Identity & Access Management

Become a Delta Member

This research includes findings from: * 210 survey completes * 6 attendees CIO focus group * 6 CIO primary research interviews *

Identity and access management (IAM) is one of the key components of modern business, blocking unauthorised access to critical systems. Because it integrates with many different applications, it is itself one of hackers’ most high-value targets.

Companies often adopt IAM early in their lifecycle, both to increase security and handle regulatory compliance – although IT leaders say the most challenging aspect of IAM, rather than rules and regulations, is often staff acceptance, at every level of the company.

In this report we present a working definition of IAM; examine how IT leaders address the major challenges of staff acceptance, monitoring and product integration; and examine the market players, from the most significant to niche vendors.

This report covers the following areas:

  • Quantitative and qualitative data on how IT leaders are choosing and using IAM solutions in the real world, including their major challenges and how they are addressing them.
  • Current and future trends in the market, including the convergence of IAM and UEM and addition of new authentication methods.
  • Deep analysis of all major players in the UK market – not based on marketing spend, but on actual feedback from UK IT leaders.

 

Table of contents

IAM Vendor Ratings

  • Interacting with charts
  • Methodology
  • IAM Vendors
  • IAM Solutions

Executive Summary

  • The IAM Marketplace
  • Introduction
  • Modern IAM
  • General trends
    • Silent IAM
    • Regulation
    • Near-parity between separate and multi-functional tools
  • Future trends
    • IAM and UEM converge
    • Microservices
    • Changing authentication methods
  • Challenges
  • Factors in choosing a vendor or solution
    • Deployment
  • Vendor awareness
  • Leading vendors
  • Falling vendors
  • End-user sentiment
  • Appendix

Microsoft

  • Summary
  • Company background
  • Solution
  • Pricing
  • Data centres
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Google

  • Summary
  • Company background
  • Solution
  • Pricing
  • Data centres
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

AWS

  • Summary
  • Company background
  • Solution
  • Pricing
  • Data centres
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

RSA

  • Summary
  • Company background
  • Solution
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Oracle

  • Summary
  • Company background
  • Solution
  • Pricing
  • Data centres
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Okta

  • Summary
  • Company background
  • Solution
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Other vendors

  • Auth0
  • ForgeRock
  • IBM
  • OneLogin
  • Ping Identity
  • SailPoint
  • Thycotic
  • Ubisecure

Conclusions

Avoid making costly errors (when making IT investment and implementation decisions)

UK and European research, not USA focused or vendor biased

Actionable advice from Computing’s industry experts and community, saving you time and money