Gartner defines IGA as the enterprise solution to manage digital identity life cycle and govern user access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data that is distributed throughout the IT landscape to enhance control over human and machine access. GA’s must-have capabilities: - Identity life cycle management - Access request process - Basic analytics and reporting
Gartner defines privileged access management (PAM) as tools that administer or configure systems and applications to provide an elevated level of technical access through the management and protection of accounts, credentials and commands. PAM tools, available as software, SaaS or hardware appliances, manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: Privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management and cloud infrastructure entitlement management (CIEM) .
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.