June 29, 2017 By Jason Keenaghan 2 min read

Gartner has named IBM a Leader in its first-ever Magic Quadrant for Access Management, Worldwide. Both IBM Security Access Manager and Cloud Identity Service were evaluated in this new report, alongside 14 other vendors.

IBM was placed as a Leader for completeness of vision and ability to execute.

IBM Leads the Way in Access Management

According to Gartner, by 2019, more than 80 percent of organizations will use access management (AM) software or services, up from 55 percent today. In their journey to secure the adoption of new cloud applications and maintain usability for an increasingly mobile workforce, security leaders are seeking a hybrid approach to access management that bridges existing on-premises investments to the cloud.

Gartner created this new report in response to evolving market conditions in the AM space. According to Gartner, “What was once considered a mature market for web access management that served only web browser clients and web applications using static or semistatic data for access decisions has evolved to one that better supports more diversity in user authentication methods, contextual and adaptive access, mobile computing, internet-connected things and API target systems.”

We believe this report further validates our vision for a truly contextually aware and hybrid approach to access management and the need to infuse identity everywhere, as evidenced by last week’s launch of Cloud Identity Connect and our November announcement of IBM Verify.

Download the 2017 Gartner Magic Quadrant for Access Management

Gartner does extensive research to determine which vendors will be positioned in the Leaders, Challengers, Visionaries and Niche Players quadrants in its reports.

Recognizing IBM’s Completeness of Vision and Ability to Execute

When evaluating access management vendors on their ability to execute, Gartner analyzed product/service, overall viability, sales execution/pricing and customer experience, among other criteria. When evaluating vendors on their completeness of vision, the firm analyzed market understanding, sales strategy, innovation and geographical strategy, among other criteria.

According to Gartner, “Leaders in the AM market generally have significant customer bases. They provide feature sets that are appropriate for current customer use-case needs. Leaders also show evidence of strong vision and execution for anticipated requirements related to technology, methodology or means of delivery; and they show evidence of how AM plays a role in a collection of related or adjacent product offerings. Leaders typically demonstrate solid customer satisfaction with overall AM capabilities, the sales process and/or related service and support.”

Download the complete 2017 Gartner Magic Quadrant for Access Management

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today