Eye of the Tiger: The Gartner Magic Quadrant for IGA 2019

Saviynt is rising to the challenge! Gartner’s 2019 IGA Magic Quadrant recognizes the contenders in the Identity Governance and Administration space. Saviynt’s position on both axes is improved again this year. Let’s survey the landscape of the Identity Governance and Administration (IGA) Magic Quadrant and explore trends, as we believe Saviynt’s gutsy disruption is leading to glory.

What is Identity Governance and Administration?

Identity Governance & Administration (IGA) provides policy and governance around identity access to ensure the right people are getting access to the right things at the right time. IGA vendors often offer identity management capabilities to assist with security, compliance, entitlements, access certification, provisioning and de-provisioning in a centralized management solution.

Saviynt’s Prep for the Gartner IGA Magic Quadrant

Every year, Gartner reviews various vendors in the Identity Governance and Administration space and places them on an axis of Completeness of Vision and Ability to Execute. These vendors—just like contenders in the big fight—are evaluated as Niche Players, Challengers, Visionaries, and Leaders. Organizations use Gartner’s expert in-depth examination for guidance on vendors to consider for their Identity Governance program.

At Saviynt, we prepare for the Gartner Magic Quadrant as though training for the Identity Governance and Administration championship match. We answer extensive questionnaires, meet with Gartner analysts to explain capabilities and roadmap, and present customer success stories to demonstrate how our IGA solution helped leverage identity governance as the foundation for their digital transformation. Then we climb back in the ring with the Gartner preliminary reviewers to defend any debatable points. We see the Gartner Magic Quadrant as the IGA event of the year. Every year.

Highlights: Identity Governance and Administration 2019 Heavy-Weight Championship

2019 saw dramatic shifts in the Identity Governance and Administration Magic Quadrant. We can’t get into the nuance of the shifting landscape—you have to read the report for that detail. There’s always movement within the axes as some vendors show the results of their hard work and some end up on the ropes or quit the fight.

But for Saviynt? This year we might as well be singing the song “Eye of the Tiger” because we believe we’ve been rising to the challenge. From the moment we first “entered the ring” and were evaluated by Gartner in the 2016 IGA Magic Quadrant, we’ve targeted the apex of identity governance vision and cloud security. Sharpening our governance solution for identity, we’ve focused on a diversity of features and technical soundness aiming to surpass our competition, and we think it’s working since we’ve been placed as a Leader for the second year in a row.

We’re excited, but we’re not surprised; at Saviynt, our dedication to innovation and transformation drives our direction. 

Saviynt’s Expanding Identity in 2019

2019 saw many advancements for Saviynt. We started with our industry disruptive, cloud-native identity governance solution, created a new approach to application and privileged access, and used AI/ML to strengthen our governance capabilities. Our drive to innovate in the areas of identity management, application access, and cloud security has served us well:

  • We achieved FedRAMP Authority to Operate, indicative of our exceptional security and; a mandatory requirement for U.S. federal agency cloud deployments.
  • We launched Cloud PAM, a convergence of cloud privileged access management and identity governance.
  • We’re embracing natural language protocol to develop reports.
  • We’ve developed an AI-enabled chatbot to facilitate administration.
  • We’ve formed strong partnerships with Microsoft, AWS, GCP, SAP, Workday, Okta, Axiomatics, PlainID, UIPath, and more.

It was clearly a knock-out year for us. Again, that’s no surprise, the industry is seeing that Saviynt’s solution differs from others in the IGA space.

Saviynt’s Identity Governance is Fundamentally Different

Saviynt was created with all of the core capabilities you expect from an Identity Governance solution. But from our inception, Saviynt was architected differently. We started out taking advantage of the compute power, analytical capability, and expansive storage of the cloud. This gave us deeper visibility into access details and fine-grained entitlements of mission-critical business applications, both on-premises and in the cloud. Nobody else goes that deep and broad. Our intelligent analytics finds patterns, risks, and outliers in your environment to help define (and refine) your roles and access.

And Saviynt’s commitment to security is demonstrated by the Saviynt Control Exchange, a library of 200+ out-of-the-box controls for customers to implement to meet regulatory compliance or industry frameworks such as PCI-DSS, HIPAA, SOX, NERC-CIP, COBIT, NIST or ISO, as well as AWS, Azure, SAP, Oracle EBS, and Workday. 

With our philosophy of convergence, Saviynt takes these capabilities (IGA, intelligent analytics, continuous controls), and converges them with other emerging technologies and needs.

Saviynt’s Convergence Philosophy

Saviynt sees identity going to new places, and so we’re bringing governance to these new frontiers. Cloud security helps protect cloud workloads, databases, serverless processes, and other cloud artifacts, and Saviynt’s IGA is converging with cloud security. Our intelligent analytics treats each of these as identities with their own policies. We respond when policy says one of these is anomalous, such as a workload with an unblocked, insecure port or a database that’s unencrypted. Saviynt can shut down that cloud database before someone finds your at-risk data, and will send a notification to administrators.

Saviynt also envisioned the necessary convergence between IGA and Cloud PAM, our new capability that secures privileged accounts such as administrators, RPAs, or service accounts for SaaS applications and IaaS environments. Experience frictionless access with workloads automatically discovered and integrated; administrative access to workloads without keys or credentials, directly from a browser-based containerized SSH session; and in-session role or access elevation, all securely and granularly monitored and audited. 

What’s Our Vision?

Saviynt has aimed to be a disruptor in the identity governance industry since our beginnings, and we continue to beat others to the punch with our innovation. Our innovative Identity Hub is a firm foundation for organizations to pursue One Identity for Life. 

We believe Gartner and other analysts agree, when you’re deciding the line-up for your legacy modernization or your digital transformation, Saviynt is in the ring and ready to go the distance. Come see us December 8th and 9th at Saviynt Converge ‘19 in Las Vegas just before the Gartner Identity Management Summit to learn more.

[1]Gartner, Magic Quadrant for Identity Governance and Administration, 9 October 2019, Felix Gaehtgens, Kevin Kampman, Abhyuday Data, Henrique Teixeira, David Collinson

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Diana Volere

About author

Diana is a strategist, architect and communicator on digital identity, governance and security, with a passion for organizational digital transformation. She has designed solutions for and driven sales at Fortune 500 companies around the world, and has an emphasis on healthcare and financial verticals. In her role as Saviynt's Chief Evangelist she is a technical advisor for and strategist with partners and customers to derive business value from technical capabilities. Her past twenty years have been spent in product and services organizations in the IAM space.

Leave a Reply

Your email address will not be published. Required fields are marked *