Market Report: The SAP Identity Management Strategy

Report Details

About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it was two years ago.

The product called SAP NetWeaver Identity Management has gained a lot of attention in the market. By now, SAP can provide numerous customer references. Furthermore, it is especially customers with a large SAP infrastructure as well as mid-sized companies that show an active interest in SAP NetWeaver Identity Management.

However, it must also be said that SAP has by no means completely solved all problems identified by Kuppinger Cole as early as 2007. The integration with SAP NetWeaver and SAP NetWeaver Business Suite has made significant progress. A large number of employee-based scenarios are being supported there in various solutions.

While the SAP Solution for Governance Risk and Compliance and specifically SAP GRC Access Control show improved interfaces, a reasonable integration is still not at the level where it should be. However, the roadmap calls for a further integration.
One point of criticism certainly continues to be the support for other systems outside the SAP portfolio. While there is also a growing number of connectors as well as of third party providers here, overall there is still a lot of room for improvement. However, SAP itself is primarily focusing on optimised support with SAP systems. The SAP approach to increasingly rely on partner solutions for connecting further systems is not without problems.

Over the past two years, the functionality of the product was also significantly enhanced. The integration in the SAP production and testing processes for software was also important, making the product as well as the documentation considerably more mature. All in all, though, when looking at more complex, heterogeneous infrastructures one still has to say that there are quite a few products featuring more extensive functions on the market. However, there is no doubt that SAP has developed specific strengths in the area of SAP connectivity that are also integrated with individual solution scenarios.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 05, 2009

Market Report: The SAP Identity Management Strategy

About two years have gone by since SAP took over the Norwegian manufacturer MaXware. Since then, SAP IM has positioned itself in the Identity Management market and significantly enhanced the products taken over from MaXware. In the meantime, the strategy has also become much clearer than it…

€165.00 Get Access

Latest Related Reports

Executive View

Executive View: SAP HANA Enterprise Cloud – Security and Compliance - 71117

An overview of the SAP HANA Enterprise Cloud together with an assessment of the security and assurance provided in respect of five critical risks faced by a cloud customer. 

Executive View

Executive View: SAP Enterprise Threat Detection - 71181

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP. Identifying, analyzing, and responding to…

Executive View

Executive View: akquinet SAST GRC Suite - 70979

Today’s SAP security requirements go far beyond traditional Access Governance needs regarding users, their access and roles. akquinet offers a full-featured product suite for GRC and security for SAP environments. The provided modules cover a wide range of aspects in this sensitive…

Leadership Brief

Leadership Brief: Prioritäten in der SAP-Sicherheit - 72017

Die Sicherheit aller wichtigen geschäftsunterstützenden Systeme und Prozesse wird durch den Wandel der Unternehmensinfrastrukturen und den grundlegend steigenden Bedrohungsgrad beeinflusst. Prioritäten beim Absichern der SAP-Infrastruktur zu identifizieren und ein…

Leadership Compass

Leadership Compass: Access Control/Governance für SAP-Umgebungen - 71104

Dieser Report bietet einen Überblick und eine Analyse des Markts für Access Control & Access Governance-Lösungen für SAP-Umgebungen. Unternehmen können ihr Risikomanagement und ihre Corporate Compliance bezüglich geltender Gesetze und Verordnungen…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform es una solución de seguridad para aplicaciones críticas de negocio en SAP. Una plataforma con conocimiento del contexto, segura y lista para la nube, que integra controles de vulnerabilidad y cumplimiento normativo, detección y respuesta a…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform ist eine Sicherheitslösung für kritische Unternehmensanwendungen in SAP-Umgebungen. Diese Sicherheitslösung bietet eine kontextsensitive, sichere und cloud-fähige Plattform, die Schwachstellen- und Compliance-Steuerung, Echtzeiterkennung und…

Leadership Brief

Leadership Brief: SAP Security Priorities - 72017

Changing enterprise infrastructures and the overall growing threat level influence the security of all vital business-supporting systems and processes. Identifying the priorities for securing your SAP infrastructure and maintaining appropriate security is a continuous business and…

Leadership Compass

Leadership Compass: Access Control / Governance for SAP environments - 71104

This report provides an overview and analysis of the market for Access Control & Access Governance Solutions for SAP environments. By adding the right Access Control components to their SAP infrastructure, organizations can significantly improve enterprise risk management and corporate…

Executive View

Executive View: Onapsis Security Platform - 71290

Onapsis Security Platform is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform to integrate vulnerability and compliance controls, real-time detection and response, as well as advanced threat protection…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The importance of consent management: CIAM vs. GDPR

Consumer identity and access management solutions are bringing value to the organizations which implement them, in terms of higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights.  Many companies with deployed CIAM [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Digital Finance

The emergence and prominence of bitcoin and its underlying technology Blockchain with open source, real-time payments capabilities and without centralized regulatory authority has sparked the Financial Services industry into exploring how Blockchain technology might be applied to mainstream banking and insurance sectors. Blockchain technology goes further than just a distributed ledger. Another initiative gaining acceptance is Smart Contracts that use computer protocols to facilitate, verify, or enforce the negotiation or performance of a contract or that obviate the need for a contractual [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00