Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users’ access to sensitive applications and data without inhibiting business agility, compromising digital experiences for employees and customers, or violating compliance requirements — and they need to do so as cost-effectively as possible to support confidentiality, integrity, and empathy in security and IAM operations. This report helps S&R pros understand the costs, benefits, and ROI for four different IAM deployment models.