Just like Polaroid pictures and vinyl records, web access management and identity federation technologies may not be new, but they sure are popular today, according to the latest KuppingerCole Leadership Compass report.

KuppingerCole explained that the recent growth in the interest and adoption of web access management and federation is being driven by new business requirements. “The business challenge to solve is ‘supporting the extended and connected enterprise,'” the report explained.

This makes sense: With 86 percent of workloads expected to be processed by cloud data centers by 2019, according to the “Cisco Global Cloud Index,” business departments are scrambling to ensure access to their data is controlled and monitored whether it resides in the cloud or on-premises.

Web Access Management and Federation Market

The “KuppingerCole Leadership Compass for Access Management and Federation” outlined the challenges facing enterprises today and provided recommendations and best practices for implementing web access management.

Overall, KuppingerCole stated the market is mature but evolving. One of the main findings in the report was that although federation tends to be the more important topic, access management support for existing applications is becoming an increasingly important feature.

A strong case is made in the report for not looking at access management and federation separately, but rather as a joint solution. This helps enterprises have better control of their access management and reduce complexity by using a single solution to manage access to on-premises and cloud applications.

The Vendor Landscape

This year, KuppingerCole saw five top companies in the leadership segment: IBM, CA Technologies, Micro Focus, Ping Identity and ForgeRock. Among them, IBM was categorized as a leader and top performer in all leadership categories — innovation, product and market — for its IBM Security Access Manager and its very strong web access management support, platform support and federation standards.

Additionally, easy integration with other specialized products helps IBM cast a wide net in terms of the capabilities it offers within the identity and access management space.

Download the KuppingerCole Report on the access management and federation market

More from Identity & Access

How to Keep Your Secrets Safe: A Password Primer

There are two kinds of companies in the world: those that have been breached by criminals, and those that have been breached and don't know it yet. Criminals are relentless. Today’s cyberattacks have evolved into high-level espionage perpetrated by robust criminal organizations or nation-states. In the era of software as a service (SaaS), enterprise data is more likely to be stored on the cloud rather than on prem. Using sophisticated cloud scanning software, criminals can breach an enterprise system within…

Making the Leap: The Risks and Benefits of Passwordless Authentication

The password isn't going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future.  But for some businesses and agencies, going passwordless is the clear strategy. Microsoft, for instance, has recently stopped forcing users to use a password to access their account, which allows access to a wide range of Microsoft business and personal…

Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the platforms. Most of these exploits are based on poor configurations and human error. New IBM Security X-Force data reveals that many cloud-adopting businesses are falling behind on basic security best practices, introducing more risk to their organizations. Shedding light on…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…