Access and Authentication

IBM Scored Highest for B2C Use Case in Gartner Critical Capabilities for Access Management Report

Share this post:

IBM Scored Highest in B2C Use Case in First-Ever Gartner Critical Capabilities for Access Management Report

IBM is proud to announce that it has received the highest score for Business to Consumer (B2C) use cases in Gartner’s new report, Critical Capabilities for Access Management, Worldwide. At a time when 3/4ths of companies intend to invest funds in customer-facing authentication, consumer access management platforms that allow seamless access to applications are in high and growing demand.

We believe that Gartner’s report, an in-depth analysis of the top capabilities security leaders should look for in access management vendors, provides further validation of our overall leadership in the access management marketplace. For two consecutive years, Gartner has placed IBM as a Leader in the Gartner Magic Quadrant for Access Management.

Get Gartner’s Critical Capabilities for Access Management report

Supporting our client’s clients with innovative authentication

It’s not just a scorecard of capabilities that earned us recognition. IBM is partnering with our customers to enhance their users’ experience with innovative authentication.

For example, we’ve recently partnered with BMO Financial Group and partner BioConnect on a leading edge biometric authentication platform for commercial and corporate clients. The new platform, announced in October, lets BMO’s customers log in and verify financial transactions with biometric methods including fingerprint, voice, face and eye. According to BMO’s Sharon Haward-Laird, Head of North America Treasury and Payments, “we continue to transform the bank with a focus on offering new digital capabilities that will enhance the user experience and align with changing customer expectations, and this partnership is a reflection of that….Offering a way for our customers to quickly authenticate transactions and payments using biometric authentication vastly improves the customer experience while enhancing security for our clients in Canada and the U.S.”

The core of access management is Single Sign On – and for many organizations, uniting new, old and acquired technologies under one SSO regime for external access is still a significant challenge. In Europe, we’re working with agencies like POST Luxembourg, a government-owned agency that offers postal, financial and cell service to Luxembourgian citizens, to provide a single, seamless platform for customers to access all their services with one set of credentials.

Gartner’s Critical Capabilities Report

Are you researching IAM solutions for a business to consumer, business to employee, or business to partner deployment?

Register for a complimentary copy of the report now to learn:

  • Why IBM received the highest overall score for Buisness to Consumer use cases (graphic above)
  • The top 15 access management vendors, scored on their ability to deliver 9 capabilities across 3 use cases (B2C/B2E/B2P)
  • Definitions and feature scopes for Gartner’s 9 must-haves for Access Management, including user authentication, SSO, session management, social identity support, SaaS application enablement, and more.

Register for the Critical Capabilities report here.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Click here to rate this article

Rate this article :

Product Marketing Manager, Access and Authentication

More Access and Authentication stories
By ADAM CASE on May 10, 2019

Getting started with IBM Verify

Getting started with IBM Verify With an IBM Cloud Identity Verify you have the ability to apply multi-factor authentication anywhere, using one authenticator. From Linux shell access to Windows remote desktop, even custom development with IBM Cloud Identity Verify APIs, you can take full advantage of no infrastructure costs, third party subscriptions for email and […]

Continue reading

By Craig Pearson on April 5, 2019

IBM Verify: Custom Verification Data

The release of IBM Verify v2.1.1 (iOS) and v2.1.0 (Android) brings new functionality enhancing the user experience when approving or denying a transaction. In this article I’ll show you how to send additional transaction information to IBM Verify with IBM Cloud Identity Verify (CIV). Getting Started CIV is predominately API driven, so we’ll be using […]

Continue reading

By ADAM CASE on March 25, 2019

Requesting new features in IBM Cloud Identity

Roadmaps and ideas drive our development teams to deliver the highest quality of product. Without ideas from the community and our clients, we lose insights into how the product is being used and how we can make it work better for them. We encourage everyone who wishes to make IBM Cloud Identity better to submit […]

Continue reading