• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Access Management

Access Management Reviews and Ratings

What is Access Management?

Gartner defines access management (AM) as tools that include authentication, authorization, single sign-on (SSO) and adaptive access capabilities for modern standards-based web applications, classic web applications and APIs.

AM’s purpose is to give people (employees, consumers and other users) and machines access to protected applications in a streamlined and consistent way that enhances the user experience. For people, SSO is part of the enhanced experience. AM is also responsible for providing security controls to protect the user session during runtime. It enforces authentication and runtime authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Duo
Duo
Logo of Microsoft Entra ID
Microsoft Entra ID
Logo of Okta Workforce Identity
Okta Workforce Identity
For 50M-1B USD Companies
Logo of Oracle Cloud Infrastructure Identity and Access Management
Oracle Cloud Infrastructure Identity and Access Management
Logo of Oracle Access Management
Oracle Access Management
Logo of CyberArk Workforce Identity
CyberArk Workforce Identity
For North America
Logo of OpenText Access Manager (NetIQ)
OpenText Access Manager (NetIQ)
Logo of IBM Verify
IBM Verify
Logo of Oracle Access Management
Oracle Access Management
Integration & Deployment
Logo of Duo
Duo
Logo of Oracle Cloud Infrastructure Identity and Access Management
Oracle Cloud Infrastructure Identity and Access Management
Logo of miniOrange Workforce Identity and Access Management
miniOrange Workforce Identity and Access Management

Product Listings

Filter by

Products 1 - 20 of 125
Sort by
Logo of Okta Workforce Identity

Okta Workforce Identity

By Okta

4.6
(851 Ratings)
customers choice 2025

Workforce Identity Cloud is a software designed to manage and secure user identities and access across an organization’s digital ecosystem. The software enables single sign on, multifactor authentication, lifecycle management, and API access management to help organizations control who has access to applications, resources, and data. Workforce Identity Cloud streamlines user provisioning and deprovisioning, supports integration with various applications and directories, and helps ensure compliance with security policies. The software addresses the business challenge of protecting organizational assets by centralizing identity management and reducing the risk of unauthorized access while supporting workforce productivity.

Show More Details
Logo of Microsoft Entra ID

Microsoft Entra ID

By Microsoft

4.4
(743 Ratings)

Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.

Show More Details
Logo of Ping Identity Platform

Ping Identity Platform

By Ping Identity

4.4
(614 Ratings)

Ping Identity Platform is a software that provides enterprises with capabilities for identity and access management. The software facilitates secure authentication, single sign-on, and multi-factor authentication for users across applications and devices. It enables centralized management of user identities, helping organizations meet regulatory compliance requirements and protect sensitive information. Ping Identity Platform integrates with various cloud and on-premises environments and supports standards-based protocols for interoperability. The software is designed to address business challenges related to secure access control, user provisioning, and digital identity governance in complex enterprise ecosystems.

Show More Details
Logo of OneLogin

OneLogin

By One Identity

4.5
(363 Ratings)

OneLogin is a software that provides identity and access management solutions designed to help organizations securely manage user authentication and access to applications and data. The software enables single sign-on capabilities, multi-factor authentication, and automated user provisioning. It addresses business challenges such as reducing the risk of unauthorized access, streamlining user onboarding and offboarding, and simplifying access control for cloud and on-premises applications. OneLogin integrates with various directories and supports compliance requirements through centralized access policies and audit reporting functionalities.

Show More Details
Logo of Okta Customer Identity

Okta Customer Identity

By Okta

4.6
(252 Ratings)
customers choice 2025

Okta Customer Identity is a software that provides authentication and authorization capabilities for businesses to manage and secure customer access to applications and digital services. The software offers features including single sign-on, multi-factor authentication, user lifecycle management, and API access controls. Okta Customer Identity enables organizations to streamline registration and login experiences, protect customer accounts, and ensure compliance with security requirements. The software supports integration with various platforms and applications, offering tools for developers to embed identity functionality into their products. It addresses business needs related to user management, data security, and frictionless customer access across digital channels.

Show More Details
Logo of SafeNet Trusted Access

SafeNet Trusted Access

By Thales

4.4
(246 Ratings)

Thales’s SafeNet Trusted Access is a cloud-based access management and authentication service. SafeNet Trusted Access protects your environment by applying authentication to all users and apps with diverse authentication capabilities. SafeNet Trusted Access gives you the power to address access security gaps by applying the right policy that enforces the right authentication method for the right user, in line with their specific context. May include FIDO technology.

SafeNet Trusted Access offers enterprises key benefits:

1. Ensure no user is an easy target by allowing you to expand authentication coverage to more users and apps

2. Complement IAM solutions that may already be deployed by applying more effective authentication to more users

3. Provide the right authentication for all your users, based on their context, rather than taking a ‘one size fits all’ approach

4. Meet users’ expectations about being able to work from anywhere on any device securely with the right access security

Show More Details
Logo of AWS Identity and Access Management (IAM)

AWS Identity and Access Management (IAM)

By Amazon Web Services (AWS)

4.5
(239 Ratings)

AWS Identity and Access Management IAM is a software that enables administrators to control user access to resources within Amazon Web Services environments. The software provides capabilities for creating and managing AWS users and groups and defining permissions to allow or deny access to specific AWS resources. It supports policies for fine-grained authorization, multi-factor authentication, and federated access, helping organizations maintain security and compliance by ensuring that only authenticated and authorized users can perform actions on AWS services. IAM addresses the business need for secure, manageable, and scalable user access control in cloud-based infrastructures.

Show More Details
Logo of Oracle Access Management

Oracle Access Management

By Oracle

4.9
(212 Ratings)
customers choice 2025

Oracle Access Management is a software that provides centralized access control and identity management for organizations. It enables secure authentication, single sign-on, and policy enforcement across applications, systems, and devices. The software offers features such as adaptive authentication, federation, and risk-based access, allowing organizations to manage user identities and authorizations effectively. Oracle Access Management integrates with various enterprise environments to streamline user provisioning, enhance compliance, and support regulatory requirements. The software helps address business challenges related to secure digital access and reduces the risk associated with unauthorized access to enterprise resources.

Show More Details
Logo of CyberArk Workforce Identity

CyberArk Workforce Identity

By CyberArk

4.6
(177 Ratings)

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

Show More Details
Logo of SecureAuth Workforce IAM

SecureAuth Workforce IAM

By SecureAuth

4.3
(102 Ratings)

Arculix is a software developed by SecureAuth that provides authentication and identity management solutions for organizations. The software offers features such as multi-factor authentication, risk-based authentication, and adaptive authentication methods designed to secure access to applications and systems. Arculix addresses business problems related to unauthorized access, data breaches, and regulatory compliance by enabling secure user verification and minimizing risks from compromised credentials. The software integrates with on-premises and cloud environments, supporting a range of use cases including workforce, customer, and partner access. It streamlines user authentication workflows, helps enforce access policies, and aids organizations in managing digital identities while maintaining security standards.

Show More Details
Logo of IBM Verify

IBM Verify

By IBM

4.5
(98 Ratings)

IBM Verify is a software designed to provide identity and access management capabilities, enabling organizations to secure user authentication and manage access to applications and data. The software supports multi-factor authentication, adaptive access, and risk-based authentication to help reduce unauthorized access while streamlining login experiences for users. It addresses business challenges related to secure user identity verification, regulatory compliance, and reducing the risks associated with credential compromise. IBM Verify integrates with various enterprise environments and cloud applications, facilitating centralized access management and supporting policy enforcement to control user permissions across digital resources.

Show More Details
Logo of miniOrange Workforce Identity and Access Management

miniOrange Workforce Identity and Access Management

By miniOrange

4.8
(91 Ratings)

miniOrange Cloud and On-Premise Identity Management - the perfect solution for

all of your SSO, MFA, Provisioning, Adaptive Authentication, Identity Brokering and Legacy Integration

needs. miniOrange's IDP Product - Your employees, customers, and partners can seamlessly access and

securely connect to our cloud or on-premise system. We provide a centralized platform with enhanced

capabilities for access management and identity management which fits any of your use cases and can integrate

with any system. 1. SSO- Single Sign On platform with ready integrations for all your Web, Mobile and Legacy

On-premise Apps 2. MFA - Secure your user's identity with passwords and an additional layer of authentication

(e.g. OTP over SMS/Email/Push) 3. Provisioning - Automatic user provisioning & de-provisioning, password

management and scheduled synchronization of user-data 4. Adaptive Authentication - IP, Location, Time &

Device Restriction 5. External Directory Integration - Microsoft AD, Azure AD, OpenLDAP, Cognito

Show More Details
Logo of WSO2 Identity Server

WSO2 Identity Server

By WSO2

4.3
(89 Ratings)

Designed for developers, by developers, WSO2 Identity Server offers an open, API-driven architecture alongside a broad set of developer tools. WSO2 Identity Server is extensible, and scalable. Features include:

- Single sign-on

- Social & federated login

- Strong authentication

- Passwordless, risk-adaptive and multi-factor authentication

- User onboarding

- Progressive profiling

- Account management

- User self-service

- Identity provisioning

- Identity bridging

- Fine-grained access control

- Privacy, consent & compliance management

- Analytics, dashboarding & reporting

- Preconfigured integration with sales & marketing tools

Show More Details
Logo of OpenText Access Manager (NetIQ)

OpenText Access Manager (NetIQ)

By OpenText

4.8
(75 Ratings)

OpenText Access Manager is a software designed to manage and secure digital identities and access privileges within enterprise environments. It offers features such as single sign-on, authentication, authorization, and policy enforcement for web applications and resources. The software streamlines user access by enabling centralized identity management and integrating with various authentication methods, including multi-factor authentication. It assists organizations in addressing the business problem of controlling and monitoring access to sensitive data and applications, reducing security risks, and meeting compliance requirements. OpenText Access Manager supports integration with on-premises and cloud environments, helping enterprises establish secure and scalable access controls for users and systems.

Show More Details
Logo of Duo

Duo

By Cisco Systems

4.8
(66 Ratings)

Cisco Duo provides security-first Identity and Access Management (IAM) that protects organizations from identity-based threats. Duo includes all the necessary components to serve as your sole IAM platform or seamlessly integrate with and fortify your existing identity providers, operating as a unified defense layer across your identity infrastructure. By embedding critical protections like broad-based MFA and device trust into the company’s base offering, Duo eliminates the "security tax" often imposed by traditional IAM vendors. Essential security is on by default—not a costly, complex upgrade. As a result, Duo addresses advanced threats while delivering a seamless experience that users and admins embrace.

Show More Details
Logo of Oracle Cloud Infrastructure Identity and Access Management

Oracle Cloud Infrastructure Identity and Access Management

By Oracle

4.8
(65 Ratings)
customers choice 2025

Oracle Cloud Infrastructure Identity and Access Management is a software that manages user identities and controls access to cloud resources within Oracle Cloud environments. The software enables organizations to securely authenticate users, assign permissions, and define policies for access to applications and data. It supports multi-factor authentication, single sign-on, and automated provisioning and deprovisioning of user accounts to help reduce security risks. The software delivers audit capabilities for tracking user activities and ensures compliance with access governance requirements. It addresses business needs related to secure access control, user lifecycle management, and protection of sensitive information in cloud deployments.

Show More Details
Logo of Symantec VIP Access Manager (Legacy)

Symantec VIP Access Manager (Legacy)

By Broadcom

4.5
(47 Ratings)

Symantec VIP Access Manager (Legacy) is a software that provides identity and access management capabilities for organizations seeking to secure user authentication and resource access. The software enables businesses to manage user credentials, enforce multi-factor authentication, and grant access to cloud and web applications through single sign-on functionality. It addresses business challenges related to user identity verification, unauthorized access, and regulatory compliance by centralizing authentication processes and offering policy-based access controls. The software integrates with existing directory services and supports various authentication methods, allowing organizations to reduce risk by verifying user identities before granting access to critical applications and data.

Show More Details
Logo of CyberArk Customer Identity

CyberArk Customer Identity

By CyberArk

4.5
(42 Ratings)

CyberArk Customer Identity is a software designed to manage and secure customer access to applications and services. The software provides capabilities such as authentication, authorization, identity lifecycle management, and adaptive access controls. It facilitates integration with various applications and supports compliance with security policies by enabling features like multi-factor authentication and passwordless login options. CyberArk Customer Identity addresses business challenges related to user identification, security risks from unauthorized access, and helps organizations streamline customer onboarding processes while safeguarding sensitive data. By centralizing identity management for customers, the software assists businesses in reducing operational complexity and improving access governance.

Show More Details
Logo of Trusfort Identity and Access Management

Trusfort Identity and Access Management

By Trusfort

4.8
(39 Ratings)
Show More Details
Logo of Symantec SiteMinder

Symantec SiteMinder

By Broadcom

4.1
(36 Ratings)

Symantec SiteMinder is an access management software designed to help organizations securely manage user identities and control access to web applications. The software provides features such as single sign-on, authentication, authorization, and policy management. It enables administrators to define and enforce security policies across multiple applications, helping to protect sensitive data and ensure compliance with regulatory requirements. SiteMinder integrates with various directory services and supports a wide range of authentication protocols, allowing organizations to streamline user access and reduce administrative overhead. The software addresses business challenges related to securing digital resources and managing complex user access environments.

Show More Details

Features of Access Management

Updated December 2025

Mandatory Features:

  • SSO and session management, with support for standard identity protocols (e.g., OpenID Connect, OAuth 2.0 and SAML) and social logins to access standards-based applications and legacy applications (via proxies or agents)

  • User authentication, including: 1.Support for phishing-resistant multifactor authentication (MFA) methods (e.g., X.509 and FIDO2) and other account takeover (ATO) protections 2. Controls to mitigate usage of compromised passwords 3. Protections against common MFA attacks, either directly or via out-of-the-box integration with third-party authentication services 4. Support for passwordless authentication methods

  • Adaptive access based on dynamic evaluation of identity trust and access risk

  • A directory or integrated identity repository, which includes identity synchronization services, for all constituencies

  • Basic identity life cycle management, including support for enabling create, read, update and delete (CRUD) operations across all user types

  • Authorization policy definition and enforcement for any resources, such as applications and APIs, directly defined in the system

Gartner Research

Magic Quadrant for Access ManagementCritical Capabilities for Access Management
Gartner Peer Insights 'Voice of the Customer': Access Management

Top Trending Products

DuoMicrosoft Entra IDOracle Access ManagementIBM VerifySafeNet Trusted AccessOkta Workforce IdentityMy1Login Single Sign-OnFortiAuthenticatorCyberArk Workforce Identity1Password

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.