November 20, 2023 By Wesley Gyure 3 min read

We are thrilled to share that IBM is named a Leader in the most recent Gartner® Magic Quadrant™ for Access Management. IBM is recognized for its Ability to Execute and Completeness of Vision.

As a team, we’ve been working hard to deliver on a roadmap of identity and access management capabilities that we believe solve the biggest challenges organizations are facing when it comes to managing identities in today’s dispersed, hybrid cloud environments. Ultimately, our vision is to provide the right building blocks for organizations to build an “identity fabric” that integrates, augments and streamlines the myriad of disconnected and incompatible identity tools organizations are using today.

Let’s dig into what this looks like in practice.

The challenges of managing identity across hybrid cloud

As cloud migration and digital transformation accelerate, organizations are facing a huge amount of complexity when it comes to identity and access management (IAM). They are increasingly working across multi-cloud environments and tools — each of which provides their own set of identity and access management (IAM) capabilities to manage. At the same time, they’re also still relying on legacy systems and architectures, which often lack some of the standard capabilities needed for a modern IAM strategy. Ultimately, these tools are creating a disconnected and complicated web of identities to be managed, with no easy way to integrate or streamline between them. These identity silos disrupt strategic intentions of providing users a consistent and frictionless authentication experience and improving identity security.

Taking an “identity fabric” approach can help organizations bridge the gap between legacy identity infrastructure and modern cloud-based IAM systems. An identity fabric aims to integrate and enhance existing identity solutions rather than replace them. The goal is to create a less complex environment where consistent security authentication flows and visibility can be enforced.

Providing the building blocks for identity fabric

Our strategy with IBM Security Verify is to help clients drastically simplify their identity strategy – by providing them with the foundational building blocks to create an identity fabric. Specifically, we are building flexible and modular identity solutions that are designed to help clients connect their existing IAM capabilities, bridge the gap between legacy and cloud-based solutions, and augment capabilities that are missing from within these respective toolsets.

We are building our identity tools in a way that helps eliminate identity silos and improves user experience across all apps. This includes extending modern authentication mechanisms to legacy apps with no-code changes, enabling a consistent user experience across all applications and improving security posture with real-time behavioral and biometric risk-based authentication.

Learn more about IBM Security Verify

Gartner® recognition for Completeness of Vision and Ability to Execute

IBM was recently mentioned in the 2023 Gartner® Magic Quadrant™ for Access Management, where IBM was named as a leader in this space. 

This year’s report focuses on access management platforms that “include an identity provider (IdP) and establish, manage, and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications.” Some highlights on the must have capabilities noted for this market are:

  • A directory or identity repository for workforce or external users that includes identity synchronization services
  • Identity admin for integrated apps that includes lifecycle and profile management capabilities with support for the System for Cross-Domain Identity Management
  • SSO and session management with support for standard identity protocols and APIs for accessing standards-based and legacy apps
  • User authentication (including commodity MFA)
  • Authorization enforcement (including support for modern authorization protocols, including OAuth 2.0)

Optional capabilities assessed for the AM market included features like journey time orchestration, low/no-code interfaces for customization and extensibility, passwordless authentication and identity threat detection and response.

Ultimately, we believe that the comprehensiveness and flexibility of our current capabilities, combined will set IBM Security Verify as an ideal partner for companies looking to simplify the foundation of their identity management strategy. This foundation has the potential to pave the way for faster and more effective identity-based threat detection and response (ITDR).

See below to receive a complimentary copy of the full Gartner® Magic Quadrant™ for Access Management report for more details on why Gartner® recognized IBM as a Leader.

Read the report

Gartner, Magic Quadrant for Access Management, Henrique Teixeira, Abhyuday Data, Nathan Harris, Robertson Pimental, November 16 2023.

Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Was this article helpful?
YesNo

More from Security

Data privacy examples

9 min read - An online retailer always gets users' explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. These are just some examples of how organizations support data privacy, the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate…

How to prevent prompt injection attacks

8 min read - Large language models (LLMs) may be the biggest technological breakthrough of the decade. They are also vulnerable to prompt injections, a significant security flaw with no apparent fix. As generative AI applications become increasingly ingrained in enterprise IT environments, organizations must find ways to combat this pernicious cyberattack. While researchers have not yet found a way to completely prevent prompt injections, there are ways of mitigating the risk.  What are prompt injection attacks, and why are they a problem? Prompt…

Building the human firewall: Navigating behavioral change in security awareness and culture

4 min read - The latest findings of the IBM X-Force® Threat Intelligence Index report highlight a shift in the tactics of attackers. Rather than using traditional hacking methods, there has been a significant 71% surge in attacks where criminals are exploiting valid credentials to infiltrate systems. Info stealers have seen a staggering 266% increase in their utilization, emphasizing their role in acquiring these credentials. Their objective is straightforward: exploit the path of least resistance, often through unsuspecting employees, to obtain valid credentials. Organizations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters