Report: The Forrester Wave™

CUSTOMER IDENTITY AND ACCESS MANAGEMENT: 2017 For Security & riSk ProFeSSionalS

The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook by Merritt Maxim June 15, 2017

Why read this report key takeaways in our 20-criteria evaluation of customer iaM Gigya And Janrain Lead The Pack (ciaM) providers, we identified the eight most Forrester’s research uncovered a market Enjoy your complimentary copy of the significant ones — auth0, Forgerock, Gigya, in which Gigya and Janrain lead the pack. Janrain, loginradius, Microsoft, Ping identity, , Forgerock, and Ping identity offer Forrester Wave™: Customer Identity and Salesforce — and researched, analyzed, competitive options. Microsoft, loginradius, and scored them. this report shows how each and auth0 lag behind. and Access Management, Q2 2017 provider measures up and helps security and s&r Pros Want secure, seamless Digital risk professionals make the right choice for their experiences For Customers digital businesses. Learn how Forrester ranks the eight “most significant” customer the ciaM market is growing because more S&r identity and access management (CIAM) vendors in the market, professionals increasingly trust ciaM providers according to twenty rigorous criteria. to help solve key customer iaM challenges and support customer-centric digital transformation initiatives. every vendor in this Forrester Wave™ is tracking toward this goal.

Analytics, Customer Data Management, And Geographic Coverage Are Key Differentiators as home-grown, disparate technologies for managing customer identity and access become more expensive to administer and less effective, improved customer analytics, customer data management, and the ability to service customers in multiple geographies will dictate which providers will outpace their competitors. Vendors that can provide robust customer analytics and data management on a global scale will position themselves to win.

ForresTer.CoM

136462_Print_a4.indd 1 7/19/2017 9:24:28 AM For Security & riSk ProFeSSionalS

The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook by Merritt Maxim June 15, 2017

Why read this report key takeaways in our 20-criteria evaluation of customer iaM Gigya And Janrain Lead The Pack (ciaM) providers, we identified the eight most Forrester’s research uncovered a market significant ones — auth0, Forgerock, Gigya, in which Gigya and Janrain lead the pack. Janrain, loginradius, Microsoft, Ping identity, Salesforce, Forgerock, and Ping identity offer and Salesforce — and researched, analyzed, competitive options. Microsoft, loginradius, and scored them. this report shows how each and auth0 lag behind. provider measures up and helps security and s&r Pros Want secure, seamless Digital risk professionals make the right choice for their experiences For Customers digital businesses. the ciaM market is growing because more S&r professionals increasingly trust ciaM providers to help solve key customer iaM challenges and support customer-centric digital transformation initiatives. every vendor in this Forrester Wave™ is tracking toward this goal.

Analytics, Customer Data Management, And Geographic Coverage Are Key Differentiators as home-grown, disparate technologies for managing customer identity and access become more expensive to administer and less effective, improved customer analytics, customer data management, and the ability to service customers in multiple geographies will dictate which providers will outpace their competitors. Vendors that can provide robust customer analytics and data management on a global scale will position themselves to win.

ForresTer.CoM

136462_Print_a4.indd 1 7/19/2017 9:24:28 AM For Security & riSk ProFeSSionalS

For Security & riSk ProFeSSionalS The Forrester Wave™: Customer Identity and Access Management, TheQ2 2017 Forrester Wave™: Customer Identity and Access Management, Q2Tools 2017 And Technology: The Identity And Access Management Playbook Tools And Technology: The Identity And Access Management Playbook by Merritt Maxim with Stephanie Balaouras, andras cser, Salvatore Schiano, and Peggy Dostie by Merritt Maxim withJune Stephanie 15, 2017 Balaouras, andras cser, Salvatore Schiano, and Peggy Dostie June 15, 2017

table of contents related research Documents

t2ableCIAM o Enablesf contents Personal Trusted Digital Forrester’srelated crustomeresearch iaM DocumentsSecurity Maturity Experiences assessment Model 2 CIAM Enables Personal Trusted Digital Forrester’s customer iaM Security Maturity VendorsExperiences Will Support Fraud Management, Marketassessment overview: Model customer identity and access More consent Management, and iot Management (ciaM) Solutions Vendors Will Support Fraud Management, Market overview: customer identity and access 6 CIAMMore cEvaluationonsent Management, Overview and iot Q&Managementa: 10 Questions (ciaM) t oSolutions ask Before Deploying customer identity and access Management 6 eCIAMvaluated Evaluation Vendors Overview and inclusion criteria Q&a: 10 Questions to ask Before Deploying customer identity and access Management 9 Vendorevaluated Profiles Vendors and inclusion criteria

9 lVendoreaders Profiles

Strongleaders Performers

cStrongontenders Performers

14 Supplementalcontenders Material

14 Supplemental Material

Forrester research, inc., 60 acorn Park Drive, cambridge, Ma 02140 uSa +1 617-613-6000 | Fax: +1 617-613-5000 | forrester.com Forrester research, inc., 60 acorn Park Drive, cambridge, Ma 02140 uSa © 2017 Forrester research, inc. opinions reflect judgment at the time and are subject to change. Forrester®, +1technographics 617-613-6000®, Forrester |Wave, Fax: tech +1radar, 617-613-5000 and total economic | impactforrester.com are trademarks of Forrester research, inc. all other trademarks are the property of their respective companies. unauthorized copying or distributing © 2017 Forrester research, inc. opinions reflect judgment at the time and are subject to change. Forrester®, is a violation of copyright law. [email protected] or +1 866-367-7378 technographics®, Forrester Wave, techradar, and total economic impact are trademarks of Forrester research, inc. all other trademarks are the property of their respective companies. unauthorized copying or distributing is a violation of copyright law. [email protected] or +1 866-367-7378

136462_Print_a4.indd 1 7/19/2017 9:24:28 AM

136462_Print_a4.indd 1 7/19/2017 9:24:28 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

ciaM enables Personal trusted Digital experiences

today’s digital businesses need deep customer insights to successfully deliver new products and services that can increase customers’ engagement and brand loyalty while maintaining their security and privacy. customer identity and access management (ciaM), if done well, can help business owners achieve this outcome. according to our data, 71% of global enterprise security technology decision makers rate improving the security of customer-facing apps and services as a high or critical priority; this may explain why enterprise ciaM adoption is getting strong interest across all geographies (see Figure 1).1 ciaM solutions enable S&r pros and other line of business executives to (see Figure 2):

› streamline new customer acquisition and registration processes. allowing customers to use bring-your-own-identity (Byoi) from a recognized social identity provider such as , , , or PayPal, and preregister on a site is a large component of many ciaM implementations. minimizes registration fatigue, which can occur when users have to create a new account just to complete a transaction at a new site, and minimizes the risk of a new user abandoning a site altogether. ciaM platforms give organizations the ability to build compelling registration pages and support a wide range of social identity providers, which is increasingly important for global brands with diverse customer bases that require support for other regional- specific providers such as orkut, Vk, and Wechat.

› Manage user consent to meet compliance with global privacy requirements. consumers expect brands to accommodate their preferences so that they can decide how firms use their data. Multinational brands with millions of customers must address various demands. the complexity of the changing multijurisdictional aspects of privacy compliance, together with the looming GDPr compliance deadline, means that digital businesses need mechanisms to verify ongoing compliance with consumer privacy mandates, because even the slightest violation can have a material impact on a brand or company. ciaM platforms can assist with these challenges.

› Provide user-centric capabilities for preference management. a ciaM deployment must allow consumers to update their preferences (e.g., opting out of marketing communications). Strong privacy management in a ciaM implementation empowers consumers to determine how firms collect and use their personal data and must be a core component of any implementation.

› Provide a consistent, secure omnichannel user experience. Multiple logins cause a fractured value delivery mechanism across channels and devices, which can cause customers to seek competitors’ services. eliminating multiple logins is, therefore, the first step for providing low- friction services to customers. as organizations build in capabilities that remove friction, customers buy more, have more trust, and stay engaged longer. ciaM platforms provide the ability to build consistent and compelling customer interactions, regardless of the access methods, to ensure that customers remain engaged and loyal.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 2 [email protected] or +1 866-367-7378

136462_Print_a4.indd 2 7/19/2017 9:24:28 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

› Deliver identity reporting and analytics. ciaM platforms collect a wide range of data about customers’ digital interactions. the platform can feed this data into other business intelligence or crM systems, and eBusiness or customer experience professionals can leverage the data internally within the platform.

› Integrate with other customer-centric systems of insight. ciaM initiatives increasingly sit at the nexus of multiple digital initiatives. While ciaM solutions provide a range of useful data on their own, these solutions complement other technologies such as content management, personalization engines, crM, and marketing automation solutions. in response, ciaM platforms are emphasizing integration via documented reStful aPis to these systems to help digital businesses obtain a comprehensive view of every individual customer.

FIGUre 1 ciaM Has Been adopted Worldwide

Global enterprise adoption by region, 2016 Customer identity and access management

Asia Paci c 67%

North America 64%

Europe 54%

Base: 138-217 global enterprise network security decision-makers (base sizes vary by region) Source: Forrester Data Global Business Technographics® Security Survey, 2016

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 3 [email protected] or +1 866-367-7378

136462_Print_a4.indd 3 7/19/2017 9:24:56 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

FIGUre 2 ciaM Platforms are in Demand

FIGUre 2 ciaM Platforms are in Demand CIAM platforms connect data, insights, and security CIAM platforms connect data, insights, and security ENGAGE

ENGAGE

Customer data management

Customer data management

Analytics

Analytics

Authenticated identities

Authenticated identities LEARN

LEARN

Enterprise plans to adopt CIAM The majority of rms prioritize improving customer security Enterprise plans to adopt CIAM The majority of rms prioritize 17% improving customer security

17%

61%

20% 61%

20%

Implemented/implementing/expanding 71% rate improving the security of customer- Planning to implement within the next 12 months Implemented/implementing/expanding facing71% services and applications as high Not interested/interested but no immediate plans rate improving the security of customer- Planning to implement within the next 12 months or critical priority. facing services and applications as high Not interested/interBase: 579ested enterprise but no immediate plans or criticalBase: 1,165 priority enterprise. security security decision-makers technology decision-makers Base: 579 enterprise Base: 1,165 enterprise security security decision-makers technology decision-makers Source: Forrester Data Global Business Technographics® Security Survey, 2016

Source: Forrester Data Global Business Technographics® Security Survey, 2016

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 4 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 4 [email protected] or +1 866-367-7378

136462_Print_a4.indd 4 7/19/2017 9:24:56 AM

136462_Print_a4.indd 4 7/19/2017 9:24:56 AM For Security & riSk ProFeSSionalS June 15, 2017 TheFor SecurityForrester & Wave™: riSk Pro FCustomereSSionalS Identity and Access Management, Q2 2017 June 15, 2017 TTheools Forrester And Technology: Wave™: T Customerhe Identity IdentityAnd Access and ManagementAccess Management, Playbook Q2 2017 Tools And Technology: The Identity And Access Management Playbook

Vendors Will support Fraud Management, More Consent Management, And IoT Vendors Will support Fraud Management, More Consent Management, And IoT traditional web access management solutions (WaM) have been in existence since the early 2000s tandraditional still enjoy web a accessbroad installed management base, solutionsincluding (Wfora manyM) have B2 beenc scenarios. in existence However, since the the adoption early 2000s of theseand still solutions enjoy a wasbroad the installed result of base, use cases including related for manyto authentication, B2c scenarios. single However, sign-on, the and adoption authorization, of andthese vendors solutions designed was the them result as of on-premises use cases related installations. to authentication, the dramatic single growth sign-on, of mobile and authorization,users and increasedand vendors emphasis designed on them initiatives as on-premises that support installations. customer retention the dramatic led to growth the creation of mobile of many users cloud- and centricincreased solutions emphasis that on exchanged initiatives WthataM support policy management customer retention for capabilities led to the more creation aligned of many with marketingcloud- andcentric service solutions requirements. that exchanged as the WciaaMM policymarket management continues to forgrow capabilities and evolve, more cia alignedM vendors with aremarketing addingand service features requirements. such as: as the ciaM market continues to grow and evolve, ciaM vendors are adding features such as: › The ability to detect, monitor, and block fraudulent accounts. Many large B2c sites still › experienceThe ability tofraudulent detect, accountmonitor, sign-ups, and block which fraudulent can increase accounts. their Manyrisks. largeand while B2c manysites still cia M platformsexperience can fraudulent already detectaccount brute-force sign-ups, loginswhich canand increasesuspend/close their risks. potential and whilefraudulent many accounts, ciaM theplatforms continued can alreadysophistication detect ofbrute-force hackers means logins thatand ciasuspend/closeM vendors willpotential begin fraudulentadding more accounts, support tothe reduce continued fraud sophistication at the time of of account hackers sign-up. means thatVendors ciaM could vendors offer will this begin capability adding natively more supportor via integrationto reduce fraud with atother the fraud-managementtime of account sign-up. vendors, Vendors and they could could offer also this extendcapability it to natively monitor or and via detectintegration potential with otherfraudulent fraud-management transactions. vendors, and they could also extend it to monitor and detect potential fraudulent transactions. › Improved analytics to support user registration/activation processes. converting an › anonymousImproved analytics user into to a knownsupport customer user registration/activation will always be important. processes. in response, converting businesses an will continuallyanonymous seek user methodsinto a known that cancustomer improve will the always customer be important. journey experience in response, transparently. businesses willthis cancontinually include seek progressive methods profiling that can to improve gather thedata customer that social journey identity experience providers transparently.don’t provide tashis well ascan linking include other progressive physical profilingand digital to touchpoints,gather data thatsuch social as in-store identity purchases providers anddon’t sign-ups. provide tashe well deepas linking understanding other physical of individual and digital customers touchpoints, garnered such hereas in-store can be purchases leveraged andby other sign-ups. business the functionsdeep understanding to build compelling of individual and customerssustainable garnered relationships here canthat bedeliver leveraged significant by other business business value. functions to build compelling and sustainable relationships that deliver significant business value. › Improved user consent tools to help customers. Because of the need to manage user data in › accordanceImproved user with consent various compliancetools to help requirements, customers. ciaBecauseM platforms of the needwill begin to manage enhancing user supportdata in foraccordance simple out-of-the-box with various compliance workflows requirements,to help users enableciaM platformsfine-grained will beginaccess enhancing control around support how organizationsfor simple out-of-the-box use and share workflows their data. to thelphe emerging users enable user-managed fine-grained access access (uM controla) standard around will how likelyorganizations play an importantuse and share role in their empowering data. the consumersemerging user-managed to manage their access consent (uM individually.a) standard2 will likely play an important role in empowering consumers to manage their consent individually.2 › support for emerging IoT use cases. Many iot deployments still rely on a very device-centric › viewsupport of identity. for emerging this model IoT useis not cases. sustainable, Many i oespeciallyt deployments concerning still rely connected on a very cars device-centric and connectedview of identity. homes, this where model there is not may sustainable, be multiple especially users of aconcerning single device. connected Such use cars cases and will drive theconnected need to homes, extend wheredigital thereidentity may to bethe multiple network users edge ofto asupport single device. constrained Such devices.use cases cia willM drive platforms’the need to analytical extend digital and administrative identity to the capabilities network edge will to complement support constrained these iot devices.identity uses ciaM case in theplatforms’ coming analytical years ahead. and administrative capabilities will complement these iot identity uses case in the coming years ahead. › Geofenced CIAM data centers. today’s global digital businesses must manage a highly diverse › customerGeofenced base CIAM within data a broadcenters. range today’s of privacy global and digital compliance businesses requirements. must manage this a ishighly leading diverse tocustomer improved base user within consent a broad management range of privacy tools, but and it compliancewill also be accompaniedrequirements. bythis emergence is leading of to improved user consent management tools, but it will also be accompanied by emergence of

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 5 ©[email protected] 2017 Forrester research, or +1 inc. 866-367-7378 unauthorized copying or distributing is a violation of copyright law. 5 [email protected] or +1 866-367-7378

136462_Print_a4.indd 5 7/19/2017 9:24:57 AM 136462_Print_a4.indd 5 7/19/2017 9:24:57 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

specific deployment models for individual geographies such as china or the eu. these deployment models will be more than just a data center resident in the region but will include other specific specific deployment models for individual geographies such as china or the eu. these deployment controls for a specific geography and will appeal to organizations that have to manage a broad models will be more than just a data center resident in the region but will include other specific range of global privacy requirements. controls for a specific geography and will appeal to organizations that have to manage a broad range of global privacy requirements. ciaM evaluation overview

tciao assessM e thevaluation state of the o ciaverviewM market and see how the vendors stack up against each other, Forrester evaluated the strengths and weaknesses of top ciaM vendors. after examining past research, user to assess the state of the ciaM market and see how the vendors stack up against each other, Forrester need assessments, and vendor and expert interviews, we developed a comprehensive set of evaluation evaluated the strengths and weaknesses of top ciaM vendors. after examining past research, user criteria. We evaluated vendors against 20 criteria, which we grouped into three high-level buckets: need assessments, and vendor and expert interviews, we developed a comprehensive set of evaluation criteria.› Current We evaluated offering. vendorsthe vendor’s against position 20 criteria, on the which vertical we axisgrouped of the into Forrester three high-level Wave graphic buckets: indicates the strength of its current ciaM offering. We evaluated criteria such as customer satisfaction with › Current offering. the vendor’s position on the vertical axis of the Forrester Wave graphic indicates the current ciaM offering, social registration and login, platform security and user authentication, the strength of its current ciaM offering. We evaluated criteria such as customer satisfaction with privacy controls, customer data management, analytics, integration and aPis, reporting, scalability the current ciaM offering, social registration and login, platform security and user authentication, and availability, administration and security certifications, and standards support. privacy controls, customer data management, analytics, integration and aPis, reporting, scalability › sandtrategy. availability, a vendor’s administration position on and the security horizontal certifications, axis indicates and the standards strength support.of its strategy. Factors we considered include product vision and strategy, product execution, partner ecosystem, pricing › strategy. a vendor’s position on the horizontal axis indicates the strength of its strategy. Factors terms and flexibility, and customer satisfaction with product strategy and direction. we considered include product vision and strategy, product execution, partner ecosystem, pricing › Marketterms and presence. flexibility, t heand size customer of each satisfactionvendor’s bubble with onproduct the chart strategy indicates and direction.the vendor’s market presence. We evaluated each vendor’s installed base, product line revenues, staffing, and vertical › Market presence. the size of each vendor’s bubble on the chart indicates the vendor’s market and geographic market penetration. presence. We evaluated each vendor’s installed base, product line revenues, staffing, and vertical and geographic market penetration. evaluated Vendors And Inclusion Criteria

Forresterevaluated included Vendors eight And vendors Inclusion in theCriteria assessment: auth0, Forgerock, Gigya, Janrain, loginradius, Microsoft, Ping identity, and Salesforce. each of these vendors has (see Figure 3): Forrester included eight vendors in the assessment: auth0, Forgerock, Gigya, Janrain, loginradius, Microsoft,› A CIAM Ping platform identity, that and can Salesforce. be deployed each in of the these cloud vendors (private has or (see public). Figure t 3):he platform had to be generally available (Ga) prior to December 31, 2016. › A CIAM platform that can be deployed in the cloud (private or public). the platform had to be › Totalgenerally annual available CIAM (G producta) prior revenuesto December of at 31, least 2016. $10 million.

› AtTotal least annual 100 payingCIAM product customer revenues organizations of at least in production. $10 million. the vendor’s ciaM offering had to have at least 100 paying customer organizations in production at the Ga cutoff date. › At least 100 paying customer organizations in production. the vendor’s ciaM offering had to › Thoughthave at least leadership 100 paying in CIAM customer evidenced organizations by products in production and services. at the G Wea cutoff included date. vendors that demonstrated ciaM thought leadership and ciaM solution strategy execution through regular › Thought leadership in CIAM evidenced by products and services. We included vendors that updates and improvements to their productized ciaM product portfolio. demonstrated ciaM thought leadership and ciaM solution strategy execution through regular updates and improvements to their productized ciaM product portfolio.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 6 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 6 [email protected] or +1 866-367-7378

136462_Print_a4.indd 6 7/19/2017 9:24:57 AM

136462_Print_a4.indd 6 7/19/2017 9:24:57 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

› A mindshare with Forrester’s clients during inquiries. During Forrester inquiries and other interactions, clients mentioned the vendor’s name in an unaided context, such as, “We looked at › A mindshare with Forrester’s clients during inquiries. During Forrester inquiries and other the following vendors for ciaM.” interactions, clients mentioned the vendor’s name in an unaided context, such as, “We looked at › Anthe unaidedfollowing mindshare vendors for with ciaM.” other CIAM competitive vendors. When Forrester asks other vendors about their competition on briefings, inquiries, and other interactions, other vendors › An unaided mindshare with other CIAM competitive vendors. When Forrester asks other mention the vendor as a real competitor in the ciaM market space. vendors about their competition on briefings, inquiries, and other interactions, other vendors mention the vendor as a real competitor in the ciaM market space.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 7 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 7 [email protected] or +1 866-367-7378

136462_Print_a4.indd 7 7/19/2017 9:24:57 AM

136462_Print_a4.indd 7 7/19/2017 9:24:57 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

FIGUre 3 evaluated Vendors: Product information and Selection criteria

FIGUre 3 evaluated Vendors: Product information and Selection criteria Vendor Product evaluated

Auth0Vendor Auth0Product Customer evaluated Identity Management Solution v1.0

ForAuth0geRock ForAuth0geRock Customer Identity Identity Platform Management v5.0 Solution v1.0

GigyaForgeRock GigyaForgeRock Customer Identity Identity Platform Management v5.0 Platform v6.5

JanrainGigya JanrainGigya Customer Identity Cloud Identity Management Platform v6.5

LoginRadiusJanrain LoginRadiusJanrain Identity CIAM Cloud Platform

MicrLoginRadiusosoft AzurLoginRadiuse Active DirCIAMectory Platform B2C

PingMicrosoft Identity PingFederateAzure Active Dir 8.3ectory B2C PingAccess 4.2 Ping Identity PingDataGoverPingFederate 8.3nance 6.0 PingDirPingAccessectory 4.2 6.0 PingDataGovernance 6.0 Salesforce SalesforPingDirectoryce Identity 6.0

Salesforce Salesforce Identity Vendor inclusion criteria

•V endorA CIAM inclusion platform criteria that can be deployed in the cloud (private or public). The platform had to be generally available (GA) prior to December 31, 2016. • A CIAM platform that can be deployed in the cloud (private or public). The platform had to be • Tgenerallyotal annual available CIAM (GA) product prior rtoevenues December of at 31, least 2016. $10 million.

• AtTotal least annual 100 payingCIAM pr customeroduct revenues organizations of at least in pr $10oduction. million. The vendor’s CIAM offering had to have at least 100 paying customer organizations in production at the GA cutoff date. • At least 100 paying customer organizations in production. The vendor’s CIAM offering had to have • atThought least 100 leadership paying customer in CIAM or evidencedganizations by in pr productsoduction and at services.the GA cutof Wef includeddate. vendors that demonstrated CIAM thought leadership and CIAM solution strategy execution through regular updates • Thoughtand improvements leadership to intheir CIAM productized evidenced CIAM by prproductsoduct portfolio. and services. We included vendors that demonstrated CIAM thought leadership and CIAM solution strategy execution through regular updates • Aand mindshar improvementse with Forrto theirester’ productizeds clients duringCIAM pr inquiries.oduct portfolio. During Forrester inquiries and other interactions, clients mention the vendor’s name in an unaided context, such as, “We looked at the • Afollowing mindshar vendorse with for Forr CIAM.”ester’s clients during inquiries. During Forrester inquiries and other interactions, clients mention the vendor’s name in an unaided context, such as, “We looked at the • Anfollowing unaided vendors mindshar for CIAM.”e with other CIAM competitive vendors. When Forrester asks other vendors about their competition on brie ngs, inquiries, and other interactions, other vendors mention the vendor • Anas aunaided real competitor mindshar in ethe with CIAM other market CIAM space. competitive vendors. When Forrester asks other vendors about their competition on brie ngs, inquiries, and other interactions, other vendors mention the vendor as a real competitor in the CIAM market space.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 8 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 8 [email protected] or +1 866-367-7378

136462_Print_a4.indd 8 7/19/2017 9:24:57 AM

136462_Print_a4.indd 8 7/19/2017 9:24:57 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

Vendor Profiles

Vendorthis evaluation Profiles of the ciaM market is intended to be a starting point only. We encourage clients to view detailed product evaluations and adapt criteria weightings to fit their individual needs through the this evaluation of the ciaM market is intended to be a starting point only. We encourage clients to Forrester Wave excel-based vendor comparison tool (see Figure 4). view detailed product evaluations and adapt criteria weightings to fit their individual needs through the Forrester Wave excel-based vendor comparison tool (see Figure 4).

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17 Strong Challengers Contenders Performers Leaders Strong StrongChallengers Contenders Performers Leaders Strong Gigya Go to Forrester.com Janrain to download the Salesforce Gigya ForrGo toester Forr Westerave.com tool for Janrain morto downloade detailed the pr oduct Salesforce evaluations,Forrester Wave featur toole for comparisons,more detailed andproduct ForgeRock customizableevaluations, featur rankings.e Auth0 comparisons, and Ping IdentiFotyrgeRock customizable rankings. Current LoginRadiuAuth0s offering Microsoft Ping Identity Current LoginRadius offering Microsoft

Market presence

Market presence Weak

Weak Weak Strategy Strong

Weak Strategy Strong

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 9 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 9 [email protected] or +1 866-367-7378

136462_Print_a4.indd 9 7/19/2017 9:24:57 AM

136462_Print_a4.indd 9 7/19/2017 9:24:57 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17 (cont.)

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17 (cont.)

s ce

ester’ geRock osoft s Forr weightingAuth0 For Gigya Janrain LoginRadiusMicr Ping IdentitySalesforce osoft Current Offering 50%ester’ 2.78 3.10 geRock4.22 4.06 2.72 2.56 2.78 3.88 Forr weightingAuth0 For Gigya Janrain LoginRadiusMicr Ping IdentitySalesfor CurrCustomerent Of satisfactionfering with current CIAM 50%10% 2.783.00 3.104.00 4.224.00 4.063.00 2.723.00 2.562.00 2.784.00 3.883.00 product Customer satisfaction with current CIAM 10% 3.00 4.00 4.00 3.00 3.00 2.00 4.00 3.00 prSocialoduct registration and login 12% 3.00 3.00 4.00 5.00 4.00 3.00 2.00 3.00

SocialPlatform registration security and and user login authentication 12% 3.004.00 3.004.00 4.00 5.003.00 4.002.00 3.001.00 2.004.00 3.002.00

PlatformPrivacy contr securityols and user authentication 12%8% 4.003.00 4.005.00 4.003.00 3.005.00 2.003.00 1.003.00 4.003.00 2.005.00

PrivacyCustomer contr dataols management 12%8% 3.001.00 5.003.00 3.005.00 5.003.00 3.001.00 3.00 3.00 5.00

CustomerAnalytics data management 12%6% 1.00 3.001.00 5.00 3.005.00 1.003.00 3.00 3.00 5.00

AnalyticsIntegration and APIs 6%8% 1.00 1.003.00 5.004.00 5.00 3.004.00 3.002.00 3.001.00 5.004.00

IntegrationReporting and APIs 8%6% 1.003.00 3.001.00 4.005.00 5.003.00 4.003.00 2.001.00 1.003.00 4.005.00

ReportingScalability and availability 6%8% 3.00 1.004.00 5.004.00 3.004.00 3.00 1.005.00 3.004.00 5.00

ScalabilityAdministration and availability 12%8% 3.005.00 4.003.00 4.005.00 4.005.00 3.00 5.003.00 4.001.00 5.003.00

AdministrationSecurity certi cations and standards support 12%6% 5.002.00 3.001.00 5.003.00 5.004.00 3.001.00 3.002.00 1.003.00 3.005.00

Security certi cations and standards support 6% 2.00 1.00 3.00 4.00 1.00 2.00 3.00 5.00 All scores are based on a scale of 0 (weak) to 5 (strong).

All scores are based on a scale of 0 (weak) to 5 (strong).

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 10 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 10 [email protected] or +1 866-367-7378

136462_Print_a4.indd 10 7/19/2017 9:24:58 AM

136462_Print_a4.indd 10 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17 (cont.)

FIGUre 4 Forrester Wave™: customer identity and access Management, Q2 ’17 (cont.)

s ce ester’ osoft s geRock Forr weightingAuth0 For Gigya Janrain LoginRadiusMicr Ping IdentitySalesforce ester’ osoft Strategy 50% 2.25 3.75 geRock4.35 4.10 2.35 2.55 3.10 3.15 Forr weightingAuth0 For Gigya Janrain LoginRadiusMicr Ping IdentitySalesfor StrategyCIAM vision 50%35% 2.253.00 3.754.00 4.354.00 4.105.00 2.353.00 2.552.00 3.102.00 3.153.00

CIAM visionexecution 35%25% 3.002.00 4.003.00 4.005.00 5.003.00 3.002.00 2.003.00 2.004.00 3.002.00

CIAMPartner execution ecosystem 25%20% 2.000.00 3.004.00 5.00 3.005.00 2.001.00 3.00 4.00 2.005.00

PartnerPricing termsecosystem and exibility 20%10% 0.003.00 4.00 5.003.00 5.003.00 1.003.00 3.002.00 4.003.00 5.003.00

PricingCustomer terms satisfaction and exibility with product strategy 10% 3.004.00 4.00 3.004.00 3.00 3.00 2.003.00 3.00 3.00 and direction Customer satisfaction with product strategy 10% 4.00 4.00 4.00 3.00 3.00 3.00 3.00 3.00 and direction Market Presence 0% 2.05 3.15 3.75 3.75 2.60 1.70 3.50 1.85

MarketSales, services Presence and technical support stafng 15%0% 2.052.00 3.154.00 3.754.00 3.753.00 2.602.00 1.703.00 3.504.00 1.854.00

Sales,CIAM installedservices baseand technical support stafng 15%35% 2.003.00 4.003.00 4.003.00 3.004.00 2.004.00 3.001.00 4.00 4.001.00

CIAM installedrevenues base 35%20% 3.002.00 3.00 3.00 4.002.00 4.003.00 1.000.00 4.003.00 1.000.00

CIAMVerticals revenues and geographies 20%30% 2.001.00 3.00 3.005.00 2.005.00 3.001.00 0.003.00 3.00 0.003.00

Verticals and geographies 30% 1.00 3.00 5.00 5.00 1.00 3.00 3.00 3.00 All scores are based on a scale of 0 (weak) to 5 (strong).

All scores are based on a scale of 0 (weak) to 5 (strong).

Leaders

Leaders› Gigya. Gigya has been delivering ciaM solutions since 2010 and has the largest market presence based on the revenues, direct customer install base, partner ecosystem, and global presence of › Gigya. Gigya has been delivering ciaM solutions since 2010 and has the largest market presence vendors in this Forrester Wave. Gigya is only available as a multitenant public cloud SaaS offering. based on the revenues, direct customer install base, partner ecosystem, and global presence of the solution’s analytics and administration are slightly more intuitive and modern than other vendors in this Forrester Wave. Gigya is only available as a multitenant public cloud SaaS offering. solutions. the solution is lacking the truSte security certification. customers praised the vendor’s the solution’s analytics and administration are slightly more intuitive and modern than other ciaM execution, reporting, and broad partner ecosystem. Forrester expects the vendor will add solutions. the solution is lacking the truSte security certification. customers praised the vendor’s support for: 1) cross-network registration analytics to improve conversions; 2) passwordless ciaM execution, reporting, and broad partner ecosystem. Forrester expects the vendor will add authentication across all sites; and 3) client-facing notice and consent portal for GDPr-compliant support for: 1) cross-network registration analytics to improve conversions; 2) passwordless consent document management. authentication across all sites; and 3) client-facing notice and consent portal for GDPr-compliant › Janrain.consent documentJanrain was management. one of the first entrants in this market, having first launched a ciaM solution in 2008. Janrain is only available as a multitenant public cloud SaaS offering in aWS with broad › Janrain. Janrain was one of the first entrants in this market, having first launched a ciaM solution global coverage. the vendor’s ciaM vision is more differentiated than other solutions in the in 2008. Janrain is only available as a multitenant public cloud SaaS offering in aWS with broad Forrester Wave and supports a broad range of security certifications including Soc2 and Privacy global coverage. the vendor’s ciaM vision is more differentiated than other solutions in the Forrester Wave and supports a broad range of security certifications including Soc2 and Privacy

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 11 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 11 [email protected] or +1 866-367-7378

136462_Print_a4.indd 11 7/19/2017 9:24:58 AM

136462_Print_a4.indd 11 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

Shield. Janrain’s pricing terms and flexibility were less mature than those of other vendors. customers praised the vendor’s administration and social registration and login capabilities. Shield. Janrain’s pricing terms and flexibility were less mature than those of other vendors. Forrester expects the vendor to add support for: 1) security analytics to reduce data breach customers praised the vendor’s administration and social registration and login capabilities. risks; 2) expanded policy management controls and policy creation capabilities; and 3) enhanced Forrester expects the vendor to add support for: 1) security analytics to reduce data breach integrations, scale, and context-based consent management for internet-of-things use cases. risks; 2) expanded policy management controls and policy creation capabilities; and 3) enhanced integrations, scale, and context-based consent management for internet-of-things use cases. strong Performers

strong› salesforce. Performers Salesforce offers its ciaM solution as part of its well-known crM platform and deploys it as a multitenant SaaS offering. it’s not as mature in user authentication and has the › salesforce. Salesforce offers its ciaM solution as part of its well-known crM platform and smallest ciaM installed base compared with other vendors evaluated in this study. reference deploys it as a multitenant SaaS offering. it’s not as mature in user authentication and has the customers highlighted the solution’s reporting capabilities and scalability. the vendor plans to add smallest ciaM installed base compared with other vendors evaluated in this study. reference support for: 1) progressive profiling to gather extra data that social providers do not have and/ customers highlighted the solution’s reporting capabilities and scalability. the vendor plans to add or provide as are required by business processes; 2) advanced consent-gathering tools to help support for: 1) progressive profiling to gather extra data that social providers do not have and/ customers more easily model and gather opt-in and opt-out data; and 3) risk-based authentication or provide as are required by business processes; 2) advanced consent-gathering tools to help to challenge users when they create sessions from new browsers. customers more easily model and gather opt-in and opt-out data; and 3) risk-based authentication › Forgeto challengerock. usersthe Forge whenr ockthey cia createM solution sessions is designedfrom new tobrowsers. be deployed on-premises or in the cloud but does not natively offer a multitenant SaaS offering. the solution is not as mature in reporting › Forgerock. the Forgerock ciaM solution is designed to be deployed on-premises or in the cloud and security certifications compared with other vendors evaluated in this study. Forgerock has but does not natively offer a multitenant SaaS offering. the solution is not as mature in reporting been at the forefront of promoting the uMa standard, which provides a mechanism for consumer and security certifications compared with other vendors evaluated in this study. Forgerock has consent and data sharing. reference customers liked the solution’s flexibility as well as the been at the forefront of promoting the uMa standard, which provides a mechanism for consumer vendor’s strategic direction, especially for emerging iot consumer use cases. the vendor plans to consent and data sharing. reference customers liked the solution’s flexibility as well as the add support for: 1) contextual identity to increase or reduce friction at any point in a digital session; vendor’s strategic direction, especially for emerging iot consumer use cases. the vendor plans to 2) privacy/consent features to provide users with fine-grained user privacy controls for sharing data add support for: 1) contextual identity to increase or reduce friction at any point in a digital session; based on uMa 2.0; and 3) extending ciaM into constrained iot devices on the network edge. 2) privacy/consent features to provide users with fine-grained user privacy controls for sharing data › Pingbased Identity. on uMa e 2.0;stablished and 3) enterpriseextending ciaiaMM vendor into constrained Ping identity io tacquired devices uonnbound the networkiD in a ugustedge. 2016. the Ping ciaM offering consists of the rebranded unboundiD PingDataGovernance and › Ping Identity. established enterprise iaM vendor Ping identity acquired unboundiD in august PingDirectory, and existing Ping iaM solutions PingFederate and Pingaccess, and is usually 2016. the Ping ciaM offering consists of the rebranded unboundiD PingDataGovernance and deployed as hosted cloud or on-premises software. the solution is somewhat more complex to PingDirectory, and existing Ping iaM solutions PingFederate and Pingaccess, and is usually administer and has a somewhat less intuitive user interface than other vendors evaluated in this deployed as hosted cloud or on-premises software. the solution is somewhat more complex to Forrester Wave. the solution also lacks documented integrations with marketing automation administer and has a somewhat less intuitive user interface than other vendors evaluated in this and content management solutions. reference customers universally singled out Ping’s support Forrester Wave. the solution also lacks documented integrations with marketing automation and service responsiveness. the vendor plans to add support for: 1) mobile SDk to embed MFa and content management solutions. reference customers universally singled out Ping’s support functionality in customer mobile apps; 2) additional cloud offerings for customer authentication and service responsiveness. the vendor plans to add support for: 1) mobile SDk to embed MFa and profile data store; and 3) additional privacy and customer consent management features for functionality in customer mobile apps; 2) additional cloud offerings for customer authentication regulatory compliance. and profile data store; and 3) additional privacy and customer consent management features for regulatory compliance.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 12 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 12 [email protected] or +1 866-367-7378

136462_Print_a4.indd 12 7/19/2017 9:24:58 AM

136462_Print_a4.indd 12 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

Contenders

Contenders› Microsoft. Microsoft entered the ciaM market in the spring of 2016 with its azure active Directory B2c offering, which the vendor deploys as a multitenant PaaS and SaaS offering, although › Microsoft. Microsoft entered the ciaM market in the spring of 2016 with its azure active Directory availability is currently limited to north american data centers. the solution is not as mature in B2c offering, which the vendor deploys as a multitenant PaaS and SaaS offering, although some authentication and reporting functionality compared with other vendors evaluated in this availability is currently limited to north american data centers. the solution is not as mature in study. the solution also lacks documented integrations with marketing automation and content some authentication and reporting functionality compared with other vendors evaluated in this management solutions. reference customers praised the scalability and performance of the study. the solution also lacks documented integrations with marketing automation and content azure platform. the vendor plans to add support for: 1) deeper integration with adjacent Microsoft management solutions. reference customers praised the scalability and performance of the services; 2) availability in public, sovereign, and government data clouds; and 3) lightweight azure platform. the vendor plans to add support for: 1) deeper integration with adjacent Microsoft consumer account registration processes via phone number. services; 2) availability in public, sovereign, and government data clouds; and 3) lightweight › Loginconsumerradius. account login registrationradius is a processes venture-backed via phone company number. that has been in the ciaM market since 2012. the solution is hosted in Microsoft azure as a multitenant SaaS offering. the solution › Loginradius. loginradius is a venture-backed company that has been in the ciaM market is not as mature in customer data management compared with other vendors evaluated in this since 2012. the solution is hosted in Microsoft azure as a multitenant SaaS offering. the solution Forrester Wave. loginradius has a much smaller and less mature partner ecosystem and vertical is not as mature in customer data management compared with other vendors evaluated in this market presence than other vendors. customers expressed satisfaction with pricing flexibility, Forrester Wave. loginradius has a much smaller and less mature partner ecosystem and vertical especially for smaller initial deployments. the vendor plans to add support for: 1) more international market presence than other vendors. customers expressed satisfaction with pricing flexibility, social identity providers; 2) third-party integrations with other marketing automation and content especially for smaller initial deployments. the vendor plans to add support for: 1) more international management systems; and 3) touchiD support on mobile devices. social identity providers; 2) third-party integrations with other marketing automation and content › managementAuth0. auth0 systems;has been anda venture-backed 3) touchiD support ciaM on vendor mobile since devices. 2013 and is available as an on- premises appliance, hosted private cloud, or multitenant service in amazon Web Services (aWS). › Auth0. auth0 has been a venture-backed ciaM vendor since 2013 and is available as an on- the solution is not as mature in analytics and third-party integration compared with other vendors premises appliance, hosted private cloud, or multitenant service in amazon Web Services (aWS). evaluated in this study. auth0 lacks a formal partner ecosystem and has limited market presence the solution is not as mature in analytics and third-party integration compared with other vendors outside of north america. customers praised the solution’s ease of administration. the vendor evaluated in this study. auth0 lacks a formal partner ecosystem and has limited market presence plans to add support for: 1) a developer portal for creating third-party apps; 2) expanded third-party outside of north america. customers praised the solution’s ease of administration. the vendor integrations; and 3) extensibility enhancements for attaching custom code. plans to add support for: 1) a developer portal for creating third-party apps; 2) expanded third-party integrations; and 3) extensibility enhancements for attaching custom code.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 13 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 13 [email protected] or +1 866-367-7378

136462_Print_a4.indd 13 7/19/2017 9:24:58 AM

136462_Print_a4.indd 13 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

engage With an analyst

eGainngage greater With confidence an a innalyst your decisions by working with Forrester thought leaders to apply our research to your specific business and technology initiatives. Gain greater confidence in your decisions by working with Forrester thought leaders to apply our research to your specific business and technology initiatives. Analyst Inquiry Analyst Advisory Webinar

tAnalysto help you Inquiry put research tAnalystranslate Advisory research into JoinWebinar our online sessions into practice, connect action by working with on the latest research to help you put research translate research into Join our online sessions with an analyst to discuss an analyst on a specific affecting your business. into practice, connect action by working with on the latest research your questions in a engagement in the form each call includes analyst with an analyst to discuss an analyst on a specific affecting your business. 30-minute phone session of custom strategy Q&a and slides and is your questions in a engagement in the form each call includes analyst — or opt for a response sessions, workshops, available on-demand. 30-minute phone session of custom strategy Q&a and slides and is via email. or speeches. — or opt for a response sessions, workshops, lavailableearn more. on-demand. lviaearn email. more. lorearn speeches. more. learn more. learn more. learn more.

Forrester’s research apps for iPhone® and iPad® Stay ahead of your competition no matter where you are. Forrester’s research apps for iPhone® and iPad® Stay ahead of your competition no matter where you are.

Supplemental Material Supplemental Material online resource

tohenline online resource version of Figure 4 is an excel-based vendor comparison tool that provides detailed product evaluations and customizable rankings. the online version of Figure 4 is an excel-based vendor comparison tool that provides detailed product evaluations and customizable rankings. survey Methodology

Forrestersurvey Methodology Data Global Business technographics® Security Survey, 2016 was fielded in March to May 2016. this online survey included 3,588 respondents in australia, Brazil, canada, china, France, Forrester Data Global Business technographics® Security Survey, 2016 was fielded in March to May Germany, india, new Zealand, the uk, and the uS from companies with two or more employees. 2016. this online survey included 3,588 respondents in australia, Brazil, canada, china, France, Forrester’sGermany, i ndia,Business new tZealand,echnographics the uk ensures, and the that uS thefrom final companies survey populationwith two or contains more employees. only those with significant involvement in the planning, funding, and purchasing of business and technology products Forrester’s Business technographics ensures that the final survey population contains only those with and services. research now fielded this survey on behalf of Forrester. Survey respondent incentives significant involvement in the planning, funding, and purchasing of business and technology products include points redeemable for gift certificates. and services. research now fielded this survey on behalf of Forrester. Survey respondent incentives include points redeemable for gift certificates. © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 14 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 14 [email protected] or +1 866-367-7378

136462_Print_a4.indd 14 7/19/2017 9:24:58 AM

136462_Print_a4.indd 14 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

Data sources Used In This Forrester Wave

ForresterData sources used Useda combination In This Forrester of data sources Wave to assess the strengths and weaknesses of each solution. We evaluated the vendors participating in this Forrester Wave, in part, using materials that Forrester used a combination of data sources to assess the strengths and weaknesses of each they provided to us by March 2017. solution. We evaluated the vendors participating in this Forrester Wave, in part, using materials that they› Vendor provided surveys. to us by Forrester March 2017. surveyed vendors on their capabilities as they relate to the evaluation criteria. once we analyzed the completed vendor surveys, we conducted vendor calls where › Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation necessary to gather details of vendor qualifications. criteria. once we analyzed the completed vendor surveys, we conducted vendor calls where › Productnecessary demos. to gather We details asked ofvendors vendor to qualifications. conduct demonstrations of their products’ functionality. We used findings from these product demos to validate details of each vendor’s product capabilities. › Product demos. We asked vendors to conduct demonstrations of their products’ functionality. We › Customerused findings reference from these calls. product to validate demos product to validate and vendordetails qualifications,of each vendor’s Forrester product alsocapabilities. conducted reference calls with three of each vendor’s current customers. › Customer reference calls. to validate product and vendor qualifications, Forrester also conducted reference calls with three of each vendor’s current customers. The Forrester Wave Methodology

WeThe conduct Forrester primary Wave research Methodology to develop a list of vendors that meet our criteria for evaluation in this market. From that initial pool of vendors, we narrow our final list. We choose these vendors based on: We conduct primary research to develop a list of vendors that meet our criteria for evaluation in this 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate vendors that have market. From that initial pool of vendors, we narrow our final list. We choose these vendors based on: limited customer references and products that don’t fit the scope of our evaluation. 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate vendors that have alimitedfter examining customer past references research, and user products need assessments, that don’t fit theand scopevendor of and our expertevaluation. interviews, we develop the initial evaluation criteria. to evaluate the vendors and their products against our set of criteria, after examining past research, user need assessments, and vendor and expert interviews, we develop we gather details of product qualifications through a combination of lab evaluations, questionnaires, the initial evaluation criteria. to evaluate the vendors and their products against our set of criteria, demos, and/or discussions with client references. We send evaluations to the vendors for their review, we gather details of product qualifications through a combination of lab evaluations, questionnaires, and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies. demos, and/or discussions with client references. We send evaluations to the vendors for their review, Weand set we defaultadjust theweightings evaluations to reflect to provide our analysisthe most of accurate the needs view of largeof vendor user offeringscompanies and —strategies. and/or other scenarios as outlined in the Forrester Wave evaluation — and then score the vendors based We set default weightings to reflect our analysis of the needs of large user companies — and/or on a clearly defined scale. We intend these default weightings to serve only as a starting point and other scenarios as outlined in the Forrester Wave evaluation — and then score the vendors based encourage readers to adapt the weightings to fit their individual needs through the excel-based tool. on a clearly defined scale. We intend these default weightings to serve only as a starting point and the final scores generate the graphical depiction of the market based on current offering, strategy, and encourage readers to adapt the weightings to fit their individual needs through the excel-based tool. market presence. Forrester intends to update vendor evaluations regularly as product capabilities and the final scores generate the graphical depiction of the market based on current offering, strategy, and vendor strategies evolve. For more information on the methodology that every Forrester Wave follows, market presence. Forrester intends to update vendor evaluations regularly as product capabilities and go to http://www.forrester.com/marketing/policies/forrester-wave-methodology.html. vendor strategies evolve. For more information on the methodology that every Forrester Wave follows, go to http://www.forrester.com/marketing/policies/forrester-wave-methodology.html. Integrity Policy

WeIntegrity conduct Policy all our research, including Forrester Wave evaluations, in accordance with our integrity Policy. For more information, go to http://www.forrester.com/marketing/policies/integrity-policy.html. We conduct all our research, including Forrester Wave evaluations, in accordance with our integrity Policy. For more information, go to http://www.forrester.com/marketing/policies/integrity-policy.html.

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 15 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 15 [email protected] or +1 866-367-7378

136462_Print_a4.indd 15 7/19/2017 9:24:58 AM

136462_Print_a4.indd 15 7/19/2017 9:24:58 AM For Security & riSk ProFeSSionalS June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 TForools Security And Technology: & riSk Pro TFheeSS IdentityionalS And Access Management Playbook June 15, 2017 The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Tools And Technology: The Identity And Access Management Playbook

endnotes e1 Source:ndnotes Forrester Data Global Business technographics Security Survey, 2016.

12 Source:See the Forrester reportData Global “tech rBusinessadar™: Zerotechnographics trust identity Security Standards, Survey, Q1 2016.2016.” 2 See the Forrester report “techradar™: Zero trust identity Standards, Q1 2016.”

© 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 16 [email protected] or +1 866-367-7378 © 2017 Forrester research, inc. unauthorized copying or distributing is a violation of copyright law. 16 [email protected] or +1 866-367-7378

136462_Print_a4.indd 16 7/19/2017 9:24:58 AM

136462_Print_a4.indd 16 7/19/2017 9:24:58 AM We work with business and technology leaders to develop customer-obsessed strategies that drive growth.

Products and services › core research and tools › data and analytics › Peer collaboration › analyst engagement › consulting › events

Forrester’s research and insights are tailored to your role and critical business initiatives.

roles We serve Marketing & Strategy Technology Management Technology Industry Professionals Professionals Professionals cMo cio analyst relations B2B Marketing application development B2c Marketing & delivery customer experience enterprise architecture customer insights infrastructure & operations eBusiness & channel › security & risk strategy sourcing & vendor Management

client suPPort For information on hard-copy or electronic reprints, please contact client support at +1 866-367-7378, +1 617-613-5730, or [email protected]. We offer quantity discounts and special pricing for academic and nonprofit institutions.

Forrester research (nasdaq: Forr) is one of the most influential research and advisory firms in the world. We work with business and technology leaders to develop customer-obsessed strategies that drive growth. through proprietary research, data, custom consulting, exclusive executive peer groups, and events, the Forrester experience is about a singular and powerful purpose: to challenge the thinking of our clients to help them lead change in their organizations. For more information, visit forrester.com. 136462

136462_Print_a4.indd 17 7/19/2017 9:24:59 AM

About Gigya

Gigya’s Customer Identity Management platform helps companies build trusted digital relationships with over 1.3 billion consumers. With our platform, businesses identify customers across devices, build rich customer profiles and provide better services, products and experiences by integrating data into marketing and service applications.

In an increasingly complex regulatory landscape, Gigya optimizes compliance and customer trust, with five discrete regional data centers and customer self-service options for managing profile, preference, opt-in and consent settings.

More than 700 of the world’s leading businesses rely on Gigya to build identity-driven relationships and to provide scalable, secure and compliant customer identity and access management.

To learn how Gigya can help your business manage customer identities, visit gigya.com, or call us at 650.353.7230. Let’s Chat

Gigya Offices

London 6 Ramillies St, 5th Floor Soho London, W1F 7TY Telephone: +44 843 289 7652

Hamburg Stadthausbrücke 1-3 20355 Hamburg, Germany Telephone: +49 40 376 44 919

Paris 54 Avenue Hoche 75008 Paris, France Telephone: +33 1 56 60 56 60

Milano Bastioni di Porta Nuova 21 Milano, 20121, Italy

www.gigya.com The Leader in Customer Identity Management

© 2017 Gigya, Inc. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/.