Published: 20 November 2025
Summary
Access management functionality is improving for all constituencies, including the more established workforce and customers. Capabilities for partners and machine actors are also evolving, but are less broadly available. Identity and access management leaders can use this research to compare current AM tools.
Included in Full Research
- Alibaba Cloud
- CyberArk
- Entrust
- IBM
- Microsoft
- Okta
- One Identity
- OpenText
- Ping Identity
- RSA
- Thales
- Transmit Security
- ID Data, Profile, Life Cycle — Wkf
- ID Data, Profile, Life Cycle — Cust
- Authentication and IDV — Wkf
- Authentication and IDV — Cust
- Access Control — Wkf
- Access Control — Cust
- SSO, Session Mgmt, App Supt — Wkf
- SSO, Session Mgmt, App Supt — Cust
- Partner Mgmt & Delegated Admin
- Orchestration and Extensibility
- Portable and Decentralized Identity
- API Access Control
- Service Security
- Service Resilience
- Machine Access Management
- Workforce Access Management
- Customer Access Management
- Partner Access Management
- Application Development Support
- Machine Access Management
Note 1: Journey-Time Orchestration
Note 3: Identity Verification
Critical Capabilities Methodology