February 27, 2017 By John Burnham 2 min read

The 2018 Gartner Magic Quadrant is now available – and IBM is still the leader.

IBM Security was again named a Leader in the newly published “2017 Gartner Magic Quadrant for Identity Governance and Administration.” This is the third consecutive year IBM Security has been named a Leader in the identity governance and administration (IGA) Gartner Magic Quadrant.

Highlights From the Magic Quadrant for IGA

Security starts by understanding who your users are and what they have access to. This is why every company needs to invest in a leading IGA solution that is part of larger security strategy, as Gartner pointed out as a Strength below.

IBM Security views identity governance as a foundational requirement for enterprise security. In fact, our overall architecture, the IBM Security Immune System, is comprised of three segments: Identity, Risk and Protection (IRP); Security Operations and Response (SOAR) and Transformational Services.

Download the Gartner Magic Quadrant now

Here are some highlights from the 2017 Gartner Magic Quadrant for IGA:

  • IGA Leaders deliver a comprehensive toolset for governance and administration of identity and access.
  • These vendors have successfully built a significant, installed customer base and revenue stream, and they have high viability ratings and robust revenue growth.
  • Leaders also show evidence of superior vision and execution for anticipated requirements related to technology, methodology or means of delivery.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM.

IBM’s Commitment to Enterprise Security

Moving forward, IBM Security will continue to invest heavily in IGA as part of IBM’s goal to remain the No. 1 enterprise security vendor.

Customers all over the world are struggling with too many point products and are looking for an enterprise security partner who develops solutions and services that are open and integrated to reduce time to detection, increase accuracy and leverage the skilled operators already overwhelmed with data.

There are many reasons why clients look to purchase an identity governance and administration solution: compliance, security, automation, individual initiatives within the business and more. Whatever the reason, it is critical to choose a business-centric solution that fits your needs and a vendor with the expertise to help to achieve your goals.

Download the 2017 Gartner Magic Quadrant for Identity Governance and Administration

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today