For the second consecutive year, Gartner has named IBM a leader in its Magic Quadrant for Access Management, Worldwide report. We believe this placement provides excellent validation of our leadership in identity and access management-as-a-service (IDaaS) at a time when customers are embracing the cloud as the new consumption model for enterprise security.

Further, our position on the vision axis indicated a strong understanding of the IDaaS marketplace. IBM was evaluated alongside 16 other vendors and placed as a leader for completeness of vision and ability to execute.

Gartner updated the 2018 report — which it published for the first time in 2017 — in response to maturing conditions in the access management space. Gartner’s updates include:

  • Diversity in user authentication methods;
  • Increasing popularity of vendors offering access management-as-a-service; and
  • The evolution of large, established vendors to begin offering IDaaS delivery models as options.

In the report, Gartner says that by 2022, IDaaS will be the chosen delivery model for more than 80 percent of new access management purchases globally — up from 50 percent today.

Supporting the Cloud Journey

We believe Gartner’s evaluation validates our vision for a holistic, user-aware “silent” identity and access management (IAM) delivered through integrations with critical security functions like fraud detection, user behavior analytics and enterprise mobility management.

In 2017, we launched Cloud Identity, our new, born-in-the-cloud IDaaS offering, specially designed to support our clients as they migrate critical applications to the cloud (often multiple clouds). As organizations continue to accelerate their shift to the cloud, we believe IBM is uniquely positioned to help our clients find the appropriate balance of on-premises and cloud-delivered access management functionality and to support them at each step in their journey.

Gartner’s Rating Determination

When evaluating access management vendors on their ability to execute, Gartner analyzed product and service, overall viability, sales execution and pricing and customer experience, among other criteria. When evaluating vendors on their completeness of vision, the firm analyzed market understanding, sales strategy, innovation and geographical strategy, among other criteria.

According to Gartner, “Leaders in the access management market generally have significant customer bases. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery; and they show evidence of how access management plays a role in a collection of related or adjacent product offerings. Leaders typically demonstrate solid customer satisfaction with overall access management capabilities, the sales process and/or related service and support.”

Gartner does extensive research to determine which vendors will be positioned in the leaders, challengers, visionaries and niche players quadrants in its reports.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…

What is the Future of Password Managers?

In November 2022, LastPass had its second security breach in four months. Although company CEO Karim Toubba assured customers they had nothing to worry about, the incident didn’t inspire confidence in the world’s leading password manager application. Password managers have one vital job: keep your sensitive login credentials secret, so your accounts remain secure. When hackers compromise these software applications, the entire industry of identity and access management (IAM) takes notice. As an alliance of tech giants leads a global push…

Beware of What Is Lurking in the Shadows of Your IT

This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations must prepare for. Shadow IT is the use of any hardware or software operating within an enterprise without the knowledge or permission of IT or Security. IBM Security X-Force responds…