Spotlight

Report:

Magic Quadrant for Access Management

How does Gartner define the Access Management market in 2023?

Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM's purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.

Key Facts for Magic Quadrant for Access Management in 2023

Strategic Planning Assumptions

How was the Access Management market evolved in 2023?

What product features are required to be included in this year's evaluation?

What are the common features of top products in the Access Management space?

Scope Exclusions

Inclusion Criteria

Vendors must, among other requirements:

Ability to Execute — Relative Weighting

Completeness of Vision — Relative Weighting

FAQs

Q: What does this research cover?

A: This research evaluates 11 vendors in the Access Management market based on their Ability to Execute and Completeness of Vision. It covers AM platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls for cloud, modern standards-based web and classic web applications. The research focuses on both workforce (B2E) and CIAM (B2B, B2C, G2C) use cases, with increased emphasis on CIAM capabilities including B2B features, threat detection and response (ITDR), passkeys support, and B2B delegated administration capabilities.

Q: Who should use this research?

A: This research should be used by security and risk management leaders, IAM professionals, and IT decision-makers who are evaluating or selecting access management solutions for their organizations. It is particularly valuable for organizations that need both workforce and CIAM capabilities, those looking to improve their security posture against identity-based attacks, organizations implementing B2B customer relationships, and those seeking to modernize their authentication approaches with passkeys and identity verification. The interactive features allow users to create custom views aligned with their specific priorities and requirements.

Q: What are the mandatory features of vendors included in this market?

A: Mandatory features for vendors included in this market are: (1) A directory or identity repository for workforce or external users, including identity synchronization services; (2) Identity administration for integrated applications, with basic life cycle management and profile management capabilities, with support for SCIM; (3) SSO and session management with support for standard identity protocols (OpenID Connect, SAML) and APIs for accessing standards-based and legacy apps (via proxies or agents); (4) User authentication (including commodity MFA); (5) Authorization enforcement (including support for modern authorization protocols, including OAuth 2.0). Additionally, all core capabilities must be delivered as a SaaS product.

Q: What are some reasons for not being included in this report?

A:

  • Solutions without substantial customer numbers for both workforce and CIAM use cases, or only marketed to support one use case
  • Vendors that resell other vendors' products or have merely augmented other vendors' AM products
  • Not meeting revenue threshold ($60 million annual AM revenue) or customer count threshold (1,100 current AM customers)
  • Lack of global capabilities or more than 80% of customer count/revenue concentrated in primary region
  • Core capabilities not delivered as a SaaS product
  • Pure user authentication products without SSO, session management or authorization capabilities
  • Solutions focused only on operating systems, IT infrastructure or PAM
  • Managed AM services rather than vendor's own intellectual property
  • AM only provided as part of broader outsourcing agreements
  • Open-source only offerings
  • Stand-alone IGA suites, full life cycle API management platforms, EPPs, UEM, or CASBs

Q: What differentiates Ability to Execute vs. Completeness of Vision?

A: Ability to Execute evaluates vendors on the quality and efficacy of processes, systems, methods or procedures that enable IT vendors to be competitive, efficient and effective, and that positively affect revenue, retention and reputation. It focuses on current execution including product capabilities, viability, sales, market responsiveness, marketing execution, customer experience, and operations. Completeness of Vision evaluates vendors on their understanding of buyer wants and needs, and how well they anticipate, understand and respond with innovation in their product offerings to meet those needs. It focuses on vision and strategy including market understanding, marketing strategy, sales strategy, product strategy, business model, vertical strategy, innovation, and geographic strategy.

Reference

View Leaders
View Vendor Movements