We track a range of established and emerging vendors in the global identity and access management ecosystem. Established vendors provide us with meta-knowledge regarding market dynamics, funding, customer budget maturity and stable use cases. We also track more emerging technologies that relate to IAM in order to identify innovation at the edge of the ecosystem.
Perhaps trendy, perhaps a trend – but by monitoring specialist use cases and new vendors, a general picture of momentum can be created.
We also track a range of other vendors in orthogonal technology areas such as data security , ICS/OT and IoT that have a specific focus on IAM.
Category Descriptions
A look at how the market stabilises with respect to use cases, capabilities and features.
established iam specialists
Vendors are specialist providers of IAM, PAM or IGA capabilities and have typically operated for more than 7 years and have 500 or more staff.
established non-iam specialists
Vendors that are established at delivering functions for data security, networking or infrastructure with some emerging IAM capabilities.
IGA and Permissions management
Identity Governance and Administration capabilities focused on access request, access review, permissions management, hygiene and analytics.
authorization and access control
Cloud or hybrid providers of policy decision point and policy enforcement capabilities for a range of protected assets from APIs to data.
iam for
software
Emerging sector for the naming. authentication and access control for non-human identities, workloads and services.
emerging
platforms
Vendors improving existing end to end and platform ways of delivering B2E identity and access management
B2C
CIAM
Emerging vendors looking at external B2C customer, consumer and citizen based identity and access management looking to fuse privacy, security and user experience.
software authentication
Specialists delivering converged authentication, MFA, biometric, passwordless and potentially identity verification services via software.
identity threat detection & response
Providing identity security posture management, hygiene and runtime behaviour analytics for all identity services.
iam
resilience
Providing specialist capabilities that allows for the cross-function high availability and fail over of key identity services.
iam for infrastructure
Authentication, access control and governance in a specialist field of cloud-centric infrastructure and computing services