Saviynt Features
User on/off Boarding (6)
Self Service Access requests
Based on 12 Saviynt reviews. Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps This feature was mentioned in 12 Saviynt reviews.
Role Management
Based on 12 Saviynt reviews. Establish roles that create a set of authentication rights for each user in the role
Policy Management
As reported in 12 Saviynt reviews. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
As reported in 12 Saviynt reviews. Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow This feature was mentioned in 12 Saviynt reviews.
User Maintenance (3)
Self Service Password Reset
As reported in 11 Saviynt reviews. Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Based on 12 Saviynt reviews. Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application 12 reviewers of Saviynt have provided feedback on this feature.
Governance (2)
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs 12 reviewers of Saviynt have provided feedback on this feature.
Compliance Audits
Proactively audits access rights against policies 12 reviewers of Saviynt have provided feedback on this feature.
Administration (20)
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned 12 reviewers of Saviynt have provided feedback on this feature.
Mobile App
Based on 11 Saviynt reviews. Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured This feature was mentioned in 12 Saviynt reviews.
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements This feature was mentioned in 12 Saviynt reviews.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights.
Approval Workflows
Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications.
Self-Service Access Requests
Automatically allows access if users meet policy requirements.
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Documents access and alterations of the database for analytics and reporting.
Management (2)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (3)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Data Protection (4)
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
User Experience (3)
Self-Service Experience
Allows users to set, change passwords easily without interaction from IT staff.
Mobile App Usability
Integrates with your mobile device for use on mobile apps.
Multilingual Support
Accommodates multiple languages.
Authentication (4)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Biometric Authentication
Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type.
Other Authentication Methods
Provides authentication capabilities outside standard authentication methods such as MFA and biometric .
Role-Specific Authentication
Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives.
Functionality (13)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins.
BYOD support
Enables users to bring-your-own-device to access company applications.
Password Vault
Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes. 28 reviewers of Saviynt have provided feedback on this feature.
Enforces policies
Based on 27 Saviynt reviews. Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems. 26 reviewers of Saviynt have provided feedback on this feature.
Monitoring (3)
Audit Logging
Provides audit logs for compliance reasons.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks.
Reporting (2)
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Reporting
Includes reporting functionality.
Security (4)
Encrypted Storage
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance.
Access Control (4)
User, Role, and Access Management
Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Type (2)
On-premises solution
Based on 27 Saviynt reviews. Provides an IAM solution for on-prem systems.
Cloud-solution
As reported in 26 Saviynt reviews. Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Based on 25 Saviynt reviews. Tracks user activities across protected systems.
Reporting
Provides reporting functionality. This feature was mentioned in 26 Saviynt reviews.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Access control - Cloud Infrastructure Entitlement Management (CIEM) (4)
Policy Management
Helps define policies for access management
Fine-Grained Access Control
Uses principle of least privilege to ensure access control at granular level of specific resources and apps
Role-Based Access Control (RBAC)
Enables organization to define roles and assign access based on these roles
AI-driven access control
Streamlines the management of user access through AI
Monitoring - Cloud Infrastructure Entitlement Management (CIEM) (2)
Monitoring
Tracks and logs user activities, access requests, and changes to entitlements
AI-based detection
Detects and remediates risky, misconfigured permissions for human and machine identities using AI
Auditing - Cloud Infrastructure Entitlement Management (CIEM) (2)
Visibility
Provides visibility into all users and identities across the system
Compliance Reporting
Provides reporting capabilities to demonstrate compliance
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - AWS Marketplace (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.





