06.21.2018 - Optimal IdM Named a Niche Player in the Gartner Magic Quadrant for Access Management for Second Consecutive Year

Leading Identity Access Management (IAM) solutions provider evaluated on completeness of vision and ability to execute.  Optimal IdM, a leading provider of Identity and Access Management (IAM) solutions, today announced it has been positioned in the Niche Players quadrant of the June 2018 “Magic Quadrant for Access Management, Worldwide” for the second consecutive year. Gartner defines Access Management as “technologies that use access control engines to provide centralized authentication, single sign-on (SSO), session management and authorization enforcement for target applications in multiple use cases.” In the Magic Quadrant for this market sector, Gartner analysts evaluated providers offering Access Management, based on the criteria of ‘ability to execute’ and ‘completeness of vision.’ “Out of the hundreds of Access Management vendors considered, we are honored to be recognized by Gartner for our full-featured IDaaS offering,” said Mike Brengs, CRO and Managing Partner of Optimal IdM. “We are also very pleased to be placed in the Niche Players quadrant and believe it affirms our unique offering that goes beyond what other vendors in the space provide, namely the choice of having a non-shared environment. Or, in other words, a private, dedicated, secure, single tenant for the IAM space.” The flexibility of having a non-shared environment allows customers the ability to separate and customize enterprise deployments to support their organization’s unique business requirements, workflows, rules and regulatory requirements. This includes the ability to deploy secure government implementations in Azure or Amazon Web Service’s Government Cloud (“G-Cloud”) offerings. The Optimal IdM product and service portfolio includes a full-featured cloud Identity as a Service (IDaaS) platform named The OptimalCloud™. The OptimalCloud provides universal SSO, Federation Brokering, Multifactor Authentication Services, authorization enforcement, audit and reporting services. It can be combined with the exclusive power of Optimal’s Virtual Directory to solve today’s unique identity, cybersecurity, regulatory and compliancy issues. Optimal IdM’s on-premise offerings include our award winning Virtual Identity Server (VIS), which provides a secure, policy driven SSO solution incorporating Federation Services, and a single manageable console for initial authentication security policies. It provides a single view of hundreds of Active Directory forests, LDAP directories as well as other data repositories like SQL, Oracle and many others. VIS seamlessly integrates with Microsoft applications including SharePoint, Office 365 as well as on-premise legacy applications. VIS is currently integrated with more than 5,000 applications and more are added every day. ...


  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.