August 6, 2015 By Veronica Shelley 2 min read

Readers of Security Intelligence may have seen recent articles about IBM Security’s leadership rankings in the identity and access management (IAM) space. Starting with last year’s acquisitions of CrossIdeas and Lighthouse, respected analyst firms such as Gartner, KuppingerCole and Forrester have been giving IBM high marks for these new investments and the improved capabilities they bring to IBM’s IAM portfolio.

For example, in an August 2014 report on IBM’s acquisition of CrossIdeas, Gartner said, “CrossIdeas brings fine-grained segregation of duties controls, … risk-based role mining, attribute-based access control, IAM-as-a-service readiness and compliance reporting based on the way auditors define policies.” Gartner also noted that “these functions could enable IBM to take a leading role within the IGA market.” In other words, certain analysts supported IBM’s strategy for IAM and think we are making smart investments in this space.

IBM Recognized for IAM Excellence

Now, Frost & Sullivan, another analysis firm, has honored IBM with its 2015 Global Leadership Award. In its July 2015 press release, the company lauded IBM for its continued investment in the IAM portfolio, which helps clients better manage security risks. As a result of these services, Frost & Sullivan described IBM as “the established leader in the IAM market that is poised to lead the market into the next phase of growth.”

As Frost & Sullivan Industry Analyst Chris Rodriguez explained, “IBM’s IAM solutions score high on performance and reliability, as evidenced by its continued deployment in large business and enterprise networks around the globe. … IBM has expanded its deployment options, offering its IAM solutions as cost-effective virtual and hardware appliances, or as a managed cloud service.”

At the July 16 Awards Banquet in Boston, IBM Security Vice President of WW Marketing Caleb Barlow (pictured below, left) accepted the award on behalf of IBM. Barlow acknowledged that IBM’s security portfolio encompasses all segments, including cloud and mobile, threat protection, data and application security and IAM in order to address customer needs around the globe and in various industries.

Read more about the Frost & Sullivan 2015 IAM Global Leadership Award and how IBM earned the recognition.

What Makes IBM the Best?

IBM’s ranking can be explained by our expanding suite of integrated, threat-aware IAM security software and services, which score highly on performance and reliability and can adapt to a changing technology and risk landscape. Coupled with real-time identity and access analytics, the solutions can mitigate inappropriate user behavior and enable better decision-making, providing enterprise-wide security risk management for organizations around the world.

To learn more about IBM Security IAM solutions, read the IBM Security IAM Buyer’s Guide.

More from Identity & Access

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today