November 26, 2013 • Garrett Garitano

Gartner IAM Conference and Gartner IAM 2020 Predictions

The identity management future. Avatier is completely energized by the 2013 Gartner IAM Summit. We concluded the event by attending a Los Angeles Kings hockey game with over 20 fellow attendees for drinks, a catered spread and unbelievable dessert bar. Our suite offered a great chance to have more in-depth conversations than experienced on a […]

Identity Management Blog I Gartner IAM I Avatier

The identity management future.

Avatier is completely energized by the 2013 Gartner IAM Summit. We concluded the event by attending a Los Angeles Kings hockey game with over 20 fellow attendees for drinks, a catered spread and unbelievable dessert bar. Our suite offered a great chance to have more in-depth conversations than experienced on a tradeshow floor and we are grateful. We hear your immediate need for identity management solutions that drive cost-savings and business enablement.

Upon reflecting on the 2020 Gartner IAM Predications, Avatier recognize that identity and access management is more important than ever as IT focuses on business agility. Avatier previously identified the megatrends driving most of the Gartner IAM 2020 Predictions at the last two conferences. Particularly, the need for a mobile and non-PC architecture with a unified risk intelligence platform, and the death of Role Based Access Control.

With our business user and business enablement focus, Avater proudly experiences alignment today with the 2020 predictions, because we began offering 2020 solutions in 2007 with the release of the world’s first user provisioning and access management IT store.

Wholeheartedly, Avatier agrees with the 2020 IAM Prediction equating the management of user accounts to consumers. We empathetically concur the way business users make requests and access systems mimics consumer  behavior particularly with business enablement going BYOD mobile and business managers participating in IT governance.

Our 9.5 release of the Lifecycle Management IT store offers an expanded shopping cart experience with risk intelligence for identity management, service catalog, and request management systems. How futuristic is that?

If you missed us at the Gartner IAM conference, you can request a demonstration and see Gartner’s 2020 predictions in practice today.

identity management analysts white paper. Get the Free KuppingerCole Identity Management Analyst White Paper

Learn the role IT automation and business driven self-service administration play in creating lean operations. KuppingerCole’s Assignment Management — Think Beyond Access describes the shift in IT operations from tightly controlled identity management processes to workflow enabled administration.

Click Here to Request the White Paper

Garrett Garitano

Related Posts

What is Assisted Password Reset? A Complete Guide

What is Assisted Password Reset? Assisted Password Reset (APR) is a technology solution that enables users to securely regain access to their accounts without direct IT helpdesk intervention. This self-service approach automates the password recovery process through secure verification methods like security questions, mobile authentication, biometric verification, or email confirmation. In today’s complex digital ecosystem, […]

May 28, 2025 • Nelson Cicchitto

Read More

Passwordless Login: The Future of Authentication Without the Hassle

Passwords have been the cornerstone of digital security for decades, yet they represent one of the most vulnerable and frustrating aspects of our online experience. According to IBM’s 2023 Cost of a Data Breach Report, compromised credentials were responsible for 19% of all breaches, with an average cost of $4.45 million per incident—15% higher than […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Password Reset: Comprehensive Guide for IT Decision Makers

Introduction: The Business Impact of Password Reset Solutions Password reset technology is more than just a convenience feature—it’s a critical component of modern identity management that directly impacts operational efficiency, security posture, and user productivity. As organizations navigate increasingly complex digital environments, the seemingly simple function of resetting passwords has profound implications for both business […]

May 28, 2025 • Nelson Cicchitto

Read More

What is Password Policy? The Complete Guide for Enterprise Security Leaders

Password policies remain your critical first line of defense against unauthorized access. Yet many organizations struggle with creating and enforcing policies that balance security with usability. This comprehensive guide examines everything security leaders need to know about effective password policies, from foundational principles to advanced implementation strategies using modern identity management solutions. Understanding Password Policy […]

May 28, 2025 • Nelson Cicchitto

Read More