Readers of Security Intelligence may have seen recent articles about IBM Security’s leadership rankings in the identity and access management (IAM) space. Starting with last year’s acquisitions of CrossIdeas and Lighthouse, respected analyst firms such as Gartner, KuppingerCole and Forrester have been giving IBM high marks for these new investments and the improved capabilities they bring to IBM’s IAM portfolio.

For example, in an August 2014 report on IBM’s acquisition of CrossIdeas, Gartner said, “CrossIdeas brings fine-grained segregation of duties controls, … risk-based role mining, attribute-based access control, IAM-as-a-service readiness and compliance reporting based on the way auditors define policies.” Gartner also noted that “these functions could enable IBM to take a leading role within the IGA market.” In other words, certain analysts supported IBM’s strategy for IAM and think we are making smart investments in this space.

IBM Recognized for IAM Excellence

Now, Frost & Sullivan, another analysis firm, has honored IBM with its 2015 Global Leadership Award. In its July 2015 press release, the company lauded IBM for its continued investment in the IAM portfolio, which helps clients better manage security risks. As a result of these services, Frost & Sullivan described IBM as “the established leader in the IAM market that is poised to lead the market into the next phase of growth.”

As Frost & Sullivan Industry Analyst Chris Rodriguez explained, “IBM’s IAM solutions score high on performance and reliability, as evidenced by its continued deployment in large business and enterprise networks around the globe. … IBM has expanded its deployment options, offering its IAM solutions as cost-effective virtual and hardware appliances, or as a managed cloud service.”

At the July 16 Awards Banquet in Boston, IBM Security Vice President of WW Marketing Caleb Barlow (pictured below, left) accepted the award on behalf of IBM. Barlow acknowledged that IBM’s security portfolio encompasses all segments, including cloud and mobile, threat protection, data and application security and IAM in order to address customer needs around the globe and in various industries.

Read more about the Frost & Sullivan 2015 IAM Global Leadership Award and how IBM earned the recognition.

What Makes IBM the Best?

IBM’s ranking can be explained by our expanding suite of integrated, threat-aware IAM security software and services, which score highly on performance and reliability and can adapt to a changing technology and risk landscape. Coupled with real-time identity and access analytics, the solutions can mitigate inappropriate user behavior and enable better decision-making, providing enterprise-wide security risk management for organizations around the world.

To learn more about IBM Security IAM solutions, read the IBM Security IAM Buyer’s Guide.

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…