Selecting an Identity & Access Management (ID&AM) Vendor

The "Selecting an Identity & Access Management (ID&AM) Vendor" report surveys key trends in the ID&AM market and analyzes the performance of the leading vendors. Gain detailed knowledge of ID&AM vendors' strengths with regards to technology, user sentiment and market impact.  

As the focus of enterprise security technologies moves away from the perimeter and towards identity-centric and information-centric security, ID&AM will become a strategic issue in a wide variety of settings.

Datamonitor has developed this Decision Matrix to help businesses select the most appropriate ID&AM vendors based on their technology strength, reputation among customers, and impact in the market. Datamonitor provides a complete view of vendor capabilities and advises on those that businesses should explore, consider and, most importantly, shortlist.

Selecting an Identity & Access Management Vendor will help you to:

  • Gain detailed knowledge of ID&AM vendors' strengths with regards to technology, user sentiment and market impact.
  • Learn how ID&AM vendors benchmark their own performance in various key criteria against their competitors.
  • Gain valuable insight to improve your ID&AM purchasing decisions.

If you wish to read more you can purchase this title online.

Alternatively, you can download the order form here. 

Report Information:

Published: December 2008

List Price: $3,395 USD

Publisher: Datamonitor

Table of Contents 

Related Research:

Decision Matrix: Selecting an IT Systems Management Vendor  

Mitigating Information Risk Through Identity & Access Management 




close

Next Article in Research

Sign up for our newsletters

POLL

More in Research

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation ...

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."