Additional Info

Websitehttps://www.saviynt.com
Company size (employees)100 to 499
Headquarters RegionNorth America

Overview

2017 has been a watershed year for us. Saviynt moved from the Niche Players quadrant to the Challenger’s quadrant in this year’s Magic Quadrant for IGA, and in this year’s Critical Capabilities for IGA, Saviynt moved up to the #1 and #2 positions for all capabilities categories, beating out companies such as Oracle, Dell, IBM, etc. AWS has also awarded Saviynt with their Security Competency, with Saviynt being the only identity management vendor making the cut.

Our revenues have increased over 200% year over year, and our customer list is growing at a phenomenal tick. With global brands trusting us, such as Cisco, Shell, McKesson, Mass Mutual, Kimberly Clark, AOL, and many more, we are becoming the new choice for cloud security.

Saviynt’s mission is to deliver a next-gen security solution that helps organizations adopt cloud technologies with confidence while continuing to protect the critical assets within the enterprise. We are realizing this goal as of this year.

Our customers tell us how critical our platform is to not only their core identity management needs, but to their overall level of security and efficiency in running their business. Giving companies the ability to manage access down to the fine grained entitlement level, for example, allows the right users to access critical assets or applications that they need at the right time, and prevent unwanted access, keeps our overall mission and vision in check.

How we are different

Identity Analytics - Our Analytics platform is based on big data algorithms and peer group analysis and patterns of usage allowing us to alert to problems before they become a security violation. No one else has the fine-grained data to be able to report on the usage patterns or peer group comparisons.
Cloud based IGA - We have a fully functional IGA solution in AWS or Azure, and none of our competitors have all of their features operating in a cloud based instance.
Continuous Risk Based Controls - Our controls are pre-built (others need to be built), ours are based on usage intelligence so you know when the controls or SOD rules are ACTUALLY violated. Other tools know there’s a possibility of a violation, but can’t confirm when it does occur. No usage data.