2018 Executive View Evidian Identity Access Management
2018 Executive View Evidian Identity Access Management
by Richard Hill
rh@kuppingercole.com
September 2018
Content
1 Introduction ................................................................................................................................. 2
2 Product Description ...................................................................................................................... 3
3 Strengths and Challenges .............................................................................................................. 5
4 Copyright ..................................................................................................................................... 6
Related Research
Executive View: Evidian Enterprise SSO - 70823
Leadership Compass: IAM/IAG Suites - 71105
Leadership Compass: Identity Provisioning - 71139
Leadership Compass: Adaptive Authentication – 71173
Identity & Access Management has come a long way since the inception of directory services and it is
still activity evolving.
KuppingerCole’s view of IAM over time begins with an IAM in whose primary purpose was to prevent
unauthorized access to secure resource. With its focus on access administration, the IAM core
technology started to include Identity Provisioning as well as the core capabilities to authenticate,
authorize and audit.
A further generation of IAM not only tried to prevent unauthorized access to a resource, but it also
added the capability to detect it. Access Governance was included as a core technology for IAM with a
focus on administration with business participation, and the ability to detect was partially due to
integrations with Security Information and Event Management (SIEM) products making its way onto the
stage.
In this latest iteration, IAM adds to its ability to prevent and detect by also providing the ability to
respond to the security threats. New IAM technologies included Access Analytics and Intelligence.
Analytics gives the ability to perform data analysis of historical data and uncover trends or pattern that
can be used to improve the decision-making process, while Intelligence gives the ability to make access
decisions that can be acted upon based on the patterns and trends found through data analytics.
Together, access analytics and intelligence provide the ability not only detect, but to also respond to
unauthorized access attempts. These new capabilities helped to fulfill the requirements of not only
business but governance, compliance, and administration too. Integrations with Adaptive
Authentication & Authorization, Real-Time Security Intelligence, Software Defined Environments and
Privilege Management also needed to be supported by IAM today.
As the landscape of information security threats changes, so do the IAM capability requirements.
Founded in 2000, Evidian is the Identity and Access Management (IAM) software suite of Atos Group.
Atos Evidian has more than 900 customers with over 5 million users within the Finances Services,
Manufacturing, Retail, Transport, Telecom, Media, Utilities, and Public Health sectors.
Evidian Identity & Access Management is a mature solution providing the IAM capabilities needed to
prevent, detect and respond to the current IT information security challenges. The IAM suite offers both
on-premises and cloud deployment option and offers an integrated modular system which includes:
• Authentication Manager
• Enterprise SSO
• Web Access Manager
• Analytics and Intelligence
Authentication Manager
The Evidian Authentication Manager module of their IAM suite covers multiple assurance levels of
authentication. At the most basic and lowest assurance level, username & passwords are supported as
well as knowledge-based questions and answers authentication.
Evidian also offers a self-service password reset tool called QRentry, which can be downloaded onto a
smartphone and used when a user loses their password or smart card for example. This allows them to
unlock their PC by scanning a QR Code at login using the QRentry mobile application which generates a
one-time passcode.
Beyond username/password authentication, Evidian offers authentication at higher levels of assurance
by provides a range of strong Multi-Factor Authentication (MFA) methods, which include:
● Smart Card (with or without certificate) ● QRentry
● Secure USB (with or without certificate) ● Finger Vein
● RFID Badge & PIN (also NFC compliant) ● Finger Print
● OTP (SMS, E-mail, or Push Notification) ● Wearable Devices (RFID, Bluetooth)
For smart cards, the Authentication Manager can manage its entire life cycle including card assignment,
replacement, blacklist, data, and certificates. Other MFA management options support the management
of centralized access policies, group-based authentication profiles, and centralized auditing of user
access attempts.
In addition to their MFA options, Evidian Authentication Manager also provides Fast User Switching
capabilities that provide a personalized session in shared workstation environments (e.g. public
workstations at hospitals, manufacturing plants, etc.) and, the other way around where centralized
authentication is available for several workstations used by the same user (e.g. traders).
Enterprise SSO
Evidian has a comprehensive portfolio in the area of Identity & Access Management.
The Evidian Authentication Manager module of their IAM suite provides a good list of authentication
MFA methods as well as a more unique, yet useful QRentry tool for self-service password resets.
Evidian’s Enterprise SSO gives users access to their applications using consistent authentication methods
provided by their Authentication Manager module, which demonstrates good integration between most
of the components in their IAM suite. User account delegation and possible automation of account
management tasks are also provided as well as the extension of SSO to mobile devices with features like
their eWallet data vault.
The Evidian Web Access Manager component offers a mature Adaptive Authentication capability with
its risk engine able to evaluate common risk factors, although more advanced user behavioral analysis is
currently unavailable. Evidian WAM can act either as a federation IdP or as a reverse proxy.
The use of analytics and intelligence are an expected extended capability in modern IAM solutions.
Evidian provides an integrated analytics and intelligence capability with the other modules in their IAM
suite. It provides a user-friendly web interface, reporting, and auditing.
Strengths Challenges
4 Copyright
© 2018 Kuppinger Cole Ltd. All rights reserved. Reproduction and distribution of this publication in any form is forbidden unless
prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole’s initial
view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to
refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of
this information. Even if KuppingerCole research documents may discuss legal issues related to information security and
technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such.
KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion
expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks
of their respective holders. Use of them does not imply any affiliation with or endorsement by them.