Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors.

IBM was placed as a Leader for completeness of vision and ability to execute.

IBM Leads the Way in Access Management

According to Gartner, by 2019, more than 80 percent of organizations will use access management (AM) software or services, up from 55 percent today. In their journey to secure the adoption of new cloud applications and maintain usability for an increasingly mobile workforce, security leaders are seeking a hybrid approach to access management that bridges existing on-premises investments to the cloud.

Gartner created this new report in response to evolving market conditions in the AM space. According to Gartner, “What was once considered a mature market for web access management that served only web browser clients and web applications using static or semistatic data for access decisions has evolved to one that better supports more diversity in user authentication methods, contextual and adaptive access, mobile computing, internet-connected things and API target systems.”

We believe this report further validates our vision for a truly contextually aware and hybrid approach to access management and the need to infuse identity everywhere, as evidenced by last week’s launch of Cloud Identity Connect and our November announcement of IBM Verify.

Download the 2017 Gartner Magic Quadrant for Access Management

Gartner does extensive research to determine which vendors will be positioned in the Leaders, Challengers, Visionaries and Niche Players quadrants in its reports.

Recognizing IBM’s Completeness of Vision and Ability to Execute

When evaluating access management vendors on their ability to execute, Gartner analyzed product/service, overall viability, sales execution/pricing and customer experience, among other criteria. When evaluating vendors on their completeness of vision, the firm analyzed market understanding, sales strategy, innovation and geographical strategy, among other criteria.

According to Gartner, “Leaders in the AM market generally have significant customer bases. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery; and they show evidence of how AM plays a role in a collection of related or adjacent product offerings. Leaders typically demonstrate solid customer satisfaction with overall AM capabilities, the sales process and/or related service and support.”

Download the complete 2017 Gartner Magic Quadrant for Access Management

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…