Identity and Digital Trust Software

Related Links

Meet the Experts

Photo of Frank Dickson
Frank Dickson

Group Vice President, Security & Trust

Photo of Jay Bretzmann
Jay Bretzmann

Research Vice President, Security Products

IDC's Identity and Digital Trust Software service offers market sizing and vendor share analysis, focusing on research that provides buyer, security practitioner, and vendor perspectives on product functionality and use-case aspects of identity and access management (IAM) solutions. This is the one security services coverage that you can't afford to ignore. Security starts with not letting the bad guys in.

Markets and Subjects Analyzed

  • Directory use and identity management
  • Single sign-on (SSO) and federated provisioning
  • Modern authentication and authorization practices
  • Identity governance and privileged access management (PAM)
  • Business-to-consumer (B2C) and customer identity and access management (CIAM) requirements
  • Regulatory compliance as a driver for IAM
  • IAM as a security control point or digital business enabler

Core Research

  • Vendor Market Shares
  • Forecasts by Identity Submarket and Geography
  • Advice for Vendors, Security Practitioners, and Buyers
  • IAM Innovators and New Use-Case Definitions
  • Industry Events Coverage
  • IDC MarketScapes
  • Primary Research Studies Reflecting IT/Security Team's Technology Usage

In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.

Key Questions Answered

  1. What is the market share of each market participant?
  2. What are the size and growth prospects of IAM submarkets?
  3. What are the essential requirements and considerations for IAM products?
  4. What should buyers look for when making IAM purchasing decisions?
  5. How can IAM vendors differentiate themselves?
  6. How are IAM technologies implemented in the cloud?
  7. What technologies are included in a full IAM solution stack?