Best Software for 2025 is now live!

Best Cloud Infrastructure Entitlement Management (CIEM) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud infrastructure entitlement management (CIEM) software, also sometimes referred to as cloud permissions management software, is a security solution that manages user privileges or "entitlements" in cloud environments. The software controls access to applications, infrastructure, and resources in the cloud environment using the principle of least privileges (POLP). The least privilege policy is an integral part of the zero trust policy that limits the attack surface of security threats by restricting access in the cloud landscape.

CIEM software manages user accounts, defines user roles, and provides access control to ensure only the right users have access to resources, which reduces unauthorized access. Companies with complex cloud landscapes, as well as numerous teams and users, can use CIEM software to secure their cloud environments and ensure compliance. Security and IT operations teams use this tool to control access privileges and monitor the cloud environment for unauthorized access.

CIEM solutions have some features that overlap with identity and access management (IAM) software as both provide authentication and access control. However, they have distinct purposes. IAM focuses on user authentication, authorization, and access control across an organization's IT systems, both on-premises and in the cloud. CIEM extends its scope to include cloud infrastructure and endpoint management, addressing the broader challenges of managing cloud resources, securing endpoints, and ensuring cloud security and compliance.

To qualify for inclusion in the Cloud Infrastructure Entitlement Management (CIEM) category, a product must:

Provide visibility into all cloud assets and access privileges
Remove any unused privileges
Continuously monitor the environments, detect any violations, and perform automatic remediation

Best Cloud Infrastructure Entitlement Management (CIEM) Software At A Glance

Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
17 Listings in Cloud Infrastructure Entitlement Management (CIEM) Available
By Wiz
(697)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,648 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(209)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Features
    49
    Security
    49
    Cloud Security
    36
    Vulnerability Detection
    35
    Cons
    Improvement Needed
    25
    Missing Features
    18
    Feature Limitations
    17
    Improvements Needed
    14
    Ineffective Alerts
    14
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,847 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    442 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 36% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Features
49
Security
49
Cloud Security
36
Vulnerability Detection
35
Cons
Improvement Needed
25
Missing Features
18
Feature Limitations
17
Improvements Needed
14
Ineffective Alerts
14
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,847 Twitter followers
LinkedIn® Page
www.linkedin.com
442 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(100)4.8 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    33
    Security
    31
    Threat Detection
    26
    Detection Efficiency
    24
    Features
    24
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 41% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
33
Security
31
Threat Detection
26
Detection Efficiency
24
Features
24
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,189 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
(20)4.3 out of 5
5th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudKnox Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities – users and workloa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Entra Permissions Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Cloud Management
    3
    Easy Integrations
    3
    Features
    3
    Easy Setup
    2
    Cons
    Feature Limitations
    3
    Complex UI
    1
    Insufficient Information
    1
    Learning Curve
    1
    Resource Limitations
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

CloudKnox Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities – users and workloa

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 20% Mid-Market
Microsoft Entra Permissions Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Cloud Management
3
Easy Integrations
3
Features
3
Easy Setup
2
Cons
Feature Limitations
3
Complex UI
1
Insufficient Information
1
Learning Curve
1
Resource Limitations
1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 50% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Cloud Management
    7
    Customer Support
    7
    Insights
    7
    Monitoring
    6
    Cons
    Limited Features
    5
    Feature Limitations
    3
    Improvement Needed
    3
    Lack of Features
    3
    Missing Features
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Cloud Security (formerly Ermetic) reveals and prioritizes security gaps in AWS, Azure and GCP and enables organizations to remediate them immediately. The Tenable Cloud Security cloud native a

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 50% Mid-Market
  • 43% Enterprise
Tenable Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Cloud Management
7
Customer Support
7
Insights
7
Monitoring
6
Cons
Limited Features
5
Feature Limitations
3
Improvement Needed
3
Lack of Features
3
Missing Features
3
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(76)4.4 out of 5
4th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

    Users
    No information available
    Industries
    • Information Technology and Services
    • Accounting
    Market Segment
    • 78% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SailPoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Identity Management
    7
    Access Control
    6
    Customization
    6
    Ease of Use
    5
    Cons
    Cache Issues
    5
    Difficult Learning
    4
    Difficult Setup
    4
    Implementation Difficulty
    4
    System Delays
    4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SailPoint
    Year Founded
    2004
    HQ Location
    Austin, TX
    Twitter
    @SailPoint
    15,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,828 employees on LinkedIn®
    Phone
    (512) 346-2000
Product Description
How are these determined?Information
This description is provided by the seller.

SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the r

Users
No information available
Industries
  • Information Technology and Services
  • Accounting
Market Segment
  • 78% Enterprise
  • 22% Mid-Market
SailPoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Identity Management
7
Access Control
6
Customization
6
Ease of Use
5
Cons
Cache Issues
5
Difficult Learning
4
Difficult Setup
4
Implementation Difficulty
4
System Delays
4
Seller Details
Seller
SailPoint
Year Founded
2004
HQ Location
Austin, TX
Twitter
@SailPoint
15,094 Twitter followers
LinkedIn® Page
www.linkedin.com
2,828 employees on LinkedIn®
Phone
(512) 346-2000
(381)4.3 out of 5
Optimized for quick response
6th Easiest To Use in Cloud Infrastructure Entitlement Management (CIEM) software
View top Consulting Services for Lacework
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lacework Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Security
    50
    Vulnerability Detection
    35
    Easy Setup
    28
    Integrations
    27
    Cons
    Missing Features
    22
    Improvement Needed
    21
    Insufficient Information
    19
    Feature Limitations
    18
    Improvements Needed
    17
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Company Website
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,064 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lacework offers the original and leading data-driven cloud-native application protection platform (CNAPP). Lacework is trusted by nearly 1,000 global innovators to secure the cloud from build to run.

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Lacework Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Security
50
Vulnerability Detection
35
Easy Setup
28
Integrations
27
Cons
Missing Features
22
Improvement Needed
21
Insufficient Information
19
Feature Limitations
18
Improvements Needed
17
Seller Details
Seller
Fortinet
Company Website
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,064 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
(59)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Cloud Management
    18
    Cloud Security
    18
    Cloud Services
    16
    Ease of Use
    16
    Cons
    Expensive
    15
    Learning Curve
    12
    Pricing Issues
    12
    Not User-Friendly
    10
    Poor User Interface
    10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Enterprise
  • 32% Mid-Market
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Cloud Management
18
Cloud Security
18
Cloud Services
16
Ease of Use
16
Cons
Expensive
15
Learning Curve
12
Pricing Issues
12
Not User-Friendly
10
Poor User Interface
10
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,110 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
(69)4.6 out of 5
View top Consulting Services for CrowdStrike Falcon Cloud Security
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    32
    Cloud Security
    25
    Detection Efficiency
    22
    Vulnerability Detection
    20
    Ease of Use
    18
    Cons
    Expensive
    10
    Improvements Needed
    10
    Improvement Needed
    8
    Insufficient Information
    6
    Learning Curve
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

Unified cloud security, from endpoint to cloud. Stop cloud breaches and consolidate disjointed point products with the world’s only CNAPP built on a unified agent and agentless approach to cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Enterprise
  • 41% Mid-Market
CrowdStrike Falcon Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
32
Cloud Security
25
Detection Efficiency
22
Vulnerability Detection
20
Ease of Use
18
Cons
Expensive
10
Improvements Needed
10
Improvement Needed
8
Insufficient Information
6
Learning Curve
5
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,406 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 18% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BeyondTrust Entitle Just-in-Time Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Automation
    5
    Ease of Implementation
    5
    Easy Setup
    5
    Ease of Use
    4
    Cons
    Complex Usage
    3
    Complexity
    2
    Complex Queries
    2
    Complex Usability
    2
    Connection Issues
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Entitle
    Company Website
    Year Founded
    2021
    HQ Location
    New York, NY
    Twitter
    @EntitleIO
    83 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entitle is a seamless way to grant employees granular and just-in-time access within Cloud and SaaS. Specializing in temporary admin escalations, break-glass access, granular access to PII, and acces

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 18% Enterprise
BeyondTrust Entitle Just-in-Time Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Automation
5
Ease of Implementation
5
Easy Setup
5
Ease of Use
4
Cons
Complex Usage
3
Complexity
2
Complex Queries
2
Complex Usability
2
Connection Issues
2
Seller Details
Seller
Entitle
Company Website
Year Founded
2021
HQ Location
New York, NY
Twitter
@EntitleIO
83 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sonrai Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Cloud Security
    6
    Cloud Technology
    6
    Cloud Management
    5
    Risk Management
    4
    Cons
    Feature Limitations
    3
    Improvement Needed
    3
    Limited Customization
    3
    Complexity
    2
    Expensive
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 33% Mid-Market
Sonrai Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Cloud Security
6
Cloud Technology
6
Cloud Management
5
Risk Management
4
Cons
Feature Limitations
3
Improvement Needed
3
Limited Customization
3
Complexity
2
Expensive
2
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Cloud Entitlements Manager reduces risk by implementing Least Privilege across multi-cloud environments. With no VM footprint required, Cloud Entitlements Manager leverages AI to detect and r

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Secure Cloud Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    User Interface
    2
    Access Management
    1
    Connectivity
    1
    Cons
    Expensive
    1
    Internet Dependency
    1
    Network Issues
    1
    Pricing Issues
    1
    Resource Limitations
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,824 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Cloud Entitlements Manager reduces risk by implementing Least Privilege across multi-cloud environments. With no VM footprint required, Cloud Entitlements Manager leverages AI to detect and r

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Enterprise
CyberArk Secure Cloud Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
User Interface
2
Access Management
1
Connectivity
1
Cons
Expensive
1
Internet Dependency
1
Network Issues
1
Pricing Issues
1
Resource Limitations
1
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,222 Twitter followers
LinkedIn® Page
www.linkedin.com
3,824 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CheckRed is a complete cloud security platform (SSPM/CNAPP/CSPM/CIEM/CWPP/Compliance) covering all critical SaaS apps and cloud providers – all in a single, user-friendly, and affordable solution.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CheckRed Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    3
    Security
    3
    Monitoring
    2
    Cloud Management
    1
    Cloud Services
    1
    Cons
    Complexity
    1
    Complex Understanding
    1
    Difficult Learning
    1
    Difficult Setup
    1
    False Positives
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    5220 Spring Valley Rd Suite 604 Dallas,TX 75254
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

CheckRed is a complete cloud security platform (SSPM/CNAPP/CSPM/CIEM/CWPP/Compliance) covering all critical SaaS apps and cloud providers – all in a single, user-friendly, and affordable solution.

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
CheckRed Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
3
Security
3
Monitoring
2
Cloud Management
1
Cloud Services
1
Cons
Complexity
1
Complex Understanding
1
Difficult Learning
1
Difficult Setup
1
False Positives
1
Seller Details
HQ Location
5220 Spring Valley Rd Suite 604 Dallas,TX 75254
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authomize
Product Description
How are these determined?Information
This description is provided by the seller.

Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Seller Details
Seller
Authomize
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NextLabs
    Year Founded
    2004
    HQ Location
    San Mateo, CA
    Twitter
    @nextlabs
    399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    181 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
NextLabs
Year Founded
2004
HQ Location
San Mateo, CA
Twitter
@nextlabs
399 Twitter followers
LinkedIn® Page
www.linkedin.com
181 employees on LinkedIn®