{"id":16002,"date":"2026-03-25T10:06:38","date_gmt":"2026-03-25T10:06:38","guid":{"rendered":"https:\/\/newestek.com\/?p=16002"},"modified":"2026-03-25T10:06:38","modified_gmt":"2026-03-25T10:06:38","slug":"6-key-trends-reshaping-the-iam-market","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16002","title":{"rendered":"6 key trends reshaping the IAM market"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>The <a href=\"https:\/\/www.csoonline.com\/article\/518296\/what-is-iam-identity-and-access-management-explained.html\">identity and access management (IAM)<\/a> market has shifted its focus from traditional \u201clogin and MFA\u201d mechanisms toward treating identity as a security control plane.<\/p>\n<p>Buyers are prioritizing phishing-resistant authentication, including passkeys, and the <a href=\"https:\/\/www.csoonline.com\/article\/2132294\/what-are-non-human-identities-and-why-do-they-matter.html\">management of non-human identities<\/a>, according to an array of experts quizzed on developments in the market by CSO.<\/p>\n<p>\u201cWorkforce access is still the anchor, but more programs now pull in governance, privileged access, and controls for non-human identities because those gaps are where attackers and auditors keep finding leverage,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/gattaca\/?originalSubdomain=ca\">Dave Lewis<\/a>, global advisory CISO at password management tools vendor 1Password.<\/p>\n<p>While the overall European cybersecurity market grew by 7.5% in 2025, IAM surged by 10.8%, according to industry analysts Context.<\/p>\n<p>As of January 2026, the market has accelerated even further, showing a 24% year-over-year (YoY) increase in the first month alone.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/joehturner\/?originalSubdomain=de\">Joe Turner<\/a>, global director of research and business development at Context, says the market growth reflects how \u201csecuring the user\u201d has become a spending priority in many enterprise security programs.<\/p>\n<h2 class=\"wp-block-heading\" id=\"agentic-ai-shakes-up-iams-future\">Agentic AI shakes up IAM\u2019s future<\/h2>\n<p>The increased need to manage non-human identities \u2014 machine identities, AI agents, secrets \u2014 is one vector shaping the evolution of IAM, as both a technology and a market.<\/p>\n<p>\u201cNon-human identities \u2014 service accounts, API keys, AI agents, and IoT devices \u2014 are rising significantly, and in most enterprises they already outnumber human users by around three to one,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/paul-hanagan-52a3269\/?originalSubdomain=uk\">Paul Hanagan<\/a>, CTO of Conscia UK, a provider of secure and complex digital infrastructures.<\/p>\n<p>The IT industry is moving past the introduction of AI technologies toward agentic AI, where autonomous agents act on behalf of users with increasing autonomy. This transformation requires a <a href=\"https:\/\/www.csoonline.com\/article\/4089732\/rethinking-identity-for-the-ai-era-cisos-must-build-trust-at-machine-speed.html\">rethink in how security controls manage identities and access<\/a> to resources.<\/p>\n<p>\u201cThe volume and independence of these [AI] entities demands careful monitoring, with least-privilege enforcement and secret keys rotated regularly to ensure non-human identities are secure,\u201d Hanagan says. \u201cHackers are increasingly targeting non-human identities to gain access, so these services must be secured with the same rigor as human accounts.\u201d<\/p>\n<p>AI should play a big role in behavior analytics, entitlement management, and configuration management by helping to build an identity fabric that bridges security and governance.<\/p>\n<p>\u201cTo work effectively, AI agents will need continuous access to all sorts of data, which will lead to rapid behavioral changes,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/jonoltsik\/\">Jon Oltsik<\/a>, analyst in residence at SiliconAngle and theCUBE. \u201cWe\u2019ll need policies and guardrails here.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"passwordless-authentication-on-the-rise\">Passwordless authentication on the rise<\/h2>\n<p>Passwords have long been <a href=\"https:\/\/www.csoonline.com\/article\/4042464\/enterprise-passwords-becoming-even-easier-to-steal-and-abuse.html\">the weakest link in most security architectures<\/a>.<\/p>\n<p>Many mobile phones and laptops already use biometrics for authentication, and the user experience is typically far better than typing a long and complex password into an interface.<\/p>\n<p>The growing uptake of <a href=\"https:\/\/www.csoonline.com\/article\/649083\/10-passwordless-authentication-solutions.html\">passwordless authentication<\/a> (FIDO2\/<a href=\"https:\/\/www.csoonline.com\/article\/1312195\/redefining-multi-factor-authentication-why-we-need-passkeys.html\">passkeys<\/a>, biometrics) is redefining the scope of many IAM projects.<\/p>\n<p>\u201cMany enterprises are still in the early stages of deploying passkeys and FIDO2, and biometrics are often deployed as part of a broader MFA strategy, where hardware costs and management overhead <a href=\"https:\/\/www.csoonline.com\/article\/4085426\/your-passwordless-future-may-never-fully-arrive.html\">remain barriers to widespread adoption<\/a>,\u201d says Conscia\u2019s Hanagan.<\/p>\n<h2 class=\"wp-block-heading\" id=\"regulations-shake-up-iam-architectures\">Regulations shake up IAM architectures<\/h2>\n<p>The regulatory environment has evolved from a tick-box exercise in compliance toward governance and continuous testing to demonstrate corporate adherence to regulations. That shift, according to Conscia\u2019s Hanagan, is actively reshaping how organizations architect their IAM programs.<\/p>\n<p>\u201cThere is a significant amount of regulatory work under way,\u201d he says. \u201cGDPR, <a href=\"https:\/\/www.csoonline.com\/article\/3568787\/eus-nis2-directive-for-cybersecurity-resilience-enters-full-enforcement.html\">NIS2<\/a>, DORA, PCI DSS 4.0, and sector-specific frameworks all focus on who accesses what, when, and why.\u201d<\/p>\n<p>Hanagan adds: \u201cThe EU often takes a different approach to the UK \u2014 <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/eidas-regulation\">eIDAS 2.0<\/a>, for example, is driving digital identity wallet adoption across Europe \u2014 which makes compliance particularly difficult for multinational enterprises spanning multiple regions.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"sovereign-iam-and-eidas-2-0-decentralize-identity\">Sovereign IAM and eIDAS 2.0 decentralize identity<\/h2>\n<p>With the introduction of the <a href=\"https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/spaces\/EUDIGITALIDENTITYWALLET\/pages\/694487738\/EU+Digital+Identity+Wallet+Home\">European Digital Identity (EUDI) Wallet<\/a>, companies are looking at decentralized identity architectures.<\/p>\n<p>\u201cInstead of storing user data, European firms are becoming \u2018relying parties,\u2019 verifying identities through cryptographic proof via government-backed digital wallets to reduce PII [personally identifiable information] liability and comply with the EU Data Act, particularly regarding data minimization,\u201d Context\u2019s Turner says.<\/p>\n<h2 class=\"wp-block-heading\" id=\"managed-iam-services-make-their-pitch\">Managed IAM services make their pitch<\/h2>\n<p>Issues such as the cybersecurity workforce gap and the technical complexity of IAM in the modern enterprise are impacting both CISOs\u2019 identity and access strategies and the direction of the IAM market.<\/p>\n<p>\u201cMost organizations are running hybrid estates alongside SaaS sprawl, and the identity surface is fragmented across multiple directories, legacy apps, and inconsistent entitlement models,\u201d 1Password\u2019s Lewis says.<\/p>\n<p>To bridge the challenges posed by this complexity in the face of talent shortages, many organizations are turning to managed IAM services, according to Conscia\u2019s Hanagan.<\/p>\n<p>\u201cModern IAM solutions are complex to set up and require deep knowledge and expertise,\u201d he says. \u201cWhen this is coupled with the fear that AI may displace roles \u2014 which discourages new entrants into the profession \u2014 and tightening regulation, it takes its toll on why modern IAM projects struggle to progress at pace.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"the-iam-industry-consolidates\">The IAM industry consolidates<\/h2>\n<p>The IAM market is going through a period of consolidation as vendors vie to build the most comprehensive platforms while tackling the problem of managing machine identities and AI agents.<\/p>\n<p>Notable IAM M&amp;A activity over recent months include:<\/p>\n<ul class=\"wp-block-list\">\n<li>Last July, <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2025\/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leader\">Palo Alto Networks acquired privileged access management firm CyberArk for $25 billion<\/a>.<\/li>\n<li><a href=\"https:\/\/delinea.com\/news\/delinea-acquires-strongdm-to-secure-ai-with-continuous-authorization\">Delinea announced plans to acquire universal access management firm StrongDM<\/a> in March. StrongDM provides \u201cjust-in-time\u201d access for DevOps and AI agents, moving Delinea from offering static password management to offering a platform for dynamic, runtime authorization. Financial terms of the deal were not disclosed.<\/li>\n<li><a href=\"https:\/\/www.crowdstrike.com\/en-us\/press-releases\/crowdstrike-to-acquire-sgnl-to-transform-identity-security-for-ai-era\/\">CrowdStrike has announced deals to acquire identity security startup SGNL for $740 million<\/a> and browser security startup <a href=\"https:\/\/www.crowdstrike.com\/en-us\/press-releases\/crowdstrike-to-acquire-seraphic-security\/\">Seraphic Security for $420 million<\/a> in January 2026. SGNL provides the ability to grant access based on real-time context (e.g., \u201cAllow this dev to see the database only while they have an active Jira ticket.\u201d)<\/li>\n<li><a href=\"https:\/\/www.zscaler.com\/press\/zscaler-acquires-squarex\">Zscaler snapped up SquareX<\/a> in February 2026, allowing it to acquire browser security technology that can detect identity-based attacks on unmanaged devices.<\/li>\n<li><a href=\"https:\/\/www.sophos.com\/en-us\/press\/press-releases\/2026\/02\/sophos-acquires-arco-cyber\">Sophos is buying Arco Cyber<\/a> in a deal focused on bringing AI-powered governance to the midmarket. \u201cIt [the deal] targets those 50- to 500-seat companies that lack a full-time CISO but need to meet the new UK Cyber Security Bill requirements,\u201d Context\u2019s Turner says.<\/li>\n<\/ul>\n<p><strong>See also:<\/strong><\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4009316\/how-cybersecurity-leaders-can-defend-against-the-spur-of-ai-driven-nhi.html\">How cybersecurity leaders can defend against the spur of AI-driven NHI<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4109999\/agentic-ai-already-hinting-at-cybersecuritys-pending-identity-crisis.html\">Agentic AI already hinting at cybersecurity\u2019s pending identity crisis<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4085426\/your-passwordless-future-may-never-fully-arrive.html\">Your passwordless future may never fully arrive<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/2132294\/what-are-non-human-identities-and-why-do-they-matter.html\">What are non-human identities and why do they matter?<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/4123184\/always-on-privileged-access-is-pervasive-and-fraught-with-risks.html\">Always-on privileged access is pervasive \u2014 and fraught with risks<\/a><\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/1312195\/redefining-multi-factor-authentication-why-we-need-passkeys.html\">Redefining multifactor authentication: Why we need passkeys<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The identity and access management (IAM) market has shifted its focus from traditional \u201clogin and MFA\u201d mechanisms toward treating identity as a security control plane. Buyers are prioritizing phishing-resistant authentication, including passkeys, and the management of non-human identities, according to an array of experts quizzed on developments in the market by CSO. \u201cWorkforce access is still the anchor, but more programs now pull in governance,&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16002\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16002","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16002"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16002\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}