Saviynt Newsroom

FEATURED NEWS

What’s Changed: Gartner’s 2017 Magic Quadrant for Identity Governance and Administration (IGA)

Jeff Edwards of Solutions Review takes a look at the recent Gartner Magic Quadrant for Identity Governance and Administration, where Saviynt was recently moved from the Niche Player to the Challenger Quadrant.

Latest Press Releases

Saviynt named a Challenger in the 2017 Gartner Magic Quadrant for Identity Governance and Administration
Saviynt named a Challenger in the 2017 Gartner Magic Quadrant for Identity Governance and Administration
Saviynt, the leading provider of Identity Governance and Cloud Security solutions, today announced that the company was named a Challenger by Gartner, Inc. in the February 2017 Magic Quadrant for Identity Governance and Administration report by analysts Felix Gaehtgens....
Saviynt gets double honors in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards
Saviynt gets double honors in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards
Saviynt gets double honors in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards winning the ‘Leader in Identity & Access Management Solutions for 2017’ and the ‘Best of Breed in Cloud Security Solutions’.
Oxford Computer Group and Saviynt Announce Strategic Partnership
Oxford Computer Group and Saviynt Announce Strategic Partnership
Partnership to enable customers to secure their critical data, infrastructure and applications both in the Cloud and within a traditional perimeter using a unified platform.

In the News

What’s Changed: Gartner’s 2017 Magic Quadrant for Identity Governance and Administration (IGA)

Identity Management Solutions Guide | February 28, 2017
Analyst house Gartner, Inc. has released the latest iteration of its annual Identity Governance and Administration (IGA) Magic Quadrant (MQ) report……..
READ ARTICLE >

Saviynt’s Security Management Solution on AWS

AWS Partner Network APN Blog  | January 16, 2017
APN Partner Saviynt recently added privileged access management (PAM) to its existing AWS security offering. Granting least privileges via roles in order to complete a required task is considered best practice.

The Navigator for Enterprise Solutions

CIO Review  | November 30, 2016
Saviynt: Security and Compliance Management for Amazon Web Services

Cool tech at AWS re:Invent

NetworkWorld  | November 30, 2016
Amazon Web Service’s re:Invent conference is one of the premier showcases for new cloud technology spanning across the infrastructure, platform and software as a service markets. …
READ ARTICLE >

10 AWS security blunders and how to avoid them

InfoWorld  | November 03, 2016
The cloud has made it dead simple to quickly spin up a new server without waiting for IT. But the ease of deploying new servers — and the democratic nature of cloud management — can be a security nightmare, as a simple configuration error…
READ ARTICLE >

Identity governance and admin: beyond basic access management

CSO  | August 31, 2016
Identity management continues to fall into the top security efforts needed to protect information resources. However, traditional solutions rely on significant human analysis and management: analysis and management that result in high productivity costs for analysts and managers…
READ ARTICLE >

Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace

SC Magazine | June 27, 2016
A hacker with the ominous nickname “thedarkoverlord” appears to have stolen more than 650,000 medical records from three separate healthcare institution databases, and……….
READ ARTICLE >

How SAP Basis Admins Can Best Prepare for Security and New Implementations in the Cloud

Insider Books | June 22, 2016
SAP Basis Admins have long been a cornerstone for managing security and compliance for SAP applications within an enterprise. Now, S/4HANA and SAP (and non-SAP) Cloud applications are introducing………
READ ARTICLE >

Without Legislation, Your Health Care Data Is Up for Grabs

VOA | June 10th, 2016
Health care providers – repositories of critical patient data – have relinquished millions of sensitive records and billions of dollars to hackers in the past few years. And there is no end in sight as the industry expands to largely-unsecured mobile and Internet of Things (IoT) platforms………..
READ ARTICLE >

Sign up for Saviynt Updates