June 25, 2018 By Lane Billings 3 min read

For the second consecutive year, Gartner has named IBM a leader in its Magic Quadrant for Access Management, Worldwide report. We believe this placement provides excellent validation of our leadership in identity and access management-as-a-service (IDaaS) at a time when customers are embracing the cloud as the new consumption model for enterprise security.

Further, our position on the vision axis indicated a strong understanding of the IDaaS marketplace. IBM was evaluated alongside 16 other vendors and placed as a leader for completeness of vision and ability to execute.

Gartner updated the 2018 report — which it published for the first time in 2017 — in response to maturing conditions in the access management space. Gartner’s updates include:

  • Diversity in user authentication methods;
  • Increasing popularity of vendors offering access management-as-a-service; and
  • The evolution of large, established vendors to begin offering IDaaS delivery models as options.

In the report, Gartner says that by 2022, IDaaS will be the chosen delivery model for more than 80 percent of new access management purchases globally — up from 50 percent today.

Supporting the Cloud Journey

We believe Gartner’s evaluation validates our vision for a holistic, user-aware “silent” identity and access management (IAM) delivered through integrations with critical security functions like fraud detection, user behavior analytics and enterprise mobility management.

In 2017, we launched Cloud Identity, our new, born-in-the-cloud IDaaS offering, specially designed to support our clients as they migrate critical applications to the cloud (often multiple clouds). As organizations continue to accelerate their shift to the cloud, we believe IBM is uniquely positioned to help our clients find the appropriate balance of on-premises and cloud-delivered access management functionality and to support them at each step in their journey.

Gartner’s Rating Determination

When evaluating access management vendors on their ability to execute, Gartner analyzed product and service, overall viability, sales execution and pricing and customer experience, among other criteria. When evaluating vendors on their completeness of vision, the firm analyzed market understanding, sales strategy, innovation and geographical strategy, among other criteria.

According to Gartner, “Leaders in the access management market generally have significant customer bases. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery; and they show evidence of how access management plays a role in a collection of related or adjacent product offerings. Leaders typically demonstrate solid customer satisfaction with overall access management capabilities, the sales process and/or related service and support.”

Gartner does extensive research to determine which vendors will be positioned in the leaders, challengers, visionaries and niche players quadrants in its reports.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today