logo--saviynt-white.png




"Saviynt Offers an Identity-Focused Governance Approach
to Tackle Cloud Workload Security"

By Fernando Montenegro, Industry Analyst


451 Research has released a new report evaluating Saviynt's Identity Governance and Administration (IGA) product offering.


As 451 Research has mentioned, Saviynt has framed its cloud infrastructure access governance offering around strongly tying user identities to cloud infrastructure resources and events. The offering aims to address a variety of use cases, including, among others: ƒ

  • Providing visibility into how various cloud elements may have security misconfigurations or policy deviations from recommended practices or accepted standards that can introduce vulnerabilities.
  • Maintaining continuous compliance. Once an environment has been properly configured, maintaining an approved configuration can be achieved via automation. Should a violation be detected, the system can terminate the violating elements and roll back changes. ƒ
  • Simplifying access governance, including privileged access management. Drawing on Saviynt’s roots in identity governance, its offering can automate and control the granting of special privileges to accounts, including provisioning, de-provisioning, and attestation of activities.



"Saviynt Offers an Identity-Focused Governance Approach
to Tackle Cloud Workload Security”

-Fernando Montenegro, Sr. Analyst, Information Security,  451 Research

451 Research has released a new report evaluating Saviynt's Identity Governance and Administration (IGA) product offering.


From the report: Saviynt has framed its cloud infrastructure access governance offering around strongly tying user identities to cloud infrastructure resources and events. The offering aims to address a variety of use cases, including, among others: ƒ

  • Providing visibility into how various cloud elements may have security misconfigurations or policy deviations from recommended practices or accepted standards that can introduce vulnerabilities.
  • Maintaining continuous compliance. Once an environment has been properly configured, maintaining an approved configuration can be achieved via automation. Should a violation be detected, the system can terminate the violating elements and roll back changes. ƒ
  • Simplifying access governance, including privileged access management. Drawing on Saviynt’s roots in identity governance, its offering can automate and control the granting of special privileges to accounts, including provisioning, de-provisioning, and attestation of activities.

Fill the form below to get your Complimentary Access


© 2018 Saviynt Inc.
GET REPORT

FB.png Linkd.png Twitter.png Youtube.png