Published: 07 January 2025
Summary
AM functionality is improving for all constituencies, including the more-established workforce and customers. Capabilities for partners and machine actors are also evolving, but are less broadly available. Identity and access management leaders can use this research to compare current AM tools.
Included in Full Research
- CyberArk
- Entrust
- IBM
- Microsoft
- Okta
- One Identity
- OpenText
- Ping Identity
- RSA
- Thales
- ID Data, Profile, Lifecycle-Wkf
- ID Data, Profile, LIfecycle-Cus
- Authentication, ID Verification-Wkf
- Authentication, ID Verification-Cus
- Access Control-Wkf
- Access Control-Cus
- SSO, Session Mgmt, App Supt-Wkf
- SSO, Session Mgmt, App Supt-Cus
- Partner Mgmt & Delegated Admin
- Orchestration and Extensibility
- Portable and Decentralized Identity
- API Access Control
- Service Security and Resilience
- Machine Access Management
- Workforce Access Management
- Customer Access Management
- Partner Access Management
- Application Development Support
- Machine Access Management
Note 1: Journey-Time Orchestration
Note 3: Identity Verification
Critical Capabilities Methodology