Introducing G2.ai, the future of software buying.Try now

Best Cloud Infrastructure Entitlement Management (CIEM) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud infrastructure entitlement management (CIEM) software, also sometimes referred to as cloud permissions management software, is a security solution that manages user privileges or "entitlements" in cloud environments. The software controls access to applications, infrastructure, and resources in the cloud environment using the principle of least privileges (POLP). The least privilege policy is an integral part of the zero trust policy that limits the attack surface of security threats by restricting access in the cloud landscape.

CIEM software manages user accounts, defines user roles, and provides access control to ensure only the right users have access to resources, which reduces unauthorized access. Companies with complex cloud landscapes, as well as numerous teams and users, can use CIEM software to secure their cloud environments and ensure compliance. Security and IT operations teams use this tool to control access privileges and monitor the cloud environment for unauthorized access.

CIEM solutions have some features that overlap with identity and access management (IAM) software as both provide authentication and access control. However, they have distinct purposes. IAM focuses on user authentication, authorization, and access control across an organization's IT systems, both on-premises and in the cloud. CIEM extends its scope to include cloud infrastructure and endpoint management, addressing the broader challenges of managing cloud resources, securing endpoints, and ensuring cloud security and compliance.

To qualify for inclusion in the Cloud Infrastructure Entitlement Management (CIEM) category, a product must:

Provide visibility into all cloud assets and access privileges
Remove any unused privileges
Continuously monitor the environments, detect any violations, and perform automatic remediation
Show More
Show Less

Best Cloud Infrastructure Entitlement Management (CIEM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud Infrastructure Entitlement Management (CIEM) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
23 Listings in Cloud Infrastructure Entitlement Management (CIEM) Available
(738)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 54% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    114
    Features
    105
    Security
    101
    Visibility
    80
    Easy Setup
    74
    Cons
    Feature Limitations
    35
    Improvement Needed
    35
    Improvements Needed
    32
    Learning Curve
    30
    Missing Features
    29
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    18,784 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 54% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
114
Features
105
Security
101
Visibility
80
Easy Setup
74
Cons
Feature Limitations
35
Improvement Needed
35
Improvements Needed
32
Learning Curve
30
Missing Features
29
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
18,784 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(222)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Features
    44
    Security
    42
    Cloud Security
    32
    Visibility
    31
    Cons
    Improvement Needed
    22
    Feature Limitations
    17
    Missing Features
    16
    Improvements Needed
    14
    Poor Reporting
    13
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,848 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    453 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Features
44
Security
42
Cloud Security
32
Visibility
31
Cons
Improvement Needed
22
Feature Limitations
17
Missing Features
16
Improvements Needed
14
Poor Reporting
13
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,848 Twitter followers
LinkedIn® Page
www.linkedin.com
453 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(111)4.8 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    37
    Vulnerability Detection
    37
    Threat Detection
    31
    Detection Efficiency
    30
    Visibility
    27
    Cons
    Feature Limitations
    13
    Missing Features
    10
    Complexity
    9
    Learning Curve
    8
    Difficult Learning
    7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    660 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
37
Vulnerability Detection
37
Threat Detection
31
Detection Efficiency
30
Visibility
27
Cons
Feature Limitations
13
Missing Features
10
Complexity
9
Learning Curve
8
Difficult Learning
7
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,214 Twitter followers
LinkedIn® Page
www.linkedin.com
660 employees on LinkedIn®
(16)4.3 out of 5
6th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudKnox Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities – users and workloa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,570,889 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

CloudKnox Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities – users and workloa

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,570,889 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
(110)4.1 out of 5
8th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    46
    Features
    43
    Security
    41
    Visibility
    36
    Cloud Integration
    33
    Cons
    Expensive
    31
    Difficult Learning
    27
    Learning Curve
    27
    Pricing Issues
    24
    UX Improvement
    20
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,297 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,872 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Enterprise
  • 32% Mid-Market
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
46
Features
43
Security
41
Visibility
36
Cloud Integration
33
Cons
Expensive
31
Difficult Learning
27
Learning Curve
27
Pricing Issues
24
UX Improvement
20
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,297 Twitter followers
LinkedIn® Page
www.linkedin.com
17,872 employees on LinkedIn®
Ownership
NYSE: PANW
(147)4.5 out of 5
7th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 80% Enterprise
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SailPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Features
    20
    Customer Support
    15
    Integrations
    15
    Security
    15
    Cons
    Poor Customer Support
    14
    Improvement Needed
    12
    Expensive
    11
    Missing Features
    10
    Cost
    9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SailPoint
    Company Website
    Year Founded
    2004
    HQ Location
    Austin, TX
    Twitter
    @SailPoint
    15,061 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,341 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 80% Enterprise
  • 14% Mid-Market
SailPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Features
20
Customer Support
15
Integrations
15
Security
15
Cons
Poor Customer Support
14
Improvement Needed
12
Expensive
11
Missing Features
10
Cost
9
Seller Details
Seller
SailPoint
Company Website
Year Founded
2004
HQ Location
Austin, TX
Twitter
@SailPoint
15,061 Twitter followers
LinkedIn® Page
www.linkedin.com
3,341 employees on LinkedIn®
(25)4.6 out of 5
3rd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sonrai Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    12
    Security
    12
    Cloud Management
    10
    Ease of Use
    9
    Cloud Technology
    8
    Cons
    Complexity
    3
    Expensive
    3
    Feature Limitations
    3
    Improvement Needed
    3
    Limited Customization
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Sonrai Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
12
Security
12
Cloud Management
10
Ease of Use
9
Cloud Technology
8
Cons
Complexity
3
Expensive
3
Feature Limitations
3
Improvement Needed
3
Limited Customization
3
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(37)4.6 out of 5
View top Consulting Services for Tenable Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 57% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Detailed Analysis
    7
    Visibility
    7
    Cloud Management
    6
    Compliance
    6
    Cons
    Complex Setup
    5
    Expensive
    5
    Difficult Setup
    4
    Setup Difficulty
    4
    Deployment Issues
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,351 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,340 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 57% Mid-Market
  • 38% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Detailed Analysis
7
Visibility
7
Cloud Management
6
Compliance
6
Cons
Complex Setup
5
Expensive
5
Difficult Setup
4
Setup Difficulty
4
Deployment Issues
3
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,351 Twitter followers
LinkedIn® Page
www.linkedin.com
2,340 employees on LinkedIn®
Ownership
NASDAQ: TENB
(384)4.4 out of 5
Optimized for quick response
5th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
View top Consulting Services for FortiCNAPP
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiCNAPP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Security
    20
    Features
    16
    Alert Management
    14
    Vulnerability Detection
    14
    Cons
    Integration Issues
    9
    Difficult Learning
    7
    Improvement Needed
    7
    Missing Features
    7
    Time-Consuming
    7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,497 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire

Users
  • Security Engineer
  • Security Analyst
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
FortiCNAPP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Security
20
Features
16
Alert Management
14
Vulnerability Detection
14
Cons
Integration Issues
9
Difficult Learning
7
Improvement Needed
7
Missing Features
7
Time-Consuming
7
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,497 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Saviynt is a comprehensive identity governance and administration (IGA) solution designed to help organizations manage and secure both human and machine identities. By providing complete visibility an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Enterprise
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saviynt Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Features
    11
    Access Control
    8
    Management Ease
    7
    Customer Support
    6
    Cons
    Limited Features
    7
    Poor Customer Support
    7
    Lack of Features
    5
    Limited Customization
    5
    Missing Features
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Saviynt
    Company Website
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @saviynt
    1,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,381 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Saviynt is a comprehensive identity governance and administration (IGA) solution designed to help organizations manage and secure both human and machine identities. By providing complete visibility an

Users
No information available
Industries
No information available
Market Segment
  • 86% Enterprise
  • 7% Mid-Market
Saviynt Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Features
11
Access Control
8
Management Ease
7
Customer Support
6
Cons
Limited Features
7
Poor Customer Support
7
Lack of Features
5
Limited Customization
5
Missing Features
5
Seller Details
Seller
Saviynt
Company Website
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@saviynt
1,213 Twitter followers
LinkedIn® Page
www.linkedin.com
1,381 employees on LinkedIn®
(79)4.6 out of 5
View top Consulting Services for CrowdStrike Falcon Cloud Security
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Falcon Cloud Security unifies visibility and posture with AI-driven insights, empowering you to quickly investigate threats, prioritize risk with precision, and stop breaches before they happen. -

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    18
    Cloud Security
    14
    Detection Efficiency
    13
    Vulnerability Detection
    12
    Ease of Use
    10
    Cons
    Expensive
    12
    Improvements Needed
    8
    Improvement Needed
    7
    Feature Complexity
    5
    Insufficient Information
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    108,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,831 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Falcon Cloud Security unifies visibility and posture with AI-driven insights, empowering you to quickly investigate threats, prioritize risk with precision, and stop breaches before they happen. -

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 43% Mid-Market
CrowdStrike Falcon Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
18
Cloud Security
14
Detection Efficiency
13
Vulnerability Detection
12
Ease of Use
10
Cons
Expensive
12
Improvements Needed
8
Improvement Needed
7
Feature Complexity
5
Insufficient Information
5
Seller Details
Company Website
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
108,661 Twitter followers
LinkedIn® Page
www.linkedin.com
10,831 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Entitle Just-in-Time Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Documentation
    2
    Security
    2
    Access Control
    1
    Auditing
    1
    Cons
    Complex Queries
    2
    Complex Usability
    2
    Complex Usage
    2
    Difficult Setup
    2
    Admin Management Issues
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,377 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,699 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
BeyondTrust Entitle Just-in-Time Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Documentation
2
Security
2
Access Control
1
Auditing
1
Cons
Complex Queries
2
Complex Usability
2
Complex Usage
2
Difficult Setup
2
Admin Management Issues
1
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,377 Twitter followers
LinkedIn® Page
www.linkedin.com
1,699 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Secure Cloud Access provisions Zero Standing Privileges (ZSP) across multi-cloud environments, scoping just enough permissions to adhere to the principle of least privilege access. CyberAr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Secure Cloud Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    User Interface
    2
    Access Management
    1
    Easy Setup
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,895 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Secure Cloud Access provisions Zero Standing Privileges (ZSP) across multi-cloud environments, scoping just enough permissions to adhere to the principle of least privilege access. CyberAr

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Enterprise
CyberArk Secure Cloud Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
User Interface
2
Access Management
1
Easy Setup
1
Features
1
Cons
This product has not yet received any negative sentiments.
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,659 Twitter followers
LinkedIn® Page
www.linkedin.com
4,895 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CheckRed is a complete cloud security platform (SSPM/CNAPP/CSPM/CIEM/CWPP/Compliance) covering all critical SaaS apps and cloud providers – all in a single, user-friendly, and affordable solution.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CheckRed Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    3
    Security
    3
    Monitoring
    2
    Cloud Management
    1
    Cloud Services
    1
    Cons
    Complexity
    1
    Complex Understanding
    1
    Difficult Learning
    1
    Difficult Setup
    1
    False Positives
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CheckRed
    HQ Location
    5220 Spring Valley Rd Suite 604 Dallas,TX 75254
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

CheckRed is a complete cloud security platform (SSPM/CNAPP/CSPM/CIEM/CWPP/Compliance) covering all critical SaaS apps and cloud providers – all in a single, user-friendly, and affordable solution.

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
CheckRed Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
3
Security
3
Monitoring
2
Cloud Management
1
Cloud Services
1
Cons
Complexity
1
Complex Understanding
1
Difficult Learning
1
Difficult Setup
1
False Positives
1
Seller Details
Seller
CheckRed
HQ Location
5220 Spring Valley Rd Suite 604 Dallas,TX 75254
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trustle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Identity Management
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustle
    Year Founded
    2019
    HQ Location
    Walnut Creek, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Trustle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Identity Management
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Seller Details
Seller
Trustle
Year Founded
2019
HQ Location
Walnut Creek, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®