Confirming that a user is who he or she claims to be involves far more than entering credentials. Today's environment requires that all individuals have a digital identity, which determines what they can access and how. That requirement is all the more complex when extended to a cloud environment, or when trusted partners are factored into the equation.

Products recognized in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.