Close

Key Criteria for Evaluating Identity as a Service Solutionsv1.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. IDaaS Primer
  3. Report Methodology
  4. Decision Criteria Analysis
  5. Evaluation Metrics
  6. Key Criteria: Impact Analysis
  7. Analyst’s Take
  8. About Paul Stringfellow

Summary

User access management, or identity and access management (IAM), is a critical part of enterprise IT. It has long allowed organizations to centralize the management of their users and control access to the tools they need to carry out their business tasks.

Now, though, IAM is more crucial to the enterprise than ever. Infrastructure has become more distributed, with systems spanning data centers, cloud, and software as a service (SaaS) platforms, making identity management more complex. This has led to an even greater concern—the security of those identities. Today, identities are the key battleground in cybersecurity and the primary target for the cybercriminal. This makes them a priority for the enterprise to secure.

These challenges have also altered the way enterprises must approach identity security. Like much of today’s as-a-service enterprise infrastructure, this has led to the rapid development of identity as a service (IDaaS) platforms. These platforms allow an organization to use a specialized third party to manage the operational basics and deliver a more scalable solution, one that simplifies the required infrastructure and critically improves security. For many, IDaaS meets the demands of the modern enterprise far better.

A robust approach to securing identity is critical for the enterprise. The risk posed to a business by compromised identity is significant, and not securing identity effectively is reckless.

The GigaOm Key Criteria and Radar reports provide an overview of the IDaaS market, identify capabilities (table stakes, key criteria, and emerging technology) and evaluation metrics for selecting an IDaaS platform, and detail vendors and products that excel. These reports will give prospective buyers an overview of the top vendors in this sector and will help decision makers evaluate solutions and decide where to invest.

How to Read this Report

This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:
Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.
GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.
Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.

Full content available to GigaOm Subscribers.

Sign Up For Free