2026 IAM Conference Exhibitors

Meet the world’s leading technology and solution providers at Gartner Identity & Access Management Summit 2026 in London.

Connect with IAM solution providers

Visit the dynamic show floor, where you can interact with solution providers and learn about new products and services.

Learn about the solution provider landscape at Gartner Identity & Access Management Summit 2026 in London.

Solution provider landscape

Learn about the current landscape as you continuously evaluate and analyze product capabilities.

Join interactive sessions that help you make investment decisions at Gartner Identity & Access Management Summit 2026.

Interactive sessions

Make well-informed investment decisions based on objective insights from Gartner case studies and thought leadership.

Compare IAM solutions from top providers at Gartner Identity & Access Management Summit 2026 in London.

Solution evaluations

Compare solutions and formulate your shortlists of providers that can best help solve your mission-critical priorities.

Build relationships with solution providers at Gartner Identity & Access Management Summit 2026 in London.

Exhibitor connections

Gain mind share and build relationships with executives from solution provider companies.

Interested in becoming a conference exhibitor?

Innovative technology companies have the opportunity to share solutions with a wide range of well-qualified, senior-level prospects across our role-based annual conference ecosystem.

Premier

Hear peers share their experiences with solution providers:

  • “Coordinated to perfection with great insights for the current state and future of identity and access management. Knowledgable speakers with a variety of sessions to select the ones that best fit your needs.”


    Iakovos Prospathopoulos
    Senior ICT Officer, EUAA

  • “Great insights from keynote speakers and [exhibitors] with focused demos. The knowledge of the community is inspiring. So much insight to take away. The future of digital identity tapestry sparks many emotions. Well-done, Gartner and team, taking care of us while we consume all the wisdom.”


    Kamy Ng
    IAM Leader, ABB

  • “Great conference, many insightful talks, great networking with other clients to exchange their experiences. Took a whole bucket of new tools from it, [and I’m] looking forward to review the new insights in the next weeks.”


    Michael Glauche
    TL IT Security, C&A

1 3

Platinum

“Attending Gartner IAM Summit was transformative ... [I] gained invaluable insights and strategies to elevate our identity management. Gartner IAM Summit offered cutting-edge trends and practical solutions in identity management. A must-attend conference.”

Patrick Wolle
Consultant, PwC

Silver

background wave background wave background wave
Conference Exhibitor Directory

Admin By Request

Admin By Request delivers enterprise-grade security without the enterprise overhead. We help IT teams protect their organisations from privilege-based attacks through solutions that deploy in hours, require no dedicated administrators, and need zero additional infrastructure. Our products are built entirely in-house in Denmark and are trusted by organisations in more than 100 countries. We've grown over 900% in five years by making powerful security actually accessible. ...Read More

BeyondTrust

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™ with an identity-centric approach. We are leading the charge in transforming identity security and are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners. Learn more at www.beyondtrust.com. ...Read More

CrowdStrike

CrowdStrike has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk - endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise. Built in the cloud with a single lightweight-agent architecture, Falcon platform delivers rapid & scalable deployment, protection, performance, & reduced complexity. ...Read More

CyberArk Software

CyberArk, a Palo Alto Networks company, is the global leader in Identity Security. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers, AI agents and machines, to securely access any resource, located anywhere, from everywhere. ...Read More

Microsoft

Microsoft Security is an AI-first, end-to-end platform that protects organizations across AI, clouds, apps, data, devices, and identities. Microsoft Entra delivers a unified family of identity and network access solutions, enabling secure access for any identity to any app, AI, or resource from anywhere. Recognized as a Leader in the Gartner® Magic Quadrant™ for Access Management from 2016 to 2025 , Microsoft Entra offers comprehensive identity and access management unified with identity-centric Zero Trust Network Access and Secure Web + AI Gateway for your workforce, customers, and AI agents. ...Read More

Okta

Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorisation, and more at okta.com. ...Read More

One Identity

One Identity delivers trusted identity security for enterprises worldwide to protect and simplify access to digital identities. With flexible subscription and deployment options – from self-managed to fully managed – our solutions integrate seamlessly into your identity fabric to strengthen your identity perimeter, protect against breaches and ensure governance and compliance. One Identity is a trusted leader in identity governance and administration (IGA), privileged access management (PAM), and access management (AM) for security without compromise. ...Read More

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. We let enterprises combine our best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This is all made possible using our simple drag-and-drop canvas. That’s why more than half of the Fortune 100 choose Ping Identity to protect digital interactions from their users while making experiences frictionless. ...Read More

Radiant Logic

Radiant Logic pioneered the Identity Data Fabric and leads in Identity Security Posture Management (ISPM). We help enterprises reduce identity risk and strengthen resilience by unifying fragmented identity data into a secure, actionable foundation. RadiantOne Identity Data Cloud centralizes identity from legacy, cloud, and non-human sources, detects risk with AI, and automates remediation. Trusted by 1/3 of the Fortune 100 and 60% of US agencies. ...Read More

SailPoint Technologies

SailPoint delivers unified, identity-first security through an intelligent platform that manages and secures access for all human and digital identities. We empower enterprises to scale securely, defend against evolving threats, boost productivity, and drive transformation. Trusted by the world’s most complex organisations, SailPoint protects the modern enterprise. ...Read More

Saviynt

Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognised as an industry leader in identity security whose cutting-edge solutions protect the world’s leading brands, Fortune 500 companies and government organisations. For more information, please visit www.saviynt.com. ...Read More

Semperis, Inc.

For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing Active Directory, Semperis’ patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. ...Read More

Silverfort

Silverfort secures every dimension of identity. We are the first to deliver an end-to-end identity security platform that is easy to deploy and won't disrupt business operations, resulting in better security outcomes with less work. Discover every identity across every environment, analyze exposures to reduce your attack surfaces, and enforce security controls inline to stop lateral movement, ransomware, and other identity threats. ...Read More

SSH

SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum-Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defense, Critical Infrastructure Operators, Manufacturing, OT Security, and Public Safety. ...Read More

Veza

Veza is the identity security company, helping organizations secure access across the enterprise, including cloud infrastructure, data systems, SaaS apps, and on-prem apps. Powered by the Authorization Graph, Veza’s platform delivers visibility and control of permissions so that organizations finally achieve least privilege. Global enterprises like Wynn Resorts, Expedia and CrowdStrike trust Veza for privileged access monitoring, cloud access management, data lake governance, SaaS access security, automated access reviews and access, and identity provisioning. ...Read More

1Password

Trusted by over 180,000 businesses and millions of consumers, 1Password offers identity security and access management solutions built for the way people work and live today. 1Password is on a mission to eliminate the conflict between security and productivity while securing every sign-in for every app on every device. As the provider of the most-used enterprise password manager, 1Password continues to innovate on its strong foundation to offer security solutions relied upon by companies of all sizes, including Associated Press, Salesforce, GitLab, Under Armour, and Intercom. ...Read More

ARCON

ARCON is a leading information risk-management solutions provider specializing in Identities, Vaults, Cybersecurity and Digital Risk Assessment solutions. Built on the pillars: Predict, Protect, Prevent, it offers solutions that enable robust perimeter security around IT systems, endpoints, and data while developing a comprehensive GRC framework. Product portfolio: ARCON|Converged Identity ARCON|Privileged Access Management ARCON|Endpoint Privilege Management ARCON|Security Compliance Management ARCON|Global Remote Access ARCON|My Vault ARCON|Cloud Governance ARCON|Drift Management ...Read More

Delinea

Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading cloud-native Identity Security Platform applies context to eliminate threats throughout the entire identity lifecycle – across cloud and traditional infrastructure, data, SaaS applications, and AI. ...Read More

DigiCert

DigiCert is a leading global provider of digital trust, enabling individuals and businesses to engage online with the confidence that their footprint in the digital world is secure.DigiCert® ONE, the platform for digital trust, provides organizations with centralized visibility and control over a broad range of trust needs, securing websites, enterprise access and communication, software, identity, content and devices.DigiCert pairs its award-winning software with industry leadership in standards, support, operations, and is the digital trust provider of choice for companies around the world. ...Read More

MAYI ID

At MAYI ID, we make secure, scalable, and seamless IAM solutions simple and effective. Our Swiss-engineered platform empowers organizations to manage user and machine identities with ease. We offer robust tools for certificate lifecycle management, access control, and governance. Our solutions reduce security risks, ensure compliance, and streamline operations. Guided by Excellence, Collaboration, Innovation, and Simplicity, we deliver reliable, high-quality service. MAYI ID enables businesses and partners to deploy, scale, and protect identities with confidence ...Read More

Omada

Omada is a leader in identity security and governance, helping organizations reduce risk by securing access for every identity, human and non-human. Omada’s platform uses AI-driven insights and intelligent automation to enforce just-in-time, least-privilege access. With unified visibility and continuous risk evaluation, Omada enables security teams to detect threats faster, strengthen control, and scale identity security without added complexity. ...Read More

Persona

Persona helps leading organizations strengthen workforce security with a single identity that spans the employee lifecycle, from candidate verification and hiring through onboarding, access changes, and account recovery. Our workforce identity verification solution detects AI-driven impersonation and social engineering using signals like liveness detection, and behavioral analysis. With seamless integrations into IAM, HRIS, and ATS platforms, Persona delivers high-assurance identity verification trusted by industry leaders without requiring teams to reinvent their access control systems. ...Read More

Quest Software

At Quest Software, we create technology and solutions that build the foundation for enterprise AI. By focusing on data management and governance, cybersecurity, and platform modernization, we help organizations solve their most pressing challenges and turn the promise of AI into reality. ...Read More

Thales

Thales is a global leader in advanced technologies and cybersecurity. Thales’s digital identity solutions empower billions of people and things with digital identities worldwide. The Thales OneWelcome IAM portfolio enables organizations to build frictionless, trusted and secure digital journeys for customers, business partners and employees. The OneWelcome Identity Platform provides a variety of capabilities from identity verification, SSO, passwordless and MFA to fraud management, adaptive access, dynamic authorization and consent & preference management for the highest levels of assurance. ...Read More

Akeyless

Akeyless is the identity security platform built for machines, AI agents, and the people who depend on them. The platform unifies secrets management, certificate lifecycle automation (PKI), privileged access (PAM), identity governance, and identity visibility and intelligence, to improve efficiency while securely accelerating modernization. Built on a patented zero-knowledge, post-quantum–ready cryptographic foundation, Akeyless reduces risk, improves visibility, and lowers operational costs. ...Read More

AppViewX

AppViewX is trusted by the world’s leading enterprises to prevent outages, reduce risk, and ensure compliance through automated Certificate Lifecycle Management (CLM) and PKI solutions. Our platform delivers end-to-end visibility, automation, and policy control while enabling crypto-agility. Today, mid-size enterprises to Fortune 500 companies—including 6 of the top 10 global banks and 5 of the top 10 healthcare providers—rely on AppViewX as the foundation for their digital trust. ...Read More

Aquera

Aquera, a 2022 Gartner Cool Vendor in Identity-First Security, offers highly scalable solutions for Partner IAM, identity application discovery and onboarding, IGA entitlement file collection operations automation for disconnected applications, identity sourcing from 50+ HR apps, 1000+ LCM/IGA connectors, self-service GenAI connector builders, and HR app to HR app syncing. Aquera automates over 1 billion transactions annually for over 1000 organizations. ...Read More

Axiomatics, Inc.

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continue depend on the Axiomatics platform as a critical part of their access control strategy. ...Read More

Cerby

Cerby offers IT and Security teams the only identity and access management platform tailored for disconnected applications. Seamlessly integrating with your existing identity provider, Cerby extends SSO, MFA, and lifecycle management to any application, even those without APIs or support for standard protocols. With Cerby's patent-pending identity automation, IT teams can streamline manual processes like deprovisioning and MFA enrollment, gaining unmatched efficiency and full visibility and control over applications that fall outside traditional identity systems. ...Read More

Curity

Curity is a leading supplier of identity management, providing unified security for apps, APIs and AI. The Curity Identity Server delivers strong, standards-based authentication and authorization for humans and machines. Built on open standards and designed for development and operations teams, Curity is trusted by large organizations in financial services, telecom, retail, energy and government services that need enterprise-grade API access security. ...Read More

CyberIAM

CyberIAM is a cybersecurity services company, specialising in Identity and Access Management (IAM), Privileged Access Management (PAM), Identity Governance and Administration (IGA) and Customer Identity and Access Management (CIAM). We provide the expertise needed for the design and implementation of complex identity management solutions, tailored to the individual needs of our global customers from the Energy, Finance, Healthcare, Manufacturing, Public Sector, Retail, Telecom, and Transport industries. ...Read More

Descope

Descope is a drag & drop CIAM platform. Our no / low code solution helps hundreds of organizations easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federated SSO. Customers like GoFundMe, Databricks, Navan, and AEG Presents use Descope to improve user onboarding, enhance account protection, and get a unified view of their customer journey. ...Read More

Evolveum

Evolveum is the company behind midPoint, the only open source complete IGA suite recognized by Gartner. MidPoint gives organizations control, visibility, and efficiency to reduce identity risk, simplify compliance, and modernize identity operations. Trusted globally, it delivers full lifecycle automation, transparency, and professional support. Building on this foundation, we are developing midPilot, an AI assistant that streamlines application onboarding, supported by the European Union’s Next Generation EU program and Slovakia’s Research and Innovation Authority (VAIA). ...Read More

iC Consult

Identity Excellence Delivered. Globally. iC Consult is the world-leading independent services provider for identity security. Our team of over 850 experts is committed to delivering next-level solutions tailored to the unique needs of our clients worldwide. We achieve this by continuously driving innovation, leveraging cutting-edge technology, and partnering with leading identity and cybersecurity vendors, as well as renowned analyst firms. Our end-to-end portfolio covers all identity security services across advisory, architecture, implementation, integration, support, and operations. ...Read More

iProov

iProov provides biometric identity solutions that combine science, AI, and security. Our Biometric Solution Suite secures remote onboarding and authentication for both digital and physical access. We safeguard organizations that need innovative identity verification without sacrificing usability. With proven success in global deployments, iProov is a trusted partner for governments and enterprises, including the Australian Taxation Office, GovTech Singapore, ING, Rabobank, UBS, U.K. Home Office, UK National Health Service (NHS), and the U.S. Department of Homeland Security. ...Read More

Keeper Security

Keeper Security is one of the fastest-growing cybersecurity software companies that protects thousands of organisations and millions of people in over 150 countries. Keeper is a pioneer of zero-knowledge and zero-trust security built for any IT environment. Its core offering, KeeperPAM®, is an AI-enabled, cloud-native platform that protects all users, devices and infrastructure from cyber attacks. Recognised for its innovation in the Gartner Magic Quadrant for Privileged Access Management (PAM), Keeper secures passwords and passkeys, infrastructure secrets, remote connections and endpoints. ...Read More

Keyfactor

Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale – and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. ...Read More

Netwrix Corporation

Netwrix’s vision is to create a world where every organization has secured its data and identities. The 1Secure™ platform unifies identity and data security to provide complete visibility into where data lives, who can access it, and how it’s governed. With Netwrix, security teams strengthen data protection, safeguard identities, and stay ahead of evolving threats. Today, more than 13,000 customers, including nearly 25% of the Fortune 500, rely on Netwrix solutions across hybrid and AI-driven environments. ...Read More

Oasis Security

Oasis is a leading provider of non-human identity management. The shift to cloud, devops, and AI is fueling exponential growth of non-human identities opening up a new massive attack surface. Oasis pioneered the first enterprise-grade platform specifically designed to tackle the unique security and operational challenges of non-human identities, enabling security and engineering teams to bolster security posture, implement robust governance, and simplify compliance. ...Read More

OneSpan N.V.

OneSpan provides secure authentication, identity, electronic signature, and digital workflow solutions. Trusted by global blue-chip enterprises, including more than 60% of the world’s 100 largest banks, OneSpan processes millions of digital agreements and billions of multi-factor authentication transactions in 100+ countries annually. ...Read More

Pathlock

Unlike traditional risk, audit, and security systems, Pathlock continuously monitors transactions across all enterprise applications where sensitive activities and data are concentrated. It surfaces actual violations, not theoretical possibilities. With Pathlock as the hub, all lines of defense work together to make informed decisions. Founded as Greenlight Technologies, we became the only solution endorsed by SAP that extends SAP Access Control to cloud and non-SAP systems. Today, we are the leader in application security and controls automation, serving customers worldwide. ...Read More

rf IDEAS

At rf IDEAS, reliability and efficiency are our top priorities. It’s how we empower companies just like yours to make security simple by implementing our authentication solutions. Across industries like healthcare and enterprise, our logical access control solutions are compatible with your existing credentials or with new credentials like NFC wallet and FIDO, giving you the tools to manage your security ecosystem. Our goal is to be so reliable that secure, easy-to-use access becomes what you expect. ...Read More

Rubrik

Rubrik, the Security and AI Operations Company, leads at the intersection of data protection, cyber resilience, and enterprise AI acceleration. Rubrik Security Cloud delivers complete cyber resilience by securing, monitoring, and recovering data, identities, and workloads across clouds. Rubrik Agent Cloud accelerates trusted AI agent deployments at scale by monitoring and auditing agentic actions, enforcing real-time guardrails, fine-tuning for accuracy and undoing agentic mistakes. ...Read More

Simeio

Simeio cuts through the complexity of identity and access management. Our specialized platform and expert services deliver secure digital access without the endless complications. When you need reliable IAM solutions that actually work, you get access right now.

Specter Ops

SpecterOps is a leader in Identity risk reduction. Possessing deep knowledge of adversary tradecraft, the company enables organisations to detect and remove critical attack paths before attackers can act. SpecterOps maintains widely used open-source security toolsets including BloodHound, the company’s foundational tool that enables identity attack path mapping in Active Directory & Entra ID. BloodHound Enterprise allows for continuous Identity Attack Path Management, and provides full attack path visibility with prioritisation, remediation guidance and reporting to show improvement over time. ...Read More

StrongDM

StrongDM delivers modern privileged access and authorisation, combining productivity and security in ways traditional PAM cannot. Built for modern cloud and hybrid infrastructure, it provides runtime security with continuous, fine-grained authorisation and just-in-time access for human, machine, and agentic identities. The result is frictionless access that eliminates standing privileges, stops lateral movement, and boosts productivity while strengthening enterprise security, all powered by StrongDM's Identity Firewall. ...Read More

Teleport

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise.

Twine Security

Twine builds AI Digital Employees for cybersecurity teams. Our first AI digital employee, Alex, learns, understands and takes away the burden of identity and access management (IAM) tasks - proactively completing your organization’s cyber objectives. Our customers use Alex for varied use cases - from autonomously remediating issues like finding missing account owners, to IAM ticket automations, and much more. Goodbye simple, legacy automations. Hello effortless, self healing, start to finish execution by proactive AI Digital Employees. Come check us out! ...Read More

Yubico

Yubico (Nasdaq Stockholm: YUBICO) is a modern cybersecurity company on a mission to make the internet safer for everyone. As the inventor of the YubiKey, we set the gold standard for secure, simple login, stopping account takeovers with phishing-resistant, hardware-backed authentication. Our technology secures people in over 160 countries, delivering fast, passwordless access. Dual-headquartered in Stockholm and Santa Clara, we believe strong security should be within everyone's reach. Learn more at www.yubico.com. ...Read More

Ready to join us in London?

Experience the Gartner difference — talk with experts, meet your peers and turn insights into action.