IDC's Identity and Digital Trust Software service offers analysis and perspectives, event coverage, vendor share estimates, and a five-year technology forecast serving the market research needs of commercial identity security solution buyers, practitioners, and participating vendors. Primary and secondary studies of product functionality and use case aspects of identity and access management (IAM) solutions are reported. Cybersecurity begins with identity.
Identity and Digital Trust Software
Related Links
Meet the Experts
Markets and Subjects Analyzed
- Directory use and identity management
- Single sign-on (SSO) and federated provisioning
- Modern authentication (MFA) and authorization practices
- Privileged access management (PAM)
- Identity governance administration (IGA)
- Business to customer identity and access management (B2C/CIAM) requirements
- Artificial intelligence and machine learning (AI/ML and GenAI) impact on identity security practices
- Regulatory compliance as a driver for IAM
- IAM as a security control point or digital business enabler
Core Research
- IAM Security Products Taxonomy
- Market Perspective: Identity Management/Passkeys and Passwordless Technologies
- Striking A Balance Between Platform Products and Point Solutions for Identity Security Deployments
- Identity Security in the Clouds
- IAM Security Technology Forecast 2023 – 2028 Market Forecast
- Multifactor Authentication Technology Adoption Update
- RSAC: Conference Coverage and Notable Vendor Announcements
- Building Better Identity Security Practices Using AI/ML Technology
- Identity Security Markets Leaders Market Share
- IDC MarketScape: Worldwide Integrated Solutions for Identity Security 2024 Vendor Assessment
In addition to the insight provided in this service, IDC may conduct research on specific topics or emerging market segments via research offerings that require additional IDC funding and client investment.
Key Questions Answered
- What technologies are included in a full IAM solution stack?
- What are the size and growth prospects of IAM submarkets?
- What are the essential requirements and considerations for IAM products?
- What should buyers look for when making IAM purchasing decisions?
- What is the market share of each market participant?
- How can IAM vendors differentiate themselves?
- How are IAM technologies implemented in the cloud?
Companies Covered
- Akamai Technologies, Inc.
- Amazon Web Services Inc.
- Beyond Identity Inc.
- BeyondTrust Corp.
- Broadcom Inc.
- Cerby
- Cisco Systems Inc.
- CyberArk Software Ltd.
- Delinea Inc.
- Entrust Corporation
- Google LLC
- HID Global Corporation
- Hitachi, Ltd.
- IBM
- JumpCloud Inc.
- Micro Focus International plc
- Microsoft Corporation
- Okta, Inc.
- Omada Solutions Inc
- OpenText Corporation
- Oracle Corporation
- Ping Identity Corporation
- Quest Software Inc.
- RSA Security LLC
- SAP SE
- SailPoint Technologies Holdings Inc.
- Saviynt Inc.
- SecureAuth Corp.
- Semperis Ltd.
- Thales S.A.
- Wallix Group SA