Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Strategies, and Forecasts, 2006 to 2012

Size: px
Start display at page:

Download "Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Strategies, and Forecasts, 2006 to 2012"

Transcription

1 Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Strategies, and Forecasts, 2006 to 2012 Identity Resolution, Authentication, and Management Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc. Lexington, Massachusetts

2 CHECK OUT THESE KEY TOPICS ANONYMOUS IDENTITY RESOLUTION FEDERATED IDENTITY MANAGEMENT SERVICES Key Drivers In The Internet Security Marketplace Identity Resolution, Authentication, and Management Market Anaylsis Serious Threats In Internet Environment Identity Security System Issues and Aspects USES OF INTERNET SECURITY DIGITAL IDENTITY MANAGEMENT MIDDLEWARE IDENTITY AND ACCESS MANAGEMENT BUSINESS SOLUTION AREAS INFRASTRUCTURE SOLUTION AREAS SIEGE PROBLEM DIRECTORY SERVICES IDENTITY ADMINISTRATION SOLUTIONS HOST SINGLE SIGN-ON IDENTITY SECURITY PRODUCTS OPPORTUNITY ABOUNDS OPPORTUNITY ABOUNDS WinterGreen Research, Inc. Lexington, Massachusetts

3 Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Market Forecasts, and Market Strategies, Identity resolution, authentication, and management is a broad market with significant variation between the types of products offered. Middleware is implemented in federated and application specific systems. The ability to identify fraudulent people proactively is an emerging issue tackled with identity resolution suites. The technology to implement identity resolution is also useful for business analysis of transaction objects. The ability to create correlations, at high speed, between similar objects is fundamental to the next stage of business process management. Middleware is needed for digital identity management because it leaves the information in place and operates on it there. The ability to move information from one place to another for analysis is good, but the accuracy of information is best assured by leaving it where it is gathered originally. Digital identity management software enables companies to share and compare information with other companies or government agencies without identifying the people connected to it. The software for anonymous resolution enables companies or government agencies to share personal information on customers or citizens without identifying them. The software converts data on a person into a string of random characters, using a one-way hash function technique. No names, addresses or Social Security numbers re embedded within the character string. The strings are fed through a program to detect a matching pattern of characters. Critical components of identity and access management include identity resolution, Web and host single sign-on, user provisioning, advanced and legacy authentication, public key infrastructure, and directory services. Full suites comprise solutions that include directory services, provisioning, secure access/authentication and, federated identity elements. The market forecasts for , in the worldwide identity and access management market, is expected to double by the year 2011.

4 Companies Profiled Market Leaders IBM Computer Associates Novell Market Participants ActivCard Alcatel Beta Systems Bluesocket Cisco Systems Factor3 Fujitsu Intel Language Analysis Systems Meetinghouse Nexidia PEC CardSaver Software RSA Security Soundex System Tri-Sector Technologies Group Visual Analytics Advanced VoIP Pvt Ltd Alepo Blue Ridge Networks Bridgewater Systems Ericsson Funk Software Huawei Technologies Interlink Networks Lucent Technologies Microsense Nortel Rodopi Software Siemens Spotngo UTStarcom

5 Identity Resolution, Identity Authentication, and Identity Management Strategies and Forecasts, REPORT METHODOLOGY THIS IS THE 270TH REPORT IN A SERIES OF MARKET RESEARCH REPORTS THAT PROVIDE FORECASTS IN COMMUNICATIONS, TELECOMMUNICATIONS, THE INTERNET, COMPUTER, SOFTWARE, TELEPHONE EQUIPMENT, HEALTH EQUIPMENT, AND ENERGY. THE PROJECT LEADERS TAKE DIRECT RESPONSIBILITY FOR WRITING AND PREPARING EACH REPORT. THEY HAVE SIGNIFICANT EXPERIENCE PREPARING INDUSTRY STUDIES. FORECASTS ARE BASED ON PRIMARY RESEARCH AND PROPRIETARY DATA BASES. FORECASTS REFLECT ANALYSIS OF THE MARKET TRENDS IN THE SEGMENT AND RELATED SEGMENTS. UNIT AND DOLLAR SHIPMENTS ARE ANALYZED THROUGH CONSIDERATION OF DOLLAR VOLUME OF EACH MARKET PARTICIPATION IN THE SEGMENT. INSTALLED BASE ANALYSIS AND UNIT ANALYSIS IS BASED ON INTERVIEWS AND AN INFORMATION SEARCH. MARKET SHARE ANALYSIS INCLUDES CONVERSATIONS WITH KEY CUSTOMERS OF PRODUCTS, INDUSTRY SEGMENT LEADERS, MARKETING DIRECTORS, DISTRIBUTORS, LEADING MARKET PARTICIPANTS, OPINION LEADERS, AND COMPANIES SEEKING TO DEVELOP MEASURABLE MARKET SHARE. OVER 200 IN DEPTH INTERVIEWS ARE CONDUCTED FOR EACH REPORT WITH A BROAD RANGE OF KEY PARTICIPANTS AND INDUSTRY LEADERS IN THE MARKET SEGMENT. WE ESTABLISH ACCURATE MARKET FORECASTS BASED ON ECONOMIC AND MARKET CONDITIONS AS A BASE. USE INPUT/OUTPUT RATIOS, FLOW CHARTS, AND OTHER ECONOMIC METHODS TO QUANTIFY DATA. USE IN-HOUSE ANALYSTS WHO MEET STRINGENT QUALITY STANDARDS. INTERVIEWING KEY INDUSTRY PARTICIPANTS, EXPERTS AND END-USERS. OUR RESEARCH INCLUDES ACCESS TO LARGE PROPRIETARY DATABASES. LITERATURE SEARCH INCLUDES ANALYSIS OF TRADE PUBLICATIONS, GOVERNMENT REPORTS, AND CORPORATE LITERATURE. YOU MUST HAVE THIS STUDY

6 Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Strategies, and Forecasts, 2006 to 2012 Table of Contents IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT EXECUTIVE SUMMARY IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT EXECUTIVE SUMMARY Anonymous Identity Resolution Federated Identity Manager Services Identity Resolution, Identity Authentication, and Identity Management Market Analysis ES-1 ES-3 ES-6 ES-10 INTERNET SECURITY MARKET DESCRIPTION 1. INTERNET SECURITY IDENTITY MARKET DESCRIPTION Key Drivers In The Internet Security Marketplace Applications Drive the Internet Security Marketplace Internet Security Market Segments Serious Threats In Internet Environment Need for Application Intelligence Defense Strategies for Application-Level Security Validate Compliance to Standards Control Application-Layer Operations Identity Security System Issues And Aspects Securing Data Resources Mainframe Clustered Systems As the Model For Internet Security Systems Uses Of Internet Security Identity Security Products Information As A Service Service-Oriented Architecture (SOA) Unlocks The Business Value Aligning Business Process And Technology Business Process Challenges Business Environment Service Oriented Architecture (SOA) Ability To Transform Business Service-Oriented Architecture Works By Abstracting Business Processes Layers of Application Integration Web Services Positioning Business Imperatives E-Business Platforms Syndication As a Business Model Business Process Management Platforms Business Processes Use Web Services Customer-Centric, Agile Enterprise Managing Transactions in a Distributed Environment 1-40

7 1.19 Exchanging Information Application Building Software And Platform Interoperability Role Of Distributed Transaction Processing Transaction-Processing Solution Internet Revolution Business Requirements For Information Security Network Context Siege Problem Internet Commerce Telecommuting Types Of Networks Internet And Intranet Strategy 1-61 IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT MARKET SHARES AND MARKET FORECASTS 2. IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT MARKET SHARES AND MARKET FORECASTS Digital Identity Management Middleware Identity Resolution, Identity Authentication, and Identity Management Market Driving Forces Identity Resolution, Identity Authentication, and Identity Management Market Analysis Identity Resolution, Identity Authentication, and Identity Management Market Shares Identity Resolution, Identity Authentication, and Identity Management Total Market Forecasts Identity and Access Management Server Market Shares Single Sign On Market Shares Token Identity Authentication Market Shares Identity Directory Market Shares Enterprise AAA Radius Market Shares Carrier Service Provider AAA Radius Market Shares Identity Resolution Market Shares Identity Directory Market Shares Federated Identity Market Shares Federated Identity IBM Tool Masks Shared Data Identity Directory Identity Entity Resolution Directory Identity Services Identity And Access Management Computer Associates Identity And Access Management Host Single Sign-On Provisioning User Lifecycle Account Management 2-93 IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT PRODUCT DESCRIPTION 3. IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT PRODUCT DESCRIPTION Computer Associates Identity Access etrust SiteMinder 3-4

8 3.1.3 etrust Access Control etrust Identity and Access Management Identity Manager Identity Manager / Netegrity Identity Resolution, Identity Authentication, Identity Management, and Identity Access IBM Identity Resolution Entity Analytic Solutions IBM DB2 Entity Analytic Solutions / DB2 Data Management Software IBM DB2 EAS Products IBM DB2 Entity Analytic Anonymous Resolution IBM EAS Middleware Enhances Privacy and Increases Security IBM DB2 Anonymous Resolution Entity Analytic Solutions (EAS) IBM DB2 EAS Pre-Processing One-Way Hash Components To The IBM DB2 EAS Anonymous Resolution Solution IBM DB2 Anonymous Resolution Methodology Functions IBM DB2 Anonymous Relationship Resolution Resolver Site IBM DB2 Anonymous Identity Resolution IBM DB2 Anonymous Identity Resolution Single Organization Deployment IBM DB2 Anonymous Identity Resolution Multi Organization Deployment IBM DB2 Anonymous Resolution Security, Auditability, and Control IBM DB2 Anonymous Identity Resolution Components IBM DB2 Entity Analytics Security, Auditability, And Control Language Analysis Systems Language Analysis Systems Suite Of Products Language Analysis Systems NameParser Language Analysis Systems NameClassifier Language Analysis Systems NameHunter Language Analysis Systems MetaMatch Language Analysis Systems Name Reference Library Language Analysis Systems Name Reference Library Language Analysis Systems NameGenderizer Soundex System Factor3 Technologies Factor3 F3BAM Factor3 Productivity And Compliance Products Intelligent Search Technology Nexidia Directory Services As An Identity Management Foundational Technology Novell Security and Identity Novell e-directory Microsoft Active Directory Federated Identity Managers IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Services IBM Tivoli Federated Identity Manager Simplified Integration IBM Tivoli Federated Identity Manager User Identification Lifecycle Management HP OpenView Identity Management RSA Federated Identity and Access Management Identity Administration Solutions RSA Security Two-Factor Authentication RSA Authentication Manager Software RSA Security Application Program Interfaces RSA Identity Administration Solution 3-92

9 3.5.5 RSA Security Xellerate Identity Manager Authentication and Remote Authentication Dial-In User Service (RADIUS) Server Products RSA SecurID Authentication RSA Authenticators RSA Integration Cisco Aironet Cisco Network EAP or Open Authentication with EAP Cisco Client Authentication Methods Cisco Radius Message Transmission Funk Software Steel-Belted Radius Funk Software Steel-Belted Radius Functions Funk Software Steel-Belted Radius Allows Administrators To Centralize The Authentication Of All Users Funk Software 802.1X-Based Infrastructure Funk Software Steel-Belted Radius Features and Functionality Interlink Networks AAA RADIUS Server Interlink Wireless LAN Interlink LucidLink Secures 802.1x Wireless LAN Interlink LucidLink Enterprise-Class Wireless Security for Small Business Lucent Lucent NavisRadius Authentication Server for Service Providers Alcatel Bridgewater Providing OEM Radius Server for Alcatel SSC Siemens Wireless Portfolio (WLAN) Depends on Radius Server Siemens Enables Service Provider And Enterprise Mobility Access Management Siemens Enterprise HiPath Wireless Controller Siemens Enterprise HiPath Wireless Convergence Software Siemens Wireless Access Points Bridgewater Radius Products Bridgewater Systems, A Leading Developer Of Subscriber-Centric Policy Management Software For IP-Based Services Bridgewater Systems Supports Verizon Wireless V CAST Wireless Broadband Multimedia Service Alepo RADIUS and AAA Billing Solutions Alepo Radius Reliability And Scalability Alepo Radius Web Based Administration Alepo Radius Support For The Latest RFCs Alepo Smart Radius Servers IBM Radius Authorization Policy Microsoft Remote Authentication Dial-In User Service (RADIUS) Microsoft Internet Authentication Service IDENTITY TECHNOLOGY BY INDUSTRY 4. IDENTITY TECHNOLOGY BY INDUSTRY Business Solution Areas Business Intelligence (BI) Customer Relationship management (CRM) Enterprise Resource Planning (ERP) Product Lifecycle Management (PLM) Supply Chain Management (SCM) Infrastructure Solution Areas Digital Media 4-2

10 4.2.2 Linux-Based Solutions Security And Business Resilience Wireless IBM DB2 Anonymous Resolution Law Enforcement IBM DB2 Federal Government Anonymous Resolution LAS Intelligence Identity Processing LAS Name Recognition Intelligence Capabilities LAS Intelligence Community And Federal Government LAS Law Enforcement Systems LAS Law Enforcement for FBI Wanted Individuals LAS Precision Name Recognition For Homeland Security Data Marketing: Getting the Name Right Increases ROI Financial Institution Identity Compliance Financial Institution Multi-Cultural Name Recognition Products Name Matching Bank Technology Software Banks Screen Out Unwanted Clients IBM DB2 Anonymous Resolution Health Care IBM DB2 Anonymous Resolution Operational Process For A Health Care Study Extending the Utility of Existing One-Way Hashing Input Text Hashed Value IBM DB2 Anonymous Resolution for ISP s (Internet Service Providers) Lightweight Directory Access Protocol (LDAP) 4-30 IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT COMPANY PROFILES 5. IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT COMPANY PROFILES ActivCard ActivCard Revenue ActivCard / Protocom Advanced VoIP Pvt Ltd Alcatel Alcatel Positioning Alcatel Market Issues Alcatel Multi-service Aggregation Alcatel Broadband Access Alcatel-To-End Communications Solutions Alcatel VND Division Alcatel Net Sales Alcatel Third Quarter 2004 Revenue Alcatel Fixed Communications Alcatel Mobile Communications Alcatel Private Communications Alcatel Third Quarter 2004 Regional Revenue Third Quarter 2003 Regional Revenue Alcatel Participation In Communications Network Equipment Markets Alcatel Metro DWDM Alcatel and Optics Alepo Alepo Customers Beta Systems Blue Ridge Networks 5-35

11 5.7 Bluesocket Bridgewater Systems Cisco Systems Cisco IP Communications Cisco Systems Second Quarter Fiscal Year 2005 Revenue Cisco IP Communications Cisco / Linksys Cisco / Linksys Broadband and Wireless Networking Computer Associates Ericsson Ericsson Revenue Ericsson Customers T-Mobile UMTS network Sony Ericsson Mobile Communications Revenue Sony Ericsson Mobile Communications Products Sony Ericsson Symbian Factor Funk Software Funk Software Solution Customers and Partners Funk Software Odyssey Product Funk Software Steel-Belted Radius Product Funk Software Radius/AAA Products For Remote And WLAN User Management Funk Software Proxy Remote Control Solution Fujitsu Fujitsu Network Communications Fujitsu Considers WiMAX vs. 3G vs. Wi-Fi Fujitsu FLASHWAVE 7500 Small System Fujitsu FASST Transition Solutions Fujitsu Microelectronics America Fujitsu Network Communications Inc Fujitsu Revenue Fujitsu Business Segment Results Huawei Technologies International Business Machines (IBM) IBM Identity Resolution Software IBM Information Management Portfolio International Business Machines Revenue IBM On Demand Operating Environment Architecture IBM Clients IBM Capabilities IBM Acquires Ascential Software IBM Advanced Information Technologies IBM / Corio, IBM Global Services IBM Multi-Core Processor Architecture Design IBM Technology IBM 2004 Fourth-Quarter And Full-Year Revenue IBM RFID Moving To Continuous Information Visibility IBM RFID Strategic Alliances IBM Comprehensive RFID Services IBM / Ascential Software Intel Intel Communications Wi-Fi Company Investment 5-112

12 5.18 Interlink Networks Interlink Networks Products Interlink Networks Use At A Large-Scale Hotspots Language Analysis Systems LAS Commercial Products Visual Analytics Partners with LAS to Bolster Data Mining of Names Lucent Technologies Lucent Technologies Maximize Service Revenues Lucent Technologies Systems Lucent Bell Labs Meetinghouse Microsense Nexidia Nortel Nortel VoIP Network Elements Nortel VoIP Enabling Technologies Nortel ATM (Asynchronous Transfer Mode) Nortel Networking And Communication Services And Infrastructure Nortel Network Elements Nortel Enabling Technologies Nortel ATM (Asynchronous Transfer Mode) Novell Novell Web Services Solutions PEC CardSaver Software Rodopi Software Rodopi Billing System RSA Security RSA Consumer Identity Protection RSA Lead e-security RSA Seamless Solutions RSA Path to the Future Siemens Siemens Business Services Siemens Research and Development Siemens Information and Communication Networks Siemens Information and Communication Mobile Group Soundex System Spotngo Tri-Sector Technologies Group UTStarcom UTStarcom Third Quarter 2004 Revenue Key UTStarcom Customer Wins UTStarcom Global Technology UTStarcom Sarbanes-Oxley Visual Analytics 5-177

13 List of Tables and Figures IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT EXECUTIVE SUMMARY Table ES-1 IBM DB2 Anonymous Resolution Algorithm Methodology Functions Table ES-2 Identity Resolution, Identity Authentication, and Identity Management Market Driving Forces Table ES-3 Identity Resolution, Identity Authentication, and Identity Management Product Benefits Table ES-4 Worldwide Enterprise and Carrier AAA Radius Server License Shipments Market Shares, Dollars, 2004 Table ES-5 Worldwide Enterprise and Carrier AAA Radius Server License Shipments Market Shares, Dollars, 2005 Table ES-6 Worldwide Identity Resolution Market Forecasts, Software License and Service/Maintenance, Units and Dollars, Table ES-7 Worldwide Identity Management Token Architecture Market Forecasts, Software License, Services, and Maintenance Dollars, Table ES-8 Worldwide Identity and Access Management Market Forecasts, Software License and Service/Maintenance, Units and Dollars, ES-3 ES-7 ES-9 ES-10 ES-11 ES-12 ES-13 ES-13 INTERNET SECURITY MARKET DESCRIPTION Table Internet Security Market Segments Table Internet Security Market Aspects Table Defense Strategies for Application-Level Security Table Network Identity Security Issues Table Security System Aspects Table Use Of Internet Security Table Industries Using Internet Security Table Information Access To Create A Service Table Services Oriented Architecture To Achieve Flexible Infrastructure Table Services Oriented Architecture Line Of Business Positioning Table Services Oriented Architecture Business Process Efficiency

14 Table Services Oriented Architecture Business Process Challenges Table Services Oriented Architecture Business Process Risk Management Table Services Oriented Architecture Business Process Improvements Figure EAI Infrastructure Architecture Forecast Figure Layers of Application Integration Table Layers of Application Integration Table Application Integration Engines Figure Layers Of Network Security Software Table Security technologies Table Web Services Back End Functionality Support Table Benefits Of Business Process Management Products Table Web-Based Transaction Service Requirements Table Supply Chain Exchanges Table Critical Network Security Needs Table Types Of Telecommuting Access Needing Internet Security Table Networks Requiring Security Table Domains Of Network Security Table Logged Session Activity Viewing Points Table Organizational Challenges In The Context Of Security IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT MARKET SHARES AND MARKET FORECASTS Table Identity Resolution, Identity Authentication, and Identity Management Market Driving Forces Table Identity Resolution, Identity Authentication, and Identity Management Product Benefits Figure Worldwide Enterprise and Carrier AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Table Worldwide Enterprise and Carrier AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Enterprise and Carrier AAA Radius Server License Shipments, Market Shares, Dollars, 2005

15 Table Worldwide Enterprise and Carrier AAA Radius Server License Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Resolution Market Forecasts, Software License and Service/Maintenance, Units and Dollars, Table Worldwide Identity Management Token Architecture Market Forecasts, Software License, Services, and Maintenance Dollars, Table Worldwide Identity and Access Management Market Forecasts, Software License and Service/Maintenance, Units and Dollars, Figure Worldwide Identity and Access Management Market Forecasts, Software License and Service/Maintenance, Units and Dollars, Figure Worldwide Identity and Access Management Server License Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity and Access Management Server License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity and Access Management Server License Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity and Access Management Server License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Single Sign On Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Single Sign On Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Single Sign On Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Single Sign On Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Token Identity Authentication License Shipments, Market Shares, Dollars, 2004 Table Worldwide Token Identity Authentication License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Token Identity Authentication License Shipments, Market Shares, Dollars, 2005 Table Worldwide Token Identity Authentication License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Token Identity Authentication Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Token Identity Authentication Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Token Identity Authentication Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Token Identity Authentication Maintenance and Services Shipments, Market Shares, Dollars, 2005

16 Figure Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Identity Directory Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Directory Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Directory Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Directory Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Enterprise AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Table Worldwide Enterprise AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Enterprise AAA Radius Server License Shipments, Market Shares, Dollars, 2005 Table Worldwide Enterprise AAA Radius Server License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Enterprise AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Enterprise AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Enterprise AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Enterprise AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Carrier Service Provider AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Table Worldwide Carrier Service Provider AAA Radius Server License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Carrier Service Provider AAA Radius Server License Shipments, Market Shares, Dollars, 2005 Table Worldwide Carrier Service Provider AAA Radius Server License Shipments, Market Shares, Dollars, 2005

17 Figure Worldwide Carrier Service Provider AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Carrier Service Provider AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Carrier Service Provider AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Carrier Service Provider AAA Radius Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Identity Resolution License Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Resolution License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Resolution License Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Resolution License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Identity Resolution Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Resolution Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Resolution Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Resolution Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Directory License Shipments, Market Shares, Dollars, 2005 Figure Worldwide Identity Directory Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Identity Directory Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Identity Directory Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Identity Directory Maintenance and Services Shipments, Market Shares, Dollars, 2005 Figure Worldwide Federated Identity Management Server License Shipments, Market Shares, Dollars, 2004 Table Worldwide Federated Identity Management Server License Shipments, Market Shares, Dollars, 2004 Figure Worldwide Federated Identity Management Server License Shipments, Market Shares, Dollars, 2005 Table Worldwide Federated Identity Management Server License Shipments, Market Shares, Dollars, 2005

18 Figure Worldwide Federated Identity Management Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Table Worldwide Federated Identity Management Server Maintenance and Services Shipments, Market Shares, Dollars, 2004 Figure Worldwide Federated Identity Management Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Worldwide Federated Identity Management Server Maintenance and Services Shipments, Market Shares, Dollars, 2005 Table Identity Middleware Aspects: Table Variability Found In Identity Data Table Benefits of Anonymous Resolution Table Identity Management Competitive Intelligence Issues Table Risk potential Table CA's etrust Identity and Access Management Suite Functions IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT PRODUCT DESCRIPTION Table Computer Associates Products Table Identity and Access Management Critical Components Table etrust Access Control Features Table etrust Table ETrust Identity and Access Management Features Table etrust Identity and Access Management Suite Solutions Table CA s e-trust Identity and Access Management Suite Table Identity Manager Features Table IBM DB2 Entity Analytic Solutions (EAS) Benefits Table IBM DB2 EAS Middleware Portfolio Target Markets Table IBM DB2 EAS Middleware Portfolio Functions Table IBM DB2 EAS Products

19 Table IBM DB2 Entity Analytic Anonymous Resolution Solution Functions Table IBM DB2 Anonymous Resolution Features Table IBM DB2 Anonymous Resolution Entity Analytic Solutions Aspects Table Main Components To The IBM DB2 Anonymous Resolution Solution Table IBM DB2 Anonymous Resolution Algorithm Methodology Functions Table IBM DB2 Anonymous Resolution Technology Target Markets Table IBM DB2 Anonymous Resolution Functions Table IBM DB2 Anonymous Identity Resolution Component Characteristics Table IBM DB2 Anonymous Identity Resolution Data Format Characteristics Table IBM DB2 Anonymizer requirements Table IBM DB2 Resolver requirements Table IBM DB2 Anonymous Resolution Platforms Table IBM DB2 Entity Analytics Support Table Language Analysis Systems Target Markets Table Language Analysis Systems Intelligence Community Target Markets Table Language Analysis Systems Benefits Table Language Analysis Systems Multiple Cultural Capabilities Table Factor3 Critical Issues Addressed Table Factor3 F3BAM Target Market Positioning Table IBM Tivoli Federated Identity Manager Key Aspects Table IBM Service-Oriented Architecture (SOA) Environment Identity Management Functions Table IBM Service-Oriented Architecture (SOA) Environment Identity Management Benefits Table IBM Service-Oriented Architecture (SOA) Environment Identity Management Features Table IBM Tivoli Federated Identity Manager User Identification Lifecycle Management Benefits Table IBM Tivoli Federated Identity Manager User Identification Lifecycle Management Services Table RSA Security Two-Factor Authentication Functions

20 Table RSA Authentication Manager Software Features Table RSA SecurID Authentication Manager Software Benefits Table Primary/Replica Configuration Of RSA Authentication Manager Software Enables Users To Authenticate To Multiple Servers Table RSA Xellerate Identity Manager Benefits Table RSA Security range enterprise networks for user authentication Table Funk Software Steel-Belted Radius Solution Network Functions Table Funk Software Steel-Belted Radius Functions Table Funk Software Steel-Belted Radius Features Table Funk Software Steel-Belted Radius Functions Table Interlink AAA RADIUS Server Functions Table Interlink RAD-Series Features Table Interlink RAD-Series Benefits Table Interlink RAD-Series Advanced Control Flexibility Table Lucent Security Software Benefits Table Lucent NavisRadius Authentication Server for Service Providers Target Markets Table Lucent NavisRadius Licensing Options Table Lucent NavisRadius Value Description Table Lucent NavisRadius Features Table Alcatel Radius Server Key Benefits Table Siemens Wireless Portfolio (WLAN) Radius Server Functions Table Bridgewater Product Suite Table Alepo RADIUS Billing Solutions Services Supported Table Alepo Radius billing RADIUS RFCs Compliance Table Microsoft Internet Authentication Service IAS Features Table Microsoft Internet Authentication Service IAS Supported Authentication Methods

21 IDENTITY TECHNOLOGY BY INDUSTRY Table IBM DB2 Federal Government Anonymous Resolution Sharing Locations Table LAS Intelligence Identity Processing Benefits Table LAS Law Enforcement Systems Key Benefits Table Precision Name Recognition Mapping Table LAS Precision Name Recognition For Homeland Security Features Table Corporate Uses Of Personal Names Table Corporate Personal Name Tracking Benefits Table LAS Name Matching Technology In Financial Institutions Table LAS Financial Institution Name Matching Benefits Table Office of Foreign Assets Control (OFAC) regulations risks IDENTITY RESOLUTION, IDENTITY AUTHENTICATION, AND IDENTITY MANAGEMENT COMPANY PROFILES Table ActivCard Principal Competitors Table Alcatel Market Issues Table Alcatel Positioning To Address Carrier Issues Table Alcatel Strategic Network Focus Table Alcatel Data Networks Positioning Table Alcatel Metro DWDM Positioning Table Alcatel Terrestrial Optical Networking Strategy Table Alepo RBS Advantages Table Beta Systems Product Positioning Table Bluesocket Wireless LAN Gateway Functions Table Cisco / Linksys Business Use Of Products To Enhance Productivity Table Funk Software Radius/AAA Products For Remote And WLAN User Management Components Table Funk Software Complete Suite Of Radius/AAA Solutions For Carriers And ISPs

22 Table Ascential Software Enterprise Data Integration Software Functions Table IBM RFID Business Operations Table IBM / Sony / Toshiba Cell Functions Table Intel Wireless Hotspot Installations Table Nortel Voice Over IP Benefits Table Nortel Voice Over IP VoIP Technologies Table Nortel Voice Over IP Benefits Table Novell Identity Management And Web Services Solutions Table Tri-Sector Technologies Group Communications Solutions

23 ABOUT THE COMPANY WINTERGREEN RESEARCH, HAS A UNIQUE RESEARCH STRATEGY THAT RELATES TO IDENTIFYING MARKET TRENDS THROUGH READING AND INTERVIEWING OPINION LEADERS. BY READING THE ELECTRONIC EQUIVALENT OF 40 FEET OF PAPER, WINTERGREEN RESEARCH SENIOR ANALYSTS CAN LEARN A LOT MORE ABOUT MARKETS, A LOT FASTER THAN CAN BE LEARNED THROUGH EXPENSIVE SURVEYS AND FOCUS GROUPS. THINKING ABOUT MARKET TRENDS IS A HIGH PRIORITY AT WINTERGREEN RESEARCH. AS WITH ALL RESEARCH, THE VALUE PROPOSITION FOR COMPETITIVE ANALYSIS COMES FROM INTELLECTUAL INPUT. IT IS A LUXURY REALLY, AVAILABLE TO ONLY A VERY FEW PEOPLE, TO BE ABLE TO GATHER INFORMATION, LOTS OF INFORMATION FROM READING MASSIVE AMOUNTS OF CONTENT, AND THEN TRYING TO MAKE SENSE OF THAT CONTENT. THE ABILITY TO THINK ABOUT MARKET TRENDS IS ENHANCED BY DOING IT OVER AND OVER FOR MANY DIFFERENT MARKETS. THAT IS WHAT WINTERGREEN RESEARCH IS ALL ABOUT: READING AND THINKING IS AN ESSENTIAL ASP ECT OF COMPETITIVE ANALYSIS. TALKING TO OPINION LEADERS IS THE THIRD ESSENTIAL ASPECT OF PRODUCING GOOD, RELIABLE DATA. WINTERGREEN RESEARCH, FOUNDED IN 1985, PROVIDES STRATEGIC MARKET ASSESSMENTS IN TELECOMMUNICATIONS, COMMUNICATIONS EQUIPMENT, HEALTH CARE, INTERNET AND ADVANCED COMPUTER TECHNOLOGY. INDUSTRY REPORTS FOCUS ON OPPORTUNITIES THAT EXPAND EXISTING MARKETS OR DEVELOP MAJOR NEW MARKETS. THE REPORTS ASSESS NEW PRODUCT AND SERVICE POSITIONING STRATEGIES, NEW AND EVOLVING TECHNOLOGIES, AND TECHNOLOGICAL IMPACT ON PRODUCTS, SERVICES, AND MARKETS. MARKET SHARES ARE PROVIDED. LEADING MARKET PARTICIPANTS ARE PROFILED, AND THEIR MARKETING STRATEGIES, ACQUISITIONS, AND STRATEGIC ALLIANCES ARE DISCUSSED. THE PRINCIPALS OF WINTERGREEN RESEARCH HAVE BEEN INVOLVED IN ANALYSIS AND FORECASTING OF INTERNATIONAL BUSINESS OPPORTUNITIES IN TELECOMMUNICATIONS AND ADVANCED COMPUTER TECHNOLOGY MARKETS FOR OVER 30 YEARS.

24 ABOUT THE PRINCIPAL AUTHORS ELLEN T. CURTISS, TECHNICAL DIRECTOR, CO-FOUNDER OF WINTERGREEN RESEARCH, CONDUCTS STRATEGIC AND MARKET ASSESSMENTS IN TECHNOLOGY-BASED INDUSTRIES. PREVIOUSLY SHE WAS A MEMBER OF THE STAFF OF ARTHUR D. LITTLE, INC., FOR 23 YEARS, MOST RECENTLY AS VICE PRESIDENT OF ARTHUR D. LITTLE DECISION RESOURCES, SPECIALIZING IN STRATEGIC PLANNING AND MARKET DEVELOPMENT SERVICES. SHE IS A GRADUATE OF BOSTON UNIVERSITY AND THE PROGRAM FOR MANAGEMENT DEVELOPMENT AT HARVARD GRADUATE SCHOOL OF BUSINESS ADMINISTRATION. SHE IS THE AUTHOR OF RECENT STUDIES ON WORLDWIDE TELECOMMUNICATIONS MARKETS, THE TOP TEN INTERNET EQUIPMENT COMPANIES, THE TOP TEN CONTRACT MANUFACTURING COMPANIES, AND THE TOP TEN TELECOMMUNICATIONS MARKET ANALYSIS AND FORECASTS. SUSAN EUSTIS, PRESIDENT, CO-FOUNDER OF WINTERGREEN RESEARCH, HAS DONE RESEARCH IN COMMUNICATIONS AND COMPUTER MARKETS AND APPLICATIONS. SHE HOLDS SEVERAL PATENTS IN MICROCOMPUTING AND PARALLEL PROCESSING. SHE HAS THE ORIGINAL PATENTS IN ELECTRONIC VOTING MACHINES. SHE HAS NEW PATENT APPLICATIONS IN FORMAT VARYING, MULITPROCESSING, AND ELECTRONIC VOTING. SHE IS THE AUTHOR OF RECENT STUDIES OF THE REGIONAL BELL OPERATING COMPANIES' MARKETING STRATEGIES, INTERNET EQUIPMENT, BIOMETRICS, A STUDY OF INTERNET EQUIPMENT, WORLDWIDE TELECOMMUNICATIONS EQUIPMENT, TOP TEN TELECOMMUNICATIONS, DIGITAL LOOP CARRIER, WEB HOSTING, WEB SERVICES, AND APPLICATION INTEGRATION MARKETS. MS. EUSTIS IS A GRADUATE OF BARNARD COLLEGE.

25 Return To: ORDER FORM WinterGreen Research, Inc. 6 Raymond Street Lexington, MA USA Phone: (781) Fax: (781) or (781) PLEASE ENTER MY ORDER FOR: Identity Resolution, Identity Authentication, and Identity Management Market Opportunities, Strategies, and Forecasts ALL REPORTS ARE AVAILABLE IN EITHER PRINT OR PDF- PDF PRINT ENCLOSED IS MY CHECK FOR $2,800 FOR SINGLE COPY, $3,800 FOR WEB SITE POSTING PLEASE BILL MY COMPANY USING P.O. NUMBER PLEASE CHARGE MY MASTERCARD/VISA/AMERICAN EXPRESS CARD NUMBER EXP. DATE If charging to a Credit card you may the order form, but not the card information Fax or Call with credit card information - Do not send card number as - You may send the order as ADDITIONAL $375 (EXTRA COPY PRICE IN EFFECT ONLY WITH INITIAL ORDER) NAME TITLE SIGNATURE COMPANY DIVISION ADDRESS CITY STATE / ZIP TELEPHONE FAX PLEASE NOTE: RESIDENTS OF MASSACHUSETTS AND CONNECTICUT MUST INCLUDE APPROPRIATE SALES TAX SUBSCRIBERS OUTSIDE THE UNITED STATES MUST PROVIDE PREPAYMENT IN U.S. FUNDS