REGISTER

email 14 48

Data Monitor

Datamonitor, May 2008, Pages: 26

 

This report provides an in-depth look into the opportunities that the identity and access management market represents to both vendors and end-users. It also explores likely scenarios in the evolution of the market, both in terms of technology and market dynamics. In addition, this report provides vendors with actionable recommendations that can assist them with their go-to-market strategy.

Scope

Provides an in-depth look into the ID&AM market opportunity, including a quantitative forecast of the markets growth. Examines possible scenarios for the development of ID&AM technologies. Presents a detailed view of the impact ID&AM technologies are having on end-users. Analyses the go to market approach of vendors and provides guidance on how this could be improved.

Highlights

The complexity of ID&AM requirements, along with the need to integrate disparate elements into a coherent ID&AM infrastructure, has left the technology with a reputation for being difficult to deploy and costly to integrate. This reputation may have been justified in the past, but vendors have made strides towards simplifying their solutions. Of all the components of security, ID&AM has the most important role to play in the maturing security market. ID&AM is tightly linked to business processes and to the IT infrastructure, since the management of access according to role, location and type of resource is a key enabler of business processes. Retail banking will continue to represent a key vertical for ID&AM vendors; however, the high penetration in the market suggests that demand within this sector will slow down. This will be accompanied by an increase in the demand for ID&AM solutions across other verticals.

Reasons to Purchase

This report provides broad coverage of a range of important topics relating to the ID&AM market. Vendors can learn about the major trends affecting the ID&AM space through a combination of quantitative and qualitative market assessments. Vendors can better understand the challenges their clients face as the technology and business requirements of identity and access management evolve.

Purchase

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top