Leadership Compass: Cloud IAM/IAG - 71121

Report Details

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity Access Management/Governance) as an alternative to on-premise IAM suites, and Cloud IAM solutions that bring a combination of directory services, user management, and access management to the Cloud.

There are many terms for what we call “Cloud IAM” for Cloud Identity and Access Management. IDMaaS (Identity Management as a Service), IDaaS (Identity as a Service), and various other names are used. However, there is no common understanding of what constitutes that market segment To which vendors have taken different paths. One common denominator is Cloud Single Sign-On, which allows users to access a portal that links to “his” (or “her”) Cloud services and provides a seamless login, either based on passing through username and password or relying on Identity Federation standards.


Date Title Price
Jul 15, 2014

Leadership Compass: Cloud IAM/IAG - 71121

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity…

€1295.00 Get Access

Latest Related Reports

Whitepaper

Whitepaper: Ping Identity solutions for Customer Identity and Access Management - 70289

Customer Identity and Access Management systems and services provide new technical capabilities for organizations to know their customers better.  Implementing Ping Identity’s solutions for CIAM can provide better user experiences, generate additional revenue, and enhance brand…

Leadership Compass

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems,…

Executive View

Executive View: NextLabs Data Centric Security in the Hybrid Cloud - 72531

Organizations are adopting a hybrid model for the delivery of IT services a consistent approach is needed to govern and secure data on-premise, in the cloud and when shared with external parties. NextLabs Data Centric Security Suite provides a proven tool that can protect data and ensure…

Executive View

Executive View: Ping Identity’s PingFederate - 70284

PingFederate sets the standard for identity federation standards support. PingFederate can enable Single Sign-On (SSO) between business units, enterprises, and all popular SaaS applications. PingFederate works both on-premise or in the cloud, and is easy for administrators to install and maintain.

Executive View

Executive View: CensorNet Cloud Security Platform - 72529

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Whitepaper

Whitepaper: Balabit - Privilege Management - 72705

Privileged Accounts are the high-risk accounts – and they are the target of attackers, both internals and externals. SOCs must implement modern Privilege Management as part of their overall toolset, for identifying and countering attacks. Session Monitoring and Privileged User…

Executive View

Executive View: AWS Lambda - 72524

AWS Lambda is an event-driven serverless computing platform that completely abstracts the underlying cloud infrastructure to let developers focus on the core business functionality of their applications, providing transparent scalability and redundancy across multiple datacenters in the…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: RSA Identity Governance and Lifecycle - 72503

RSA Identity Governance and Lifecycle is a complete solution for managing digital identities, both inside and outside the enterprise. The RSA solution covers all aspects of governance from attestations to policy exceptions and identity lifecycle, from provisioning to entitlement assignment…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Building a Future-proof Intelligent Security Operations Center, Part 2

Security Intelligence Platforms (SIP) are universal and extensible security analytics solutions that offer a holistic approach towards maintaining complete visibility and management of the security posture across the whole organization. Only by correlating both real-time and historical security [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00