Leadership Compass: Access Governance - 70735

Report Details

Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few vendors try to establish this as a new market segment, we understand enhanced analytical capabilities just as an important feature within Access Governance.

Few years ago, there have been only a handful of vendors in the Access Governance market. The large players acquired some vendors, others entered the market, and some of the Identity Provisioning vendors developed Access Governance capabilities by themselves. Thus, there are close to 20 vendors in this market segment as of now.

This Leadership Compass provides an overview and analysis of the Access Governance market segment. Access Governance nowadays goes well beyond access recertification, role management and analytics. Strong capabilities for access request management, access analytics, and advanced direct or indirect capabilities of provisioning changes back are mandatory features. In addition, access risk management, enhanced data governance for non-structured data, or improved integration with for instance Privilege Management tools or User Activity Monitoring solutions are increasingly common. The Access Governance market is changing and our rating not only focuses on the traditional capabilities but also takes into account what we expect to become the new key features.

It shows that there are several established vendors with mature solutions, but also some very interesting smaller or regional vendors with a good potential for growth and for delivering what customers require.

Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit for a particular customer and his requirements. However, this Leadership Compass will help identifying those vendors customers should have a closer look at.


Date Title Price
Mar 08, 2013

Leadership Compass: Access Governance - 70735

Access Governance is as of now the fastest growing market segment in the broader IAM (Identity and Access Management) market. Some vendors also use the term IAG (Identity and Access Governance). Another recent term is Access Intelligence (or Identity and Access Intelligence). While a few…

€1295.00 Get Access

Latest Related Reports

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Advisory Note

Advisory Note: Enterprise Role Management - 70285

Role-based access control (RBAC) has become an important part of Access Management and Access Governance. However, defining, implementing and maintaining an enterprise role model remains a substantial task and many projects fail. This document describes best practice approaches towards the…

Executive View

Executive View: Avatier Identity Management Suite - 71510

AIMS is a modular IAM/IAG suite emphasizing a quick ROI through easy GUI configuration while maintaining solid security.

Executive View

Executive View: RSA NetWitness Suite - 72516

RSA NetWitness Suite is a security monitoring solution that combines log and network traffic analysis with endpoint-based visibility and automated threat intelligence to detect and investigate sophisticated cyber-attacks. 

Executive View

Executive View: Microsoft Advanced Threat Analytics - 71554

Microsoft Advanced Threat Analytics combines deep packet inspection with Active Directory and SIEM integration to build an Organizational Security Graph and identify suspicious user and device activity within corporate networks.

Leadership Compass

Leadership Compass: Cloud Access Security Brokers - 71138

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

Executive View

Executive View: Microsoft Azure Blockchain Services - 71332

Azure’s Blockchain-as-a-Service (BaaS) operates both as Infrastructure-as-a-Service and a Platform-as-a-Service. With its large number of strategic partnerships and template library of preconfigured Virtual Machines, developer templates and artefacts, Microsoft Azure’s BaaS…

Leadership Brief

Leadership Brief: Transforming IAM – not Panicking - 71411

Many organizations are responding to incidents and audit failures by panicking and buying more point solutions. They need to take a more strategic approach to transform their IAM. 

Executive View

Executive View: Beta Systems Garancy Recertification Center - 71315

With the new Garancy Recertification Center, Beta Systems is closing a previous gap in its portfolio in the Access Governance segment. The portal solution for recertification enables companies to run review campaigns of the users’ access rights in a business-friendly and intuitive…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The importance of consent management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed CIAM [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Digital Finance

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a contractual [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00