•  High level deliverance and efficiency have driven businesses to implement heterogeneous technology environment. Managing information and data access from various platforms have increased-both internally and externally. With Backdoor, Cryptosystem, chipset, Homunculus computer and so many-the list is never ending and so is the list of solution. Hence the increased realizations for balancing data access controls and strengthen security to protect the business identity. But one solution is taking all these in its stride-Identity and Access Management (IAM). From helping monitor the user access in various platforms, security policy information, business identity governance to reduce costs with agility to adapt various business initiatives, IAM have strengthened Access management without restricting productivity. IAM system and products manage the method of protection and support with network protocols, digital certificates and passwords while identifying ancillary data of users, computer related hardware and software applications also. Current market strategy is mostly dousing fire at point-by-point basis but what we really need is one unified strategy. Also to simply understand everything a user can access and what can be done with that access gives a powerful insight to implement a correct IAM structure. And just because every current company data is uploaded in Cloud, the work of a good IAM is paramount to secure them. All these suggests -with inappropriate IAM structure the agility of company gets limited and with the right IAM system there is no fear of impeding a company’s growth. We, a distinguished panel of CEOs, CIOs, industry analysts and the CIOReview editorial team have therefore come up with a list of “20 Most Promising IAM Solution Providers”. These vendors, we believe, are here to stay bridging efficiency and security of company thus completing the trust circle of company, users and customers.