The All New 2017 IAM Solutions Buyer’s Guide: 28 Vendors Evaluated, Top 10 Questions To Ask

IAM Buyers GuideJANUARY 24, 2017, WOBURN, MA — The Solutions Review team is proud to announce the release of our latest resource: the all new 2017 Identity and Access Management (IAM) Buyer’s Guide Report, now available as a complimentary download to site visitors. The IAM Buyer’s Guide Report provides valuable insight into the current state of the cyber security landscape and the IAM solutions that are helping organizations combat security identity-related security issues.

For those researching IAM as part of an active purchasing initiative, The 2017 IAM Buyer’s Guide Report offers ten questions to ask both yourself and prospective solution providers before a purchase as well as detailed profiles of the top 28 IAM products (the most ever included in our IAM guide) as selected by Solutions Review. Each profile provides a company and solution backgrounds, highlights solution key features, and gives the Solutions Review’s take on each solution.

The 28 vendors included in the guide are: Avatier, Beta Systems, Bitium, CA Technologies, Centrify, Courion, Covisint, Crossmatch, Dell, ForgeRock, Hitachi ID Systems, IBM, Ilantus, iWelcome, Microsoft Azure AD, NetIQ, Okta, Omada, OneLogin, Oracle, Ping Identity, Propentus, RSA, Sailpoint, Salesforce, Simeio, UnboundID, and UXP Systems.

Creating these guides isn’t easy—we’re constantly monitoring all things IAM and diligently read and analyze what the solutions are doing. Who’s raising money for development? Who’s making acquisitions? Who’s being acquired, and Why? Who added something innovative to their solution? What are the biggest, most valuable updates and innovations? We take all that information along with our analysis of reports like the Gartner Magic Quadrant and the Gartner Critical Capabilities Reports, and break down each solution in in-depth, yet digestible profiles, aimed at giving readers a one-take look at who a vendor is, what their product does, and where that product makes the best fit.

In our analysis of each vendor, we’ve highlighted the products and services offered, key features, strengths, and markets best served.

What we aim to do is give you a brief and comprehensive snapshot of top IAM, IGA, and IDaaS solutions so you create your own shortlist of solutions that you already know have all the components you’re looking for—there’s nothing worse than going into a sales call with a vendor without knowing anything about what they’re offering you and how it compares to the other solutions.

The guide also includes a current overview of the Identity Management space along with five questions to ask yourself and five questions to ask a potential vendor to assist you in any future sales calls or demos. On top of that, we’ve thrown in the IAM Glossary for reference, with over 50 of the top IAM terms and acronyms defined.

If you’re in the beginning process of buying your first Identity Management solution, or if you’re looking for something a little different than what you already have, we hope this is the perfect resource to get you started on the decision-making process.

You can download the 2017 Buyer’s Guide in full here.

 

Follow Jeff

Jeff Edwards

Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff