Save or Share this Report

For Security & Risk Professionals

TechRadar™: Identity And Access Management (IAM), Q1 2016

PIM, Federation, Directories, Risk-Based And Two-Factor Authentication, And Web Single Sign-On Provide High Business Value

January 22, 2016

Authors

Why Read This Report

Identity and access management (IAM) has experienced significant transformation during the past two to three years, from support for cloud workloads and apps, to availability of identity-as-a-service (IDaaS), to new methods of two-factor authentication (2FA), to mobile authentication. In this TechRadar™ report, we identified the 14 most important technology categories for IAM at various stages of market maturity, business value, and user adoption. Use this report to help you figure out which ones you need, and when you should implement them.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).

Purchase

Table of Contents

  • The State Of The IAM Technology Landscape
  • Why The Future Of IAM Matters
  • Overview: TechRadar For IAM
  • IAM TechRadar: Directories, Access Control, And IDM Are Most Useful
  • Supplemental Material
  • Related Research Documents

Recommended Research