Not one, not two, but six of the most recent analyst reports evaluating the major Identity and Access Management-as-a-Service (IDaaS) vendors positioned IBM Cloud Identity Service as an overall market leader in cloud-based identity and access management (IAM). The market is crowded with both startups and large IDaaS vendors, making this is a big win for IBM Security.

“We are very pleased to receive the outside recognition of Cloud Identity Service by independent analysts,” said Eric Maass, director of IAM Cloud Services Strategy at IBM. “IBM’s clients are using this fully cloud-based solution as the centerpiece of their entire IAM program and building long-term road maps for their IAM strategy around Cloud Identity Service.”

But don’t just take our word for it.

IBM Distinguished Among IDaaS Vendors

IBM Cloud Identity Service’s market leadership ranking among IDaaS vendors is due to independent analysis of its breadth and depth of IAM capabilities, which goes well beyond the standard IDaaS feature set. The global reach and broad industry penetration of Cloud Identity Service, as well as its ability to meet both internal workforce and external consumer use cases, makes it ideally suited to serve as an organization’s strategic IAM platform.

IBM Cloud Identity Service is positioned as a market leader in the following recent IDaaS analyst reports:

  1. Critical Capabilities for Identity and Access Management as a Service, Worldwide,” published on Sept. 29, 2016 (ID: G00299338; Analysts: Neil Wynne, Gregg Kreizman).
  2. Ovum Decision Matrix: Selecting an Identity-as-a-Service (IDaaS) Solution, 2016–17,” published on Dec. 7, 2016 (Product code: IT0022-000836; Analyst: Andrew Kellett).
  3. “Magic Quadrant for Access Management, Worldwide,” published on June 7, 2017 (ID: G00315479; Analysts: Gregg Kreizman, Anmol Singh).
  4. Leadership Compass: CIAM Platforms,” published on June 9, 2017 (No. 70305; Analyst: John Tolbert).
  5. Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO),” published on June 30, 2017 (No. 71141; Analyst: Martin Kuppinger).
  6. Leadership Compass: Identity as a Service: Cloud-Based Provisioning, Access Governance and Federation (IDaaS B2E),” published on July 4, 2017 (No. 70319; Analyst: Martin Kuppinger).

Learn More

To learn more about why Cloud Identity Service is pulling ahead of IDaaS vendors as a market leader, scan this IDaaS Market Leader infographic.

Download the complete Gartner Magic Quadrant for Access Management

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today