New digital business and customer engagement models have extended today's identity boundaries. In response, security pros must now manage identities and access across a variety of populations (employees, partners, and customers), devices, and hosting models to ensure the right people have access to the appropriate level of resources. This report organizes today's diffuse range of identity and access management (IAM) security solutions into seven specific categories and project spending patterns for the global IAM market.