Identity and access management: Saviynt solutions

Savvynt is a company founded in 2018 specializing in the development of solutions foridentity governance, Access management. A reality that managed to convince the market and analysts in a short time, so much so that in 2020 it obtained the highest score in the comparison made by Gartner on IGA, Identity Governance and Administration.

Alberto Dossena_Regional Sales Manager for Italy, Switzerland, Greece, Croatia and Hungary

The target audience is large companies which, as he explains Alberto Dossenaregional sales manager for Italy, Switzerland, Greece, Croatia and Hungary of the company, is a sector “more receptive than others to policies, configurations and processes“. Dossena did not indicate turnover data, limiting himself to pointing out how, in the last two years, the company has doubled the number of Global 2000 customers, representing the high end of the business market. Saviynt is investing heavily in EMEA and over the last two months 20 new digits have been introduced, along with a new support center in Poland, adding to those already in the US, India and UK.

Saviynt: a zero-trust approach

Saviynt has developed a platform for Enterprise Identity Cloud modular, able to meet different customer needs. What federates all the services provided by this platform is, for Dossena, the user experience: the interfaces have been designed in such a way as to require no technical skills and, underlines the Regional Sales Director, “they have a level of interaction equal to that of Netflix“, in terms of ease of use. The same goes for integration with the company’s infrastructure, which does not require writing code or installing hardware or software on site, being given that the services are provided via the cloud in SaaS mode.

Saviynt’s approach to access management looks like this zero trust, which implies that every action of every user requires authorization. In short, it is not enough for a user to be identified once to guarantee him full access to the systems: each operation will be analyzed by artificial intelligence algorithms. “Deep visibility, automation, and the application of machine learning (ML) accelerate access reviews and incident response times. By quickly identifying compromised resources, organizations can take proactive steps to block access, reduce the scope of an attack, and reduce its impact.” Dossena said.

Saviynt Identity Management Solutions

There are five types of services provided by the Saviynt’s Enterprise Identity Cloud.

IGA informed

The IGA solution (Identity Governance & Administration) is designed to ensure seamless access to applications and infrastructure without compromising compliance while Cloud Privileged Access Management (CPAM) is designed to ensure secure access to cloud services. Indeed, “cloudification” has a significant impact on identity management, since companies migrating to the cloud no longer rely on a protected and internally governed infrastructure, but must rely on managed services. provided by third parties, thereby reviewing their user authentication and authorization policies. .

As well Application Access Governance (AAG) is designed precisely for large companies moving to the cloud: it is a tool designed to support IT teams in the implementation of governance, risk and compliance (GRC) processes, in order to have processes consistent and compliant across all cloud and on-premises environments. apps. Saviynt’s AAG solution offers proactive SoD and investigative analysis capability and out-of-the-box rulesets to provide granular insight into application risk and to help maintain audit readiness with ongoing compliance across business critical applications.

Data Access Governance (DAG) is a tool for discovering, analyzing, securing and managing access to data, structured or unstructured, in any IT ecosystem, whether on-premises, hybrid or fully cloud-based. Third Party Access Governance (TPAG)finally, it simplifies the secure management of data shared with third parties, such as partners or service and technology providers. For example, it offers greater security guarantees to companies that outsource the IT infrastructure, or part of it, to third parties, but want to retain control over identity and access management.