Demo Day

Deploying The New AML Playbook - April 29, 9:30 AM

Register Now

Blog

5 Takeaways from Our IAM Demo Day

August 26, 2025

iam-demo-day-blog-post-thumbail2

IAM Demo Day 2025: What Buyers Need to Know

When we set out to host the IAM Demo Day, the goal was not just to showcase products. It was to answer a bigger question: what does the future of identity access management actually look like in practice? On August 20, 12 leading vendors gave us their answer. From adaptive authentication and orchestration layers to access governance and Zero Trust enforcement, what became clear is that IAM is no longer a background IT function. It has become the connective tissue between security, compliance, and user experience.

For buyers such as CISOs under pressure to reduce risk, product leaders balancing login friction with conversion, and compliance officers navigating new regulatory regimes, the demos were a reminder that vendor selection in IAM is not about comparing feature checklists, but choosing the architecture your organization will be living with for the next decade.

1. Adaptive Authentication Is the New Baseline

The age of static passwords and “MFA everywhere” is over. Nearly 90% of enterprises experienced an account takeover attempt last year, and the vendors on stage were unanimous: authentication must adapt dynamically to context. Device, location, behavioral signals — these are the new inputs to trust.

As Joe Palmer, CIO at iProov, explained: “Not all biometrics are equal. Device biometrics like Face ID prioritize convenience over security. Cloud biometrics, tied to a trusted ID, are what stop deepfakes.”

He then added, “You don’t need to force a face scan on every login. Zero Trust means you always authenticate, but when risk is high, that’s when biometrics shine.”

The takeaway is clear: if your authentication system treats a suspicious login attempt the same way it treats a low-risk returning user, you are already behind. And for product leaders, the stakes are even higher. Every unnecessary prompt is a drop in conversion, every extra click a lost customer. Adaptive authentication is parting away from being just a security control, and it’s becoming a growth strategy.

2. Identity Orchestration Is Becoming the Control Layer

If authentication is the frontline, orchestration is the command center. Time and again, vendors showcased orchestration layers that knit together logins, consent flows, and user data across disparate systems. Why? Because 74% of organizations still cite fragmented identity data as their biggest challenge.

Think about that. For all the talk of digital transformation, most enterprises are still piecing together identity flows that do not talk to each other. Orchestration platforms promise to end that.

As David Mahdi, CIO at Transmit Security, explained: “You bring in all these third-party solutions… it adds to the complexity. And frankly, attackers love this. That’s where orchestration comes in as the baseline — to unify identity and give you a single confident view of the user.”

Orchestration becomes the difference between weeks of custom integration and a few clicks. It ensures that consent and access policies are enforced consistently, no matter whether a customer logs in through an app, a website, or a third-party service.

But as orchestration stitches systems together, it also shines a light on the next pressing question: who has access, and can you prove it?

3. Access Governance Moves to the Forefront

Once upon a time, access governance was the unglamorous corner of IAM, more a compliance checkbox than a competitive differentiator. Not anymore. Workforce IAM demos leaned heavily on role-based access, privileged account management, and Zero Trust enforcement. The subtext was clear: governance is now make-or-break.

As Filip Verley, our CIO, reminded the audience:  “Zero Trust isn’t just about denying access, it’s about proving the right access. And proving it again and again, in ways that regulators can see.”

Least privilege is not a nice-to-have; it is the only defensible posture in a regulatory audit. The burden of proof is now squarely on the enterprise, and as governance rises in importance for the workforce, a parallel trend is reshaping the customer side of IAM. 

If IAM is splintering into so many dimensions, then buyers themselves must become more specific about what success looks like.

4. Customer IAM Is Becoming the Source of Truth

If there was one forward-looking theme cutting across the demos, it was the push for customer IAM to become the authoritative record of identity. Liminal research shows that 91% of businesses want CIAM solutions that integrate with MDM, and while vendors didn’t use the term “MDM,” they clearly pointed in that direction. Several positioned themselves not just as login providers, but as the backbone for a unified, trustworthy customer record.

As Brook Lovatt, CPO at SecureAuth, explained: “Identity is more than just people; it’s about agents, APIs, and systems that act on behalf of people. If you don’t extend IAM guardrails to them, you’re blind to half your attack surface.”

Why does this matter? Because fragmented identity data is more than a compliance risk; it is a drag on the business. Personalization fails when profiles are scattered, silos expand the attack surface, and regulators will not accept “we couldn’t reconcile the data” as an excuse. The takeaway is clear: IAM is evolving into the system of record for identity, spanning both human and non-human users.

5. Buyer Priorities Are Becoming Role-Specific

The final, and perhaps most important, takeaway is that IAM is no longer one market with one buyer. The demos underscored how fragmented the buyer landscape has become. CISOs want measurable threat reduction. Product leaders demand orchestration that accelerates, not slows, development. Compliance executives expect governance to be mapped cleanly to regulatory frameworks.

In other words, IAM vendors cannot win with generic pitches anymore. They have to prove value to each buyer persona on their terms. And for buyers, the lesson is just as stark: do not settle for “good enough across the board.” Choose the vendor that solves your highest-stakes problem, because IAM is now a competitive differentiator, not a background system.

Watch the Recording

Did you miss IAM Demo Day 2025? You can still catch the full replay of vendor demos and expert insights:
Watch the IAM Demo Day recording here

Yura Nunes
Marketing Director, Liminal

Yura Nunes is the Marketing Director at Liminal, where she leads product marketing, demand generation, and go-to-market strategy. She has over 10 years of experience building and scaling marketing functions for B2B SaaS companies, with a track record spanning product launches, ABM, and pipeline attribution.

Want real-time, personalized insights?

Get full access to real-time competitor tracking, buyer signals, and personalized intelligence delivered straight into your workflow.

Demo Day

Deploying The New AML Playbook
April 29, 9:30 AM

See how leading vendors are deploying AI-powered transaction monitoring, intelligent alert prioritization, and continuous compliance to modernize AML operations.

Register Now