Identity and access management (IAM) has experienced significant transformation during the past two to three years, from support for cloud workloads and apps, to availability of identity-as-a-service (IDaaS), to new methods of two-factor authentication (2FA), to mobile authentication. In this TechRadar™ report, we identified the 14 most important technology categories for IAM at various stages of market maturity, business value, and user adoption. Use this report to help you figure out which ones you need, and when you should implement them.