There are many access and identity management (IAM) solutions with some overlapping in adjacent areas. Gartner created the Buyer’s Guide for Access Management to help security leaders select a long-lasting, cost-efficient access management solution.
Gartner recommends these steps for access management (AM) buyers:
AM initiatives with an initial focus on only one population can be expensive or lack features when extended to another.
AM capabilities keep growing, overlapping and converging with adjacent identity and access management (IAM) and security markets, like user authentication, identity governance and administration (IGA) and API security. Such overlap complicates mapping the organization’s own IAM business requirements and use cases relevant to AM.
Recent AM technology buying initiatives have been driven by tactical needs,like securing remote access to employees, workforce collaboration and customer portals, leading to emergency investments and disproportionate spending.
In this report Gartner states, “According to a recent Gartner survey user authentication (including MFA) is the top IAM technology that clients want to purchase as a consolidated feature from a single security vendor (41%), followed by AM (35%).” Read this report to learn how passwordless and multi-factor authentication can secure user passwords and prevent most breaches.
Gartner, Buyer’s Guide for Access Management, Henrique Texieira, Michael Kelley, Abhyuday Data, 14 December, 2020