KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market
- LANGUAGE: English DATE: Tuesday, September 03, 2019 TIME: 3:00pm CEST, 2:00pm BST, 9:00am EDT
Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.
The significant growth of the IDaaS AM market can be attributed to the ever-increasing demand of organizations to achieve better time-to-value proposition over on-premises IAM deployments, and to extend IAM capabilities to meet the security requirements of a growing SaaS portfolio.
The KuppingerCole Analysts Leadership Compass “IDaaS Access Management” discusses the market direction and provides a detailed evaluation of market players and offers essential guidance for IAM and security leaders to make informed decisions.
In this KuppingerCole webinar you will learn:
- about use cases for IDaaS technology adoption and their primary characteristics
- about the current state of the IDaaS AM market
- why IDaaS AM offers a springboard for most organizations to start using foundational IAM elements delivered from the cloud
KuppingerCole Principal Analyst Martin Kuppinger will take you through the main findings of the Leadership Compass and explain the rankings.
Leadership Compass: IDaaS Access Management - 79016
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. This Leadership Compass discusses the market direction and provides a detailed evaluation of market players to offer necessary guidance for IAM and security leaders to make informed decisions.
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.