Identity Management Solutions

Transcription

IAMIdentity ManagementSolutionsBuyers GuideIncludes a Category Overview; the Top 10 Questions to Ask;Plus a Capabilities Reference of the Top 24 Providers forIdentity and Access Management Solutions

INTRODUCTION: User name and password please. You are asked for it every day and you probably have severalcombinations. Work email, home email, Facebook, Twitter, Amazon, your CRM system – so many thingsto remember – you may even have dozens. This is good old-fashioned Identity and Access Management.And while it seems to work, it is remarkably old, unreliable and unsecure.The clean line we have drawn between the world we live in and the one we work in is rapidly blurring. Thecrush of mobile devices and new corporate policies that allow employees to access secure networks withtheir own phone or tablet (BYOD) further muddy the water. Add to that the advancement of cloudcomputing and the evolution of distributed applications, data and networks and you have created a floodof security challenges for information technology professionals. Measures must be taken. As Bob Dylanonce wrote, “You better start swimmin' or you'll sink like a stone. For the times they are a-changin'.”Enter the enterprise Identity Management solution. Exactly who is accessing what, when, where, why andhow. And the stakes have never been higher. From Enron to Edward Snowden, the lack of controls oninformation systems and sensitive data has caused a remarkable series of scandals over the past tenyears that has resulted in increased governmental regulation. And more should be expected.The best practice for the enterprise is to implement an Identity and Access Management (IAM) solution.And given the regulatory, security and public relations implications, an IAM solution may be the singlemost important best practice you will implement – ever.Whether you are a publicly traded corporation, a governmentinstitution or even a small to medium-sized business, the need forIdentity and Access Management has never been greater. In thisBuyers Guide there is a solution for everyone from small groups tomulti-national organizations.Solutions Review is not in the business of picking winners andlosers in a technology solution sector. We will leave that to others.Our job is to help you get started solving the problem. We haveselected 24 Identity and Access Management solution providers asa way to narrow things down a bit.“Given the regulatory,security and PRimplications, anIdentity Managementsolution may be thesingle most importantbest practice you willimplement – ever.”In order to help you start the process of sorting all this out, below are 10 questions, five for yourself, andfive for a prospective solutions provider to your Identity Management needs. It will help you walk throughwhat you want in a solution, what it’s supposed to do for you, as well as the solution offerings, servicesand staying power.And if you would like any more help from us, please send along an email or give us a call.Douglas AtkinsonPresidentSolutions Reviewdatkinson@solutions-review.com(339) 927-92292Solutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

5 Questions You Should Ask Yourself Before Selectingan Identity Management SolutionQUESTION #1Should we go with an On-Premise Solution or a Cloud-Based IAM Provider?In many organizations, this is as much a political decision as it is a business decision. On-premisesolutions provide greater perceived security and control and philosophically it is often the easiest path fora large enterprise with the resources to manage the operation and integration. A cloud solution offersimmediate cost savings and faster implementation. There is no right answer here and you will find manysolutions offer both cloud and on-premise as well as hybrids of the two which may be the best answer forgetting something in place sooner rather than later.QUESTION #2What applications do we need our Identity Management solution to integrate with or support?Software-as-a-Service cloud-based applications have transformed the business world and complicated theidentity management world. Many IAM solutions are now building libraries of thousands of applications inwhich they can support or integrate. Take stock of every app you want employees to have access andtrack to (and track). Then, ask the vendors you are considering to list what business and consumerapplications they support either in the cloud or behind a firewall and what advantages that provides foryour implementation.QUESTION #3Do We Need a Point Solution or A Full Platform?We have included a wide-range of solutions in our 2014 Buyers Guide. Several are simple point solutionsthat will provide smaller organizations or groups with the basics benefits of Identity and AccessManagement and can be integrated internally with existing systems in a more ad hoc manner. There isalso a collection larger, more ambitious platform based solutions that come fully integrated with broaderfunctionality but bring along with them greater expense and higher switching costs. .QUESTION #4What business trends are we facing that impact our needs today as well as our needs in 5 years?It is remarkable how much the Identity Management sector has changed in just the past 24 months, withthe prevailing mobile device management trend of allowing employees to “Bring Your Own Device”. Alwaysa good exercise to gaze into the crystal ball just a bit and try to gauge what else you may require in asolution: Is it simple to implement; modular; scalable; well supported with fixes and new releases;developer-friendly and cost-effective over the life of the engagement.QUESTION #5What size company do I want to work with?The following list of Identity Management solution providers contains some of the largest technologycompanies in the world. It also contains young, small and aggressive companies that may bring a verydifferent sales and service mindset to the table. Have an idea going into the buying cycle, which type ofvendor you are interested in working with. Remember, the vendors you pick today, may be the partnersyou can’t live without in a few short years.3Solutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

And 5 Questions You Should Ask Your Potential Identityand Access Management Solution ProviderQUESTION #6Describe your solutions’ ability to support the following authentication types as well as any additionalauthentication types: Password, Soft-token, Hard-token, Bio-metric, Adaptive, Certificate, and Out-ofBand mobile device?We have included 24 solutions in this Buyers Guide and each brings to the table a different and stronglyheld view of the best way to deliver Identity and Access Management. Have them take a stand and expandon their model while defending that position against the other options available.QUESTION #7How does your Identity Management Solution enable or improve web-based Single Sign-On?The benefits of single sign-on are compelling; reduced password fatigue from different user name andpassword combinations, reducing time spent re-entering passwords for the same identity and reducing ITcosts due to lower number of IT help desk calls about passwords.QUESTION #8Explain how Identity Federation does or does not fit into your proposed solution?As we stated earlier, the need for partners or contractors to securely access internal business applicationsis becoming a daily reality for many enterprises. Plus, the need to provide employees with access toexternal providers systems like outsourced human resources applications has created a genuine demandfor Federated Identity Management solutions. If not an immediate requirement, certainly one to consideras your needs grow.QUESTION #9How do you manage access from mobile devices and what operating systems do you support?If you are committed to providing employees, or vendors, or customers access to systems from anywhereat any time, than you need to understand what a solution can support with regard to mobile devices. Andif your organization has made a commitment to a Bring Your Own Device (BYOD) policy than you will needto understand whether an IAM solution can support not only iOS, but Android, Windows and Blackberry aswell.QUESTION #10How is your solution priced?At some point you need to get to the bottom-line. According to Forrester Research, “IAM solution pricinghas traditionally been more complex than other middleware pricing”. Certainly there is a wide range ofsophistication in the solutions we have selected below, so there will be a spectrum of pricing models.Some will include line items for various options and others will be a simple per user fees. In order to get anapples to apples comparison and build a cost model that you can plan around, you will need to have puteach solution into some sort of “per user per month” cost model. So get all the line by line costs and divideby the number of users and then add that to the per user fees.4Solutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

IDENTITY MANAGEMENT SOLUTION PROVIDERSVENDORSOLUTIONAlert Enterprise Corp.4350 Starboard DriveFremont, CA 94538United States 1 (510) 440-0840www.alertenterprise.comEnterprise GuardianLeverages unique IT-OT Convergencecapabilities by linking SAP and other ITapplications with Physical AccessControl Systems and SCADA /Operational systems.“The AlertEnterprise Market Advantage is a coreunderstanding of application security, IT securityand integration with Physical Access Control Systems (PACS). AlertEnterprisedelivers a holistic view of risk that can extend into security control systems forcritical infrastructure without compromising the production process.”Authentify Inc.8745 West Higgins Rd.Chicago, IL 60631United States 1 (773) 243-0300www.authentify.comAuthentify xFA Authentify employs a process requiringthe user's synchronized exchangebetween the Internet and their phone toprovide out-of-band authentication.OOBA employs separate communicationchannels to authenticate a user.“Authentify's patented technology employs amessage-based architecture to seamlesslyintegrate with existing online processes developed for e-business, secureinformation access, or the distribution of security credentials. By synchronizing auser’s web session with an automated telephone call, Authentify makesundeniable contact with the person behind the computer while capturingtransaction details for audit purposes.”Avatier Corporation2603 Camino RamonSan Ramon, CA 94583United States 1 (800) 609-8610www.avatier.comIdentity Management Software SuiteProvides a complete set of identitymanagement, network access controland data leakage prevention features.The Avatier solution integrates with onpremise custom applications, off-theshelf solutions and cloud-based apps.“Our solution represents an integratedbusiness focused platform that simplifiescomplex environments. Our unique self-serviceapproach unifies enterprise IT through automation and business processstandardization. Our patented business friendly IT store with workflowautomation serves as a single system of record for all access needs andcompliance reporting.”CA TechnologiesOne CA PlazaIslandia, NY 11749United States 1 (800) 225-5224www.ca.comCA IdentityMinder A unified solution for user t their entire lifecycle. Helpsimprove your overall security posturewith an auditable method for managingidentity-related activities.“Automating the process of granting andverifying application access based on eachuser's relationship and role with yourorganization—whether they are employees, contractors, customers or businesspartners—improves IT flexibility. It also helps to improve operational efficienciesand reduce security risks by on-boarding new users faster and ensuring peopleonly have access that is appropriate in their job function.”Centrify Corporation3393 Octavius DriveSanta Clara, CA 95054United States 1 (669) 444-5200www.centrify.comCentrify Identity ServiceImproves end-user productivity andsecures access to cloud and mobileapps via SSO, user provisioning andMulti-factor Authentication. Managemobile devices and Macs via the cloudand/or Active Directory.“Centrify provides Unified Identity Servicesacross data center, cloud and mobile —resulting in one single login for users andone unified identity infrastructure for IT. Centrify's software and cloud services letorganizations securely leverage their existing identity infrastructure to centrallymanage authentication, access control, privilege management, policyenforcement and compliance across on-premise and cloud resources.”Courion Corporation1900 West Park DriveWestborough, MA 01581United States 1 (508) 879-8400www.courion.comAccess Risk Management SuiteThe Courion Suite allows customers tomanage access to applications in thecloud or on premises — whetherprovisioning user access changes,certifying user access, remediatingaccess violations or generating auditand compliance reports.“Courion's comprehensive approach to AccessRisk Management increases your operationalefficiency and transparency, strengthens security and improves compliance. Bystreamlining the user access process and ensuring only the right people have theright access to the right resources, Courion’s solutions help companies reducethe risk of intellectual property theft, loss of reputation and regulatory penaltiesby identifying, quantifying and managing access risk.”5FROM THE COMPANYSolutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

VENDORSOLUTIONFROM THE COMPANYCyberArk GmbHMangfallstraße 37D-83026 RosenheimGermany 49 8031 406600www.cyberark.comPrivileged Identity Management SuiteAn enterprise-proven, policy-basedsolution that secures, manages and logsall privileged accounts and activities. Itcan be used by itself, or as acomplement to CyberArk’s PrivilegedSession Management Suite.“CyberArk’s security solutions master highstakes compliance and audit nagement Suite together with the Privileged Session Management Suiteprovides a stronger level of protection against advanced targeted attacks andinsider threats. It also provides a more complete audit record, including access toprivileged credentials and full privileged session monitoring.”Dell Software5 Polaris WayAliso Viejo, CA 92656United States 1 (949) 754–8000www.quest.comDell One IdentityDell One Identity’s modular andintegrated approach to accountmanagement provides rapid time-tovalue by offering comprehensivefunctionality that builds on existinginvestments.“Dell One Identity enables you to securely andefficiently manage the entire identity lifecycle to:Automate account creation with delegated rights;Group memberships and attributes to authorize users; Reduce complexity ofcommon administrative tasks, such as password management; Achieve optimalsingle sign-on (SSO) for all platforms, systems and applications; and Simplify themanagement of complex Unix, Linux and Mac environments.”Fischer International5801 Pelican Bay Blvd.Naples, FL 34108United States 1 (239) 643-1500Fischer Identity Fischer offers businesses a choice ofprocurement models in addition toSaaS, including on-premise, hosted andremotely managed.“Fischer Identity simplifies, accelerates, andautomates the complex task of managing identitiesfor on- and off-premise resources with no limits toscalability or reach. Organizations can now manageand extend their identity solutions after the vendor leaves. Fischer solutions runon any Java-enabled business platform including open-source to significantlylower costs.”ForgeRock33 New Montgomery St.San Francisco, CA 94105United States 1 (415) 523-0772www.forgerock.comOpen Identity StackIncludes a set of APIs, allowing forefficient and rapid development of newapplications and services, ready fordeployment in the cloud and on mobiledevices. Mobile enhancements supportof OAuth 2.0 and OpenID Connect.“Competitive advantage will now be determined by anorganization’s ability to rapidly verify and manage theidentities of consumers, partners, employees, anddevices, anytime and anywhere, based on context.ForgeRock’ Identity Relationship Management (IRM)platform is designed to help CIOs address these new business challenges atInternet Scale.”Hitachi ID Systems, Inc.500, 1401 - 1st St. S.E.Calgary, AlbertaCanada T2G 2J3 1(403) 233-0740www.hitachi-id.comHitachi ID Management SuiteDesigned as identity management andaccess governance middleware, in thesense that it presents a uniform userinterface and a consolidated set ofbusiness processes to manage useridentity attributes, security rights andcredentials across multiple systems.“Hitachi ID Systems, Inc. deliversaccess governance and identityadministration solutions to organizations globally. Products are available eitherindividually or as components of the Hitachi ID Management Suite. The Hitachi IDManagement Suite is an identity management and access governance solutiondesigned to simplify and secure the management of user life-cycles, from onboarding until termination, across most common types of systems andapplications.”IBM Corporation1 New Orchard RoadArmonk, NY 10504United States 1 (877) 257-5227www.ibm.comIBM Security Identity ManagerIBM Security Identity Managerautomates the creation, modification,recertification and termination of userprivileges and supports policy-basedpassword management throughout theuser lifecycle.“We provide Threat-aware Identity and AccessManagement solutions to help clients manage andsecure identities across multiple perimeters,providing secure online access in today’s mobile,cloud, and social environments. IAM solutions are used to improve identityassurance, meet compliance needs, and reduce operational costs by providinginsight and enforcement of user access to data, applications and utions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

VENDORSOLUTIONIdentropy, Inc.254 W. 31st StreetNew York, NY 10001United States 1 (201) 580-2700www.identropy.comSmart Identity ManagementSCUID (Secure Cloud-based UnifiedIdentity) is an Identity-as-a-Service(IDaaS) platform that delivers a suite ofincluding Self-Service Access Request,Password Management, Provisioning,Identity Governance, and Compliance.“Most companies today have a hybrid environmentwhere some of their applications are on-premiseand others are SaaS-based. SCUID is able toprovide a unified IDM platform to manage such hybrid environments, enforcingthe same policy and workflow controls across the enterprise’s IT footprintconsistently.”Lighthouse Gateway6 Blackstone Valley Pl.Lincoln, RI 02865United States 1 (888) 542-8030www.lighthousecs.comLighthouse GatewayAn IAM platform, offered as a service viathe Cloud. Provides clients with userprovisioning, single sign-on, web accessmanagement, and federation – withoutany need for an on-premise system.“Built upon IBM Tivoli software, LighthouseGateway offers a comprehensive suite offeatures that enable your organization totake control over its IAM challenges cost-effectively, quickly, and with ease. As anopen-standard based solution, Lighthouse Gateway is also compatible withleading on-premise IAM products.”NetIQ Corporation1233 West Loop SouthHouston, TX 77027United States 1 (888) 323-6768www.netiq.comNetIQ Identity ManagerIdentity Manager centralizes accessadministration and ensures every userhas one identity—from your physicaland virtual networks to the cloud.“NetIQ Identity & Access Management solutionsuse integrated identity information to create,modify, and retire identities and control theiraccess to enterprise, cloud and mobile resources. We provide IdentityManagement, Access Management, single sign-on (SSO), access governance,identity tracking and Active Directory (AD) administration.”Okta, Inc.301 Brannan StreetSan Francisco, CA 94107United States 1 (888) 722-7871www.okta.comEnterprise Identity NetworkThe Okta identity management serviceprovides directory services, single signon, strong authentication, provisioning,workflow, and reporting. Okta runs inthe cloud on a secure platform.“Okta is an enterprise grade identity managementservice, built in the cloud. With Okta IT canmanage access across any application, person ordevice. Whether the people are employees, partners or customers or theapplications are in the cloud, on premises or on a mobile device, Okta helps ITbecome more secure and maintain compliance.”Omada A/SOesterbrogade 1352100 CopenhagenDenmark 45 7025 0069www.omada.netOmada Identity SuiteProvides enterprise platform for bothidentity management and identitygovernance. Implements an integratedidentity governance and administrationsolution including closed loop reporting.“Omada's identity solutions work either as standalone or as a unified comprehensive solution thatcovers both identity and access governance andidentity and access management. The suite is built on Microsoft technology andcovers every aspect of identity management challenges in heterogeneous ITenvironments.”OneLogin, Inc.150 Spear StreetSan Francisco, CA 9410United States 1 (855) 426-7227www.onelogin.comOneLoginProvides an on-demand solutionconsisting of single sign-on, multifactor authentication, directoryintegration, user provisioning and acatalog of pre-integrated applications.“OneLogin’s mission is to democratize identitymanagement; making it available to anyorganization, regardless of size. Historically,identity management has been available only to large enterprises who had themeans to purchase expensive software and undertake a complex project.OneLogin gets enterprises up and running in minutes – literally”.7FROM THE COMPANYSolutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

VENDORSOLUTIONOracle Corporation500 Oracle ParkwayRedwood Shores, CA94065United States 1 (650) 506-7000www.oracle.comOracle Identity ManagementAn integrated suite that centralizessecurity for applications and Webservices as well as provides a singlepoint of contact for support, a singlelicense ations to effectively manage the end-toend lifecycle of user identities across all enterprise resources, both within andbeyond the firewall and into the cloud. The Oracle Identity Management platformdelivers scalable solutions for identity governance, access management anddirectory services.”Ping Identity Corporation1001 17th StreetDenver, CO 80202United States 1 (303) 468-2900www.pingidentity.comNext Gen Identity PlatformDelivers solutions that simplifyenterprise security. Including Cloudsingle sign-on, federated identitymanagement, mobile identity security,API security, social identity integration,and identity & access management.“Ping Identity believes secure professional and personalidentities underlie human progress in a connected world.Our identity and access management platform givesenterprise customers and employees one-click access toany application from any device. Over 2,000 companies,including half of the Fortune 100, rely on our award-winning products to make thedigital world a better experience for billions of people.”RSA Aveska (EMC)303 Wyman StreetWaltham, MA 02451United States 1 (877) 487-7797www.aveska.comBusiness-Driven IAMRSA Aveksa's solution coversapplications and data resources,whether on-premise, in the cloud ordelivered via mobile device. The threekey components are: Governance,Provisioning, and Single Sign-On.“Using a business-driven approach, RSA Aveksa’ssolution integrates access governance, provisioning,authentication, and single sign-on (SSO) in oneplatform. Whether on-premise or in the cloud, the platform reduces risk andcomplexity while improving security, visibility, and compliance. RSA Aveksa'splatform supports the entire identity lifecycle, and provides a unified businessview for all types of users.”SailPoint Technologies11305 Four Points DriveAustin, TX 78726United States 1 (512) 346-2000www.sailpoint.comIdentityIQOn-premises IAM solution offerscompliance, provisioning and accessmanagement in a unified solution.IdentityNowDelivered as a cloud service.“SailPoint provides integrated IAM solutions forcompliance, provisioning and access management — delivered either on-premises or as acloud service with no hardware or software to deploy. And we deliver a uniqueCloud On-Ramp that allows you to implement IdentityIQ on-premises today with asmooth migration path to our IDaaS solution, IdentityNow, when you are ready.”SecureAuth Corporation8965 Research Drive,Irvine, CA 92618United States 1 (949) 777-6959www.secureauth.comIdentity Provider SecureAuth IdP combines SSO withnative two-factor authentication.Implements an integrated identitygovernance and administration solutionincluding closed loop reporting.“SecureAuth IdP includes VersatileAuthentication (VAS) that enables IT todeploy single, two, or three-factor authentication to meet current and futureregulatory requirements for cloud and web applications whether accessed fromdesktop or mobile device. Bringing the same level of security and control to cloudapplications that enterprises experience with on-premise applications.”Symplified, Inc.4900 Pearl East CircleBoulder, CO 80301United States 1 (888) 327-9480www.symplified.comIdentity and Access ManagementSymplified provides single sign-on,identity and access management,directory integration, centralizedprovisioning, and strong authenticationin the Cloud, On-Premise or in Hybriddeployment options.“Unlike legacy IAM products and multi-tenant SaaS(Software-as-a-Service) offerings, Symplified allowsconvenient access to any cloud or on-premiseapplication through a unified, customizable SSO portal and delivers a singletenant identity control point — in essence, Identity as a Service (IDaaS). There’sno need to replicate user data to a third party, no need for “side-door” access tocloud applications and an enterprise-wide audit trail.”8FROM THE COMPANYSolutions Review 500 West Cummings Park Woburn, Massachusetts 01801 USA

Centrify Corporation 3393 Octavius Drive Santa Clara, CA 95054 United States 1 (669) 444-5200 www.centrify.com Centrify Identity Service Improves end-user productivity and secures access to cloud and mobile apps via SSO, user provisioning and Multi-factor Authentication. Manage mobile devices and Macs via the cloud and/or Active Directory.