SlideShare a Scribd company logo
1 of 11
Download to read offline
2015
2015 Global Identity and Access Management (IAM)
Market Leadership Award
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 2 “We Accelerate Growth”
Contents
Background and Company Performance ...................................................................... 3 
Industry Challenges............................................................................................ 3 
Market Leadership of IBM.................................................................................... 3 
Conclusion ........................................................................................................ 6 
Significance of Market Leadership............................................................................... 7 
Understanding Market Leadership............................................................................... 8 
Key Performance Criteria .......................................................................................... 8 
The Intersection between 360-Degree Research and Best Practices Awards...................... 9 
Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best
Practices............................................................................................................... 10 
About Frost & Sullivan ............................................................................................ 11 
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 3 “We Accelerate Growth”
Background and Company Performance
Industry Challenges
Identity and Access Management (IAM) solutions have been available and implemented by
organizations for years. However, the IAM market is now at a critical juncture in its
development. The ability to manage identities and access entitlements is becoming
increasingly important to businesses of all sizes. IT Mega Trends such as growing adoption
of mobile devices, complex threats, cloud services and Web applications are challenging
traditional models of IAM and information security.
Widespread adoption of mobile devices and cloud services, emergence of insider threats,
and stricter compliance requirements have forced an evolution in corporate IT security
practices, democratizing and decentralizing control of information and communication
technologies. Employees and visitors all have multiple devices that they expect to use.
Employees determine which mobile applications would best enable them to perform their
jobs and then deploy it on their own, possibly without approval or knowledge of their
organization’s IT professionals. IT departments can no longer wonder if they can support
emerging best practices, but are instead focusing on how they can operate in a secure and
regulation compliant manner.
Competitors in the IAM market are challenged to provide innovative solutions that help
customers address changing technologies, security needs and business practices. The IAM
market, which has segments that are maturing, now have opportunities for growth by
innovative companies. Leading companies in the IAM market are in advantageous but
vulnerable positions, and can lead the IAM market in the next phase of growth or lose
market share.
Market Leadership of IBM
Product Quality
IBM offers a broad portfolio of integrated IAM solutions with a wealth of functionality
including access management for Web, mobile, or enterprise Single Sign-On (SSO),
identity federation, directory services, identity and access governance, privileged identity
management, automated provisioning, auditing, and a security policy manager.
IBM IAM solutions receive high marks for performance and reliability, as evidenced by
years of use in large business and enterprise networks around the globe, as well of
thousands of small and midsized firms. IBM solutions are traditionally offered as scalable
enterprise software and can support tens of thousands of different identities and access
entitlements, as well as all related roles, groups and policies. IBM has expanded its
deployment options, recently offering its IAM solutions as cost-effective virtual and
hardware appliances, or as a managed cloud service.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 4 “We Accelerate Growth”
Growth Strategy Excellence
Despite an already strong position in the IAM market, IBM continues to monitor trends
and identify new market segments for growth. In recent years, cloud-based IAM services
have gained a strong following with small and medium size businesses (SMB). The SMB
segment is emerging as a high growth market and enterprise organizations are also
evaluating the value that IAM-as-a-Service can offer.
In recent years, IBM has made important strategic acquisitions including Lighthouse
Security Group and CrossIdeas to strengthen the IBM IAM portfolio. The Lighthouse
Security Group acquisition provides IBM with the foundation necessary to introduce a
cloud-based service for IAM in 2015, allowing the company to better support new
customers in the SMB market and large enterprise customers that require a solution to
manage access to cloud applications. Though some of IBM’s competitors have been
offering cloud-based IAM services, IBM is in an advantageous position and can provide
customers with an integrated, end-to-end solution for managing identities and access
rights across on-premises applications and cloud applications.
Technology Leverage
IBM continues to invest in developing new technologies that solve customers’ security
problems. For example, IBM introduced its concept of Threat-Aware IAM in 2013. This
strategy would allow IBM identity solutions to utilize security intelligence to discover and
block threats. IBM Threat-Aware IAM focuses on two critical themes: to prevent advanced
insider threats and to deliver actionable identity intelligence. These are two of the top
concerns for businesses today as advanced malware and persistent threat actors have
been able to steal massive amounts of sensitive data from even the largest and most
technically savvy global companies.
The acquisition of CrossIdeas further demonstrates IBM’s business-focused approach to
IAM. IBM envisions IAM as a security-purposed technology that allows businesses to
manage risk from user access. IBM identity governance solutions are designed to enable
businesses to understand access risks, make informed business decisions, and then take
necessary steps to mitigate risk and achieve compliance.
Product Differentiation
IBM has established itself in the IAM market and has built a strong product over many
years of development. IBM IAM solutions feature an extensive library of third-party
product integrations, including authentication technologies, databases, user repositories,
Web servers, and directories. IBM ensures simplified deployment and reliable use of its
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 5 “We Accelerate Growth”
product by supporting heterogeneous network environments and third-party systems such
as Microsoft, SAP and Oracle.
Security technologies are challenging to develop as businesses vary greatly in terms of
risk profile, compliance requirements, business objectives, and technical savvy. IAM in
particular requires a strong understanding of technologies, people, and business
processes. As a large organization with a significant professional services division, IBM has
the large product development teams and support services needed to address customer
needs and processes that will enable customers to reach a successful deployment that
delivers maximum value.
Brand Strength
IBM is a large global IT software, hardware, and services company with multiple security
solutions including network intrusion prevention systems (IPS), security information and
event management (SIEM) solutions, data and application security solutions. IBM also
operates the X-Force research organization. The IBM X-Force is a well-known and active
contributor in the information security industry. The IBM X-Force produces multiple
reports on security trends and the intelligence that it provides is used to support IBM
security products.
As one of the first companies to offer IAM products, IBM has a strong history in the
market and a brand name that is well established. IBM has the largest customer base with
thousands of customers, many of whom are interested in updating their security and IAM
processes. Customers that are evaluating IAM solutions are quick to short list IBM.
Market Share Leadership
In 2014, IBM accounted for the greatest share of market revenue and was named the
fastest growing vendor in the worldwide security software market, supported by continued
sales and renewals of its current IAM offerings. IBM faces growing competition but can
maintain this market leadership position by developing new cloud-based IAM services and
advanced security analytics that leverage identity data to understand and manage risk.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 6 “We Accelerate Growth”
Conclusion
IBM is the established market leader in the IAM market in 2014 and is poised to lead the
market into the next phase of growth. By understanding and adapting to changing
information and communication technologies and business practices, IBM can continue to
meet customers’ needs and to maintain its leadership role in the market.
With its strong overall performance, IBM has achieved a leadership position in the IAM
market, and Frost & Sullivan is proud to bestow the 2015 Market Leadership award to
IBM.
IBM, 14%
Others, 
86%
Percent of Revenue
Total IAM Market:  Global, 2014
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 7 “We Accelerate Growth”
Significance of Market Leadership
Ultimately, growth in any organization depends upon customers purchasing from your
company, and then making the decision to return time and again. Loyal customers
become brand advocates; brand advocates recruit new customers; the company grows;
and then it attains market leadership. To achieve and maintain market leadership, an
organization must strive to be best-in-class in three key areas: understanding demand,
nurturing the brand, and differentiating from the competition.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 8 “We Accelerate Growth”
Understanding Market Leadership
As discussed on the previous page, driving demand, strengthening the brand, and
competitive differentiation all play a critical role in a company’s path to market leadership.
This three-fold focus, however, is only the beginning of the journey and must be
complemented by an equally rigorous focus on the customer experience. Best-practice
organizations therefore commit to the customer at each stage of the buying cycle and
continue to nurture the relationship once the customer has made a purchase. In this way,
they build a loyal, ever-growing customer base and methodically add to their market
share over time.
Key Performance Criteria
For the Market Leadership Award, Frost & Sullivan analysts focused on specific criteria to
determine the areas of performance excellence that led to the company’s leadership
position. The criteria that were considered include (although not limited to) the following:
Criterion Requirement
Growth Strategy Excellence
Demonstrated ability to consistently identify,
prioritize, and pursue emerging growth
opportunities
Implementation Excellence
Processes support the efficient and consistent
implementation of tactics designed to support the
strategy
Brand Strength
The possession of a brand that is respected,
recognized, and remembered
Product Quality
The product or service receives high marks for
performance, functionality and reliability at every
stage of the life cycle
Product Differentiation
The product or service has carved out a market
niche, whether based on price, quality, uniqueness
of offering (or some combination of the three) that
another company cannot easily duplicate
Technology Leverage
Demonstrated commitment to incorporating leading
edge technologies into product offerings, for
greater product performance and value
Price/Performance Value
Products or services offer the best value for the
price, compared to similar offerings in the market
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 9 “We Accelerate Growth”
Customer Purchase Experience
Customers feel like they are buying the most
optimal solution that addresses both their unique
needs and their unique constraints
Customer Ownership Experience
Customers are proud to own the company’s product
or service, and have a positive experience
throughout the life of the product or service
Customer Service Experience
Customer service is accessible, fast, stress-free,
and of high quality
Market Share Leadership
Superior execution results in a commanding
revenue position in the market
The Intersection between 360-Degree Research and Best
Practices Awards
Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our
research process. It offers a 360-degree-view of industry challenges, trends, and issues
by integrating all 7 of Frost & Sullivan's
research methodologies. Too often,
companies make important growth
decisions based on a narrow understanding
of their environment, leading to errors of
both omission and commission. Successful
growth strategies are founded on a
thorough understanding of market,
technical, economic, financial, customer,
best practices, and demographic analyses.
The integration of these research
disciplines into the 360-degree research
methodology provides an evaluation
platform for benchmarking industry
players and for identifying those
performing at best-in-class levels.
360-DEGREE RESEARCH: SEEING ORDER IN
THE CHAOS
Technology
Obsolescence
Disruptive
Technologies
New
Applications
CEO
Demographics
Needs
and
Perceptions
Segmentation
Buying
Behavior
Branding
and
Positioning
Competitive
Benchmarking
Emerging
Competition
Competitive
Strategy
Capital
Investments
Availability
of
Capital
Country
Risk
Economic
Trends
Crowd
Sourcing
Growth
Strategies
Career
Development
Growth
Implementation
Industry
Evolution
New Vertical
Markets
Industry
Expansion
Industry
Convergence
Emerging
Technologies
Smart Cities
Sustainability
New Business
Cultures
GeoPolitical
Stability
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 10 “We Accelerate Growth”
Best Practices Recognition: 10 Steps to Researching,
Identifying, and Recognizing Best Practices
Frost & Sullivan Awards follow a 10-step process to evaluate award candidates and assess
their fit with select best practice criteria. The reputation and integrity of the Awards are
based on close adherence to this process.
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
1
Monitor,
target, and
screen
Identify award recipient
candidates from around the
globe
ď‚· Conduct in-depth industry
research
ď‚· Identify emerging sectors
ď‚· Scan multiple geographies
Pipeline of candidates who
potentially meet all best-
practice criteria
2
Perform
360-degree
research
Perform comprehensive,
360-degree research on all
candidates in the pipeline
ď‚· Interview thought leaders
and industry practitioners
 Assess candidates’ fit with
best-practice criteria
ď‚· Rank all candidates
Matrix positioning all
candidates’ performance
relative to one another
3
Invite
thought
leadership in
best
practices
Perform in-depth
examination of all candidates
ď‚· Confirm best-practice criteria
ď‚· Examine eligibility of all
candidates
ď‚· Identify any information gaps
Detailed profiles of all
ranked candidates
4
Initiate
research
director
review
Conduct an unbiased
evaluation of all candidate
profiles
ď‚· Brainstorm ranking options
ď‚· Invite multiple perspectives
on candidates’ performance
ď‚· Update candidate profiles
Final prioritization of all
eligible candidates and
companion best-practice
positioning paper
5
Assemble
panel of
industry
experts
Present findings to an expert
panel of industry thought
leaders
ď‚· Share findings
ď‚· Strengthen cases for
candidate eligibility
ď‚· Prioritize candidates
Refined list of prioritized
award candidates
6
Conduct
global
industry
review
Build consensus on award
candidates’ eligibility
ď‚· Hold global team meeting to
review all candidates
ď‚· Pressure-test fit with criteria
ď‚· Confirm inclusion of all
eligible candidates
Final list of eligible award
candidates, representing
success stories worldwide
7
Perform
quality check
Develop official award
consideration materials
ď‚· Perform final performance
benchmarking activities
ď‚· Write nominations
ď‚· Perform quality review
High-quality, accurate, and
creative presentation of
nominees’ successes
8
Reconnect
with panel of
industry
experts
Finalize the selection of the
best-practice award recipient
ď‚· Review analysis with panel
ď‚· Build consensus
ď‚· Select winner
Decision on which company
performs best against all
best-practice criteria
9
Communicate
recognition
Inform award recipient of
award recognition
ď‚· Present award to the CEO
ď‚· Inspire the organization for
continued success
 Celebrate the recipient’s
performance
Announcement of award
and plan for how recipient
can use the award to
enhance the brand
10
Take
strategic
action
Upon licensing, company
may share award news with
stakeholders and customers
ď‚· Coordinate media outreach
ď‚· Design a marketing plan
 Assess award’s role in future
strategic planning
Widespread awareness of
recipient’s award status
among investors, media
personnel, and employees
BEST PRACTICES RESEARCH
© Frost & Sullivan 2015 11 “We Accelerate Growth”
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
and achieve best in class positions in growth, innovation and leadership. The company's
Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined
research and best practice models to drive the generation, evaluation and implementation
of powerful growth strategies. Frost & Sullivan leverages almost 50 years of experience in
partnering with Global 1000 companies, emerging businesses and the investment
community from 31 offices on six continents. To join our Growth Partnership, please visit
http://www.frost.com.

More Related Content

What's hot

Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...sandrahulvat
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access managementTatiana Grisham
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15Tirrah Switzer
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
MIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comMIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comLikhan Banik
 
Company Profile
Company ProfileCompany Profile
Company ProfileITB001
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T UEcom Ftu
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services sellingALEX CHANG
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseAhmed Banafa
 
Smart Information Management
Smart Information ManagementSmart Information Management
Smart Information ManagementDaryl Pereira
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010guest4a4bba7
 

What's hot (20)

Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
IBM: Redefining Enterprise Systems
IBM: Redefining Enterprise SystemsIBM: Redefining Enterprise Systems
IBM: Redefining Enterprise Systems
 
MIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comMIS Presentation about SalesForce.com
MIS Presentation about SalesForce.com
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T U
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services selling
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
Smart Information Management
Smart Information ManagementSmart Information Management
Smart Information Management
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010
 

Similar to 2015 Global Identity and Access Management (IAM) Market Leadership Award

IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without CompromiseArrow ECS UK
 
World cloud identity access management
World cloud identity access managementWorld cloud identity access management
World cloud identity access managementAllied Market Research
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
The Brands of The Year 2023 - Ciolook India.pdf
The Brands of The Year 2023 - Ciolook India.pdfThe Brands of The Year 2023 - Ciolook India.pdf
The Brands of The Year 2023 - Ciolook India.pdfCIO Look Magazine
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesAldo Pietropaolo
 
2018 IBM Annual Report2018 IBM Annual Report2018 .docx
2018 IBM Annual Report2018 IBM Annual Report2018  .docx2018 IBM Annual Report2018 IBM Annual Report2018  .docx
2018 IBM Annual Report2018 IBM Annual Report2018 .docxlorainedeserre
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedAutotask
 
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...Carlos Tomas
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk DataConor Coughlan
 
Indviduellverkaufen von social media zum social crm-kam final 26062014
Indviduellverkaufen  von social media zum social crm-kam final 26062014Indviduellverkaufen  von social media zum social crm-kam final 26062014
Indviduellverkaufen von social media zum social crm-kam final 26062014Friedel Jonker
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. IBM
 

Similar to 2015 Global Identity and Access Management (IAM) Market Leadership Award (20)

Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cloud without Compromise
Cloud without CompromiseCloud without Compromise
Cloud without Compromise
 
World cloud identity access management
World cloud identity access managementWorld cloud identity access management
World cloud identity access management
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
The Brands of The Year 2023 - Ciolook India.pdf
The Brands of The Year 2023 - Ciolook India.pdfThe Brands of The Year 2023 - Ciolook India.pdf
The Brands of The Year 2023 - Ciolook India.pdf
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
 
Ibm
IbmIbm
Ibm
 
2018 IBM Annual Report2018 IBM Annual Report2018 .docx
2018 IBM Annual Report2018 IBM Annual Report2018  .docx2018 IBM Annual Report2018 IBM Annual Report2018  .docx
2018 IBM Annual Report2018 IBM Annual Report2018 .docx
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Cloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is ConsumedCloud Changed The Way Technology is Consumed
Cloud Changed The Way Technology is Consumed
 
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
 
Indviduellverkaufen von social media zum social crm-kam final 26062014
Indviduellverkaufen  von social media zum social crm-kam final 26062014Indviduellverkaufen  von social media zum social crm-kam final 26062014
Indviduellverkaufen von social media zum social crm-kam final 26062014
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.
 

More from Peter Tutty

IBM Big Data
IBM Big Data IBM Big Data
IBM Big Data Peter Tutty
 
Ibm big data
Ibm big dataIbm big data
Ibm big dataPeter Tutty
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1Peter Tutty
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1Peter Tutty
 
Your Cognitive Future
Your Cognitive FutureYour Cognitive Future
Your Cognitive FuturePeter Tutty
 
Redefining Boundaries
Redefining BoundariesRedefining Boundaries
Redefining BoundariesPeter Tutty
 
Harnessing the power of IBM Analytics
Harnessing the power of IBM AnalyticsHarnessing the power of IBM Analytics
Harnessing the power of IBM AnalyticsPeter Tutty
 
Social Media Analytics
Social Media AnalyticsSocial Media Analytics
Social Media AnalyticsPeter Tutty
 
Collaborating with Clients & Partners on Cognitive IoT
Collaborating with Clients & Partners on Cognitive IoTCollaborating with Clients & Partners on Cognitive IoT
Collaborating with Clients & Partners on Cognitive IoTPeter Tutty
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsPeter Tutty
 
Digital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryDigital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryPeter Tutty
 
Digital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryDigital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryPeter Tutty
 
Cognitive Business is here.
Cognitive Business is here.Cognitive Business is here.
Cognitive Business is here.Peter Tutty
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Why no sql_ibm_cloudant
Why no sql_ibm_cloudantWhy no sql_ibm_cloudant
Why no sql_ibm_cloudantPeter Tutty
 
IBM Mobile
IBM Mobile IBM Mobile
IBM Mobile Peter Tutty
 
Gartner infographic final
Gartner infographic finalGartner infographic final
Gartner infographic finalPeter Tutty
 

More from Peter Tutty (20)

IBM Big Data
IBM Big Data IBM Big Data
IBM Big Data
 
Ibm big data
Ibm big dataIbm big data
Ibm big data
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1
 
Your Cognitive Future
Your Cognitive FutureYour Cognitive Future
Your Cognitive Future
 
Redefining Boundaries
Redefining BoundariesRedefining Boundaries
Redefining Boundaries
 
Harnessing the power of IBM Analytics
Harnessing the power of IBM AnalyticsHarnessing the power of IBM Analytics
Harnessing the power of IBM Analytics
 
Social Media Analytics
Social Media AnalyticsSocial Media Analytics
Social Media Analytics
 
Collaborating with Clients & Partners on Cognitive IoT
Collaborating with Clients & Partners on Cognitive IoTCollaborating with Clients & Partners on Cognitive IoT
Collaborating with Clients & Partners on Cognitive IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Digital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryDigital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industry
 
Digital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industryDigital disruption and the future of the automotive industry
Digital disruption and the future of the automotive industry
 
Cognitive Business is here.
Cognitive Business is here.Cognitive Business is here.
Cognitive Business is here.
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Why no sql_ibm_cloudant
Why no sql_ibm_cloudantWhy no sql_ibm_cloudant
Why no sql_ibm_cloudant
 
IBM Mobile
IBM Mobile IBM Mobile
IBM Mobile
 
Gartner infographic final
Gartner infographic finalGartner infographic final
Gartner infographic final
 
Canon
CanonCanon
Canon
 
Ibm verse
Ibm verseIbm verse
Ibm verse
 

Recently uploaded

Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

2015 Global Identity and Access Management (IAM) Market Leadership Award

  • 1. 2015 2015 Global Identity and Access Management (IAM) Market Leadership Award
  • 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 2 “We Accelerate Growth” Contents Background and Company Performance ...................................................................... 3  Industry Challenges............................................................................................ 3  Market Leadership of IBM.................................................................................... 3  Conclusion ........................................................................................................ 6  Significance of Market Leadership............................................................................... 7  Understanding Market Leadership............................................................................... 8  Key Performance Criteria .......................................................................................... 8  The Intersection between 360-Degree Research and Best Practices Awards...................... 9  Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices............................................................................................................... 10  About Frost & Sullivan ............................................................................................ 11 
  • 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 3 “We Accelerate Growth” Background and Company Performance Industry Challenges Identity and Access Management (IAM) solutions have been available and implemented by organizations for years. However, the IAM market is now at a critical juncture in its development. The ability to manage identities and access entitlements is becoming increasingly important to businesses of all sizes. IT Mega Trends such as growing adoption of mobile devices, complex threats, cloud services and Web applications are challenging traditional models of IAM and information security. Widespread adoption of mobile devices and cloud services, emergence of insider threats, and stricter compliance requirements have forced an evolution in corporate IT security practices, democratizing and decentralizing control of information and communication technologies. Employees and visitors all have multiple devices that they expect to use. Employees determine which mobile applications would best enable them to perform their jobs and then deploy it on their own, possibly without approval or knowledge of their organization’s IT professionals. IT departments can no longer wonder if they can support emerging best practices, but are instead focusing on how they can operate in a secure and regulation compliant manner. Competitors in the IAM market are challenged to provide innovative solutions that help customers address changing technologies, security needs and business practices. The IAM market, which has segments that are maturing, now have opportunities for growth by innovative companies. Leading companies in the IAM market are in advantageous but vulnerable positions, and can lead the IAM market in the next phase of growth or lose market share. Market Leadership of IBM Product Quality IBM offers a broad portfolio of integrated IAM solutions with a wealth of functionality including access management for Web, mobile, or enterprise Single Sign-On (SSO), identity federation, directory services, identity and access governance, privileged identity management, automated provisioning, auditing, and a security policy manager. IBM IAM solutions receive high marks for performance and reliability, as evidenced by years of use in large business and enterprise networks around the globe, as well of thousands of small and midsized firms. IBM solutions are traditionally offered as scalable enterprise software and can support tens of thousands of different identities and access entitlements, as well as all related roles, groups and policies. IBM has expanded its deployment options, recently offering its IAM solutions as cost-effective virtual and hardware appliances, or as a managed cloud service.
  • 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 4 “We Accelerate Growth” Growth Strategy Excellence Despite an already strong position in the IAM market, IBM continues to monitor trends and identify new market segments for growth. In recent years, cloud-based IAM services have gained a strong following with small and medium size businesses (SMB). The SMB segment is emerging as a high growth market and enterprise organizations are also evaluating the value that IAM-as-a-Service can offer. In recent years, IBM has made important strategic acquisitions including Lighthouse Security Group and CrossIdeas to strengthen the IBM IAM portfolio. The Lighthouse Security Group acquisition provides IBM with the foundation necessary to introduce a cloud-based service for IAM in 2015, allowing the company to better support new customers in the SMB market and large enterprise customers that require a solution to manage access to cloud applications. Though some of IBM’s competitors have been offering cloud-based IAM services, IBM is in an advantageous position and can provide customers with an integrated, end-to-end solution for managing identities and access rights across on-premises applications and cloud applications. Technology Leverage IBM continues to invest in developing new technologies that solve customers’ security problems. For example, IBM introduced its concept of Threat-Aware IAM in 2013. This strategy would allow IBM identity solutions to utilize security intelligence to discover and block threats. IBM Threat-Aware IAM focuses on two critical themes: to prevent advanced insider threats and to deliver actionable identity intelligence. These are two of the top concerns for businesses today as advanced malware and persistent threat actors have been able to steal massive amounts of sensitive data from even the largest and most technically savvy global companies. The acquisition of CrossIdeas further demonstrates IBM’s business-focused approach to IAM. IBM envisions IAM as a security-purposed technology that allows businesses to manage risk from user access. IBM identity governance solutions are designed to enable businesses to understand access risks, make informed business decisions, and then take necessary steps to mitigate risk and achieve compliance. Product Differentiation IBM has established itself in the IAM market and has built a strong product over many years of development. IBM IAM solutions feature an extensive library of third-party product integrations, including authentication technologies, databases, user repositories, Web servers, and directories. IBM ensures simplified deployment and reliable use of its
  • 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 5 “We Accelerate Growth” product by supporting heterogeneous network environments and third-party systems such as Microsoft, SAP and Oracle. Security technologies are challenging to develop as businesses vary greatly in terms of risk profile, compliance requirements, business objectives, and technical savvy. IAM in particular requires a strong understanding of technologies, people, and business processes. As a large organization with a significant professional services division, IBM has the large product development teams and support services needed to address customer needs and processes that will enable customers to reach a successful deployment that delivers maximum value. Brand Strength IBM is a large global IT software, hardware, and services company with multiple security solutions including network intrusion prevention systems (IPS), security information and event management (SIEM) solutions, data and application security solutions. IBM also operates the X-Force research organization. The IBM X-Force is a well-known and active contributor in the information security industry. The IBM X-Force produces multiple reports on security trends and the intelligence that it provides is used to support IBM security products. As one of the first companies to offer IAM products, IBM has a strong history in the market and a brand name that is well established. IBM has the largest customer base with thousands of customers, many of whom are interested in updating their security and IAM processes. Customers that are evaluating IAM solutions are quick to short list IBM. Market Share Leadership In 2014, IBM accounted for the greatest share of market revenue and was named the fastest growing vendor in the worldwide security software market, supported by continued sales and renewals of its current IAM offerings. IBM faces growing competition but can maintain this market leadership position by developing new cloud-based IAM services and advanced security analytics that leverage identity data to understand and manage risk.
  • 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 6 “We Accelerate Growth” Conclusion IBM is the established market leader in the IAM market in 2014 and is poised to lead the market into the next phase of growth. By understanding and adapting to changing information and communication technologies and business practices, IBM can continue to meet customers’ needs and to maintain its leadership role in the market. With its strong overall performance, IBM has achieved a leadership position in the IAM market, and Frost & Sullivan is proud to bestow the 2015 Market Leadership award to IBM. IBM, 14% Others,  86% Percent of Revenue Total IAM Market:  Global, 2014
  • 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 7 “We Accelerate Growth” Significance of Market Leadership Ultimately, growth in any organization depends upon customers purchasing from your company, and then making the decision to return time and again. Loyal customers become brand advocates; brand advocates recruit new customers; the company grows; and then it attains market leadership. To achieve and maintain market leadership, an organization must strive to be best-in-class in three key areas: understanding demand, nurturing the brand, and differentiating from the competition.
  • 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 8 “We Accelerate Growth” Understanding Market Leadership As discussed on the previous page, driving demand, strengthening the brand, and competitive differentiation all play a critical role in a company’s path to market leadership. This three-fold focus, however, is only the beginning of the journey and must be complemented by an equally rigorous focus on the customer experience. Best-practice organizations therefore commit to the customer at each stage of the buying cycle and continue to nurture the relationship once the customer has made a purchase. In this way, they build a loyal, ever-growing customer base and methodically add to their market share over time. Key Performance Criteria For the Market Leadership Award, Frost & Sullivan analysts focused on specific criteria to determine the areas of performance excellence that led to the company’s leadership position. The criteria that were considered include (although not limited to) the following: Criterion Requirement Growth Strategy Excellence Demonstrated ability to consistently identify, prioritize, and pursue emerging growth opportunities Implementation Excellence Processes support the efficient and consistent implementation of tactics designed to support the strategy Brand Strength The possession of a brand that is respected, recognized, and remembered Product Quality The product or service receives high marks for performance, functionality and reliability at every stage of the life cycle Product Differentiation The product or service has carved out a market niche, whether based on price, quality, uniqueness of offering (or some combination of the three) that another company cannot easily duplicate Technology Leverage Demonstrated commitment to incorporating leading edge technologies into product offerings, for greater product performance and value Price/Performance Value Products or services offer the best value for the price, compared to similar offerings in the market
  • 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 9 “We Accelerate Growth” Customer Purchase Experience Customers feel like they are buying the most optimal solution that addresses both their unique needs and their unique constraints Customer Ownership Experience Customers are proud to own the company’s product or service, and have a positive experience throughout the life of the product or service Customer Service Experience Customer service is accessible, fast, stress-free, and of high quality Market Share Leadership Superior execution results in a commanding revenue position in the market The Intersection between 360-Degree Research and Best Practices Awards Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often, companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360-degree research methodology provides an evaluation platform for benchmarking industry players and for identifying those performing at best-in-class levels. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS Technology Obsolescence Disruptive Technologies New Applications CEO Demographics Needs and Perceptions Segmentation Buying Behavior Branding and Positioning Competitive Benchmarking Emerging Competition Competitive Strategy Capital Investments Availability of Capital Country Risk Economic Trends Crowd Sourcing Growth Strategies Career Development Growth Implementation Industry Evolution New Vertical Markets Industry Expansion Industry Convergence Emerging Technologies Smart Cities Sustainability New Business Cultures GeoPolitical Stability
  • 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 10 “We Accelerate Growth” Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Frost & Sullivan Awards follow a 10-step process to evaluate award candidates and assess their fit with select best practice criteria. The reputation and integrity of the Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify award recipient candidates from around the globe ď‚· Conduct in-depth industry research ď‚· Identify emerging sectors ď‚· Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline ď‚· Interview thought leaders and industry practitioners ď‚· Assess candidates’ fit with best-practice criteria ď‚· Rank all candidates Matrix positioning all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates ď‚· Confirm best-practice criteria ď‚· Examine eligibility of all candidates ď‚· Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles ď‚· Brainstorm ranking options ď‚· Invite multiple perspectives on candidates’ performance ď‚· Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders ď‚· Share findings ď‚· Strengthen cases for candidate eligibility ď‚· Prioritize candidates Refined list of prioritized award candidates 6 Conduct global industry review Build consensus on award candidates’ eligibility ď‚· Hold global team meeting to review all candidates ď‚· Pressure-test fit with criteria ď‚· Confirm inclusion of all eligible candidates Final list of eligible award candidates, representing success stories worldwide 7 Perform quality check Develop official award consideration materials ď‚· Perform final performance benchmarking activities ď‚· Write nominations ď‚· Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice award recipient ď‚· Review analysis with panel ď‚· Build consensus ď‚· Select winner Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform award recipient of award recognition ď‚· Present award to the CEO ď‚· Inspire the organization for continued success ď‚· Celebrate the recipient’s performance Announcement of award and plan for how recipient can use the award to enhance the brand 10 Take strategic action Upon licensing, company may share award news with stakeholders and customers ď‚· Coordinate media outreach ď‚· Design a marketing plan ď‚· Assess award’s role in future strategic planning Widespread awareness of recipient’s award status among investors, media personnel, and employees
  • 11. BEST PRACTICES RESEARCH © Frost & Sullivan 2015 11 “We Accelerate Growth” About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best in class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation and implementation of powerful growth strategies. Frost & Sullivan leverages almost 50 years of experience in partnering with Global 1000 companies, emerging businesses and the investment community from 31 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com.