Showing 9 results
-
Tech Launch Perspective
Identity and Access Management (IAM) – Review of Saviynt’s Product Launch at RSAC 2025
June 26, 2025In this report, we evaluate Saviynt’s product innovations announced at RSA Conference (RSAC) 2025, particularly focusing on its AI-powered Identity Security Posture Management (ISPM) capabilities. Saviynt’s product launch builds on its identity cloud platform by introducing features designed to provide real-time visibility into identity posture, risk signals, and governance maturity. Core capabilities include auto-generating role descriptions, identifying orphaned accounts, and improving ownership clarity of service identities, addressing long-standing challenges in identity data hygiene. A key strength is the platform’s application-owner-centric approach, which enables business teams to directly access and analyze access control and usage data. Built upon a zero-trust-aligned architecture, the offering leverages an AI-enabled data lake to enforce continuous verification principles. Despite these enhancements, the launch reveals some gaps that enterprises may need to explore further. These include limited disclosure around integration with broader security ecosystems, such as security information and event management and threat intelligence platforms, a lack of clarity around pricing/licensing models, and insufficient transparency into the AI algorithms used. Saviynt’s ISPM solution, while promising in its conceptual direction, will benefit from better articulation of deployment strategies and industry-aligned use cases. -
State of the Market
Identity and Access Management (IAM) Services State of the Market 2025 – Exploring the Evolution of Converged IAM
March 07, 2025This comprehensive report examines the state of the Identity and Access Management (IAM) services market as it evolves toward converged solutions that integrate identity governance and administration and privileged IAM. It discusses how unified platforms designed to simplify identity management, reduce operational risks, and improve compliance across on-premises, cloud, and hybrid environments are replacing fragmented legacy systems. By drawing on robust research scope and real-world market touchpoints, the report analyzes current trends and future growth prospects in detail. The report further delves into key market dynamics and challenges – including rising cyber threats, digital infrastructures’ increasing complexity, and the need for continuous oversight – that are driving integrated IAM framework adoption. It also highlights strategic recommendations and frameworks, such as the 5A model, that can help enterprises assess, architect, activate, augment, and advance their converged IAM journey. This detailed exploration makes the report an essential resource for CIOs, security leaders, and IT strategists aiming to future-proof their organizations’ IAM practices. Scope All industries and geographies Contents In this report, we examine Digital identity challenges Converged IAM’s evolution Global market insights The 5A framework Membership(s) Cybersecurity Sourcing and Vendor Management -
Dec. 20, 2024The Secure Access Service Edge (SASE) services market in the EMEA region is significantly growing, transforming enterprises' networking and security landscape. The shift toward cloud-centric operations, global hybrid workforce expansion, and the increasing adoption of zero-trust principles drive this evolution. These factors are prompting enterprises to integrate network and security functions, enhance user experiences, strengthen security postures, and simplify their IT environment management. In response, leading SASE service providers in the EMEA region are enhancing their SASE services solution portfolio through strategic technology partnerships and capability enhancements. Providers are also significantly investing in innovation through next-generation technologies such as AI-driven threat detection, automation, and generative AI to further improve the performance, reliability, and adaptability of SASE solutions. In this report, we assess 15 SASE providers featured on SASE Services for EMEA Enterprises PEAK Matrix® Assessment 2024 and categorize them as Leaders, Major Contenders, and Aspirants based on their capabilities and offerings. Scope EMEA geography All industries The assessment is based on Everest Group’s RFI process for the calendar year 2024, interactions with leading SASE providers in EMEA, client reference checks, and an ongoing analysis of the SASE services market Contents In this report, we examine: The market impact, vision, and capabilities of 15 providers focused on SASE services in the EMEA region Providers’ key strengths and limitations Enterprise sourcing considerations Memberships Cloud and Infrastructure Services Cybersecurity Sourcing and Vendor Management
-
Dec. 03, 2024AI and ML have transformed the way enterprises manage, access, and use information. As modern-day enterprises endlessly generate and process data, it becomes increasingly difficult to manage data access across multiple systems, maintain its quality and reliability, and ensure security compliance. Enterprise search has emerged as a key solution to these problems as modern-day enterprise search solutions combine managing, governing, and searching for data under one offering. The integration of AI and generative AI technologies has evolved enterprise search solutions, allowing them to be queried in natural language and generate key insights and personalized recommendations based on the searched data. In this report, we explore the enterprise search technology market, provide a high-level view of notable market offerings, and gauge the technology’s industry adoption. Scope All industries and geographies Contents In this report, we examine: Enterprise search’s evolution Modern enterprise search solutions’ core components Key enterprise considerations influencing enterprise search adoption Technology provider landscape and the growing investment capital raised by providers Enterprise search solutions’ maturity and use across industries Key adoption challenges enterprises face Membership(s) Artificial Intelligence (AI) Sourcing and Vendor Management
-
March 11, 2024The increasing threat of cyberattacks has fueled a growing demand for robust Identity and Access Management (IAM) solutions. Noteworthy trends include the widespread adoption of Zero Trust Security principles, integration of AI/ML for enhanced threat detection, and a shift toward decentralized identity solutions using blockchain. Concurrently, Identity-as-a-Service (IDaaS) is on the rise, simplifying IAM through scalable cloud solutions. These trends collectively fortify digital identities, enhance security postures, and adapt to the evolving cybersecurity landscape. IAM tools are integral to maintaining the confidentiality, integrity, and availability of organizational data. They offer a comprehensive framework for managing identities and access, addressing security challenges, and supporting the efficient and secure operation of modern digital environments. In this report, we examine the global IAM market, highlighting key growth drivers and enterprise concerns. Furthermore, the report provides insights into the top eight IAM tool providers, offering complete IAM coverage with automated user provisioning and de-provisioning to enhance operational efficiency and minimize errors. Scope All industries and geographies Contents In this report, we examine: Global IAM market demand drivers and enterprise concerns Top IAM tool providers Membership(s) Cybersecurity Outsourcing Excellence
-
Jan. 17, 2024This report is available only to Outsourcing Excellence members. For information on membership, please contact us The Identity and Access Management (IAM) Request For Proposal (RFP) Toolkit is a comprehensive resource designed to streamline the solicitation of proposals for IAM services. This ready-to-use toolkit includes two key components: the Supplier Details Questionnaire and the Scope of Work Questionnaire. The Supplier Details Questionnaire gathers crucial information from potential suppliers about their IAM products, future vision, implementation approach, support services, and financial details. The Scope of Work Questionnaire offers a flexible selection of components, covering functional, integration, user base, and security and compliance aspects. Both sections are customizable to align with organization-specific requirements, providing an efficient and streamlined approach to the RFP preparation process. Whether organizations are seeking insights into supplier details or defining the scope of work for IAM services, this toolkit serves as a versatile tool to navigate the complexities of IAM service procurement. Scope All industries and geographies Contents In this report, we: Provide questionnaires designed to facilitate preparation of RFP for IAM services List crucial functional aspects inherent to IAM services that enterprises must consider while formulating their RFP for IAM services
-
Provider Compendium
Identity and Access Management (IAM) Services – Provider Compendium 2023
Dec. 14, 2023Cybersecurity and Identity and Access Management (IAM) have become indispensable components in the contemporary digital enterprise landscape. As organizations navigate an increasingly complex and interconnected digital ecosystem, the challenges of safeguarding sensitive data, mitigating cybersecurity threats, and managing user identities with precision have grown exponentially. Cybersecurity acts as the frontline defense against a myriad of evolving threats, encompassing everything from malicious cyberattacks to data breaches. Simultaneously, IAM plays a vital role in ensuring secure and efficient access to digital resources, emphasizing the need for precise identity verification and comprehensive access controls. This dynamic and crucial synergy between cybersecurity and IAM is integral to organizations fortifying themselves against the ever-evolving cyber threat landscape, making them resilient, adaptive, and capable of safeguarding both their assets and user identities in an interconnected digital environment. In this report, we assess 21 IT service providers for their cybersecurity and IAM capabilities featured in the Cybersecurity and Identity and Access Management (IAM) PEAK Matrix® Assessment 2023. Each profile offers a comprehensive picture of the provider’s operational overview, delivery presence, solutions on offer, investments, and market success. Scope All industries and geographies The assessment is based on Everest Group’s annual RFI process for the calendar year 2023, interactions with leading IAM service providers, client reference checks, and an ongoing analysis of the IAM services market Contents In this report, we: Examine 21 IAM service provider profiles Study providers’ key strengths and limitations Evaluate enterprise sourcing considerations Membership(s) Cybersecurity Sourcing and Vendor Management -
July 19, 2023The demand for Identity and Access Management (IAM) services in the global business landscape is accelerating due to digital transformation trends, the importance of data protection, and the complexities of managing IT environments. The need for effective IAM solutions has intensified with the implementation of BYOD (Bring Your Own Device) policies, cloud-based services, and the ongoing cyber threats. To address the shortage of in-house IAM expertise, companies are adopting external IAM services. This allows organizations to reduce CAPEX and OPEX associated with maintaining an internal IAM team while ensuring efficient and secure management of digital identities. Additionally, as governments worldwide enforce stricter data protection and security regulations, enterprises face pressure to comply with these regulations and adhere to localized data privacy laws. Examples include Europe’s GDPR, California’s CCPA, and Brazil’s LGPD, reflecting the evolving regulatory landscape. Consequently, global enterprises are seeking providers capable of delivering sophisticated, adaptable, and globally compliant IAM services. Key areas of interest include user authentication and authorization, centralized IAM operations, integration of IT/OT IAM services, and regulatory compliance assessments. In this report, we present a comprehensive analysis of 21 global IAM service providers as featured on the IAM Services PEAK Matrix® Assessment 2023. The research will help buyers select the right-fit provider for their needs, while providers will be able to benchmark themselves against each other. Scope All industries and geographies Services: IAM The assessment is based on Everest Group’s annual RFI process for the calendar year 2023, interactions with leading IAM service providers, client reference checks, and an ongoing analysis of the IAM services market Contents In this report, we examine: IAM services PEAK Matrix® characteristics Enterprise sourcing considerations Providers’ key strengths and limitations Membership(s) Cybersecurity Sourcing and Vendor Management
-
May 12, 2023Enterprises are concerned about rising cyberattacks, growing regulations, and a widespread digital presence. In some cases, a single cyberattack could lead to bankruptcy. Zero trust offers solutions to many cybersecurity concerns, but some enterprises that have started their zero-trust journey have not made much progress in recent years. In this viewpoint, we explore the identity-based zero-trust approach in detail and provide a maturity assessment framework to help enterprises understand their current position and how they can progress in their zero-trust journey. Additionally, the report highlights the benefits of zero trust, such as improved employee experience, reduced legacy technical debt, decreased third-party risks, and improved compliance. Scope All industries and geographies Contents In this report, we examine: The growth of zero trust Starting an identity-based zero-trust journey Zero-trust maturity assessment framework Enterprise adoption of zero trust across different industries Key considerations for implementing zero-trust strategies Membership(s) Cybersecurity Sourcing and Vendor Management