Published: 02 November 2022
Summary
AM tools are critical for a zero-trust approach to IAM as they act as a centralized policy engine, the collector of data and the enforcer of runtime access through adaptive access controls. SRM leaders focused on IAM can use this research to compare the effectiveness of prominent AM tools.
Included in Full Research
Overview
Key Findings
Access management (AM) tools continue to add adjacent IAM functions, especially identity governance and administration (IGA) functions, through acquisitions or organic development to strengthen their position as converged IAM platforms.
An AM tool must provide responsive and always-available runtime access to target applications/services, therefore high availability, effective resiliency and dynamic scalability of AM services are key selection criteria.
With internal (B2E) AM use cases becoming mainstream and commoditized, most of AM vendors’ growth is coming from addressing their customers’ requirements for external AM use cases, specifically B2C, B2B and government-to-constituent (G2C).
Customer interest in low-code/no-code approaches offered by AM tools for
Clients can log in to view the entire
document.
- CyberArk
- ForgeRock
- IBM
- Micro Focus
- Microsoft
- Okta
- Okta (Auth0)
- One Identity (OneLogin)
- Oracle
- Ping Identity
- Directory Services
- Internal Access Administration
- Authorization and Adaptive Access
- SSO and Session Management
- User Authentication
- External Access Administration
- Developer Tools
- API Access Control
- Standard Application Enablement
- Nonstandard Application Enablement
- Analytics and Reporting
- Ease of Deployment
- Security and Resilience
- Internal Access Management
- External Access Management
- Application Development
Gartner Recommended Reading
Note 1: Continuous Adaptive Trust (CAT)
Critical Capabilities Methodology