Selecting an Identity & Access Management (ID&AM) Vendor

The "Selecting an Identity & Access Management (ID&AM) Vendor" report surveys key trends in the ID&AM market and analyzes the performance of the leading vendors. Gain detailed knowledge of ID&AM vendors' strengths with regards to technology, user sentiment and market impact.  

As the focus of enterprise security technologies moves away from the perimeter and towards identity-centric and information-centric security, ID&AM will become a strategic issue in a wide variety of settings.

Datamonitor has developed this Decision Matrix to help businesses select the most appropriate ID&AM vendors based on their technology strength, reputation among customers, and impact in the market. Datamonitor provides a complete view of vendor capabilities and advises on those that businesses should explore, consider and, most importantly, shortlist.

Selecting an Identity & Access Management Vendor will help you to:

  • Gain detailed knowledge of ID&AM vendors' strengths with regards to technology, user sentiment and market impact.
  • Learn how ID&AM vendors benchmark their own performance in various key criteria against their competitors.
  • Gain valuable insight to improve your ID&AM purchasing decisions.

If you wish to read more you can purchase this title online.

Alternatively, you can download the order form here. 

Report Information:

Published: December 2008

List Price: $3,395 USD

Publisher: Datamonitor

Table of Contents 

Related Research:

Decision Matrix: Selecting an IT Systems Management Vendor  

Mitigating Information Risk Through Identity & Access Management 




close

Next Article in Research

Advertisement

How to Prevent Insider Threats!

POLL

More in Research

2013 eBook on surviving SIEM

2013 eBook on surviving SIEM

Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

2013 eBook on Advanced Persistent Threats

2013 eBook on Advanced Persistent Threats

APTs - most often taking the form of cyber criminal campaigns out for financial gain or trade secrets - have impacted some of the largest organizations and government agencies in ...