Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (3)
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Governance (2)
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs
Compliance Audits
Proactively audits access rights against policies
Administration (4)
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Mobile App
Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Functionality (6)
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Type (1)
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Monitoring (3)
Automatic Misconfiguration Discovery
23 reviewers of Zygon have provided feedback on this feature.
Continuously monitors misconfigurations in SaaS applications environment
User Permission Monitoring
22 reviewers of Zygon have provided feedback on this feature.
Monitors user permissions settings and flags excessive permissions
Compliance Risk Monitoring
21 reviewers of Zygon have provided feedback on this feature.
Detects and fixes compliance issues with regard to different security frameworks
Security (4)
Sensitive Data Discovery
This feature was mentioned in 24 Zygon reviews.
Discovers where sensitive data resides in SaaS environments and identifies users with access to it
Data Movement Monitoring
This feature was mentioned in 23 Zygon reviews.
Monitors how sensitive data moves across different applications
Automatic Remediation
As reported in 23 Zygon reviews.
Automatically determines the best set of actions to be taken upon detecting SaaS security issues.
Dashboard
24 reviewers of Zygon have provided feedback on this feature.
Offers dashboards that show information about unauthorized users, potential threats, and remediation actions
Agentic AI - SaaS Security Posture Management (SSPM) Solutions Features (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.