Product

Integrations

Customers

Alternative to Okta

Blog

Login

Integrations

Customers

Alternative to Okta

Blog

PRODUCT

Shadow IT

Discover every app used in your organization

Access Reviews

Access Reviews that take minutes, not weeks

Provisioning

Automated user provisioning.No SCIM or SAML required

Requests & Approvals

Access requests and approvals directly in Slack

Vendor Management

Manage all vendors in a single place

SaaS Spend Management

Track, manage and optimize SaaS Spend

USE CASES

Onboarding and Offboarding

On- and Offboarding with a single click

Apps and Access in one place

One place to track all vendors, apps and access

Compliant access controls

Compliant access controls that won't slow down your team.

Login

Lost track of your SaaS apps? Uncover them all with a free Shadow IT scan! 🌟

Product

Integrations

Customers

Alternative to Okta

Blog

Login

Integrations

Customers

Alternative to Okta

Blog

PRODUCT

Shadow IT

Discover every app used in your organization

Access Reviews

Access Reviews that take minutes, not weeks

Provisioning

Automated user provisioning.No SCIM or SAML required

Requests & Approvals

Access requests and approvals directly in Slack

Vendor Management

Manage all vendors in a single place

SaaS Spend Management

Track, manage and optimize SaaS Spend

USE CASES

Onboarding and Offboarding

On- and Offboarding with a single click

Apps and Access in one place

One place to track all vendors, apps and access

Compliant access controls

Compliant access controls that won't slow down your team.

Login

Product

Integrations

Customers

Alternative to Okta

Blog

Login

Susan, an IT-security expert since the 1990s, specializes in encryption, privacy, and identity, recognized among the UK's top tech women.

Susan Morrow

Content Writer & IT Security Expert

Susan, an IT-security expert since the 1990s, specializes in encryption, privacy, and identity, recognized among the UK's top tech women.

Susan Morrow

Content Writer & IT Security Expert

Susan, an IT-security expert since the 1990s, specializes in encryption, privacy, and identity, recognized among the UK's top tech women.

Susan Morrow

Content Writer & IT Security Expert

What Is

What is OIDC SSO?

Oct 16, 2024

What Is

What is the Least Privilege Principle?

Oct 5, 2024

What Is

What is SaaS Risk Management?

Sep 24, 2024

What Is

What is Identity Sprawl?

Sep 21, 2024

What Is

What is IAM vs PAM?

Sep 18, 2024

What Is

What is Privilege Creep?

Sep 15, 2024

What Is

What is Permission Sprawl?

Sep 12, 2024

What Is

What is SaaS Management?

Aug 13, 2024

What Is

What is SaaS Sprawl?

Aug 9, 2024

What Is

What is SCIM vs. SAML?

Aug 6, 2024

What Is

What is Digital Operational Resilience Act (DORA)?

Jul 19, 2024

What Is

What is NIS2 Directive?

Jun 9, 2024

What Is

What is an IdP (Identity Provider)?

May 12, 2024

What Is

What is SAML?

May 5, 2024

What Is

What is NIST CSF 2?

Apr 5, 2024

What Is

What is SSO?

Mar 25, 2024

What Is

What is SAML vs. OAuth?

Feb 22, 2024

What Is

What is Authentication vs. Authorization?

Feb 16, 2024

Shadow IT

Shadow IT: The Dangers and How to Avoid them

Feb 15, 2024

What Is

What Is IGA (Identity Governance and Administration)?

Feb 6, 2024

What Is

What Is IAM (Identity and Access Management)?

Jan 25, 2024

What Is

What Is MFA (Multifactor Authentication)?

Sep 10, 2023

An identity governance and administration tool.


© All rights reserved.

linkedin

Product

Shadow IT

Provisioning

Requests & Approvals

Access Reviews

Spend Management

Vendor Management

Integrations

Customers

Use Cases

Onboarding and Offboarding

Apps and access in one place

Compliant access control

Alternative to Okta

Company

Blog

FAQ

Contact

Security

Privacy

Terms

Imprint

An identity governance and administration tool.


© All rights reserved.

Product

Shadow IT

Provisioning

Requests & Approvals

Access Reviews

Spend Management

Vendor Management

Integrations

Customers

Use Cases

Onboarding and Offboarding

Apps and access in one place

Compliant access control

Alternative to Okta

Company

Blog

FAQ

Contact

Security

Privacy

Terms

Imprint

linkedin