About This Report
Executive Summary
The Observatory Report
Contact Us
Key Terms
About ETR
See More Observatory Reports
Download Report PDF
Thank you for your interest in this ETR Observatory. Please share a little info then click the button below.
View and download PDF

Identity and Access Management Tools

Mission Critical Identity Security is Progressing and Consolidating All at Once

About This Report
Executive Summary
The Observatory Scope
Contact Us
Key Terms
About ETR
See More Observatory Reports
View and download report PDF

about this report

24-minute read • Based on data collected January 2024
This Observatory features the most comprehensive and current evaluator data and feedback about the Identity and Access Management marketplace. In addition to relying upon ETR’s industry-leading evaluation and spending intentions data, this report also leverages ETR’s proprietary data set: the ETR Market Array. The ETR Market Array for Identity and Access Management (IAM) study was designed specifically to capture usage and evaluation metrics across a wide swath of security professionals representing the end user and evaluator buying demographic. The study offers data and analysis around spending trends, usage, return on investment (ROI), churn, product feature rankings, Net Promoter Scores (NPS), and more for the IAM players encompassed in this Observatory. This report utilizes some of that market intelligence data; however, the full IAM Market Array study is available separately. While structuring a grouping of disparate vendors with varying functionalities is subjective, the ETR Observatory for IAM vendors categorizes the vendor group in two ways. Primarily, we break down the data-driven plotting of each vendor into our four Observatory Scope vectors. In addition, we highlight the vendors by what is viewed as their core feature set while acknowledging that all these vendors offer multiple functionalities, and the categorization may not appease all definitions. It is important to remind our readers that all of ETR’s Observatory reports are based solely on evaluator data and feedback, not vendor involvement. This Observatory report examines a selection of Identity Management vendors by triangulating data from ETR’s Technology Spending Intentions Survey (TSIS), Emerging Technology Survey (ETS), commentary from ETR Insights Interviews with IT decision makers (ITDMs) from the ETR Community, and industry analysis by our research staff. TSIS data measures spending velocity on a vendor or product based on ETR’s proprietary Net Score and Pervasion measures. ETR Insights interviews provide qualitative context and vendor evaluation to complement the data. This report focuses on the following vendors: 1Password | Cisco (Duo) | CyberArk | ForgeRock | IBM | JumpCloud | Microsoft Entra ID | Okta | OneLogin | Oracle | Ping Identity | RSA | SailPoint | Saviynt | Thales (Imperva)
Figure 1. Positioning for the ETR Observatory for IAM was determined purely by ETR’s surveys, powered by the ETR Community. The full methodology and graphic explanation are available on our About the ETR Observatory page.

Executive Summary

Identity and access management (IAM) is not a singular technology or tool. It is more a framework of business processes and cybersecurity practices that aims to safeguard an organization's data, assets, and resources by permitting only authorized users and identities to access them. IAM plays a critical role in an organization's security architecture by controlling who and what can access its assets. This process helps to verify user identities before granting them access to workplace systems and information, thereby preventing fraud and infiltration by unauthorized parties. IAM is not limited to internal use by employees, machines, and authorized third parties, but it also extends to external-facing customers, adding to the complexity and importance. At its core, IAM involves multiple components that ensure secure access to systems and information. This includes identifying individuals, understanding the distinction between identity management and authentication, assigning roles to individuals and devices, updating those roles and access levels, and safeguarding sensitive data as well as the systems itself.
This security field can be quite intricate, particularly regarding the various attributes and distinctions between identity and governance access vendors. The vendors that compete in this space offer an array of features such as multi-factor authentication (MFA), single sign-on (SSO), privileged access management (PAM), Identity Directory, out-of-the-box API integrations with essential applications, password management, governance and lifecycle management, and more. Despite the already broad range of functionality and use cases, IAM solutions continue to evolve to accommodate cloud-native and complex hybrid environments, as well as a growing embrace of a zero-trust-based philosophy. Even more progressive features of generative AI, blockchain ledgers, and behavioral and biometric authentication will continue to push this dynamic marketplace in the future.
All of the vendors included in this report support and play a role in these different components of the IAM framework, including many more that were not included. As technologies continue to advance, offerings expand, and vendors converge, the winner should be the enterprise end-users themselves, as more options beget a buyers’ market. In addition, the ripples from the latest Okta breach are still yet to reach many organizations, but when contract renewals come around, there will likely be more seats at the proof-of-concept table than there would have been previously. This is a dynamic marketplace that bears close monitoring over the next year.
This report will examine end-user and evaluator data and describe each vendor's different aspects amidst this backdrop of technological advancement, expanded offerings, and a potentially converging marketplace.
The Observatory Scope
The plotting of vendors across the Observatory Scope is supported wholly by ETR’s exclusive market intelligence and spending intentions data sets (see Figure 1). The Leading vector in this period was heavily populated and consisted of Microsoft Entra ID in dominant positioning with the highest overall Presence and Momentum in the survey set. Other vendors in the Leading vector include CyberArk, SailPoint, 1Password, Okta, and Cisco’s Duo.
The Advancing and Tracking vectors were less populated. IBM is the lone resident in the Advancing category due to elevated Momentum, with Ping Identity directly on the cusp due to higher-than-average Momentum. Occupying the Tracking vector are the well-established Oracle and RSA, where both vendors captured enough Presence in the Market Array survey to break into the vector despite holding lower-than-average Momentum.
In this ETR Observatory, numerous vendors, including Saviynt, OneLogin, Thales (Imperva), ForgeRock, and JumpCloud were plotted in the Pursuing vector based on relational plotting of the Momentum and Presence data versus the other vendors. This report will break down the four vectors and the vendors in more detail in the following sections.

Spending Intentions

Figure 2. ETR’s Market Array spending Net Score for IAM vendors was derived from a survey of 325 security-expert ITDMs. The necessary threshold for inclusion in this spending intention metric was a minimum of 5% direct customer representation of the total Market Array survey population.
In Figure 2 above, we exhibit the Market Array Net Score for select vendors within the IAM marketplace. This tracks the forward-looking spending trajectory for each vendor’s IAM-specific offerings and differs from ETR’s TSIS, which tracks overall spending projections at the company- and sector-wide levels. The data visualized in this figure will be referenced throughout this Observatory report.
Microsoft Entra ID leads with an extremely elevated 69% Net Score, driven by the highest level of Increase spend intent (65% of the vendor’s unique respondents) and the lowest indications of negative spend (3% Decrease and zero Replacement intent). CyberArk’s Net Score comes in second with an equally lofty 63%, driven by high levels of Increase spend intent and minimal negativity among its end-user respondents.
The pack of vendors resting in the upper half has spending scores tightly ranging from 53% to 50% and consists of (in order) OneLogin, 1Password, SailPoint, and Okta. From that group, SailPoint garnered the highest level of Adoption indications across the survey, with 13% of respondents identifying themselves as net new customers. On the other end of the spectrum, Okta captured one of the highest levels of Replacement indications among its representative customer base, 7% of 123 respondents. When isolated to Mid & Small customers in this spending metric, 1Password jumped to the third-highest Net Score due to zero negativity. 1Password also gathered the largest representation of customers among the Mid & Small respondents. Okta also captured a sizeable number of customer respondents in this demographic, where Replacement indications nearly doubled from its total respondent base from 7% to 13%.
ETR Data: Despite the higher relative levels of Replacement indications seen for Okta in this Market Array data set, the vendor was strongly positioned in our proprietary Churn metric, where Okta had the third-lowest Churn expectation with 58% of the end-user representation anticipating using Okta’s products for at least three years or more. See the full Market Array survey for this Churn data across all included vendors.
The next tranche in spending intent comes from the mature and deeply entrenched pairing of IBM and Cisco (Duo), which captured Net Scores of 40% and 39%, respectively. Comparing the two, Cisco captured more Presence (total customer representation of the survey sample) than IBM, but IBM garnered more Adoption indications, whereas Cisco saw more Increased spend intent and zero Replacement indications among its customers. Cisco was one of only three vendors in this metric to see no Replacement intent, along with Microsoft Entra ID and CyberArk.
Rounding out the Net Score spending metric, Ping Identity held a positive 30% score with a 10% Adoption rate versus only a 3% Replacement rate. Thales, Oracle, and Imperva were the lower three on a relative basis, however all held positive Net Scores, which is in and of itself a telling data point for how healthy and critical identity access is for enterprise security end users. In order, Thales, Oracle, and RSA held 27%, 23%, and 20% Net Scores. Each vendor saw the highest relative level of Flat spend indications among this survey sample base, with 60% of their end-user representation citing flat spending levels over the next 12 months.
I. Leading Vector: Microsoft Entra ID, CyberArk, SailPoint, 1Password, Okta, Cisco (Duo)
As seen in Figure 1, the Leading vendors captured the highest overall Momentum and Presence within ETR’s Market Array survey for IAM tools. Microsoft Entra ID had the highest overall Momentum and Presence. It is to be expected that Microsoft Entra ID would have a strong Presence, given the technology giant’s bundled licensing strategy. As one ITDM stated in a recent ETR Insights 2024 Top Trends interview, “We're heavy users of Microsoft 365 and we're using Entra. Probably like a lot of companies with a deep investment in Microsoft, you use it because it comes free, to a degree, or it's bundled with the product.”
Microsoft Entra ID, which evolved from Azure Active Directory, is now a fully comprehensive cloud IAM solution with robust functionality. Better stated by one end-user, “I would like to mention that Microsoft Entra, formerly Azure Active Directory, will get more traction. The reason is they're going to have information around privilege, identity management, MFA, SSO, and identity protection, all bundled together in one. Then they have everything where we can look at external identities, the HR system back again, in terms of that former use case. And then afterwards, we can look at on-premises as well as self-service apps.”
Following in Microsoft’s massive wake, CyberArk had the next-highest Momentum, with SailPoint, 1Password, and Okta all relatively in line, and then Cisco (Duo). In overall Presence, Okta and Cisco (Duo) came in second and third, followed closely by 1Password and rounded out by CyberArk and then SailPoint, whose Presence was just enough to break out of the Advancing vector and into the Leading category.
Often labeled one of the best-in-breed tools in this space, Okta’s end user and evaluator data appear to remain resilient in the face of multiple high-profile security breaches; however, the longer-term trend line in ETR’s core TSIS spending data is decidedly declining, and higher than historically seen levels of Replacement indications are present in this Market Array study. One reason for the company’s strong market position is the Okta Integration Network (OIN), which offers thousands of pre-built integrations with various cloud, mobile, and web applications and has been central to the vendor’s appeal from the beginning. What originated mainly for MFA and SSO with excellent integration capability has since widened into a full array of offerings within the wider identity space. In addition, Okta’s 2021 acquisition of Auth0 added prowess and clout among developers by enhancing the customization and flexibility of the tool. Lastly, its cloud-native nature allows it to scale effectively with an organization's growth.
The ETR Insights library is packed with end-user commentary and feedback on Okta, but here, we will just share two snippets: “Okta was nimble enough to integrate our existing Active Directory service that we had (which was server-based at the time) and move to Azure technologies, so we could implement that and a bunch of smaller tools we still had and make those all come together. We needed somebody who could bring in even those mom-and-pop technologies and make it all work, and Okta did that for us. I was very pleased with the result.” However, several other end-users have expressed varying levels of concern around a perceived lack of innovation and maturity in their security hygiene, expressed as such: “I don't want to say that Okta stopped innovating at the pace they once did, but they don't have the secret special sauce anymore that somebody else can't replicate. … I continue to challenge Okta on the level of adequate monitoring, alerting, or playbooks. I found their response and the forensics accounting a bit lackluster and surface level.
ETR Data: In the most recent JAN24 TSIS data, Okta and Auth0’s combined spending intentions remain healthy on an absolute basis and remain in the top 10 ranking within the Information Security sector among vendors with 100 or more citations. However, spending trajectory has trended lower, reaching an all-time low of 35%, driven by the highest levels of Replacement and the lowest level of Adoption indications captured in four years (N= 459). ETR members can see Okta’s most recent JAN24 TSIS data on our research platform and review an Insights Security Panel on the subject in this summary or replay.
CyberArk is highlighted as having the second highest Momentum and Market Array Net Score within the identity marketplace for this survey. Although widely known for PAM, the vendor offers functionalities and services across the identity, access, and governance triumvirate, including MFA, SSO, password and key management, and anomaly detection. End users see a consolidation trend emerging in what many of these companies offer, as exemplified by this ITDM observing, “Even within privileged account management, all of these companies come at it in very different ways. We've looked at CyberArk and other players. They all play in the same space but come at it from different angles. … I see consolidation coming in the identity and access management areas, with what Okta and Auth0 is doing, or SailPoint and CyberArk in combining with your privileged access management and identity governance components, or even with what HashiCorp Vault is delivering.” As mentioned in that commentary, SailPoint is another vendor who is best known for identity governance and lifecycle management but also is blending into more traditional aspects of identity and password-less management, and, like so many other vendors in this marketplace, beginning to boast of AI functionality driving its roadmap.
The prior vendor breakdown section also illustrated the strong spending Momentum across the Leading vendors; however, the solid footing of this group is further supported in the Market Array’s Usage growth metric, where Microsoft Entra ID, CyberArk, Okta, SailPoint, and 1Password (in order) lead all vendors in overall usage growth within their respective organizations. While Microsoft’s ubiquitous hold across the enterprise might take some surprise away from its leading spot, 68% and 64% of CyberArk and Okta customer representatives, respectively, citing intent to increase their usage of these products is certainly an auspicious forward-looking data point for these two companies (see the full Market Array survey on the ETR research platform for this Usage data across all included vendors).

Return on Investment

Figure 3. This chart visualizes the Market Array data for return on investment (ROI) expectations from ITDM evaluators. Only respondents who have recently evaluated the specific IAM tool were tabulated in this analysis.
While Microsoft also led all IAM vendors with the lowest expected Churn rates in this Market Array period, it was 1Password that was the leading vendor in expected return on investment (ROI). In Figure 3 above, 1Password captured a 67% ROI score, besting both Microsoft Entra ID and Okta’s ~58% scores. Among Leading vector names, Cisco (Duo) and CyberArk stood out strongly in this evaluation metric. The private company JumpCloud also had a strong debut showing here, with an elevated and healthy ROI score of 47% and with 65% of its respondents citing a positive ROI expectation.
With a long history and well-earned reputation in networking, Cisco parlayed its strong enterprise foothold into the security realm initially through firewalls but has since spread into all facets of information security through both acquisitions and internal R&D. In the IAM space, the acquisition and integration of Duo garnered instant credibility across a large customer base. Today, Cisco Duo combines its core identity services, like MFA, with its networking prowess to offer lateral zero-trust practices, user behavior analytics, and anomaly detection across both on-premises and cloud environments. In an ETR Insights interview from last year, one CISO and Duo user expressed satisfaction with the product, stating, “We like Duo. We use their product for multifactor authorization and we’re happy with it, so we'll probably continue down that path.
II. Advancing and Tracking Vectors: IBM, Oracle, and RSA
The trio comprising the Advancing and Tracking Vectors are the elder statesmen of this vendor grouping. While very few companies can boast of longevity like IBM, first iterated under a different moniker in 1911, Oracle and RSA have been around since the late 1970s and early 1980s, respectively. This duration led to wide entrenchment, which pushed both Oracle and RSA into the Tracking vectors due to higher-than-average Presence within the survey sample; however, each had lower-than-average Momentum relative to peers.
Of these three vendors, IBM was the only IAM vendor to land within the Advancing vector (although Ping Identity was extremely close). Referencing back to Figure 2, IBM’s Market Array Net Score was firmly positioned in the middle of the pack with a 40% score based on 48% of their respondents citing a positive intent (Adopt + Increase) versus only 8% negativity (Replace + Decrease). Meanwhile, Oracle and RSA also held positive spending intent scores at 23% and 20%, respectively, but trailed all other IAM peers within the survey universe. Of the three, RSA garnered more total end-user representation amongst the survey sample.
These vendors also stood out in the Product Strengths analysis, where evaluators ranked each listed tool by various attributes. As shown in Figure 4 below, RSA, IBM, and Oracle ranked in the top echelon for their account representatives. This evaluation data can be viewed and sorted by feature set strength or by individual product in the full Market Array data set.

Product Evaluation

Figure 4. ETR’s Market Array tracks Product Strength data across all listed attributes and by individual vendor
IBM’s approach to identity solutions leans heavily around the governance aspect for both the internal workforce and customers, with a strong emphasis on digital identity governance and PAM in its solutions. Oracle also provides critical functionality such as SSO and MFA, but also adds directory integration and strong governance services such as user lifecycle management and role-based and privileged access.
Meanwhile, RSA is a bit of an outlier among this vendor cohort in that the company’s approach is based on its proprietary encryption technologies, including the RSA algorithm, which is a cornerstone of modern cryptographic security, as well as the use of physical tokens designed to minimize the attack surface area. Besides offering a full slate of identity governance and lifecycle tools, RSA also offers consulting and remediation services related to information security.
Given its maturity, RSA might not often be viewed as a modern or cutting-edge company; however, many IT security professionals still rely on the technology, and others long to see a return to its underlying philosophy. In a recent ETR Insights panel, one CISO had this to say: “Right now, everybody loves single sign-on. Years ago, it was Juniper or RSA Networks for tokens, and I would love to see some of them revisit their older technology and bring it forward into today. Okta is kind of giving them another shot, and this is an opportunity where a lot of these older players can reinvent themselves. Some of the older companies like RSA should take that model and see what that looks like for single sign-on devices and metrics that can be utilized across modern platforms.
III. Pursuing Vector: Ping Identity, Saviynt, OneLogin, Thales (Imperva), ForgeRock, and JumpCloud
In this particular Market Array survey, the Pursuing and Leading vectors had an equal number (and majority) of vendor placements with six company products each. Within the Pursuing vector were two sub-groupings, with Ping Identity, Saviynt, and OneLogin all capturing healthy Momentum levels. Ping Identity, in particular, fell just shy of breaking into the Advancing vector. The remainder of the grouping included Thales (Imperva), ForgeRock, and JumpCloud, who captured a lower percentage of end-user representation among the survey sample in this iteration. Due to citation threshold minimums, these vendors' products were withheld from the spending intent and churn metrics; however, all the vendors captured higher levels of overall evaluator representation and saw strong data points within their respective Product Strength analysis.
As an example, JumpCloud captured the fourth-highest ROI score across all vendors and ranked high in the Product Strength analysis, with 62% of evaluators stating that the product “does everything I expect an Identity and Access Management tool to do” and “this product is easy to implement.” JumpCloud is unique in this classification of vendors in that the vendor is primarily a cloud-based directory service that provides centralized management of user identities and device configurations across various platforms and locations. Part of that feature set includes classic identity functionality, such as SSO, MFA, password management, and PAM. From an end-user perspective, ETR Insights has seen increasing commentary on the name, with promising traction developing, including this evaluation from one CISO, stating: “JumpCloud does your cloud directory, your LDAP, your SSO, it does your radius authentication. It is a one-stop shop for anything to do with your enterprise architecture. … JumpCloud does brilliant work. The primary reason for us to select JumpCloud was that it supports a hybrid or heterogeneous mode. We have a mix of Linux, Windows, and Mac. And these are not 2% or 5%, these are a good 10-20% mix. JumpCloud ensures that we have an overall authentication from one ID. Logging onto your Wi-Fi and logging into your VPN. Logging onto your mailing solutions. Anything on your cloud or SaaS. And on top of that, it gives you MFA authentication.” Another recent ITDM interview backed up that commentary, recalling a situation where he replaced Okta with JumpCloud due to his organization’s acquisition of two MacOS-heavy companies.

ForgeRock also captured high remarks for having an innovative technical roadmap. While Thales and Saviynt had lower overall representation in this survey period, they were still highly ranked for the amount of technical expertise available to support their respective products. ForgeRock, as a standalone company, was known for its wide range of services that were committed to open standards and emphasized flexibility and interoperability, but it is now part of the ongoing consolidation trend. As one ITDM explains, “Thoma Bravo is buying everything and creating this portfolio with Ping Identity and ForgeRock in the identity and access management space. I still see the IAM space up for consolidation from this perspective.

Vendor Position

Figure 5. The above depicts a data illustration from ETR’s January 2024 Technology Spending Intentions Survey (TSIS), showing spending Intentions Net Score and overall Pervasion within the Information Security sector for ForgeRock, Thales, and OneLogin.
Figure 5 above shows that based on ETR’s most recent JAN24 TSIS data, ForgeRock has the highest Net Score positioning of these three vendors, followed closely by Thales. Although none of the three vendors hold a high absolute Pervasion score, OneLogin does lead the three.
ETR Data: Saviynt is not included in ETR’s core Technology Spending Intentions Survey (TSIS) but is in our most recent Emerging Technology Survey (ETS) where we track private companies. Saviynt’s NOV23 Net Sentiment ranking is on the rise to nearly 17%, up substantially from prior year levels at 12%, due to more end users planning to evaluate the technology or to allocate further resources towards the product.
Lastly, Ping Identity came in higher than the mean among the Market Array Usage growth ranking with a 35.5% Usage score and was also listed as tied for fourth among the “most innovative” vendors in the write-in portion of the survey, trailing only Okta, Microsoft Entra ID, and Cisco (Duo).

Most Innovative

Figure 6. ETR’s Market Array tracks the “Most Desired” and “Most Innovative” vendors. The above depicts a small section of that graphic illustration. The full analysis is available via the Market Array data set.
Ping Identity barely missed breaking into the Advancing vector in this Markey Array survey iteration and, with even slightly more Momentum, would have easily landed in that category. The vendor was also very squarely positioned in overall Presence and could see itself landing within the Leading vector in future survey periods with a simultaneous bump in that metric. Historically, Ping Identity has focused on core MFA and SSO solutions but is keeping pace with the newer generation of players by embracing more of a zero-trust philosophy and proving its capabilities in hybrid and cloud-native environments at scale.
One ITDM praised Ping Identity’s expertise in his industry vertical, stating, “Okta is helping us with some of it, but we also have Ping Identity, who is the other strong man in the room. Ping allowed for MFA, similar to what Okta has, but the uniqueness that Ping brings to the table is they are already set up and very well-versed in aerospace and defense, government contracts, and things of that highly sensitive nature. So, by bringing Ping as the partner there, we didn't have to reinvent the wheel or figure things out. They already had that down pat and brought that with them.”


Mission-Critical Identity Security is Progressing and Consolidating All at Once
The broad, identity-related security marketplace is difficult to operantly define given the multitude of aspects it embraces. As seen in this ETR Observatory report, core features like MFA and SSO are table stakes, and directory integrations, lifecycle management, governance, and privileged access are all morphing together into a suite of security features and business processes that are mission-critical in today’s threat landscape. The industry and underlying technology are relentlessly advancing, adding in zero-trust philosophy, multi-environment support, and, of course, generative AI-fueled automation, detection, and remediation.
This progression is happening in tandem with a convergence of vendor functionality, and in this Observatory report, we see the dizzying plethora of tools and company offerings at play (admittedly, more could have been added, but they fall more directly into a core PAM offering such as BeyondTrust, Delinea, and HashiCorp, just to name a few – stay tuned for a future Market Array in this space). One aspect of convergence is coming from the vendors themselves expanding their offerings in an attempt to steal share in an ultra-competitive market, while yet another consolidating force comes from mergers and acquisitions, with the most recent and recognizable action from ThomaBravo’s plans to combine two strong players in Ping Identity and ForgeRock.
Yet another dynamic at play is the most recent Okta breach, which will test the market leader’s resilience yet again but, at a minimum, opens the door for expanded inclusion of vendor evaluation when renewal time comes around. With Microsoft dominating the enterprise ecosystem, tools like Entra ID could see even more Presence going forward; however, both SailPoint and CyberArk, which are already well-positioned for PAM and identity governance, will likely get an invite to the proof of concept (POC) round as they expand their functionality.
The entrenched players like Cisco and IBM have their sights set on more than simply maintaining share within their installed-base environments and will continue to push their ability to keep pace with innovation and compete with the more niche solutions in the market. Meanwhile, RSA’s token- and algorithm-based philosophy designed to minimize the attack surface might have been given a second chance among more modern CISOs with the recent rash of breaches. Lastly, do not sleep on the next generation of names, represented in this report by JumpCloud, although many more viable start-ups not included here are also vying for share.
As technologies continue to advance, offerings expand, and vendors converge, the winner should be the enterprise end-users themselves, as more options beget a buyers’ market. The ripples of the latest Okta breach are still yet to reach many organizations, but when the contract renewal comes around, there will likely be more seats at the POC table than there would have been previously. This is a dynamic marketplace that bears close monitoring over the next year.


Fill out the form below to get a downloadable PDF of this report.
View and download report
Press Need a quote, image, or additional information for an article, reach out to our press team at
Reprints If you would like permission to reprint this report or our ETR Observatory Scope graphic, please send your request to
ETR Insights Team Contact a member of our ETR Insights team to discuss all the details from this analysis or request custom research.
  • Erik Bradley, Chief Strategist & Research Director
  • Daren Brabham, PhD, VP Research Analyst
  • Jake Fabrizio, Principal Research Analyst

Key Terms

Emerging Technology Survey
The Emerging Technology Survey (ETS) is our quarterly survey of technology decision makers capturing the enterprise’s appetite for emerging technology vendors across the global market. Our surveys are standardized, multiple choice format.                         For each survey question, the technology decision maker will select one of the following answers:
  • Allocating further
  • Evaluated, plan to utilize
  • Currently evaluating
  • Plan to evaluate
  • Aware of, no plan to evaluate
  • Evaluated, no plan to utilize
  • Replaced or in containment
Net Score
Net Score represents the intensity of spend for a vendor.
  • Higher Net Scores = a positive spend trajectory
  • Lower Net Scores = a flat or negative spend trajectory
Pervasion represents how widely a vendor or product is utilized relative to a given sample.

Technology Spending Intentions Survey
The Technology Spending Intentions Survey (TSIS) is our quarterly survey (Jan, Apr, July, Oct) of technology decision makers capturing forward-looking spending intentions for enterprise technology vendors across the global market. Our surveys are standardized, multiple choice format.   For each survey question, the technology decision maker will select one of the following answers:
  • Adoption
  • Increase
  • Flat
  • Decrease
  • Replacing


Enterprise Technology Research (ETR) is a technology market research firm that leverages proprietary data from our targeted IT decision maker (ITDM) community to provide actionable insights about spending intentions and industry trends. With a mission to eliminate the need for opinions to fill the gaps in enterprise research, ETR provides comprehensive, quality data to inform all businesses every step of the way.
We use our three quarterly surveys (the Technology Spending Intentions Survey, the Emerging Technology Survey, and the Macro Views Survey) to collect data and insights directly from the ETR Community. This data and insights empower institutional investors, technology companies, and ITDMs to navigate the complex enterprise technology landscape. Our proprietary visualizations and models make it easy to mine insights from our data and unearth predictors of enterprise technology performance.
Beyond our core surveys, we also offer custom market research surveys. These can be commissioned with a targeted group of ITDMs and are guided by our expert content team to determine the best audience, topics, and questions. Additionally, the target group can not only be based on their organization size, sector, and title, but also on our proprietary research around a firm’s spending intentions and technology stack.
Discover what ETR can do for you at
This document was prepared by Aptiviti, Inc. (“Aptiviti”), the parent company that operates the Enterprise Technology Research or “ETR” business, and is intended only for the designated recipient(s). It may contain confidential or proprietary information and may be subject to confidentiality protections. Except as expressly stated in the Aptiviti, Inc./ETR Terms of Use (, (i) this document is provided “as is”, and Aptiviti makes no warranties, representations, or covenants, expressed or implied, regarding this document and its contents, (ii) Aptiviti expressly disclaims all warranties, representations, and covenants regarding this document and its contents, and (iii) your use of this document is at your own risk. In no event will Aptiviti be liable for any damages or other costs or fees incurred by you arising out of your use of, or your inability to use, this document, even if Aptiviti has been notified of the possibility of such damages or other costs or fees. If you received this document in error, please notify the sender and delete this document. Thank you.