80061 Leadership Compass Consumer Authentication 2019
Total Page:16
File Type:pdf, Size:1020Kb
KuppingerCole Report LEADERSHIP COMPASS by John Tolbert September 2019 Consumer Authentication This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions. by John Tolbert [email protected] September 2019 Leadership Compass KuppingerCole Leadership Compass Consumer Authentication Consumer Authentication Report No.: 80061 By KuppingerCole Content 1 Introduction ................................................................................................................................. 6 1.1 Market Segment ....................................................................................................................... 7 1.2 Delivery models ........................................................................................................................ 7 1.3 Required Capabilities ................................................................................................................ 7 2 Leadership.................................................................................................................................. 11 3 Correlated View ......................................................................................................................... 19 3.1 The Market/Product Matrix ................................................................................................... 19 3.2 The Product/Innovation Matrix .............................................................................................. 21 3.3 The Innovation/Market Matrix............................................................................................... 23 4 Products and Vendors at a glance ............................................................................................... 25 4.1 Ratings at a glance .................................................................................................................. 25 5 Product/service evaluation ......................................................................................................... 28 5.1 AdNovum NEVIS Suite ............................................................................................................ 30 5.2 Akamai Identity Cloud (formerly Janrain) .............................................................................. 31 5.3 Auth0 ...................................................................................................................................... 32 5.4 Broadcom (formerly CA Technologies) Layer 7 Authentication ............................................. 33 5.5 Cloudentity ............................................................................................................................. 34 5.6 CoffeeBean Technology Identity and Access Platform .......................................................... 35 5.7 Entrust Datacard IntelliTrust / IdentityGuard ........................................................................ 36 5.8 Ergon Informatik Airlock ......................................................................................................... 37 5.9 Evidian Web Access Manager................................................................................................. 38 5.10 ForgeRock Identity Platform................................................................................................... 39 5.11 IBM Trusteer Pinpoint ............................................................................................................ 41 5.12 iovation ................................................................................................................................... 42 5.13 LoginRadius Identity Platform ................................................................................................ 43 5.14 Microsoft Azure Active Directory B2C .................................................................................... 44 5.15 Nok Nok Labs S3 Authentication Suite ................................................................................... 45 5.16 NRI Secure Uni-ID Libra .......................................................................................................... 46 5.17 Ping Identity ............................................................................................................................ 47 5.18 Pirean Access: One ................................................................................................................. 48 5.19 SAP Customer Data Cloud ...................................................................................................... 49 5.20 SecureAuth Identity Platform ................................................................................................. 50 KuppingerCole Leadership Compass Consumer Authentication Report No.: 80061 Page 2 of 63 5.21 WSO2 Identity Server ............................................................................................................. 51 6 Vendors and Market Segments to watch ..................................................................................... 52 6.1 Amazon Cognito ..................................................................................................................... 52 6.2 Avatier .................................................................................................................................... 52 6.3 AvocoSecure Trust Platform ................................................................................................... 52 6.4 Duo Security ........................................................................................................................... 53 6.5 Fusion Auth ............................................................................................................................. 53 6.6 Singular Key ............................................................................................................................ 53 6.7 Swivel Secure .......................................................................................................................... 54 6.8 Ubisecure Identity Server ....................................................................................................... 54 6.9 UXP Systems ........................................................................................................................... 55 7 Methodology.............................................................................................................................. 56 7.1 Types of Leadership ................................................................................................................ 56 7.2 Product rating ......................................................................................................................... 57 7.3 Vendor rating .......................................................................................................................... 59 7.4 Rating scale for products and vendors ................................................................................... 60 7.5 Inclusion and exclusion of vendors ........................................................................................ 61 8 Copyright ................................................................................................................................... 62 Content of Tables Table 1: Comparative overview of the ratings for the product capabilities ............................................... 25 Table 2: Comparative overview of the ratings for vendors ........................................................................ 26 Table 3: AdNovum’s major strengths and challenges................................................................................. 30 Table 4: AdNovum’s rating .......................................................................................................................... 30 Table 5: Akamai’s major strengths and challenges ..................................................................................... 31 Table 6: Akamai’s rating .............................................................................................................................. 31 Table 7: Auth0’s major strengths and challenges ....................................................................................... 32 Table 8: Auth0’s rating ................................................................................................................................ 32 Table 9: Broadcom’s major strengths and challenges ................................................................................ 33 Table 10: Broadcom’s rating ....................................................................................................................... 33 Table 11: Cloudentity’s major strengths and challenges ............................................................................ 34 Table 12: Cloudentity’s rating ..................................................................................................................... 34 Table 13: CoffeeBean’s major strengths and challenges ............................................................................ 35 Table 14: CoffeeBean’s rating ....................................................................................................................