Access and Authentication
IBM Scored Highest for B2C Use Case in Gartner Critical Capabilities for Access Management Report
November 28, 2018 | Written by: Lane Billings
Categorized: Access and Authentication | Cloud Identity
Share this post:
IBM Scored Highest in B2C Use Case in First-Ever Gartner Critical Capabilities for Access Management Report
IBM is proud to announce that it has received the highest score for Business to Consumer (B2C) use cases in Gartner’s new report, Critical Capabilities for Access Management, Worldwide. At a time when 3/4ths of companies intend to invest funds in customer-facing authentication, consumer access management platforms that allow seamless access to applications are in high and growing demand.
We believe that Gartner’s report, an in-depth analysis of the top capabilities security leaders should look for in access management vendors, provides further validation of our overall leadership in the access management marketplace. For two consecutive years, Gartner has placed IBM as a Leader in the Gartner Magic Quadrant for Access Management.
Get Gartner’s Critical Capabilities for Access Management report
Supporting our client’s clients with innovative authentication
It’s not just a scorecard of capabilities that earned us recognition. IBM is partnering with our customers to enhance their users’ experience with innovative authentication.
For example, we’ve recently partnered with BMO Financial Group and partner BioConnect on a leading edge biometric authentication platform for commercial and corporate clients. The new platform, announced in October, lets BMO’s customers log in and verify financial transactions with biometric methods including fingerprint, voice, face and eye. According to BMO’s Sharon Haward-Laird, Head of North America Treasury and Payments, “we continue to transform the bank with a focus on offering new digital capabilities that will enhance the user experience and align with changing customer expectations, and this partnership is a reflection of that….Offering a way for our customers to quickly authenticate transactions and payments using biometric authentication vastly improves the customer experience while enhancing security for our clients in Canada and the U.S.”
The core of access management is Single Sign On – and for many organizations, uniting new, old and acquired technologies under one SSO regime for external access is still a significant challenge. In Europe, we’re working with agencies like POST Luxembourg, a government-owned agency that offers postal, financial and cell service to Luxembourgian citizens, to provide a single, seamless platform for customers to access all their services with one set of credentials.
Gartner’s Critical Capabilities Report
Are you researching IAM solutions for a business to consumer, business to employee, or business to partner deployment?
Register for a complimentary copy of the report now to learn:
- Why IBM received the highest overall score for Buisness to Consumer use cases (graphic above)
- The top 15 access management vendors, scored on their ability to deliver 9 capabilities across 3 use cases (B2C/B2E/B2P)
- Definitions and feature scopes for Gartner’s 9 must-haves for Access Management, including user authentication, SSO, session management, social identity support, SaaS application enablement, and more.
Register for the Critical Capabilities report here.
Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Product Marketing Manager, Access and Authentication
Getting started with IBM Verify
Getting started with IBM Security Verify for Multi-factor authentication With IBM Security Verify you have the ability to apply multi-factor authentication anywhere, using one authenticator. From Linux shell access to Windows remote desktop, even custom development with IBM Security Verify APIs, you can take full advantage of no infrastructure costs, third party subscriptions for voice, […]
IBM Verify: Custom Verification Data
The release of IBM Verify v2.1.1 (iOS) and v2.1.0 (Android) brings new functionality enhancing the user experience when approving or denying a transaction. In this article I’ll show you how to send additional transaction information to IBM Verify with IBM Cloud Identity Verify (CIV). Getting Started CIV is predominately API driven, so we’ll be using […]
Requesting new features in IBM Cloud Identity
Roadmaps and ideas drive our development teams to deliver the highest quality of product. Without ideas from the community and our clients, we lose insights into how the product is being used and how we can make it work better for them. We encourage everyone who wishes to make IBM Cloud Identity better to submit […]