Quantcast
Channel: CloudAccess.com
Viewing all articles
Browse latest Browse all 26

Gartner findings consistent with CloudAccess IDaaS, SECM offerings

0
0

In its most recent study “Market Trends: Cloud-Based Security Services Market, Worldwide, 2014” research firm Gartner identified several paradigm-changing trends with regard to cloud security. CloudAccess heralds these findings because they are consistent with its current offerings.

  • The largest segment of the cloud security market is cloud-based IAM or IDaaS. IDaaS will grow from $500 million to $1.24 billion in 2017 for a total 28.3% combined annual growth rate. This makes Cloud Identity the 2nd fastest growing segment of the cloud security market, with Security Event Management growing a bit faster but off a smaller base. CloudAccess’ REACT solution (SECM) combines the fast growing elements of IDaaS with SIEM and log monitoring. No other current company is currently achieving this from the cloud.

  • Using Gartner’s projections ($1.24B) combined with IDC’s estimates of $7B (encompassing the entire IAM market- cloud & on premise) the Total Addressable Market is growing rapidly and exponentially. For those that can support hybrid environments (like CloudAccess) In fact CloudAccess is working with several organizations to augment their sunsetting products like Sun (Oracle). We offer a transition and/or parallel deployment with tremendous upside and without invasive culture change. The compelling business driver is that this upgrade adds new value-added capabilities of value of proactive behavior analysis and real time activity intelligence which Forrester advocates.
  • Gartner defines IdaaS as “a combination of administration and account provisioning, authentication and authorization, and reporting functions” — obviously all facilitated as cloud-based services. However, this only addresses the administrative component of cloud security. The true effectiveness of a deployment is how well it can enforce administrative policies. To properly achieve this requires correlation of multiple silos of data which includes identities, user activity, devices, access controls and privileges.
  • Gartner also states that “an increasing number of organizations seem to be adopting cloud-based IAM services to replace IAM on-premises tools.” So larger enterprises are adopting cloud security initiatives. They later add that “larger businesses are often looking to use IAM as a mixture of legacy- and Web-architected cloud and on premises applications.” It’s important to recognize as most enterprises are not 100% cloud-based, but use on-premise systems and apps. This environment is not disappearing any time soon, so an IDaaS system must integrate with a variety of SAML application, but also securely extend itself to the large majority of web and legacy solutions that do not require federation.
  • Cloud IAM is one of the “top three” most sought after cloud-based security service, meaning it’s now more of a “must have” than a “nice to have.”
  • IDaaS has emerged as one of the key pillars of a unified security (holistic) approach

Viewing all articles
Browse latest Browse all 26

Latest Images

Trending Articles





Latest Images