Download Gartner IAM Leaders’ Guide to Access Management On The Left Side Of Page
“IAM leaders focused on core AM tools should refer to the Gartner research mentioned here to understand the broadened scope, deployment approaches and adoption trends of AM tools.” Security and risk management leaders focused on IAM need to assess AM tool scope and deployment approaches and apply continuous adaptive risk and trust assessment approaches to AM.
Download your complimentary copy – Gartner IAM Leaders’ Guide to Access Management
AM offerings include:
- Access policy management
- User authentication
- Single sign-on (SSO)
- Security token services and identity protocol translation
- Session management
- Coarse and fine-grained authorization
- Adaptive access, trust elevation and risk mitigation
“The bigger picture of an IAM program scope includes four main functional areas: administration, authorization, assurance and analytics. The AM discipline provides authorization, assurance and analytics capabilities, along with some administrative capabilities as well. It is responsible for the establishment and coordination of runtime access decisions on target systems in line with the other core AM functions.”
Gartner, Inc., Gartner 2020 IAM Leaders’ Guide to Access Management, Michael Kelley, Abhyuday Data, Henrique Teixeira, 30 April 2020
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Optimal IdM.