross Reference - 71124 Executive View: EU Guidelines for Cloud Service Level Agreements - 71154 Executive View: Executive View Microsoft Azure RMS - 70976 Executive View: PingFederate 7-70801 Executive View: Salesforce Platform as a Service Security and Assurance - 70751 Executive View: Exostar Services for Life Sciences - 70878 Executive View: PingOne - 70870 Leadership Compass: Cloud IAM/IAG - 71121 Leadership Compass: Identity Provisioning - 70949 Leadership Compass: Enterprise Key and Certificate Management - 70961 Leadership Compass: Enterprise Single Sign-On - 70962 Leadership Compass: Privilege Management - 70960 Leadership Compass: Access Management and Federation - 70790 Leadership Compass: Access Governance - 70735 Product Report: Microsoft Azure Active Directory - 70977 Scenario: Understanding Cloud Security - 70321 Scenario: Understanding Cloud Computing - 70157 Scenario: Understanding Identity and Access Management - 70129 Vendor Report: SecureAuth Corporation - 70260 Page 4 of 40

1. Management Summary The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that bring a combination of directory services, user management, and access management to the Cloud. There are many terms for what we call Cloud IAM for Cloud Identity and Access Management. IDMaaS (Identity Management as a Service), IDaaS (Identity as a Service), and various other names are used. However, there is no common understanding of what constitutes that market segment to which vendors have taken different paths. One common denominator is Cloud Single Sign-On, which allows users to access a portal that links to his (or her ) Cloud services and provides a seamless login, either based on passing through username and password or relying on Identity Federation standards. This will change, but there will be at least two distinct approaches to Cloud IAM that overlap in their core functionality. One is Cloud-based IAM/IAG that provides Identity Provisioning and Access Governance capabilities as a Cloud service. These services in fact are a direct counterpart to established on-premise Identity Provisioning and Access Governance solutions. They will gain momentum primarily in two areas: Customers that are already massively relying on Cloud services or migrating a significant portion of their IT services to the Cloud. Running IAM/IAG as a service from the Cloud is simply a logical extension for these customers. Small and medium-sized business that do not have IAM/IAG in place but want to quick-start their deployments by relying on a standardized offering. These types of solutions also provide good out-of-the-box integration with on-premise systems, allowing management and governance for identities and access to these services. The second group of solutions primarily focuses on managing what we call the new ABC: Agile Businesses: Connected. We refer to these solutions as. These solutions focus on managing external users, such as business partners and customers, and their access to Cloud services and on-premise web-based applications. Commonly, these services are a combination of identity federation, self-service registration, directory services, and access management solutions, all provided as a Cloud service. Their primary business benefit is in enabling customers to: Rapidly and easily on-board and off-board business partners and customers; Manage access to Cloud services and on-premise web applications; Allow controlled access of internal users to Cloud applications and partner applications. While both groups of solutions might converge in the long run, both provide far more functionality than just Cloud Single Sign-On, which will not remain sufficient for success in business. Page 5 of 40