Saviynt’s Identity Cloud Architecture
Proactive identity security that drives flexible, robust, and secure cloud-based identity security programs, now and for the future.
Superior Cluster-Based, Multi-Tenancy for Maximum Security
Enterprise-grade security and privacy
Data, network, and service isolation to prevent tenant compromise
Micro-services that enable auto-scaling and dynamic resource allocation
Compliant with FedRAMP, SOC 1 and SOC 2 Type II, PCI-DSS, ISO 27001, and CIS
Today’s Modern Identity Cloud Platform
A superior cluster-based, multi-tenant architecture that provides flexibility while maintaining strong security, focused on six core tenets that deliver the following benefits:
- Accelerated digital transformation without having to worry about hitting limits or compromising security
- Consistent performance with reduced latency and increased reliability
- Reduced threat landscape that lets you focus on business goals and growth
- Flexibility to deploy on AWS or Azure
Secure and Scalable
Full tenant isolation protects against data comingling and lateral movement
- Maintain continuous compliance with relevant regulations
- Restricted access mode in case of advanced threats
- Prevent neighbors from looking over the fence or even through the windows
Extensible
Bring Your Own (BYO) capabilities extend the platform’s reach, including:
- Leverage your existing vault investments
- Enforce your own security policies with credentials on your own vaults
- Protect your data by bringing your own keys and apply your key rotation policies
Reliable and Resilient
Designed with strong business continuity capabilities to ensure data integrity in case of an outage, optimized data backups, and faster recovery times
- Automated failovers
- Best-in-class RTO and RPO SLAs
- Redundant data protection with serverless backups
- 25+ global sites supporting local data residency and sovereignty needs
- Fully automated CI/CD process that removes the need for customer functional/regression testing
Report a
Vulnerability
To report a vulnerability, please email security@saviynt.com with “Security Vulnerability” in the subject line. To ensure a timely review of the vulnerability, please include supporting material, including steps on how to reproduce the issue. This will help us better understand the nature and severity of the vulnerability.
We will keep you apprised of our efforts in investigating and remediating your concern. When the investigation is complete, we will deliver the results of our findings to you, along with a resolution plan.
We do not allow active penetration, attacks, or audits of our infrastructure through manual or automated means.
Resources
EBook
Just in Time PAM: Time To Turn off “Always On”
Solution Guide
Privileged Access Management
EBook
Six Critical Capabilities of Saviynt’s Application Access Governance
EBook
Identity Governance & Administration Solution Buyer’s Guide
Solution Guide