The Forrester Wave™: Identity And Access Management, Q1 2008
Oracle Emerges As Leader, With IBM, Sun Microsystems, Novell, And CA Close Behind
March 14, 2008
Why Read This Report
Forrester evaluated leading identity and access management (IAM) vendors across 117 criteria and found that Oracle has established itself as the IAM market Leader due to its solid technology base across the IAM landscape and its compelling, aggressive strategy around what it refers to as application-centric identity. IBM, Sun Microsystems, CA, and Novell are all Strong Performers. They each have some top-notch products, but they also face a few fundamental technological shortcomings across their IAM portfolios; plus, they lack the attention to all the key areas of development and utilization of IAM solutions. BMC Software has failed to keep pace with competitors on functionality, which has hindered market execution, and it is best suited for organizations with a provisioning focus that are already looking to BMC for business service management (BSM) solutions.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($2495 USD).Purchase
Table of Contents
- Identity And Access Management Delivers Security With Strong Business Value
- Our Evaluation Criteria Put The Spotlight On IAM Portfolio Integration
- Oracle Gains A Tenuous Lead In A Competitive And Dynamic Market
- Vendor Profiles
- Supplemental Material
- Related Research Documents
Wipro Is A Strong Performer In Security Consulting With Potential For Rapid Growth
September 25, 2007 | Khalid Kark
E-Signatures Q&A: Legalize It
December 2, 2009 | Bill Nagel
Best Practices: Implementing Strong Authentication In Your Enterprise
July 23, 2009 | Bill Nagel