This content is currently locked.
Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.
1-888-670-8889 (US) or 1-844-618-3192 (CAN)
Speak With Your Representative
Request Access To Premium SoftwareReviews
Best Identity and Access Management (IAM) Software
Compare and evaluate Identity and Access Management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best Identity and Access Management software for your organization.
What is Identity and Access Management (IAM) Software?
Identity Access Management (IAM) is a software-based framework of policies and technologies for ensuring that an organization has the appropriate access to technology resources. Identity and access management systems identify, authenticate and authorize individuals who access IT resources.
What is Identity and Access Management (IAM) Software?
Identity Access Management (IAM) is a software-based framework of policies and technologies for ensuring that an organization has the appropriate access to technology resources. Identity and access management systems identify, authenticate and authorize individuals who access IT resources.
Common Features
Provisioning Deprovisioning | Identity Governance | Mobility Support | Password Management | Web Cloud Single Sign on (SSO) | Advanced Provisioning | Privileged Access Management | Access Request Management | Multi-Factor Authentication (MFA) | Activity Monitoring Alerts | Reporting
Buyer’s Guides
2023 Identity and Access Management Data Quadrant

Data Quadrant
Be confident in your decision, using the SoftwareReviews Data Quadrant Buyer’s Guide.
Explore hundreds of data points, using objective, unbiased customer feedback, in an easy to consume and understand market report.
30+ pages
What Is the Data Quadrant Buyer’s Guide?
The Data Quadrant Buyer's Guide provides a comprehensive evaluation of the top software in the Identity and Access Management market. Data is collected from real users, meticulously verified, and visualized in easy-to-understand charts and graphs. Each product is compared against the best Identity and Access Management to create a holistic, unbiased view of the product landscape.
The Data Quadrant Buyer's Guide is a summation of hundreds of data points that gives you a quick snapshot of the market. Use this detailed report to quickly validate your top features and shortlist your top contenders.
For even more detailed reports on individual products, see the Product Reports.
What Do We Measure?
The Data Quadrant measures the complete software experience, comparing both the experience with the software and the relationship with the vendor.
Product Feature & Satisfaction: Satisfaction with the software is measured by combining users’ satisfaction with the top features with the likelihood of users to recommend the software.
Vendor Experience & Capabilities: The vendor experience is calculated using a weighted average of the satisfaction scores tied to vendor capabilities (e.g. software implementation, training, customer support, product roadmap) and the working relationship with the vendor (e.g. whether the vendor is trustworthy, respectful, fair).
2023 Identity and Access Management Emotional Footprint

Emotional Footprint
Gather insight into whether your vendor is going to treat you like a partner using the Emotional Footprint Buyer’s Guide.
Compare critical emotional sentiments to quantify customer experience and compare it against the expected value you’ll receive.
30+ pages
What Is the Emotional Footprint Buyer’s Guide?
The Emotional Footprint Buyer’s Guide captures the overall experience of working with a software vendor and their platform. Organizations increasingly rely on software vendors to be true partners to help improve their operations. The Emotional Footprint helps you understand how you can trust and rely on the vendor to support you through your relationship.
We collect 25 data points outlining that experience, from the initial contracting and negotiation phase, through how they will support you during conflicts, to how their overall product strategy and direction will help you improve. Use this report to understand which vendors focus on building relationships to create a loyal customer base.
What Do We Measure?
The Emotional Diamond helps identify which vendors provide the best overall experience when compared against the perceived value of the software.
Value Index: Software pricing can be complicated and confusing, but knowing if you’re getting business value for the price you're paying is not. The Value Index metric captures users’ satisfaction with their software given the costs.
Net Emotional Footprint: The Net Emotional Footprint measures high-level user sentiment. It aggregates emotional response ratings across 25 provocative questions, creating a powerful indicator of overall user feeling toward the vendor and product.
Top Identity and Access Management (IAM) Software Awards
Next Award: January 2024

Write a review to help crown the next winner in Identity and Access Management, then follow us on LinkedIn to get notified about the results. For every approved review you will receive some compensation for your time and effort.
Latest Award: December 2020

See the most recent winners of our SoftwareReviews Data Quadrant Awards. View our Gold Medalists and compare top vendors using our free downloadable reports.
Latest Research
Author: Scott Bickley (Info-Tech)
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Latest Research
Author: Shastri Sooknanan (Info-Tech)
For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.
Compare Identity and Access Management (IAM) Software
Data QuadrantReport
A thorough evaluation and ranking of all software to compare software across every dimension.
Emotional FootprintReport
A detailed and unique report that captures a powerful indicator of overall user feeling toward the vendor and product.
Identity and Access Management (IAM) Software Data Quadrant
30+ pages
What Is the Data Quadrant Buyer's Guide?
The Data Quadrant Buyer's Guide provides a comprehensive evaluation of the top software in the Identity and Access Management market. Data is collected from real users, meticulously verified and visualized in easy-to-understand charts and graphs. Each product is compared against the best Identity and Access Management to create a holistic, unbiased view of the product landscape.
The Data Quadrant Buyer's Guide is a summation of hundreds of data points that gives you a quick snapshot of the market. Use this detailed report to quickly validate your top features and shortlist your top contenders.
For even more detailed reports on individual products, see the Product Reports.
What Do We Measure?
The Data Quadrant measures the complete software experience, comparing both the experience with the software and the relationship with the vendor.
Product Feature & Satisfaction: Satisfaction with the software is measured by combining users’ satisfaction with the top features with the likelihood of users to recommend the software.
Vendor Experience & Capabilities: The vendor experience is calculated using a weighted average of the satisfaction scores tied to vendor capabilities (e.g. software implementation, training, customer support, product roadmap) and the working relationship with the vendor (e.g. whether the vendor is trustworthy, respectful, fair).
Identity and Access Management (IAM) Software Emotional Footprint
30+ pages
What Is the Emotional Footprint Buyer's Guide?
The Emotional Footprint Buyer’s Guide captures the overall experience of working with a software vendor and their platform. Organizations increasingly rely on software vendors to be true partners to help improve their operations. The Emotional Footprint helps you understand how you can trust and rely on the vendor to support you through your relationship.
We collect 25 data points outlining that experience, from the initial contracting and negotiation phase, though how they will support you during conflicts, to how their overall product strategy and direction will help you improve. Use this report to understand which vendors focus on building relationships to create a loyal customer base.
What Do We Measure?
The Emotional Diamond helps identify which vendors provide the best overall experience when compared against the perceived value of the software.
Value Index: Software pricing can be complicated and confusing, but knowing if you’re getting business value for the price you're paying is not. The Value Index metric captures users’ satisfaction with their software given the costs.
Net Emotional Footprint: The Net Emotional Footprint measures high-level user sentiment. It aggregates emotional response ratings across 25 provocative questions, creating a powerful indicator of overall user feeling toward the vendor and product.
All Research
Author: Scott Bickley (Info-Tech)
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Author: Shastri Sooknanan (Info-Tech)
For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.
Author: Michelle Tran (Info-Tech)
Okta announces its new partnerships with endpoint security vendors VMware Carbon Black, CrowdStrike, and Tanium. Integrating endpoint protection management analysis with Okta Verify’s user identity risk indicators, Okta Identity Cloud consolidates the information and creates a risk profile of the individual login attempt.
Author: Ian Mulholland (Info-Tech)
Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable simple task automation that ultimately frees up IT staff to tackle more pressing issues.
Author: Ian Mulholland (Info-Tech)
Recent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to providing good customer service.
Author: Ian Mulholland (Info-Tech)
HID officially announced its support of Seos-enabled IDs in Apple Wallet on August 13. This enables a more convenient and secure authentication process for iPhone users using HID technology.
Author: Ian Mulholland (Info-Tech)
Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they are using it effectively within their organization.
Author: Frank Trovato (Info-Tech)
Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations running both Windows and Linux.
Author: Rita Zurbrigg (Info-Tech)
Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.
Author: Ian Mulholland (Info-Tech)
SAP SE announced on April 30, 2019, that business-to-business (B2B) functionality has come to its customer identity and access management (CIAM) solutions.
Author: Yaj Bhattacharya (Info-Tech)
Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using biometrics and FIDO2-compatible hardware is the better, and more secure, method of multi-factor authentication.
Author: George Goodall (Info-Tech)
Good IT leaders are supported by great IT teams. Take the opportunity to reassess the makeup and capabilities of the team.
Author: Jeremy Roberts (Info-Tech)
Amazon Glacier is hardly an expensive storage option. But for those users who store massive amounts of rarely needed data, it may not be worthwhile. Enter Glacier Deep Archive, an even cheaper storage option for data with an access SLA of 12 hours.
Author: George Goodall (Info-Tech)
Old file shares are a mess. Clean them up by identifying documents that are high-risk or high-value and get rid of everything else. Use a tool you didn’t know you owned to do it.