SailPoint is the leading identity governance and administration (IGA) company, providing an AI-powered platform for comprehensive identity security. SailPoint offers both on-premises and cloud-based solutions, giving enterprises centralized control over user access to critical data and applications.
Saviynt is an industry-recognized leader providing a cloud-native solution to enterprises. The Saviynt converged Identity Platform includes solutions for Cloud Security, Cloud Privileged Access Management (CPAM), IGA, External Identity Management, and Application Access Governance.
Okta is a leader in identity and access management (IAM) providing a cloud-based platform as a central hub for people, applications, and devices. Key functionality includes Single Sign-On (SSO), Multi-Factor Authentication (MFA), Universal Directory integration, and user lifecycle management.
Microsoft Entra ID is a comprehensive suite of technologies for Identity Security, including IGA, IAM (SSO, MFA, and Conditional Access), and PAM. For customers heavily invested in the Microsoft ecosystem, it offers a closely integrated and potentially cost-effective solution.
CyberArk is a PAM market leader, providing a comprehensive set of privileged account security tools and controls for lateral movement mitigation. Password Vaulting, Just-in-Time Privileged Access, Session Monitoring and Recording, and Least Privilege Enforcement are available functionality.
Established on the concept of Zero Trust, Delinea is a leading provider of PAM solutions, providing Password Vaulting, Just-in-Time Privileged Access, Session Monitoring and Recording, Elevation Control and Monitoring, and Remote Access Security for modern, hybrid enterprises.
Ping and ForgeRock’s combined capabilities uniquely address Customer IAM (CIAM) and Workforce identity, including fraud and risk protection, identity verification, decentralized identity, fine-grained authorization, lifecycle management and IGA.
Tenable is a market leader in Exposure Management, with a focus on Vulnerability Management, which scans systems for known vulnerabilities. The core features include a risk-based prioritization, continuous monitoring, attack surface management, and compliance management.