Gartner Research

Critical Capabilities for Access Management

Published: 02 November 2022

Summary

AM tools are critical for a zero-trust approach to IAM as they act as a centralized policy engine, the collector of data and the enforcer of runtime access through adaptive access controls. SRM leaders focused on IAM can use this research to compare the effectiveness of prominent AM tools.

Included in Full Research

Overview

Key Findings
  • Access management (AM) tools continue to add adjacent IAM functions, especially identity governance and administration (IGA) functions, through acquisitions or organic development to strengthen their position as converged IAM platforms.

  • An AM tool must provide responsive and always-available runtime access to target applications/services, therefore high availability, effective resiliency and dynamic scalability of AM services are key selection criteria.

  • With internal (B2E) AM use cases becoming mainstream and commoditized, most of AM vendors’ growth is coming from addressing their customers’ requirements for external AM use cases, specifically B2C, B2B and government-to-constituent (G2C).

  • Customer interest in low-code/no-code approaches offered by AM tools for

Clients can log in to view the entire document.

  • CyberArk
  • ForgeRock
  • IBM
  • Micro Focus
  • Microsoft
  • Okta
  • Okta (Auth0)
  • One Identity (OneLogin)
  • Oracle
  • Ping Identity
  • Directory Services
  • Internal Access Administration
  • Authorization and Adaptive Access
  • SSO and Session Management
  • User Authentication
  • External Access Administration
  • Developer Tools
  • API Access Control
  • Standard Application Enablement
  • Nonstandard Application Enablement
  • Analytics and Reporting
  • Ease of Deployment
  • Security and Resilience
  • Internal Access Management
  • External Access Management
  • Application Development

Access Research

Already a Gartner client?

To view this research and much more, become a client.

Speak with a Gartner specialist to learn how you can access peer and practitioner research backed by proprietary data, insights, advice and tools to help you achieve stronger performance.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Critical Capabilities: A deeper look into provider offerings

How does a Critical Capabilities report work?

As a companion to the Magic Quadrant™, a Critical Capabilities report scores competing products and services against a set of meaningful differentiators. It reveals which options are the best fit in various use cases to help you focus on the vendors best suited to your needs.

A Critical Capabilities report is more than just a diagram. You also get:

Sharper focus

Narrow down the product and service criteria most important to you.

Individualized use cases

Use interactive features to customize usage scenarios based on your organization’s unique needs.

Faster decision making

Use data to speed up provider selection and accelerate the procurement process.

A Gartner Critical Capabilities report is just one of our many offerings.

We provide actionable, objective insight to help organizations make smarter, faster technology decisions to stay ahead of disruption and accelerate growth.

Pick the right provider with confidence

We use a Critical Capabilities report, the Magic Quadrant and more to ensure you select the best-fit provider to avoid the costly repercussions of a poor decision.

Align deal structures and optimize spend

We benchmark pricing against the market so you avoid unnecessary charges.

Reduce complexity and risk

We analyze contract terms and conditions to protect you against future price increases and unanticipated costs.

©2022 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.