KuppingerCole’s Evaluation of Leading Vendors in the IDaaS Access Management Market
- LANGUAGE: English DATE: Tuesday, September 03, 2019 TIME: 3:00pm CEST, 2:00pm BST, 9:00am EDT
Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.
The significant growth of the IDaaS AM market can be attributed to the ever-increasing demand of organizations to achieve better time-to-value proposition over on-premises IAM deployments, and to extend IAM capabilities to meet the security requirements of a growing SaaS portfolio.
The KuppingerCole Analysts Leadership Compass “IDaaS Access Management” discusses the market direction and provides a detailed evaluation of market players and offers essential guidance for IAM and security leaders to make informed decisions.
In this KuppingerCole webinar you will learn:
- about use cases for IDaaS technology adoption and their primary characteristics
- about the current state of the IDaaS AM market
- why IDaaS AM offers a springboard for most organizations to start using foundational IAM elements delivered from the cloud
KuppingerCole Principal Analyst Martin Kuppinger will take you through the main findings of the Leadership Compass and explain the rankings.
Leadership Compass: IDaaS Access Management - 79016
A fast-growing market, IDaaS AM is largely characterized by cloud-based delivery of access management capabilities for business irrespective of the application and service delivery models. This Leadership Compass discusses the market direction and provides a detailed evaluation of market players to offer necessary guidance for IAM and security leaders to make informed decisions.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.