< PreviousI can ensure our clients a 100% algorithmic certainty, ensuring that it's you on your registered device for security most implement today, is akin to building a dam 100 years ago. Block the river temporarily, then put a bunch of bricks down and layer bricks on top of bricks. And there's your dam. Well, the problem is, you know, mortar erodes away so you get little pin holes. Bricks fall out, and then the dam bursts, right? We do look at the problem and say hey, let's not build an old-fashioned dam. Let's create a new dam, which is one piece altogether reinforced with multiple layers of rebar. That really works and it's one solution.” Most identity and access management service providers will have to keep catching up as Uniken continues to expand, diversify, and tackle big issues in the world of security and identity verification. As a leader in identity verification and security, there are more than a few factors that make Uniken stand out. By delivering a systematic approach to identity verification and security, one that focuses on safety, simplicity, and consistency, Uniken ensures that a bottom- up solution for the consumer makes security across all channels more reliable and resilient. Secondly, getting rid of the cumbersome elements of security management is core to Uniken’s advanced solution. Instead of trying to figure out what you put down as the answer for the question ‘what's your favorite type of ice cream?’, the customer can get back to what’s really important: verifying their identity in a quick and seamless manner. Uniken implements natural and real-time interactions through device biometrics to accurately perceive and verify identity. And lastly, what makes Uniken the ever- expanding and evolving company it is today is it’s focus on emerging markets. Uniken got its start from emerging markets and this, as Gandhi points out, is what helps Uniken go beyond the US market. “There's the concept of strong customer authentication in the developed world. But what we wanted to do was build for a product in emerging markets too. We said let's build a platform that's global in nature that meets the demands of the global marketplace.” This means that Uniken’s REL-ID, which is SOC2 certified, is able to meet the demands of global compliance requirements. And, Uniken is SOC2 certified. Factors like the different velocity levels of cyber attacks between more developed and less developed countries are accounted for. This also means that price points are also accounted for while still providing the same commitment to service. And, most importantly, it means that the most vulnerable of people are guaranteed protection and seamless identity verification. “We're in the identity business, but identity is about protecting somebody. It's about protecting their identity, protecting their data, protecting their money. And for our clients, it's about making sure they don't encounter fraud,” Gandhi says. All of this makes Uniken stand out, but REL-ID, Uniken’s in-house, all-in-one security solution, is what really puts them above and beyond the rest of their competitors. On Uniken’s website, REL-ID is described as an “authentication and security platform that safeguards the entire identity chain, including devices, applications, and networks.” Gandhi touches on this further by emphasizing the different capabilities REL-ID provides, including an endpoint threat detection that does full root jailbreak and identifies malware, both signature based and polymorphic. REL-ID also does device, app, and biometric identity creation in both private and public keys. On top of that, REL-ID provides an enhanced cryptographic digital signing capability. And most significantly, identity verification is first and foremost which includes things like onboarding a user from scratch, scanning countless government documents without asking the user the document or country type, pulling all the necessary data out, conducting a liveness check which is beta-level 2 certified (which is the gold standard) and all of it at an automatic rate for the user. All of this efficiently legitimizes the user and feeds this information back to client-facing organizations that can now trust the user’s identity faster and with greater assurance. As well, this process begins with the understanding that REL-ID is an SDK so it goes to the user’s mobile app. There’s no third-party app involved. Instead, Uniken offers a very flexible deployment model, including options for deployment on-prem, in a customized cloud environment, or as a SaaS solution. To demonstrate the kind of dynamic, efficient, and lid-tight security REL-ID ensures, Gandhi illustrates an important example of how REL-ID can be used in real-time: Say for instance a $50,000 transaction had to be approved. In the past, this would take a considerable amount of time to be able to verify the client and ensure his/her money is transferred. With REL-ID, the process becomes seconds long. Gandhi explains: “I don't even have to call you. I'm just going to shoot you an email that says, ‘I want to move $50,000 to my son for his tuition fees. Please make it happen. Here's the details.’ My banker gets it and works to utilize REL-ID. They process my request through REL-ID’s system. It sends a message to my phone that says, ‘You have a message from so-and-so.’ I click it, it opens the app, it does all the security features and says, “So-and-so just want to make sure you want to transfer $50,000 from this account to this account for my son’s tuition. Do we have your permission?’ I click yes. Terms and conditions pop up that I have to read and agree to. I digitally sign that cryptographically and, because it’s a significant transaction, it says, ‘Please, let's take a selfie.’ It's not a selfie. It's a video file. I hold the phone up, it clicks, verifies straight through processing. It took about 12 seconds. And I could do it anytime, anywhere.” The client is verified using several security capabilities, and in a record amount of time. What’s more, REL-ID is made up of a series of at-rest API’s, meaning the app is protecting and verifying client data at every transaction. Gandhi sees Uniken expanding into every verticle in the near future. “We're growing in every area in every region of the world. I think the most exciting thing for us is we see an opportunity to really innovate with one of our partners in the payment space,” Gandhi says. Uniken’s commitment to innovation is further driven by the fact that its REL-ID solution is integrated into product layer of several major banking firm’s platfroms. In fact, this is happening in other enterprises as well, including retail. The sky’s the limit for Uniken, and as it continues to be one the most innovative identity and security management solution service providers out there, there’s no doubt that its technology and the technology’s capabilities will further transform identity verification at every level of business. 12 PRODUCTS AND SERVICES CORE COMPETENCIES PRODUCT LAUNCHES AND PRESS RELEASES CASE STUDIES AND WHITE PAPERS SENIOR LEADERSHIP TEAM DOMAIN EXPERIENCE OTHER AWARDS AND RECOGNITIONS RESEARCH & DEVELOPMENT (R&D) AND INNOVATIONS BREADTH OF CAPABILITIES AND SERVICES INDUSTRY VISIBILITY, INNOVATION, & IMPACT STRENGTH OF CLIENTS AND GEOGRAPHIC REACH COMPANY SIZE AND GROWTH POTENTIAL13 Products and Services: We thoroughly analyze a company's offerings to assess their quality, uniqueness, and relevance within the industry. Core Competencies: We examine the core strengths and capabilities that set a company apart from its competitors. Product Launches and Press Releases: We take into account a company's recent product launches and noteworthy press coverage, as these indicate their commitment to innovation and market presence. Case Studies and White Papers: We review case studies and white papers to gain insights into a company's expertise and thought leadership in addressing complex challenges. Angel Investments and Acquisitions: We consider angel investments and acquisitions as indicators of a company's growth potential and strategic partnerships. Senior Leadership Team Domain Experience: We value the collective domain expertise of a company's senior leadership, which contributes to their industry knowledge and vision. Other Awards and Recognitions: We take note of any additional awards or recognition a company has received, underscoring their credibility and industry standing. THE STORY BEHIND OUR TOP INNOVATORS LISTING There is a story behind the selection of each company to be added to our elite listing. Rather than selecting random solution providers, our team performs a comprehensive analysis of companies that are providing sophisticated IAM Solutions & Services. After carefully assessing 500 Fortune listed companies, we shortlist businesses that are eligible to be part of our exclusive listing page. To ensure an adaptable and rigorous selection process, we have a dedicated market research team responsible for identifying the most exceptional companies to showcase in the magazine. Their efforts encompass monitoring press releases, researching reports, tracking product launches, case study analysis, considering event sponsors, and more, all with the aim of identifying the most relevant and innovative technology vendors. In evaluating potential companies for inclusion in our list, our evaluation team focuses on several key parameters: Research and Development (R&D) and Innovations: We assess a company's commitment to R&D and its track record of bringing innovative solutions to market. Breadth of Capabilities and Services: We consider the range and depth of a company's capabilities and services, reflecting their ability to cater to diverse client needs. Industry Visibility, Innovation, and Impact: We evaluate a company's visibility within the industry, including their participation in industry events, thought leadership initiatives, and overall impact on the sector. Strength of Clients and Geographic Reach: We take into account the caliber and size of a company's client base, as well as their geographic reach, indicating market acceptance and scalability. Company Size and Growth Potential: Lastly, we consider a company's size and its potential for future growth, reflecting their overall trajectory and market positioning. ANGEL INVESTMENTS & ACQUISITIONSSafeguard your spend.15 Callsign is pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other in the real world. Positive identification of genuine users delivers privacy, safety and minimal friction whilst ensuring that bad actors are blocked. Through a simple Swipe or Type, users can be personally recognized to a 99.999% accuracy, delivering the highest fidelity AI based user recognition for the digital world. I AM is evolving to meet the demands of a digital world characterized by increased complexity, evolving threats, regulatory requirements, and changing user expectations. Organizations need agile and adaptable IAM solutions to stay secure while delivering seamless and user- friendly experiences. Today’s IAM solutions automate user provisioning, deprovisioning, and account management throughout the user's lifecycle. They ensure that users have the appropriate access rights based on their roles and responsibilities, enhancing security and compliance. IGA solutions help organizations manage user identities, entitlements, and permissions more effectively. They provide tools for defining and enforcing policies, auditing access, and ensuring compliance with regulatory requirements. Meanwhile the CIAM solutions focus on managing customer identities and providing secure and seamless access to digital services. They enable organizations to create personalized user experiences, manage consent, and comply with privacy regulations. As the industry is shifting trends, there are numerous solutions and services growing. The Top 10 IAM Solution Providers featured herein have been meticulously selected based on their exceptional contributions, cutting-edge technologies, proven track records, and their commitment to driving IAM excellence. These providers have not only showcased their ability to deliver superior solutions but have also exhibited a deep understanding of the dynamic networking landscape, offering tailored approaches that cater to specific industry needs. We invite you to explore these pages and discover the innovative minds and ground-breaking solutions that are shaping the IAM landscape of tomorrow. CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. Zia Hayat Founder & CEO Management Location Website callsign.com London, England Ehud Udi Mokady Founder & CEO Management Location Website cyberark.com Newton, MA SOLUTIONPROVIDERS 2023 TOP IAMForgeRock®, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world. Using ForgeRock, more than a thousand global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data – consumable in any cloud or hybrid environment. JumpCloud is reimagining the on-prem directory as a cloud- based platform that secures identities, manages devices, and provides safe access to all types of IT resources. JumpCloud's revolutionary directory unifies device and identity on Windows, Mac, and Linux with cloud based SSO, MDM, MFA, PAM, and more. OneLogin by One Identity is the number one value-leader in Identity and Access Management. The company's Trusted Experience Platform™ provides everything a business need to secure workforce, customers, and partners at a price that works with the budget. Headquartered in Aliso Viejo, OneLogin secures over 5,500 customers worldwide, including Airbus, Stitch Fix, and AAA. Optimal IdM is a global provider of innovative and affordable identity access management solutions. We partner with our clients to provide comprehensive, fully customizable enterprise level solutions that meet the specific security and scalability needs of their organizations. Customers include Fortune 1000 companies, as well as Federal, State and Local Government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception" Brad Brooks President Fran Rosch CEO Rajat Bhargava CEO Management Management Management Location Location Location Website Website Website onelogin.com forgerock.com jumpcloud.com San Francisco, CA San Francisco, CA Louisville, CO Larry Aucoin Managing Partner Management Location Website optimalidm.com Lutz, FL SOLUTIONPROVIDERS 2023 TOP IAMAt Ping Identity, the team believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom. The company let enterprises combine best-in-class identity solutions with third-party services they already use to remove passwords, prevent fraud, support Zero Trust, or anything in between. This can be accomplished through a simple drag-and-drop canvas. "WSO2 is an open-source technology provider founded in 2005. It delivers software and cloud solutions that provide foundational technologies for application development and identity and access management. WSO2's suite of tools for application development and customer identity and access management (CIAM) helps these organizations harness the full power of their APIs to securely create and deliver awesome digital experiences." SecureAuth is a next-gen access management and authentication company that enables secure and passwordless, continuous authentication experience for employees, partners and customers. With the only solution that can be deployed in cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world Uniken enables businesses to transform every client interaction more valuable without the threat of fraud, while aligning with compliance requirements. Uniken raises identity from trust to certainty while enhancing customer experience. The company’s REL-ID security platform drives fraud to zero by securing the entire customer journey — from devices, applications, and network connections to customer authentication, transaction verification, and digital signing. Andre Durand Founder & CEO Management Location Website pingidentity.com Denver, CO Paul Trulove CEO Bimal Gandhi CEO Management Management Location Location Website Website secureauth.com uniken.com Irvine, CA New York, NY Sanjiva Weerawarana Founder Management Location Website wso2.com Mountain View, CA SOLUTIONPROVIDERS 2023 TOP IAMJOE GARBER, CHIEF MARKETING OFFICER REVOLUTIONIZING MESSAGING, PLANNING AND DELIVERY TO SCALE MARKETING W hen Joe Garber joined Axiad as CMO in May 2022, it wasn’t his first rodeo, as they say, in terms of running marketing for technology vendors in the GRC space. He had run marketing for major compliance, security, and governance business units at Hewlett Packard Enterprise, Micro Focus (recently acquired by Open Text), and Quest Software – all billion-dollar operations. In those roles he had directed major rebranding efforts, drove awareness activities on a global scale, crafted and executed marketing strategies to drive demand and fuel growth, and led large cross-functional teams to take advantage of emerging opportunities. For instance, while at Hewlett Packard Enterprise, he was tapped with leading HPE Software’s foray into software solutions for privacy regulations that were coming online at that time – e.g., GDPR, CCPA, and many more. He worked with a global third-party consulting firm to map technology to several mission-critical use cases, and then with marketing and sales leadership of all six business units to evangelize and bring those solutions to market worldwide. Mr. Garber has also led significant brand refresh projects for Quest’s One Identity business unit as it advanced its business model to cloud-first, and for Micro Focus following more than a dozen acquisitions in the five years prior. A Significant Pivot: Evolving the Marketing Function That experience would be critical to success in his new role at Axiad, a cybersecurity (passwordless authentication) provider that had been in business for more than a dozen years. While the company had been successful during its first decade, a decision was made in 2022 to evolve from a systems integrator model – that solved complex problems with highly tailored solutions – to a product (SaaS) vendor driven by sales volume. Mr. Garber recognized there were three primary changes that needed to be made in 2023 to increase market share in a rapidly growing authentication market: they needed to: 1) make foundational changes to brand and message; 2) adjust programs from a “random acts of marketing” mindset to one that was much more strategic, with highly integrated outreach and programs; and 3) modify its BDR function so it was more responsive to leads as they were developed. In mid 2022, he kicked of a brand refresh project that analyzed the company’s narrative from two perspectives – both a tops-down view into how Axiad could position and differentiate itself at the corporate level and a bottoms-up look at how the company could better articulate the value delivered by its products. This messaging work was vetted with customers, partners, industry analysts, and thought 400 submissions from around the globe. Gartner subsequently invited Mr. Garber to serve as an expert panelist at their core marketing event and has published a ‘brand refresh success story’ on the work completed by Axiad as well. Looking Ahead: Moving to Scale with AI With a brand refresh, and some key structural changes, now largely complete as a foundation of a unified marketing program, Mr. Garber is looking at what’s next to help further scale the company and continue to differentiate the brand in a crowded market. One focal point is content construction and delivery. In the not-so-distant past, it was said that a prospective customer had to see something six times before he/she took action. In today’s market, industry experts are now saying the number is closer to 15 times. That’s because with so much more information online people are more used to engaging with quick-hit content, and buyers are much more comfortable doing research before they even talk to a salesperson. “I often quote Mark Twain’s ‘if I had more time I’d write you a shorter letter’ when I’m talking about marketing because it captures a both a critical success factor and a core challenge – taking adequate time to deliver a message that is easily digestible,” said Mr. Garber. “That’s never been more important than right now, as rapidly developed, bite-sized, scalable, and meaningful content is likely what will separate successful from unsuccessful marketing programs. To that end, we are looking at how we can carefully use generative AI to develop content like recorded demos – where concepts and voiceover may be produced with the assistance of technology at a faster pace and with fewer cycles needed.” Mr. Garber also notes that there are other key uses of AI that should be considered for marketing as well, including both discriminative AI and predictive AI. For instance, he notes that taking time to analyze your ideal customer profile (ICP) and analyze fit to the ICP within your customer base can help you identify “more like this” to prospect. And leveraging insights from intent data – via a well-structured ABM program – to predict future buying habits, and individualized content needs, can help you move potential buyers through the buying cycle more rapidly. However, Mr. Garber notes that while AI provides many potential benefits for a marketing professional, using it can also pose potential risk. “As with the headlines on generative AI in education scenarios, be careful that content created doesn’t lead to accidental plagiarism or copyright infringement. Plus, and importantly, make sure the technology you use doesn’t inadvertently expose trade secrets or leave a side door open to bad actors that can be used to compromise the company. While there are many readily available AI tools available, be sure you thoroughly screen the provider and understand what security measures they have in place before putting them into action.” leaders, and manifested in core deliverables like a new website and fresh set of assets that were in brand and on message. He also led an effort to align events, digital marketing, campaigns, ABM, and content strategy, and he moved the company from an in-sourced strategy for BDRs to an outsourced model with a third party that had relevant vertical expertise. The results of this effort so far have been sizable. The company is tracking at, or above, target for each of its core marketing KPIs: inquiries, marketing-qualified leads (MQLs), sales-qualified leads (SQLs), cost per lead, and ROI. In fact, at the mid-year point, Axiad had already eclipsed its full-year targets for MQLs and SQLs, and BDR efficiency has increased about 6X on a four-quarter average since the changes were implemented. With respect to effectiveness of the brand refresh, Gartner Research selected Axiad as a finalist for its 2023 Gartner Marketing & Communications Awards – for excellence in Brand Activation and Experience – from a pool of more than Joe Garber CMONext >