We track a range of established and emerging vendors in the global identity and access management ecosystem. Established vendors provide us with meta-knowledge regarding market dynamics, funding, customer budget maturity and stable use cases.  We also track more emerging technologies that relate to IAM in order to identify innovation at the edge of the ecosystem. 

 Perhaps trendy, perhaps a trend – but by monitoring specialist use cases and new vendors, a general picture of momentum can be created. 

We also track a range of other vendors in orthogonal technology areas such as data security , ICS/OT and IoT  that have a specific focus on IAM.

Capability Matrix

We tag over 120 vendors based on the identity types they cater towards, the stakeholders they target and the features they offer. This allows a fine grained way of understanding new and incumbent suppliers.

established iam specialists

Vendors are specialist providers of IAM, PAM or IGA capabilities and have typically operated for more than 7 years and have 500 or more staff.

established non-iam specialists

Vendors that are established at delivering functions for data security, networking or infrastructure with some emerging IAM capabilities.

IGA and Permissions management

Identity Governance and Administration capabilities focused on access request, access review, permissions management, hygiene and analytics.

authorization and access control

Cloud or hybrid providers of policy decision point and policy enforcement capabilities for a range of protected assets from APIs to data.

iam for
software

Emerging sector for the naming. authentication and access control for non-human identities, workloads and services.

emerging
platforms

Vendors improving existing end to end and platform ways of delivering B2E identity and access management

B2C
CIAM

Emerging vendors looking at external B2C customer, consumer and citizen based identity and access management looking to fuse privacy, security and user experience.

software authentication

Specialists delivering converged authentication, MFA, biometric, passwordless and potentially identity verification services via software.

identity threat detection & response

Providing identity security posture management, hygiene and runtime behaviour analytics for all identity services.

iam
resilience

Providing specialist capabilities that allows for the cross-function high availability and fail over of key identity services.

iam for infrastructure

Authentication, access control and governance in a specialist field of cloud-centric infrastructure and computing services

Our IAM Industry Capability Matrix Report

A regularly updated list of over 120 vendors providing identity and access management and identity security capabilities for B2E, B2C, NHI, Agentic-AI ecosystems.

Vendors Missing? Get in Touch

Download the Latest Report Below