IDC's Identity and Access Management, Digital Trust and Safety (IAM) service offers market sizing and vendor share analysis, focusing on research that provides buyer, security practitioner, and vendor perspectives on product functionality use case aspects of IAM solutions.
Identity and Access Management, Digital Trust and Safety
Markets and Subjects Analyzed
- Modern authentication
- Single sign-on (SSO) and federated provisioning
- Privileged access management
- Consumer identity access management (CIAM)
- Market segmentations and business use case
- Regulatory compliance as a driver for IAM
- IAM as a business enabler
- Hybrid cloud IAM
- Model IAM architecture
- Vendor Shares
- Forecasts by Submarket and Geography
- IDC MarketScapes
- Advice for Buyers and Security Practitioners
- IAM Innovators and Use Cases
- Vendor Profiles
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- What is the market share of each market participant?
- What are the size and growth prospects of IAM submarkets?
- What are the essential requirements and considerations for IAM products?
- What should buyers look for when making IAM purchasing decisions?
- How can IAM vendors differentiate themselves?
- How are IAM technologies implemented in the cloud?
- What does a model IAM architecture look like?
Authentify Inc, BeyondTrust Software, Inc., CA Technologies, Inc., Centrify Corporation., Covisint, CyberArk Software, Ltd., Dell EMC, Dell Inc., ForgeRock AS, Fujitsu Limited, Gemalto N.V., Global Software Inc, Hewlett Packard Enterprise, Hitachi, Ltd., IBM, Identropy, Inc., Intel Corporation, Lieberman Software Corporation, Microsoft Corporation, NetAuthority, Inc., NetIQ Corporation, Okta, Inc., OneLogin, Inc., Oracle Corporation, PhoneFactor, Inc., SAILPOINT TECHNOLOGIES, INC., SYMPLIFIED INC, SafeNet, Inc., Salesforce.com, Inc., Symantec Corporation, VASCO Data Security, Inc., Verizon Communications, Inc., Yubico