KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market
- LANGUAGE: English DATE: Tuesday, September 03, 2019 TIME: 3:00pm CEST, 2:00pm BST, 9:00am EDT
Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.
The significant growth of the IDaaS AM market can be attributed to the ever-increasing demand of organizations to achieve better time-to-value proposition over on-premises IAM deployments, and to extend IAM capabilities to meet the security requirements of a growing SaaS portfolio.
The KuppingerCole Analysts Leadership Compass “IDaaS Access Management” discusses the market direction and provides a detailed evaluation of market players and offers essential guidance for IAM and security leaders to make informed decisions.
In this KuppingerCole webinar you will learn:
- about use cases for IDaaS technology adoption and their primary characteristics
- about the current state of the IDaaS AM market
- why IDaaS AM offers a springboard for most organizations to start using foundational IAM elements delivered from the cloud
KuppingerCole Principal Analyst Martin Kuppinger will take you through the main findings of the Leadership Compass and explain the rankings.
Leadership Compass: IDaaS Access Management - 79016
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. This Leadership Compass discusses the market direction and provides a detailed evaluation of market players to offer necessary guidance for IAM and security leaders to make informed decisions.
Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.