Executive View: Saviynt Security Manager for Enterprise IGA - 80325

Report Details

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functionality. Designed to be deployed as a cloud, hybrid, or on-premise solution, the Saviynt Security Manager for Enterprise IGA helps customers demonstrate assured compliance using their access governance and risk intelligence capabilities.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title
Jan 15, 2020

Executive View: Saviynt Security Manager for Enterprise IGA - 80325

Saviynt offers a comprehensive compliance-as-a-service platform providing Identity Governance and Management, Application Risk and Governance, Cloud Security, and Cloud PAM functionality. Designed to be deployed as a cloud, hybrid, or on-premise solution, the Saviynt Security Manager for…

Read on KC PLUS

Latest Related Reports

Executive View

Oracle Cloud Guard

Poorly managed security controls within a cloud services tenant's resources are increasingly the cause of security incidents and compliance failures. CSPM (Cloud Security Posture Management) tools provide functionality to address this challenge. This report provides a review of Oracle Cloud…

Executive View

Microsoft Cloud App Security

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services.…

Market Compass

Cloud-delivered Security

The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge (SASE) functional capabilities and user experiences targeted towards employees and other end users.

Market Compass

SOC as a Service

The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment.  This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market that has emerged and continues to develop in response to demand for security…

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and operating system level only, but involves business systems such as SAP S/4HANA. Identifying, analyzing, and…

Advisory Note

Redefining Access Governance: A broader perspective

Traditional approaches to Access Governance are no longer fit for purpose due to the complexity of modern IT environments, increased security risk, and growing regulatory compliance requirements.  A new risk-based and policy-based approach is needed to reduce the cost, effort, and…

Whitepaper

Safeguarding Your Most Valuable Data: Five Key Criteria to Assess Cloud Provider Security

This whitepaper focuses on defining the key security-focused selection criteria to help your company choose a secure platform for current and future cloud projects.

Executive View

UNITY: IGA Modernization Framework by Persistent

Inevitably, every organization with digital security and governance requirements will go through iterations of IAM and IGA system modernization efforts. Persistent Systems' Unity provides the necessary migration framework to facilitate an IGA modernization transition.

Executive View

SAP Cloud Identity Access Governance

SAP Cloud Identity Access Governance (IAG) is the SaaS solution provided by SAP for managing access risks and SoD controls from the cloud, for both SaaS business applications and a range of on-premises services. It covers areas such as Access Analytics, Role Management, Access Requests,…

Leadership Compass

Access Governance & Intelligence

The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providing you a compass to help you find the products that can meet the criteria necessary for successful AG deployments.


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00