Company Website

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 204 Ratings

What is SailPoint?

In today's business landscape, technology plays a vital role, and its reliability is paramount for success. The current era of "work from anywhere" necessitates stringent management and oversight of digital identities to safeguard both your company and the data it utilizes. SailPoint Identity security stands out as a solution that enables businesses to mitigate cyber risks associated with the growing access to cloud-based technologies. This approach guarantees that employees receive precisely the access they require for their roles, neither more nor less. By harnessing unparalleled visibility and intelligence, organizations can streamline and enhance the management of user identities and permissions. With AI-powered insights, you can govern, manage, and automate access in real time, ensuring a responsive and secure operational framework. This strategic capability allows businesses to thrive in a cloud-dependent, threat-laden environment while maintaining efficiency, safety, and scalability. As such, investing in identity security is not merely advisable; it is essential for sustainable growth and resilience in an increasingly digital world.

What is Push Security?

Identify and safeguard your cloud identity landscape against potential identity-related threats. Push serves as an identity security solution tailored for businesses that prioritize cloud technology. Through a simple browser extension, Push offers immediate insight into the cloud identities of all employees, revealing weaknesses that could be targeted by identity-based threats. - Achieve immediate visibility into all cloud identities, applications, and integrations utilized by your workforce. - Integrate unmanaged applications into Single Sign-On (SSO) and identify non-SSO identities to strengthen security. - Identify and secure at-risk identities, while preventing the creation of new vulnerabilities by employees. - Reveal shadow SaaS applications and accounts to mitigate SaaS proliferation and minimize supply chain vulnerabilities. Push is compatible with major browsers including Google Chrome, Microsoft Edge, Firefox, Safari, Brave, and Opera, ensuring extensive accessibility for users. By utilizing this platform, businesses can maintain a robust identity security posture while navigating the complexities of the cloud.

What is Nudge Security?

Uncover all cloud and SaaS resources within your organization in a matter of minutes. Take command of your supply chains, eradicate shadow IT, and minimize SaaS sprawl effectively. Nudge Security offers the capability to identify, catalog, and continuously monitor every cloud and SaaS account that employees have established, all within a short timeframe. There’s no need for endpoint agents or browser extensions to facilitate this process. By providing insights into the risk profiles, compliance requirements, and security measures of each provider, you can expedite security assessments in alignment with the rapid adoption of SaaS solutions. Additionally, you can attain clarity regarding your SaaS supply chains to assess whether you are within the risk zone of any incidents. To effectively manage SaaS security at scale, it’s essential to engage your workforce actively. Implement security prompts grounded in behavioral science to motivate employees towards making informed decisions and fostering improved practices. This engagement can lead to a more secure and responsible use of SaaS tools across your organization.

What is Josys?

Take full command of your digital landscape with Josys, the automated IGA platform that bridges the gap between security and productivity. Designed to give IT teams and MSPs 360-degree visibility, Josys secures your identity perimeter by continuously monitoring access permissions and application usage. Our intelligent automation engine streamlines essential tasks such as user onboarding/offboarding, access reviews, and license optimization. By identifying shadow IT and automating policy enforcement, Josys helps organizations significantly lower their security risk profiles while simultaneously reducing software spend and manual overhead.

Media

Media

Media

Media

Integrations Supported

Microsoft 365
Azure Marketplace
BeyondTrust Cloud Privilege Broker
BeyondTrust Privileged Remote Access
Cisco Duo
Clinked
Codebase
CoderPad
Contentful
Deputy
Discourse
HCL MyXalytics
Microsoft SharePoint
Optiv Managed XDR
PrivacyPerfect
Proofpoint Insider Threat Management
RadiantOne
SAP BusinessObjects Business Intelligence
Visual Identity Suite
monday.com

Integrations Supported

Microsoft 365
Azure Marketplace
BeyondTrust Cloud Privilege Broker
BeyondTrust Privileged Remote Access
Cisco Duo
Clinked
Codebase
CoderPad
Contentful
Deputy
Discourse
HCL MyXalytics
Microsoft SharePoint
Optiv Managed XDR
PrivacyPerfect
Proofpoint Insider Threat Management
RadiantOne
SAP BusinessObjects Business Intelligence
Visual Identity Suite
monday.com

Integrations Supported

Microsoft 365
Azure Marketplace
BeyondTrust Cloud Privilege Broker
BeyondTrust Privileged Remote Access
Cisco Duo
Clinked
Codebase
CoderPad
Contentful
Deputy
Discourse
HCL MyXalytics
Microsoft SharePoint
Optiv Managed XDR
PrivacyPerfect
Proofpoint Insider Threat Management
RadiantOne
SAP BusinessObjects Business Intelligence
Visual Identity Suite
monday.com

Integrations Supported

Microsoft 365
Azure Marketplace
BeyondTrust Cloud Privilege Broker
BeyondTrust Privileged Remote Access
Cisco Duo
Clinked
Codebase
CoderPad
Contentful
Deputy
Discourse
HCL MyXalytics
Microsoft SharePoint
Optiv Managed XDR
PrivacyPerfect
Proofpoint Insider Threat Management
RadiantOne
SAP BusinessObjects Business Intelligence
Visual Identity Suite
monday.com

API Availability

Has API

API Availability

Has API

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$5 per employee per month
Free Trial Offered?
Free Version

Pricing Information

$4 per user per month
Free Trial Offered?
Free Version

Pricing Information

$100/month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

SailPoint Technologies

Date Founded

2005

Company Location

United States

Company Website

www.sailpoint.com

Company Facts

Organization Name

Push Security

Date Founded

2019

Company Location

United Kingdom

Company Website

pushsecurity.com

Company Facts

Organization Name

Nudge Security

Date Founded

2022

Company Location

United States

Company Website

www.nudgesecurity.com

Company Facts

Organization Name

Josys

Date Founded

2022

Company Location

Japan

Company Website

www.josys.com

Categories and Features

Audit

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Self-Service Password Reset (SSPR)

Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Categories and Features

Cloud Cost Management

Josys is an IGA (Identity Governance and Administration) Platform designed to transform identity governance into a powerful tool for minimizing cloud expenses. By systematically detecting inactive licenses, excessive accounts, unnecessary applications, and shadow IT within your cloud infrastructure, Josys equips IT and finance departments with the timely insights required to cut waste and optimize spending. Its automated lifecycle management guarantees that both access and costs align with the current dynamics of your workforce, providing the governance discipline that leads to tangible savings.

Cost Reduction Optimization
Dashboard
Data Import/Export
Data Storage
Data Visualization
Resource Usage Reporting
Roles / Permissions
Spend and Cost Reporting

Endpoint Management

Josys serves as an Automated Identity Governance and Administration (IGA) Platform designed to connect endpoint interactions with identity management. By integrating user identities with access across all devices and applications, Josys equips IT teams with the necessary insight to implement uniform access policies, identify unauthorized actions at the endpoint stage, and promptly revoke access when users change roles or exit the organization. This ensures a well-regulated environment, preventing any endpoint from acting as an unnoticed gateway to critical systems.

Identity and Access Management (IAM)

Josys serves as a cutting-edge platform for Automated Identity Governance and Administration (IGA), transforming Identity and Access Management from a passive policy enforcement model to a forward-thinking, intelligent governance solution. With its comprehensive insights into every user, role, application, and permission within the identity landscape, Josys guarantees that access remains consistently aligned with organizational requirements, all done automatically. The platform facilitates a range of functions, including automated provisioning, access audits, detection of shadow IT, and ready-to-go audit reporting. This empowers IT departments with a cohesive platform to efficiently oversee the complete IAM lifecycle, ensuring accuracy, rapid execution, and assurance.

Identity Governance and Administration (IGA)

Josys is a cutting-edge platform designed for Automated Identity Governance and Administration (IGA), aimed at delivering enterprise-level governance that is both accessible and scalable. By consolidating the complete identity lifecycle—from access requests and provisioning to periodic reviews and deprovisioning—Josys removes the manual labor and policy discrepancies that pose security and compliance threats. Valued by IT departments and Managed Service Providers, Josys simplifies intricate IGA needs into smooth, self-sufficient workflows, empowering organizations to satisfy audit requirements, uphold least-privilege access principles, and illustrate governance maturity while minimizing operational burdens.

Identity Management

Josys is a cutting-edge Automated Identity Governance and Administration (IGA) Platform that revolutionizes the approach to identity management, transforming it from a cumbersome task into a seamless, automated process. Recognized by IT departments and Managed Service Providers (MSPs) worldwide, Josys offers comprehensive oversight of user identities throughout their lifecycle, from onboarding to offboarding. It streamlines processes such as provisioning, access reviews, and role assignments across all applications within your organization. By addressing identity sprawl and implementing least-privilege access practices on a large scale, Josys guarantees that the appropriate individuals have access to the necessary resources exactly when needed, thereby minimizing risk while maintaining operational efficiency.

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Asset Management

Josys serves as the Automated Identity Governance and Administration (IGA) Platform, empowering IT departments with comprehensive oversight of their software asset ecosystem. By seamlessly identifying all applications in operation, even those from unauthorized sources, Josys generates a real-time catalog of licenses, user activity, and access rights throughout the organization. Featuring integrated license optimization and expenditure analytics, Josys guarantees that you avoid paying for unutilized licenses and stay compliant with regulations, transforming disorganized IT assets into a streamlined, governed, and financially-efficient portfolio.

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Josys is an innovative platform designed for automated Identity Governance and Administration (IGA), aimed at significantly streamlining and enhancing IT management. Valued by both IT professionals and Managed Service Providers (MSPs), Josys provides a unified view of all users, applications, devices, and permissions. This replaces disorganized spreadsheets and labor-intensive workflows with automated lifecycle management, comprehensive access reviews, and instant governance. Whether you're bringing a new employee on board, terminating access for a leaving staff member, or conducting audits across multiple SaaS applications, Josys transforms lengthy IT tasks into smooth, self-sufficient processes that ensure your organization remains secure and operates efficiently.

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Mobile Device Management (MDM)

Josys is an advanced platform for Automated Identity Governance and Administration (IGA) that provides identity-centric management for all devices within your organization. By integrating user identities with device permissions, Josys offers a comprehensive view of access activities, regardless of whether it’s from a company-issued laptop, a personal smartphone, or a remote device. This empowers IT departments and Managed Service Providers (MSPs) to implement access regulations, identify unusual activities, and promptly revoke user permissions or device access when necessary. The outcome is a cohesive and secure mobile workforce that eliminates the governance shortcomings often associated with conventional Mobile Device Management (MDM) solutions.

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

MSP

Josys serves as a dedicated platform for Automated Identity Governance and Administration (IGA), specifically designed to assist Managed Service Providers in implementing consistent and scalable identity governance for all their clients. With its centralized multi-tenant dashboard, Josys empowers MSPs to oversee user access, uphold compliance regulations, streamline onboarding and offboarding processes, and identify shadow IT, all from one intuitive interface. By converting intricate governance tasks that vary by client into uniform, automated procedures, Josys enables MSPs to lower service delivery expenses, enhance the security of their clients, and expand their operations without the need for additional personnel.

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

SaaS Management

Josys serves as a comprehensive Automated Identity Governance and Administration (IGA) platform that transforms the chaotic landscape of enterprise SaaS into a structured environment. It is relied upon by IT departments that oversee extensive application ecosystems, enabling them to automatically identify both approved and unapproved applications in operation. Josys also aligns access rights with individual users and provides ongoing monitoring for shadow IT and accounts that have excessive permissions. By integrating visibility into SaaS applications with automated governance processes—from access audits to the retirement of unused applications—Josys empowers organizations to reclaim authority over their SaaS resources, mitigate security vulnerabilities, and eliminate unnecessary expenditures on underutilized tools.

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

SaaS Spend Management

Josys serves as an Automated Identity Governance and Administration (IGA) Platform that seamlessly integrates SaaS expense management as a result of effective governance practices. It consistently monitors user access to applications and their engagement levels, allowing Josys to identify licenses that are being underused, eliminate duplicate tools, and reveal unapproved IT expenditures that can unnecessarily increase your SaaS expenses without providing any real benefits. Equipped with automated workflows for reclaiming licenses and real-time financial insights, Josys enables IT and finance departments to make informed choices that reduce SaaS expenses while ensuring stringent governance measures remain in place.

User Provisioning and Governance

Josys is an innovative Automated Identity Governance and Administration (IGA) solution that revolutionizes the concept of swift and secure user provisioning. It streamlines onboarding workflows to provide immediate access from day one, while also implementing comprehensive off-boarding procedures that promptly revoke all permissions when an employee leaves. With Josys, organizations can be assured that every access point is managed with complete governance oversight, leaving no access unmonitored. Featuring ongoing access reviews, role-specific provisioning, and up-to-the-minute audit trails, Josys empowers IT teams with the assurance that every user is granted only the access they require—nothing excess.

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies

Popular Alternatives

Popular Alternatives

SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies
SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies