IDaaS Competitors

IDaaS Competitors

The Identity-as-a-Service (IDaaS) market is one of the most important in the IT sector. IDaaS solutions are now sitting at the center of most IT networks, and are critical when it comes to controlling access, security, and efficiency. With so much focus on the IAM sector, there is a wide array of IDaaS competitors in the market. Which ones should you look at, and what is the future of IDaaS competitors? This blog post will answer those questions.

Introducing the Concept of IDaaS

The concept of IDaaS was first introduced a little less than a decade ago with the emergence of a new wave of web application single sign-on providers. These vendors brought to market a new generation of SSO solutions from the cloud. Analysts were quick to jump on these innovations, and were quick to distinguish them as a new category called IDaaS or Identity-as-a-Service. It was easy to see where the ‘as-a-service’ portion of the moniker came from, but the identity piece was not as easy.

These web app SSO providers were not the identity provider for an organization – that task remained on-prem with Microsoft® Active Directory®, which was the most dominant directory service in the space at the time. Instead, these first generation IDaaS solutions integrated with AD to federate identities to web applications. It’s for this reason we argue that the Identity-as-a-Service space should represent more than just web app SSO. But that’s another story.

IDaaS Expands

With the emergence of a new market, a large number of companies soon followed. Many organizations emerged to play in the IDaaS space, and the competition quickly grew fierce. Many of these companies grew rapidly, and they provided significant value to IT organizations. By solving the issue of web applications being connected to the central directory, these solutions became a vital part of IT.

While this approach worked for a number of years, as the IT infrastructure continued to change and evolve this identity management architecture just wasn’t enough.

Cloud servers hosted at AWS®, Mac® and Linux® systems, on-prem (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 84 posts and counting.See all posts by jon-griffin