IDC's Identity and Access Management, Digital Trust and Safety (IAM) service offers market sizing and vendor share analysis, focusing on research that provides buyer, security practitioner, and vendor perspectives on product functionality use case aspects of IAM solutions.
Identity and Access Management, Digital Trust and Safety
Markets and Subjects Analyzed
- Modern authentication
- Single sign-on (SSO) and federated provisioning
- Privileged access management
- Consumer identity access management (CIAM)
- Market segmentations and business use case
- Regulatory compliance as a driver for IAM
- IAM as a business enabler
- Hybrid cloud IAM
- Model IAM architecture
- Vendor Shares
- Forecasts by Submarket and Geography
- IDC MarketScapes
- Advice for Buyers and Security Practitioners
- IAM Innovators and Use Cases
- Vendor Profiles
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- What is the market share of each market participant?
- What are the size and growth prospects of IAM submarkets?
- What are the essential requirements and considerations for IAM products?
- What should buyers look for when making IAM purchasing decisions?
- How can IAM vendors differentiate themselves?
- How are IAM technologies implemented in the cloud?
- What does a model IAM architecture look like?
Amazon.com, Inc., Auth0 Inc., BeyondTrust Software, Inc., CA Technologies, Inc., Centrify Corp., CyberArk Software, Ltd., Dell Inc., Duo Security, Inc., Entrust Datacard Corp., Entrust, Inc., ForgeRock AS, Fujitsu Limited, Gemalto N.V., Gigya Inc., Google Inc., Hewlett Packard Enterprise, Hitachi, Ltd., IBM, Intel Corporation, Janrain Inc., LASERCARD CORPORATION, Lieberman Software Corporation, Micro Focus International plc, Microsoft Corporation, NEC Corporation, Novell, Inc., Okta, Inc., Omada Solutions Inc, OneLogin, Inc., Oracle Corporation, Ping Identity Corporation, Quest Software Inc., SAILPOINT TECHNOLOGIES, INC., SecureAuth Corp, Symantec Corporation, VASCO Data Security, Inc.