SailPoint Features
User on/off Boarding (6)
Self Service Access requests
Based on 44 SailPoint reviews and verified by the G2 Product R&D team.
Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Based on 44 SailPoint reviews and verified by the G2 Product R&D team.
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Based on 43 SailPoint reviews and verified by the G2 Product R&D team.
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Based on 40 SailPoint reviews and verified by the G2 Product R&D team.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Based on 40 SailPoint reviews and verified by the G2 Product R&D team.
Terminate access to multiple applications based on dates
Approval Workflows
Based on 46 SailPoint reviews and verified by the G2 Product R&D team.
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (3)
Self Service Password Reset
Based on 37 SailPoint reviews and verified by the G2 Product R&D team.
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Based on 39 SailPoint reviews and verified by the G2 Product R&D team.
Change users and permissions in bulk
Bi-directional Identity Synchronization
Based on 37 SailPoint reviews and verified by the G2 Product R&D team.
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Governance (2)
Identifies and Alerts for Threats
Based on 37 SailPoint reviews and verified by the G2 Product R&D team.
Alerts administrators when inappropriate access occurs
Compliance Audits
Based on 40 SailPoint reviews and verified by the G2 Product R&D team.
Proactively audits access rights against policies
Administration (8)
Reporting
Based on 43 SailPoint reviews and verified by the G2 Product R&D team.
Standard and customized report creation to ensure appropriate access rights have been assigned
Mobile App
Based on 31 SailPoint reviews and verified by the G2 Product R&D team.
Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights
Ease of set up for target systems
Based on 43 SailPoint reviews and verified by the G2 Product R&D team.
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Based on 41 SailPoint reviews and verified by the G2 Product R&D team.
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
10 reviewers of SailPoint have provided feedback on this feature.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Tracking (3)
Spend Tracking
Provides ability to track and/or map spending on all tools across departments with little to no manual entry.
SaaS Utilization Tracking
Continuously tracks the number of licenses in use and how often they are being utilized. Tracks usage internally or through integrated applications.
User Sentiment Tracking
Allows companies the ability to periodically survey users regarding the effectiveness of SaaS applications and their experience using the tools.
Management (3)
Contract Management
Provides administrative features to renew, track pricing, analyze terms, and outline expiration dates for SaaS contracts.
Application Catalog
Allows companies to select a wide variety of applications to track and manage.
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Insights (4)
Recommendations
Provides recommendations on how to improve your use of existing SaaS tools and recommendations on new SaaS tools
Spend Forecasting and Optimization
Ability to project spend based on contracts signed. Identifies redundant transactions and unnecessary costs.
Peer Benchmarking
Facilitates the comparison of your software products, costs, sentiment, and/or utilization to that of peer companies
Reporting
Creates reports outlining application utilization, cost, user sentiment, and/or functional overlap.
User Experience (3)
Self-Service Experience
This feature was mentioned in 11 SailPoint reviews.
Allows users to set, change passwords easily without interaction from IT staff.
Mobile App Usability
Integrates with your mobile device for use on mobile apps.
Multilingual Support
Accommodates multiple languages.
Authentication (4)
Multi-Factor Authentication
10 reviewers of SailPoint have provided feedback on this feature.
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Biometric Authentication
Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type.
Other Authentication Methods
Provides authentication capabilities outside standard authentication methods such as MFA and biometric .
Role-Specific Authentication
Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives.
Functionality (16)
Structure type
Searches structured, semi-structured, and unstructured data for sensitive data.
Contextual search
Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.
Template algorithms
Has template rules and pattern matching algorithms (PII, PCI, PHI and more)
Custom algorithms
Offers the option to create custom templates and rules based on department, user type and data type.
False-positive management
Offers false-positive management functions
Multiple file and location types
Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)
Real-time monitoring
Monitors data stores in real-time searching for newly created sensitive data.
Dashboard
Offers a dashboard showing specific location of sensitive data.
Compliance
Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.
Reporting
Offers reporting functionality.
User provisioning
79 reviewers of SailPoint have provided feedback on this feature.
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
71 reviewers of SailPoint have provided feedback on this feature.
Offers password management tools to end users.
Single Sign-on
As reported in 74 SailPoint reviews.
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
This feature was mentioned in 76 SailPoint reviews.
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
72 reviewers of SailPoint have provided feedback on this feature.
Authenticates users prior to granting access to company systems.
Multi-factor authentication
71 reviewers of SailPoint have provided feedback on this feature.
Offers multi-factor authentication methods to verify a user's identity.
Type (2)
On-premises solution
Based on 67 SailPoint reviews.
Provides an IAM solution for on-prem systems.
Cloud-solution
As reported in 61 SailPoint reviews.
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
68 reviewers of SailPoint have provided feedback on this feature.
Tracks user activities across protected systems.
Reporting
Based on 76 SailPoint reviews.
Provides reporting functionality.
Access & Permission Change Reporting
As reported in 29 SailPoint reviews.
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
This feature was mentioned in 27 SailPoint reviews.
Provide standardized reports for regulatory compliance and audits.
Monitoring (5)
Investigate
Investigate identity threats with contextual user information.
Monitoring
Monitor & detect malicous identity and privileges activity
Misconfigurations
Identify identity-related misconfigurations.
Integrate
Offers integrations to identity store providers.
Visability
Provide full coverage of identity estate with granular detail.
Remediation (2)
Remediation
Remove unauthorized accounts and excessive privileges
Audit
Provides full audit trail with notifications, ticketing, and compliance information.
Access control - Cloud Infrastructure Entitlement Management (CIEM) (4)
Policy Management
Helps define policies for access management
Fine-Grained Access Control
Uses principle of least privilege to ensure access control at granular level of specific resources and apps
Role-Based Access Control (RBAC)
Enables organization to define roles and assign access based on these roles
AI-driven access control
Streamlines the management of user access through AI
Monitoring - Cloud Infrastructure Entitlement Management (CIEM) (2)
Monitoring
Tracks and logs user activities, access requests, and changes to entitlements
AI-based detection
Detects and remediates risky, misconfigured permissions for human and machine identities using AI
Auditing - Cloud Infrastructure Entitlement Management (CIEM) (2)
Visibility
Provides visibility into all users and identities across the system
Compliance Reporting
Provides reporting capabilities to demonstrate compliance
App Management (6)
App Usage Monitoring
Tracks SaaS application usage by user, team, and department.
Custom Workflows
Enables creation of tailored automations for IT and admin tasks.
Shadow IT Discovery
Identifies both sanctioned and unsanctioned SaaS applications in the environment.
Self-Service App Store
Allows employees to request and access approved SaaS applications.
Centralized Management Console
Offers a unified interface for managing licenses, users, and applications.
Onboarding & Offboarding Automation
Automates workflows for provisioning and deprovisioning user access.
Security (3)
Role-Based Access Control
Assigns access based on user roles and policy rules.
Threat Detection Alerts
Sends alerts on unauthorized access or app misconfigurations.
Compliance Monitoring
Tracks regulatory compliance across SaaS applications.
AI Features (2)
Auto-fill Custom App Details
Populates custom app metadata using AI.
AI Assistant
Provides real-time answers to questions about licenses, apps, and usage.
Spend Management (6)
Budget Tracking
Tracks SaaS application spend against allocated budgets.
Vendor Consolidation Insights
Identifies opportunities to reduce spend by consolidating redundant or overlapping vendors.
Renewal Notifications
Sends alerts for upcoming contract renewals.
AI Contract Parsing
Uses AI to extract line items, auto-renewals, and key terms from SaaS contracts.
Cost Allocation
Assigns SaaS costs to departments, teams, or business units.
Renewal Spend Forecasting
Projects upcoming renewal costs based on contract and license data.
Agentic AI - Sensitive Data Discovery (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - SaaS Spend Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - SaaS Management Platforms (SMP) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
25 reviewers of SailPoint have provided feedback on this feature.
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
This feature was mentioned in 28 SailPoint reviews.
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Based on 25 SailPoint reviews.
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
23 reviewers of SailPoint have provided feedback on this feature.
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
As reported in 22 SailPoint reviews.
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Based on 22 SailPoint reviews.
Suggest appropriate user roles based on usage patterns and peer behavior.
Discovery & Classification - Data Security Posture Management (DSPM) (3)
Continuous real‑time monitoring
Provide real‑time visibility into data exposures and activities.
Discover & classify sensitive data
Automatically scan across cloud, SaaS, on‑prem environments to locate and tag sensitive data.
Custom classification support
Allow business‑specific or regulatory data labels beyond default frameworks.
Risk Prioritization - Data Security Posture Management (DSPM) (3)
Detect excessive entitlements & toxic combinations
Identify over‑permissioned users, roles, or accounts in combination with misconfigurations.
Compliance posture assessment
Assess data risks against regulatory frameworks and internal policies.
Risk‑based exposure scoring
Prioritize findings based on data sensitivity, exploitability, and business impact.
Remediation & Governance - Data Security Posture Management (DSPM) (3)
Guided remediation actions
Provide context‑aware recommendations for fixing exposures (e.g., revoke access, encrypt, misconfiguration remediation).
Integration with enforcement tools
Integrate with CSPM, CIEM, SOAR, SIEM for automated policy enforcement.
Track remediation progress & trends
Monitor posture over time and track remediation efforts.
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions (3)
Credential Rotation & Revocation
Supports automated rotation and revocation of credentials or tokens for non-human identities.
Automated Registration & Provisioning
Automates the creation of non-human identities (devices, bots, service accounts) according to policy.
De-Provisioning & Retirement
Removes or disables non-human identities when they are no longer required or the workload is retired.
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions (3)
Fine-Grained Access Control
Enforces least-privilege access for non-human identities via granular permissions and scopes.
Machine-Native Authentication Methods
Supports authenticating non-human identities using tokens, certificates, or machine-native credentials rather than human-oriented logins.
Contextual / Just-In-Time Access
Provides dynamic, context-based access for non-human identities (e.g., JIT elevation, temporal constraints).
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions (4)
Policy Enforcement & Governance
Applies and enforces policies (e.g., least-privilege, separation-of-duties) specifically for non-human identities.
Audit Logging & Activity Monitoring
Logs and monitors all access and usage of non-human identities for forensic and compliance purposes.
Integration with IAM/Cloud/DevOps Ecosystem
Integrates non-human identity management with existing identity-access systems, DevOps pipelines, and cloud infrastructure.
Discovery & Inventory of Non-Human Ids
Discovers, classifies, and maintains an inventory of all non-human identities across environments.





