Decision Matrix: Selecting an Identity and Access Management Vendor

Date: November 22, 2010
Pages: 53
Price:
US$ 3,995.00
Publisher: Ovum
Report type: Strategic Report
Delivery: E-mail Delivery (PDF)
ID: DFDD5DC0D68EN
Leaflet:

Download PDF Leaflet

Decision Matrix: Selecting an Identity and Access Management Vendor
License Price: US$ 9,990.00

Introduction

As regulatory pressures increase and IT organizations continue to face budget pressures, identity and access management solutions become part of the toolset necessary to secure the increasingly distributed and virtual enterprise in a resource-efficient way. Ovum has developed this Decision Matrix to help enterprises select the most appropriate IAM suite vendors.

Features and benefits
  • IAM suite vendor benchmarking across functional capabilities, end-user assessment of product and service quality, and market presence.
  • Benchmarking of IAM suite vendors across key IAM technologies, such as single sign-on, federation, and web access control.
  • Helps understand key IAM vendors' focus areas and priorities.
  • Helps identify key IAM trends impacting selection decisions and vendor roadmaps.
  • Helps identify areas adjacent to IAM that are likely to be part of IAM portfolio selection decisions in the near term.
Highlights

IBM, CA, Novell, and Oracle dominate the high end of the market and are the top overall performers. Although Hitachi and Evidian are smaller vendors, they should both be considered due to their impressive IAM suites. Microsoft’s offering can now be considered very competitive, and is widely recognized as an IAM suite provider.In spite of the economic climate, IAM is a high-priority area of investment. Regulation is still the biggest driver and the market is still mostly unchanged. While "cloud" as a term is overused, there are areas within IAM that are very relevant to the cloud.The importance of role management is often overstated, but distinct capabilities within role management are likely to grow in importance. DLP and SIEM are beginning to overlap with IAM. IAM is still a very fragmented market.

Your key questions answered
  • Which are the most suitable IAM suite vendors for end-to-end requirements?
  • Among the most suitable IAM suite vendors, which are the leaders across individual IAM technology dimensions, and which have the largest presence?
  • What are the key focus areas of the nine IAM vendors profiled in this report?
  • How have their customers assessed the profiled vendors' product quality, portfolio depth, and quality of the services provided?
  • What are the key trends impacting the IAM market and related areas? Which decision factors are likely to be most critical for IAM portfolio selection?

SUMMARY

Catalyst
Ovum view
Key messages

MARKET DEVELOPMENTS

In spite of the global economic climate, IAM is a high-priority area
Regulation is still the biggest driver, and the market is mostly unchanged
How well the pieces integrate would be a critical tool selection factor
While the term is overused, the cloud is relevant to distinct IAM areas
Role management is often overhyped, but parts of it are likely to grow
DLP and SIEM are beginning to overlap with IAM
Identity and Access Management is still a fragmented market
The Identity and Access Management Decision Matrix
IBM, CA, Novell, and Oracle are the top overall performers
The combined Oracle-Sun offering makes Oracle a top IAM vendor
Microsoft’s offering can be now be considered comprehensive
Hitachi and Evidian are smaller vendors with impressive IAM suites

MARKET LEADERS

Overview
Market Leaders: Technology
The state of technology leadership reflects IAM market maturity
The ‘shortlisted’ vendors are the leaders across most categories
Strong authentication remains a specialist business
Market Leaders: Customer Sentiment
The “Shortlisted” vendors' performance has not been uniformly stellar
Hitachi-ID’s performance has been extremely impressive
Market Leaders: Market Impact
Oracle is now among the IAM behemoths
The smaller vendors are growing faster than the IAM giants

VENDOR ANALYSIS

CA: Identity and Access Management Radars
Recommendation: Shortlist
Entrust: Identity and Access Management Radars
Recommendation: Explore
Evidian: Identity and Access Management Radars
Recommendation: Consider
Hitachi-ID: Identity and Access Management Radars
Recommendation: Consider
IBM: Identity and Access Management Radars
Recommendation: Shortlist
Microsoft: Identity and Access Management Radars
Recommendation: Consider
Novell: Identity and Access Management Radars
Recommendation: Shortlist
Oracle: Identity and Access Management Radars
Recommendation: Shortlist
RSA Security: Identity and Access Management Radars
Recommendation: Explore
Conclusion

APPENDIX

Ovum ratings
Methodology
Extended methodology
Technology
User Sentiment
Market Impact
Further reading
Definitions
Author
Ovum Consulting
Disclaimer
Skip to top


Ask Your Question

Decision Matrix: Selecting an Identity and Access Management Vendor
Company name*:
Contact person*:
Phone/fax*:
Email*:
Request invoice
Your enquiry:
Please click on a Check Box below to confirm you are not a robot: