For the best web experience, please use IE11+, Chrome, Firefox, or Safari
OneLogin + One Identity delivering IAM together. Learn more

Comparison of Key Access Management Platforms in the Gartner Critical Capabilities Report

Comparison of Key Access Management Platforms in the Gartner Critical Capabilities Report

There are several key features security and risk (S&R) management leaders should consider and prioritize when evaluating centralized access management platforms. Single sign-on (SSO), adaptive authentication, session management, and centralized authentication are just a few of the critical capabilities that they should be evaluating.

Download this Gartner report to:

  • See Vendor Product Scores for various use cases
  • Explore a breakdown of capabilities on a per vendor basis
  • Get a deeper understanding of each of these capabilities
  • Understand the methodology and criteria Gartner uses to calculate Vendor Product Scores

Gartner does not endorse any vendor, product, or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner, Critical Capabilities for Access Management, Author Names, Publish Date November 2021

Comparison of Key Access Management Platforms in the Gartner Critical Capabilities Report

Download Your Free
Analyst Report

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.