FEBRUARY 5, 2016, WOBURN, MA — The Solutions Review team is proud to announce that the all new 2016 Identity and Access Management (IAM) Buyer’s Guide Report is now available as a complimentary download to site visitors. The IAM Buyer’s Guide Report provides valuable insight into the current state of the cyber security landscape and the IAM solutions that are helping organizations combat security identity-related security issues.
For those researching IAM as part of an active purchasing initiative, The 2016 IAM Buyer’s Guide Report offers ten questions to ask both yourself and prospective solution providers before a purchase as well as detailed profiles of the top 28 IAM products (the most ever included in our IAM guide) as selected by Solutions Review. Each profile provides a company and solution backgrounds, highlights solution key features, and gives the Solutions Review’s take on each solution.
The 28 vendors included in the guide are: Alert Enterprise!, Avatier, Beta Systems, Bitium, CA Technologies, Centrify, Courion, Covisint, Dell, Fischer International, ForgeRock, Hitachi ID Systems, IBM, Ilantus, iWelcome, Microsoft Azure AD, NetIQ, Okta, Omada, OneLogin, Oracle, Ping Identity, RSA, Sailpoint, Salesforce, SAP, Simeio, and UnboundID.
Creating these guides isn’t easy—we’re constantly monitoring all things IAM and diligently read and analyze what the solutions are doing. Who’s raising money for development? Who’s making acquisitions? Who’s being acquired, and Why? Who added something innovative to their solution? What are the biggest, most valuable updates and innovations? We take all that information along with our analysis of reports like the Gartner Magic Quadrant and the Gartner Critical Capabilities Reports, and break down each solution in in-depth, yet digestible profiles, aimed at giving readers a one-take look at who a vendor is, what their product does, and where that product makes the best fit.
In our analysis of each vendor, we’ve highlighted the products and services offered, key features, strengths, and markets best served. We’ve also placed each vendor’s core strengths and offerings into four categories: Identity Governance and Administration (IGA), Identity Management as a Service (IDaaS), Customer Identity and Access Management (CIAM), and Privileged Account Management (PAM).
What we aim to do is give you a brief and comprehensive snapshot of top IAM, IGA, and IDaaS solutions so you create your own shortlist of solutions that you already know have all the components you’re looking for—there’s nothing worse than going into a sales call with a vendor without knowing anything about what they’re offering you and how it compares to the other solutions.
The guide also includes a current overview of the Identity Management space along with five questions to ask yourself and five questions to ask a potential vendor to assist you in any future sales calls or demos. On top of that, we’ve thrown in the IAM Glossary for reference, with over 50 of the top IAM terms and acronyms defined.
If you’re in the beginning process of buying your first Identity Management solution, or if you’re looking for something a little different than what you already have, we hope this is the perfect resource to get you started on the decision-making process.
You can download the 2016 Buyer’s Guide in full here.
We’ve always got something new cooking over here, so keep your eyes open for the forthcoming 2016 IAM Solutions Factbook, which will give a brief overview of top solutions from a business success standpoint, and the 2016 IAM Solutions Comparison Matrix, which will provide a side-by-side comparison of top IAM solutions, their capabilities, connectors, compliance, and more.
Thanks for reading,
- 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
- What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
- Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017