Gartner Blog Network


The Gartner 2018 IAM Planning Guide Is Here!

by Mark Diodati  |  October 5, 2017  |  Submit a Comment

October is the month for candy corn and paper-bagged tricks on front stoops. And the release of Gartner’s IAM planning guide! The 2018 Planning Guide for Identity and Access Management contains four technical planning trends informed by our two principal research endeavors.  We derived insights from our 1,000 hours of client interaction over the past year. Also, we researched IaaS, IAM, machine learning and SaaS technologies, including market considerations.

The introduction section explores the widening technology gap between IAM products and the accelerating needs of the business. The planning guide’s “anchor” graphic illustrates the relationships among the topics in the document. Topics with bigger dots have more relationships.Anchor Graphic

Our challenge was reducing the number of technical planning trends to just four. Each trend has a Planning Considerations section, where we provide guidance for 2018. Here they are:

  • Dependencies Among Multiple IAM Providers Will Introduce Availability Challenges
  • More Cloud Identities Will Need Access to On-Premises Applications
  • Expanded Use of IaaS Will Require Much Stronger IAM Governance
  • Analytics Will Help Organizations Keep Up With the Pace of Digital Change

As agenda manager, I am keenly interested in your feedback. If you are a client and have a bit of time, please take a look at the 2018 IAM Planning Guide. Let me know what you think.

A special “thank you” goes to Mary Ruddy! We collaborated on the document together.

Category: analytics  authentication  azure-ad  cloud  federation  iaas  iam  idaas  identity-governance  oauth  office-365  openid-connect  

Mark Diodati
Research VP
6 years at Gartner
21 years IT industry

Mark Diodati is a Research Vice President with Gartner's IT Professionals research and advisory service. His focus topics include mobility, authentication, cloud idenitity, federation, directory services, provisioning, identity services, Active Directory interoperability, Web access management…Read Full Bio




Leave a Reply

Your email address will not be published. Required fields are marked *

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.