Introducing G2.ai, the future of software buying.Try now

Top Free Cloud Infrastructure Entitlement Management (CIEM) Software

Check out our list of free Cloud Infrastructure Entitlement Management (CIEM) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Cloud Infrastructure Entitlement Management (CIEM) Software to ensure you get the right product.

View Free Cloud Infrastructure Entitlement Management (CIEM) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
8 Cloud Infrastructure Entitlement Management (CIEM) Products Available
(752)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    19,832 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
19,832 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(224)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Enterprise
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,839 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    480 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Enterprise
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,839 Twitter followers
LinkedIn® Page
www.linkedin.com
480 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(111)4.1 out of 5
Optimized for quick response
8th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Enterprise
    • 32% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    UL
    Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
    Verified User in Computer Networking
    UC
    Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,414 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Enterprise
  • 32% Mid-Market
Verified User in Logistics and Supply Chain
UL
Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
Verified User in Computer Networking
UC
Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,414 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
(25)4.6 out of 5
3rd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Brendan P.
    BP
    I discovered Sonrai Security at AWS re:inforce 2024, and within 15 minutes, I had a full POC set up in AWS and running—nothing fancy, just smooth... Read review
    PG
    Sonrai's Cloud Permissions Firewall is purpose-built for cloud environments, avoiding the limitations of legacy access management solutions... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers id

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Brendan P.
BP
I discovered Sonrai Security at AWS re:inforce 2024, and within 15 minutes, I had a full POC set up in AWS and running—nothing fancy, just smooth... Read review
PG
Sonrai's Cloud Permissions Firewall is purpose-built for cloud environments, avoiding the limitations of legacy access management solutions... Read review
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Saviynt is a comprehensive identity governance and administration (IGA) solution designed to help organizations manage and secure both human and machine identities. By providing complete visibility an

    Users
    No information available
    Industries
    • Information Technology and Services
    • Manufacturing
    Market Segment
    • 76% Enterprise
    • 7% Mid-Market
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • anatoly v.
    AV
    I appreciate the smooth setup process of Saviynt; it was seamless and hassle-free. The software helps me stay organized and provides ease of login... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Saviynt
    Company Website
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @saviynt
    1,219 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,458 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Saviynt is a comprehensive identity governance and administration (IGA) solution designed to help organizations manage and secure both human and machine identities. By providing complete visibility an

Users
No information available
Industries
  • Information Technology and Services
  • Manufacturing
Market Segment
  • 76% Enterprise
  • 7% Mid-Market
anatoly v.
AV
I appreciate the smooth setup process of Saviynt; it was seamless and hassle-free. The software helps me stay organized and provides ease of login... Read review
Seller Details
Seller
Saviynt
Company Website
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@saviynt
1,219 Twitter followers
LinkedIn® Page
www.linkedin.com
1,458 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 17% Small-Business
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    It allows us to reference permission check out links directly, allowing for auto reponses to our users and freeing up time for our internal support... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,353 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,696 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 17% Small-Business
Verified User in Computer Software
AC
It allows us to reference permission check out links directly, allowing for auto reponses to our users and freeing up time for our internal support... Read review
Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,353 Twitter followers
LinkedIn® Page
www.linkedin.com
1,696 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    1. Authomize has a great feature to create customized access monitoring policies. 2. It offers an access control map for each user 3. Authomize... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authomize
    Year Founded
    2020
    HQ Location
    Alpharetta, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
JS
1. Authomize has a great feature to create customized access monitoring policies. 2. It offers an access control map for each user 3. Authomize... Read review
Seller Details
Seller
Authomize
Year Founded
2020
HQ Location
Alpharetta, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    - Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
    Verified User in Computer & Network Security
    UC
    Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Verified User in Financial Services
UF
- Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
Verified User in Computer & Network Security
UC
Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,498 Twitter followers
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®