Cloud Identity Governance (CIG)

Evaluating software? Don't go in blind.

Get real advice from buyers like you—what to ask, what to avoid, and what others wish they knew before buying.

    1
    Clutch Security

    Clutch Security

    Clutch Security focuses Cloud Identity Governance on the lifecycle and governance of non‑human identities (NHIs) such as service accounts, workloads, automation tokens, and AI agents. The platform discovers NHIs, correlates ownership and usage, and applies precise policies from creation through… Read More →

    2
    Saviynt

    Saviynt

    Saviynt addresses Cloud Identity Governance with a converged, SaaS‑based IGA that governs both human and machine identities. For machine identities specifically, Saviynt provides single‑pane visibility of certificates, keys, service accounts, bots, containers, and APIs, aligns owners, and enforces lifecycle policies… Read More →

    3
    CyberArk

    CyberArk

    CyberArk Modern IGA delivers cloud‑first identity governance focused on automation, speed to value, and complete visibility across SaaS, cloud, and on‑premises apps. The service centralizes entitlements for human and non‑human identities, builds a unified identity map, and uses AI‑generated profiles… Read More →

    4
    Teleport

    Teleport

    Teleport delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    5
    StrongDM

    StrongDM

    StrongDM delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    6
    Zluri

    Zluri

    Zluri delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    7
    SecurEnds

    SecurEnds

    SecurEnds delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    8
    Britive

    Britive

    Britive delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    9
    Veza

    Veza

    Veza delivers cloud identity governance to control human and machine access across cloud and SaaS. The product discovers identities, roles, and privileges, then centralizes policies to enforce least privilege. It automates joiner‑mover‑leaver processes, access requests, and approvals, and provides recurring… Read More →

    newsletter background