July 20, 2016 By Patricia Diaz 2 min read

Just like Polaroid pictures and vinyl records, web access management and identity federation technologies may not be new, but they sure are popular today, according to the latest KuppingerCole Leadership Compass report.

KuppingerCole explained that the recent growth in the interest and adoption of web access management and federation is being driven by new business requirements. “The business challenge to solve is ‘supporting the extended and connected enterprise,'” the report explained.

This makes sense: With 86 percent of workloads expected to be processed by cloud data centers by 2019, according to the “Cisco Global Cloud Index,” business departments are scrambling to ensure access to their data is controlled and monitored whether it resides in the cloud or on-premises.

Web Access Management and Federation Market

The “KuppingerCole Leadership Compass for Access Management and Federation” outlined the challenges facing enterprises today and provided recommendations and best practices for implementing web access management.

Overall, KuppingerCole stated the market is mature but evolving. One of the main findings in the report was that although federation tends to be the more important topic, access management support for existing applications is becoming an increasingly important feature.

A strong case is made in the report for not looking at access management and federation separately, but rather as a joint solution. This helps enterprises have better control of their access management and reduce complexity by using a single solution to manage access to on-premises and cloud applications.

The Vendor Landscape

This year, KuppingerCole saw five top companies in the leadership segment: IBM, CA Technologies, Micro Focus, Ping Identity and ForgeRock. Among them, IBM was categorized as a leader and top performer in all leadership categories — innovation, product and market — for its IBM Security Access Manager and its very strong web access management support, platform support and federation standards.

Additionally, easy integration with other specialized products helps IBM cast a wide net in terms of the capabilities it offers within the identity and access management space.

Download the KuppingerCole Report on the access management and federation market

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today