Cover Image
Market Research Report
Product code 
1096660

Identity & Access Management: Vendor Strategies, Vertical Analysis & Market Forecasts 2022-2027

Published: | Juniper Research Ltd | Delivery time: 1-2 business days

Price

Back to Top
Identity & Access Management: Vendor Strategies, Vertical Analysis & Market Forecasts 2022-2027
Published: July 4, 2022
Juniper Research Ltd
Delivery time: 1-2 business days
  • Description
  • Table of Contents

Juniper Research's “Identity & Access Management” research provides a highly detailed analysis of identity & access management software and hardware implementation across 5 key market verticals:

  • Directory Services
  • Password Management
  • Privileged Access Management
  • Provisioning
  • Single Sign-on

The research also provides a comprehensive evaluation of key identity & access management solutions such as single sign-on, user lifecycle management, and privileged access management; aligned to strategic recommendations for market stakeholders. Additionally, the research positions 15 identity & access management vendors in the Juniper Research Competitor Leaderboard; providing an invaluable resource for stakeholders seeking to understand the competitive landscape in the market.

This research suite comprises:

  • Strategy & Forecasts (PDF)
  • 5-year Market Sizing & Forecast Spreadsheet (Excel)
  • 12 months' access to harvest Online Data Platform

KEY FEATURES

  • Market Landscape: A detailed assessment of how identity & access management products and services are deployed internally within enterprises, and externally for customers. Also included is an analysis of the future trends that will influence the identity & access management market, including BYOD (Bring Your Own Device) culture and unified user experiences.
  • Juniper Research Competitor Leaderboard: Key player capability and capacity assessment for 15 identity & access management vendors; positioning them as either an established leader, leading challenger, or disruptor and challenger. Our Competitor Leaderboard scores these companies on their size of operations in the identity & access management space, their range of identity & access management solutions, and ease of deployment and usability, and Juniper Research's view on each company's innovation and future business prospects. The companies included in Juniper Research's Identity & Access Management Competitor Leaderboard are:
    • AWS
    • Broadcom
    • Centrify
    • CyberArk
    • ForgeRock
    • Giesecke+Devrient
    • IBM
    • Microsoft
    • Okta
    • OneLogin
    • Oracle
    • Ping Identity
    • SailPoint
    • SecurePoint
    • Thales
  • Segment Analysis & Future Trends: A strategic analysis of the major drivers, needs, vendors and solutions, and future trends for identity & access management deployment across 8 key segments. These segments include:
    • Education
    • Energy & Utilities
    • Financial Services
    • Government & Public Sector
    • Healthcare
    • Manufacturing
    • Retail & Consumer Packed Goods
    • Telecommunications
  • Benchmark Industry Forecasts: 5-year forecasts are provided for the total number of businesses deploying identity & access management, and the total annual spend on identity & access management. All forecasts are split by the size of businesses deploying and purchasing identity & access management solutions, as well as purchasing methods. The data is split by our 8 key regions and by the 60 countries listed below:
    • Algeria
    • Argentina
    • Australia
    • Austria
    • Bangladesh
    • Belgium
    • Brazil
    • Canada
    • Chile
    • China
    • Colombia
    • Croatia
    • Czech Republic
    • Denmark
    • Ecuador
    • Egypt
    • Finland
    • France
    • Germany
    • Greece
    • Hong Kong
    • Hungary
    • India
    • Indonesia
    • Ireland
    • Israel
    • Italy
    • Japan
    • Kenya
    • Kuwait
    • Malaysia
    • Mexico
    • Nepal
    • Netherlands
    • New Zealand
    • Nigeria
    • Norway
    • Pakistan
    • Peru
    • Philippines
    • Poland
    • Portugal
    • Qatar
    • Romania
    • Russia
    • Saudi Arabia
    • Singapore
    • South Africa
    • South Korea
    • Spain
    • Sweden
    • Switzerland
    • Thailand
    • Turkey
    • UK
    • Ukraine
    • United Arab Emirates
    • Uruguay
    • US
    • Vietnam

KEY QUESTIONS ANSWERED

  • 1. What are the largest segments for growth for identity & access management services?
  • 2. What are the main factors impacting adoption of identity & access management solutions?
  • 3. Who are the leading players in the identity & access management space in 2022?
  • 4. What impact has a dispersed workforce and remote working had on identity & access management?
  • 5. What will the value of the identity & access management market be in 2027?

COMPANIES REFERENCED

  • Included in the Juniper Research Competitor Leaderboard: AWS, Broadcom, Centrify, CyberArk, ForgeRock, Giesecke+Devrient, IBM, Microsoft, Okta, OneLogin, Oracle, Ping Identity, SailPoint, SecureAuth, Thales.
  • Mentioned: Accel, Accenture, Acceptto, Allegiant, Apple, Arrow Electronics, Auth0, BBC, BestBuy, BMW, BP, Brighter AI Technologies, BT, Bupa, Burberry, CA Technologies, Capgemini, Carahsoft, Casio, Cerner, Chevron, CIA, Cisco, Coca-Cola, Cognizant, Confluent, Conjur, Core Security, CrowdStrike, Dell, Deutsche Bank, ERP Maestro, ESPN, Evidian, Fisher Identity, Fujitsu, Gemalto, General Electric, Google, Hewlett Packard, Honda, Hulu, Idaptive, Identity Automation, IDSA (Identity Defined Security Alliance), Ilantus Product, Intello, Iridize, Jackson Square Ventures, K1 Investment Management, Lumen, Mayfield Fund, Motorola, Netcetera, NetSuite, Nintendo, Nissan, OneIdentity, Pandora, Pearson, Phillips, Plusoft, Postbank, PrimeKey, Quadrac, Red Hat, Reuters, Roku, Salesforce, Samsung, SAP, Siemens, Snowflake, Sony, Starbucks, Symantec, Symphonic Software, TD SYNNEX, Tesco, The Co-operative, T-Mobile, Toba Capital, Tomma Bravo, TOTVS, Toyota, Uber, US Department of Defense, US Department of Health and Human Services, Vaultive, VMware, Zoom.

DATA & INTERACTIVE FORECAST

Juniper Research's “Identity & Access Management” forecast suite includes:

  • Forecast splits for 8 key regions, as well as 60 country-level data splits for:
    • Algeria
    • Argentina
    • Australia
    • Austria
    • Bangladesh
    • Belgium
    • Brazil
    • Canada
    • Chile
    • China
    • Colombia
    • Croatia
    • Czech Republic
    • Denmark
    • Ecuador
    • Egypt
    • Finland
    • France
    • Germany
    • Greece
    • Hong Kong
    • Hungary
    • India
    • Indonesia
    • Ireland
    • Israel
    • Italy
    • Japan
    • Kenya
    • Kuwait
    • Malaysia
    • Mexico
    • Nepal
    • Netherlands
    • New Zealand
    • Nigeria
    • Norway
    • Pakistan
    • Peru
    • Philippines
    • Poland
    • Portugal
    • Qatar
    • Romania
    • Russia
    • Saudi Arabia
    • Singapore
    • South Africa
    • South Korea
    • Spain
    • Sweden
    • Switzerland
    • Thailand
    • Turkey
    • UK
    • Ukraine
    • United Arab Emirates
    • Uruguay
    • US
    • Vietnam
  • 5-year benchmark forecasts for:
    • Total number of businesses deploying identity & access management
    • Total identity & access management spending on SaaS (Software-as-a-Service) and term licence
    • Total number of businesses using identity & access management via the SaaS purchase model
    • Total annual spend on identity & access management via the SaaS purchase model
    • Total number of businesses using identity & access management via the term licences purchase model
    • Total annual spend on identity & access management via the term licences purchase model
  • Data splits are provided for small businesses, medium businesses and large businesses.
  • Access to the full set of forecast data of 51 tables and more than 44,000 datapoints.
  • Interactive scenario tool allowing users to manipulate Juniper Research's data over different metrics.

Juniper Research's highly granular IFxls (interactive Excels) enable clients to manipulate our forecast data and charts to test their own assumptions, by using the Interactive Scenario Tool, and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

1. Key Takeaways & Strategic Recommendations

  • 1.1. Key Takeaways
  • 1.2. Strategic Recommendations

2. Market Landscape

  • 2.1. Introduction
    • 2.1.1. What Is IAM?
      • Figure 2.1: IAM Dimensions
    • 2.1.2. The Origins of IAM
      • Figure 2.2: Trust-based Access
    • 2.1.3. What Is the Need for IAM?
    • 2.1.4. The IAM Framework
      • Figure 2.3: The IAM Framework
      • i. Authentication
      • ii. Authorisation
      • iii. User Management
      • iv. Central User Repository
  • 2.2. IAM Use Cases
    • 2.2.1. Provisioning & Identity Lifecycle Management
      • Figure 2.4: Identity Management Lifecycle
    • 2.2.2. Password Management & Single Sign-on
      • Table 2.5: Types of SSO
    • 2.2.3. Authentication
      • Table 2.6: Types of Authentication
      • Figure 2.7: Use of Mobile Devices in MFA
    • 2.2.4. Directory Service
    • 2.2.5. Governance & Administration
      • Table 2.8: Access Governance Infrastructure Components
    • 2.2.6. Privileged Access Management
      • Table 2.9: Optional PAM Capabilities and Their Applicability to IT Use Cases
  • 2.3. Challenges in Identity & Access Management
    • 2.3.1. Increasingly Distributed Workforce
    • 2.3.2. Distributed Applications
    • 2.3.3. Productive Provisioning
    • 2.3.4. BYOD
    • 2.3.5. Password Problems
    • 2.3.6. Regulatory Compliance
      • Table 2.10: Key Regulations in IAM Part 1
      • Table 2.11: Key Regulations in IAM Part 2
  • 2.4. Future Trends within Identity & Access Management
  • 2.5. CIAM
    • 2.5.1. The Need for CIAM
      • i. Addressing the Demand for Modern Customer Experience
      • ii. Cultivating Customer Trust
      • iii. Digital Transformation
    • 2.5.2. CIAM Use Cases
      • i. Protecting Against Account Takeover
      • ii. Building Highly Scalable Applications
      • iii. Unifying Customer Identities Across Applications
      • iv. Integrating Enterprise Identities
      • v. Securing Access to APIs
    • 2.5.3. Future Trends within CIAM
      • i. Drive Better Security Outcomes
      • ii. Increasing Customer Engagement
      • iii. Safeguard Privacy
      • iv. Managing Complexity

3. Segment Analysis & Future Trends

  • 3.1. Key Segments and Future Trends
  • 3.2. Financial Services
    • 3.2.1. Need and Utilisation of IAM
      • Figure 3.1: Challenges within the Financial Services Segment
    • 3.2.2. Leading Vendors and Solutions
      • Table 3.2: Key Vendors and Solutions in the Financial Services Segment
    • 3.2.3. Future Outlook
  • 3.3. Telecommunications
    • 3.3.1. Need and Utilisation of IAM
      • Figure 3.3: Challenges within the Telecommunications Segment
    • 3.3.2. Leading Vendors and Solutions
      • Table 3.4: Key Vendors and Solutions in the Telecommunications Segment
    • 3.3.3. Future Outlook
  • 3.4. Retail and Consumer Packed Goods
    • 3.4.1. Need and Utilisation of IAM
      • Figure 3.5: Challenges within the Retail Segment
    • 3.4.2. Leading Vendors and Solutions
      • Figure 3.6: Key Vendors and Solutions in the Retail Segment
    • 3.4.3. Future Outlook
  • 3.5. Government & Public Sector
    • 3.5.1. Need and Utilisation of IAM
      • Figure 3.7: Challenges Within the Public Segment
    • 3.5.2. Leading Vendors and Solutions
      • Table 3.8: Key Vendors and Solutions in the Public Segment
    • 3.5.3. Future Outlook
  • 3.6. Energy & Utilities
    • 3.6.1. Need and Utilisation of IAM
      • Figure 3.9: Challenges within the Energy & Utilities Segment
    • 3.6.2. Leading Vendors and Solutions
      • Table 3.10: Key Vendors and Solutions in the Energy and Utilities Sector
    • 3.6.3. Future Outlook
  • 3.7. Education
    • 3.7.1. Need and Utilisation of IAM
      • Figure 3.11: Challenges within the Education Segment
    • 3.7.2. Leading Vendors and Solutions
      • Table 3.12: Key Vendors and Solutions in the Education Segment
    • 3.7.3. Future Outlook
  • 3.8. Manufacturing
    • 3.8.1. Need and Utilisation of IAM
      • Figure 3.13: Challenges within the Manufacturing Segment
    • 3.8.2. Leading Vendors and Solutions
      • Table 3.14: Key Vendors and Solutions in the Manufacturing Segment
    • 3.8.3. Future Outlook
  • 3.9. Healthcare
    • 3.9.1. Need and Utilisation of IAM
      • Figure 3.15: Challenges within the Healthcare Segment
    • 3.9.2. Leading Vendors and Solutions
      • Table 3.16: Key Vendors and Solutions in the Healthcare Segment
    • 3.9.3. Future Outlook

4. Competitor Leaderboard

  • 4.1. Why Read This Report
    • Table 4.1: Juniper Research Competitor Leaderboard: IAM Vendors Included & Product Portfolio
    • Figure 4.2: Juniper Research Competitor Leaderboard for IAM Vendors
    • Table 4.3: Juniper Research Competitor Leaderboard: IAM Vendors & Positioning
    • Table 4.4: Juniper Research Leaderboard Heatmap: IAM Vendors
  • 4.2. Vendor Profiles
    • 4.2.1. Amazon Web Services
      • i. Corporate
        • Table 4.5: AWS' Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.2. Broadcom
      • i. Corporate
        • Table 4.6: Broadcom's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.3. Centrify
      • i. Corporate
        • Table 4.7: Centrify's Funding Rounds, 2014-2019
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.4. CyberArk
      • i. Corporate
        • Table 4.8: CyberArk's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.5. ForgeRock
      • i. Corporate
        • Table 4.9: ForgeRock's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.6. Giesecke+Devrient
      • i. Corporate
        • Table 4.10: Giesecke+Devrient's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.7. IBM
      • i. Corporate
        • Table 4.11: IBM's Financial Snapshot ($m), FY 2018-2020 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.8. Microsoft
      • i. Corporate
        • Table 4.12: Microsoft's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.9. Okta
      • i. Corporate
        • Table 4.13: Okta's Financial Snapshot ($m), FY 2018-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
        • Figure 4.14: Okta's Corporate Structure
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.10. OneLogin
      • i. Corporate
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.11. Oracle
      • i. Corporate
        • Table 4.15: Oracle's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.12. Ping Identity
      • i. Corporate
        • Table 4.16: Ping Identity's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.13. SailPoint
      • i. Corporate
        • Table 4.17: SailPoint's Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.14. SecureAuth
      • i. Corporate
        • Table 4.18: SecureAuth's Funding Round ($m), 2017
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
    • 4.2.15. Thales
      • i. Corporate
        • Table 4.19: Thales' Financial Snapshot ($m), FY 2019-2021 (FYE 31st December)
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High-level View of Offerings
      • v. Juniper Research's View: Key Strengths and Strategic Opportunities
  • 4.3. Juniper Research Leaderboard Assessment Methodology
    • 4.3.1. Limitations & Interpretation
      • Table 4.20: IAM Provider Capability Assessment Criteria

5. Market Forecasts

  • 5.1. Identity and Access Management: Market Forecasts
    • 5.1.1. Methodology & Assumptions
      • Figure 5.1: IAM Methodology
  • 5.2. IAM Forecasts
    • 5.2.1. Total Number of Businesses Deploying IAM
      • Figure & Table 5.2: Total number of Businesses Deploying IAM (m), Split by 8 Key Regions, 2022-2027
      • Table 5.3: Total Number of Businesses Deploying IAM (m), Split by Business Size, 2022-2027
    • 5.2.2. Total Number of Businesses Purchasing IAM Through a SaaS Purchase Model
      • Figure & Table 5.4: Total Number of Businesses Purchasing IAM through a SaaS Purchase Model (m), Split by 8 Key Regions, 2022-2027
    • 5.2.3. Total Number of Businesses Purchasing IAM Through a Term Licence Purchase Model
      • Figure & Table 5.5: Total Number of Businesses Purchasing IAM Through Term Licence Purchase Model (m), Split by 8 Key Regions, 2022-2027
    • 5.2.4. Total Annual Spend on IAM Through a SaaS Purchase Model
      • Figure & Table 5.6: Total Annual Spend on IAM Through a SaaS Purchase Model ($m), Split by 8 Key Regions, 2022-2027
      • Table 5.7: Total Annual Spend on IAM Through a SaaS Purchase Model ($Split by Business Size, 2022-2027
    • 5.2.5. Total Annual Spend on IAM Through a Term Licence Purchase Model
      • Figure & Table 5.8: Total Annual Spend on IAM Through a Term Licence Purchase Model ($m), Split by 8 Key Regions, 2022-2027
      • Table 5.9: Total Annual Spend on IAM Through a Term Licence Purchase Model ($m), Split by Business Size, 2022-2027
    • 5.2.6. Total Annual Spend on IAM
      • Figure & Table 5.10: Annual Spend on IAM ($m), Split by 8 Key Regions, 2022-2027
      • Table 5.11: Annual Spend on IAM ($m), Split by Business Size, 2022-2027