Top Identity Management Resources: Analyst Reports, Buyer’s Guides and Whitepapers

2016 IAM Identity and Access Management Buyer's GuideThe editors at Solutions Review have compiled this collection of complimentary resources on the subject of Identity and Access Management. Below are whitepapers, IAM Buyer’s Guides, vendor reviews and market reports from leading enterprise technology analysts like Gartner and Forrester.

And be sure to visit our other Cybersecurity sites: Security Information and Event Management as well as Endpoint Security.

IAM Buyers Guide

2016 Identity and Access Management Buyer’s Guide

This 17-page document includes a category overview, 10 questions to ask when considering IAM initiatives, and a capabilities reference of the top 28 Identity Management solution providers.
Download

Identity Management Fact Book

Solutions Review’s 2016 Identity Management Fact Book

A 9-page, easy-to-use Fact Book profiling the top Identity Management vendors with vidtal data on each company’s maturity, longevity, business model, size, geographic reach, and more.
Download

gartner-idaas-thumb

2016 Gartner Magic Quadrant for Identity and Access Management as a Service

In this industry-standard report, Gartner identifies, scores and compares the 14 most significant solution providers in the IDaaS category.

Download

Forrester Wave Report B2E Cloud IAM

Forrester Wave Report: B2E Cloud IAM (IDaaS)

Forrester identifies the nine most significant SaaS providers in the cloud IAM category and scores them via a 17-criteria evaluation process.

Download

Forrester CIAM Market Overview

Forrester Market Overview: Consumer Identity and Access Management (CIAM)

An overivew of the developing CIAM market segment to help businesses identify the best CIAM platform for their requirements.

Download

KuppingerCole Leadership Compass: Access Management and Federation

An in-depth analysis of 17 major Access Management and Federation vendors, market trends, and more.

Download

2016 Forrester Wave Report: Privileged Identity Management (PIM)

This report covers key PIM market trends, and strengths and weaknesses of the top PIM solution providers.

Download

Forrester Vendor Landscape: Identity Management for the Internet of Things

Forrester Analysts compare the top 12 providers of Identity Management for the IoT in this 16-page report.

Download

Webinar: Supporting Legacy Infrastructure on the Way to The Cloud

Forrester’s Andras Cser and OneLogin’s David Meyer discuss protecting legacy investments while securely expanding cloud app portfolios and identity management.

Download

Ping-whitepaper-thumb-cropped

Multi-factor Authentication Best Practices for Securing the Modern Digital Enterprise

This white paper gives a full overview of step-up MFA, including best practices and selection criteria.

Download

eBook: Securing the Cloud for the Modern Enterprise

This eBook dives into how an identity management solution secures your organization’s data—without impacting end users.

Download

top 8 identity and access management challenges with SaaS applications

Top Eight IAM Challenges with Your SaaS Applications

Learn best practices for adopting and deploying cloud and SaaS applications.

 

Download

Top 5 Reasons to Automate Identity Lifecycle
This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.

Download

A Modern Cloud Service for Secure Digital Experiences

In this whitepaper, you’ll learn how CIO’s and CISO’s are leading the way to the cloud in order to overcome IT challenges in a legacy environment.

Download

UnboundID Overview for Identity Management and The Internet of Things

Overview of Identity Management for The Internet of Things (IoT)

From policy-based data access governace to adaptive authentication, this new whitepaper from UnboundID will give you the details on the lates IoT IAM requirements.

Download

ensuring PCI compliance with Identity and Access Management

Ensuring PCI Compliance with Identity and Access Management

Learn from an industry expert how to comply with the Payment Card Industry Data Security Standard (PCI DSS) and protect consumers’ data.

Download