Used as a companion to the Gartner Magic Quadrant, the Gartner Critical Capabilities for Access Management, Worldwide provides deeper insight into providers’ product and service offerings by extending the Magic Quadrant analysis. Use this research to further investigate product and service ratings based on key capabilities set to important, differentiating use cases. For example, you can simply select various common usage scenarios based on how you will be using the technology or service and see which product or service offerings are a best fit based on your needs and requirements.

Optimal IdM is pleased to again be named in the Gartner Magic Quadrant for Access Management. We believe placement in the Niche Players quadrant affirms our unique offering that goes beyond what other AM vendors provide. According to Gartner, “Niche Players provide access management technology that is a good match for specific use cases. They may focus on specific industries or have a geographically limited footprint; however, they can actually outperform many competitors.”

Here are a few highlights of what to expect from Optimal IdM:

  • Security – Our identity and access management software provides advanced security features, including multi-factor authentication and a private dedicated cloud, that minimizes your risk.
  • Scalability – Our SaaS Delivered IAM offering gives you ultimate scalability so you can add and remove users if necessary.
  • Savings – Pricing is designed with the customer in mind using a subscription model based on usage.
  • ServiceManaged services provide ultimate convenience. We do all installation, configuration, monitoring, updates and system maintenance for you.
  • Speed – Fast and reliable installation with no synchronization of data required.
  • Stability – A guaranteed 99.9% uptimes reduces the worry about downtime getting in the way of operation.

 

Critical capabilities for access management

“The Gartner Magic Quadrant for Access Management defines the AM market as vendors providing solutions that use access control engines to provide centralized authentication, SSO, session management and authorization enforcement for target applications in multiple use cases (B2E, B2B and B2C). Adaptive and contextual authentication are core elements, as is support for modern identity protocols such as SAML, OAuth2 and OIDC.”

This Magic Quadrant was produced in response to market conditions for AM, including the following trends:

  • The AM market has evolved to better support more diversity in user authentication methods, managing basic access to IOT devices, contextual and more intelligent adaptive access, mobile computing, and API target services. These feature sets continue to mature in 2019.
  • Vendors that have developed AM as a service have risen in popularity. Gartner estimates that 90% or more of clients based in North America and approximately 65% in Europe and the Asia/Pacific region countries are also seeking SaaS-delivered models for new AM purchases. This demonstrates a preference for agility, quicker time to new features, elimination of continual software upgrades, reduction of supported infrastructure and other SaaS versus software benefits demonstrated in the market (see “How to Choose Between Software and SaaS Delivery Models for Identity and Access Management”).
  • Large, established vendors and others that provided only traditional software- and appliance-based AM solutions have moved to offer SaaS delivery models as options for their AM tools.”

 

Gartner, Inc., Gartner 2019 Magic Quadrant for Access Management, Michael Kelley, Abhyuday Data, Henrique Teixeira, 12 August 2019

Gartner, Critical Capabilities for Access Management, Abhyuday Data, Michael Kelley, Henrique Teixeira, 7 October 2019

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Optimal IdM.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.