IBM Verify

IBM Verify

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

IBM Named a Leader in 2023 Gartner® Magic Quadrant™ for Access Management

By John Nielsen posted Thu December 07, 2023 08:44 AM

  

Exciting news - IBM is named a Leader in the most recent Gartner® Magic Quadrant™ for Access Management. IBM is recognized for its Ability to Execute and Completeness of Vision.
 
This year’s report focuses on access management platforms that “include an identity provider (IdP) and establish, manage, and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications.” Some highlights on the must have capabilities noted for this market are: 

  • A directory or identity repository for workforce or external users that includes identity synchronization services
  • Identity admin for integrated apps that includes lifecycle and profile management capabilities with support for the System for Cross-Domain Identity Management
  • SSO and session management with support for standard identity protocols and APIs for accessing standards-based and legacy apps
  • User authentication (including commodity MFA)
  • Authorization enforcement (including support for modern authorization protocols, including OAuth 2.0).

Optional capabilities assessed for this report included features like journey time orchestration (JTO), low to no-code interfaces for customization and extensibility, passwordless authentication, and identity-based threat detection and response (ITDR).

Read the report to learn more about the access management landscape.

Ultimately, we believe that the comprehensiveness and flexibility of our current capabilities will set IBM Security Verify as an ideal partner for companies looking to simplify the foundation of their identity management strategy. This foundation has the potential to pave the way for faster and more effective identity-based threat detection and response.

0 comments
16 views

Permalink