July 20, 2016 By Patricia Diaz 2 min read

Just like Polaroid pictures and vinyl records, web access management and identity federation technologies may not be new, but they sure are popular today, according to the latest KuppingerCole Leadership Compass report.

KuppingerCole explained that the recent growth in the interest and adoption of web access management and federation is being driven by new business requirements. “The business challenge to solve is ‘supporting the extended and connected enterprise,'” the report explained.

This makes sense: With 86 percent of workloads expected to be processed by cloud data centers by 2019, according to the “Cisco Global Cloud Index,” business departments are scrambling to ensure access to their data is controlled and monitored whether it resides in the cloud or on-premises.

Web Access Management and Federation Market

The “KuppingerCole Leadership Compass for Access Management and Federation” outlined the challenges facing enterprises today and provided recommendations and best practices for implementing web access management.

Overall, KuppingerCole stated the market is mature but evolving. One of the main findings in the report was that although federation tends to be the more important topic, access management support for existing applications is becoming an increasingly important feature.

A strong case is made in the report for not looking at access management and federation separately, but rather as a joint solution. This helps enterprises have better control of their access management and reduce complexity by using a single solution to manage access to on-premises and cloud applications.

The Vendor Landscape

This year, KuppingerCole saw five top companies in the leadership segment: IBM, CA Technologies, Micro Focus, Ping Identity and ForgeRock. Among them, IBM was categorized as a leader and top performer in all leadership categories — innovation, product and market — for its IBM Security Access Manager and its very strong web access management support, platform support and federation standards.

Additionally, easy integration with other specialized products helps IBM cast a wide net in terms of the capabilities it offers within the identity and access management space.

Download the KuppingerCole Report on the access management and federation market

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today