Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM Security.

“We are very pleased to receive the outside recognition of Cloud Identity Service by independent analysts,” said Eric Maass, director of IAM Cloud Services Strategy at IBM. “IBM’s clients are using this fully cloud-based solution as the centerpiece of their entire IAM program and building long-term road maps for their IAM strategy around Cloud Identity Service.”

But don’t just take our word for it.

IBM Distinguished Among IDaaS Vendors

IBM Cloud Identity Service’s market leadership ranking among IDaaS vendors is due to independent analysis of its breadth and depth of IAM capabilities, which goes well beyond the standard IDaaS feature set. The global reach and broad industry penetration of Cloud Identity Service, as well as its ability to meet both internal workforce and external consumer use cases, makes it ideally suited to serve as an organization’s strategic IAM platform.

IBM Cloud Identity Service is positioned as a market leader in the following recent IDaaS analyst reports:

  1. Critical Capabilities for Identity and Access Management as a Service, Worldwide,” published on Sept. 29, 2016 (ID: G00299338; Analysts: Neil Wynne, Gregg Kreizman).
  2. Ovum Decision Matrix: Selecting an Identity-as-a-Service (IDaaS) Solution, 2016–17,” published on Dec. 7, 2016 (Product code: IT0022-000836; Analyst: Andrew Kellett).
  3. “Magic Quadrant for Access Management, Worldwide,” published on June 7, 2017 (ID: G00315479; Analysts: Gregg Kreizman, Anmol Singh).
  4. Leadership Compass: CIAM Platforms,” published on June 9, 2017 (No. 70305; Analyst: John Tolbert).
  5. Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO),” published on June 30, 2017 (No. 71141; Analyst: Martin Kuppinger).
  6. Leadership Compass: Identity as a Service: Cloud-Based Provisioning, Access Governance and Federation (IDaaS B2E),” published on July 4, 2017 (No. 70319; Analyst: Martin Kuppinger).

Learn More

To learn more about why Cloud Identity Service is pulling ahead of IDaaS vendors as a market leader, scan this IDaaS Market Leader infographic.

Download the complete Gartner Magic Quadrant for Access Management

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today