SailPoint Identity Security for the cloud enterprise manages risk from the explosion of technology access. The solution gives businesses visibility while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services.
N/A
Wiz
Score 8.6 out of 10
N/A
Wiz is a Tel Aviv based, cloud risk visibility solution for enterprise security. It provides a 360° view of security risks across clouds, containers and workloads.
N/A
Pricing
SailPoint Identity Security Cloud
Wiz
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
SailPoint Identity Security Cloud
Wiz
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
SailPoint Identity Security Cloud
Wiz
Features
SailPoint Identity Security Cloud
Wiz
Identity Management
Comparison of Identity Management features of Product A and Product B
SailPoint Identity Security Cloud
7.5
8 Ratings
9% below category average
Wiz
-
Ratings
ID-Management Access Control
7.78 Ratings
00 Ratings
ID Management Single-Sign On (SSO)
7.65 Ratings
00 Ratings
Multi-Factor Authentication
7.03 Ratings
00 Ratings
Password Management
7.65 Ratings
00 Ratings
Account Provisioning and De-provisioning
7.78 Ratings
00 Ratings
ID Management Workflow Automation
7.88 Ratings
00 Ratings
ID Risk Management
6.86 Ratings
00 Ratings
Cloud Computing Security Features
Comparison of Cloud Computing Security Features features of Product A and Product B
We are happy with the management of the Id, accounts where the user can request any access easily. Also the many connector which Sailpoint is offering in order to onboard lots of applications is quite helpful. The access review module has also have been improve so that large campaigns can we work out easily.
Where we see some improvement is on the UI as here it is not so intuitive for the end user, so that we need to make lots of communications and training so that the user is able to understand how to use it.
For the administration and creation of roles it also would be great to have some improvements here to make it more easily its management.
Wiz is well-suited if you want to run real-time scans against resources that were recently patched or configured. It is good to keep track of vulnerabilities found and what can be done to resolve the issues without having to open up multiple tabs. Overall, it is good to keep an eye on how well cloud teams or cloud security teams are doing.
Multi-cloud: Ability of Wiz to integrate with all of our cloud platforms makes it easy to deploy and centralizes our insights into all environments
UI/UX: Wiz's UI is one of, if not -- the best UI I have ever used in a security application. Wiz is able to make it easy to follow and use the application to simplify the normally overcomplicated process of parsing through security information and tools.
Marketing: Hosting meetups such as Wizdom has demonstrated Wiz's investment into its customers by providing us with more encouragement to use the app. The merch, ads, and presentation are above and beyond many companies in the tech industry.
Threat Intel: We rely on Wiz for the latest finds in vulnerabilities across all platforms, and since it is incorporated into the application, it makes this easy and fast to push out necessary steps without going through multiple layers of communication between vendors, cyber governance, security analysts, and developers.
The user interface is not very intuitive. It is hard for the occasional user to navigate through the request process. There are no instructions on the screen to help the user to know what to do. It is left up to the user to figure out what to click on and how to navigate through the process.
The UI is very user-friendly, with documentation available on every page of the application. New users can learn about the product features as they navigate through several different pages, using the instructions at the top of each page, making it quite easy to use.
The on-prem SailPoint IdentityIQ platform provides the necessary customization that is required in our dynamic environment. Although we may look at a cloud-based Identity Management service again in the future, (there are many advantages), our identity management, authentication, and application assignment processes cannot be quickly consolidated to a single cloud-based service at this time.
We previously used Lacework but transitioned to Wiz as part of our effort to improve cloud security visibility and streamline risk management. While Lacework provided useful insights, we found that Wiz offered a clearer, more intuitive interface and better collaboration features, making it easier for both Security and Engineering teams to work together. The Security Graph and automated risk analysis in Wiz have been especially valuable, helping us quickly understand exposures and prioritise fixes. Overall, the transition to Wiz has improved how we manage security risks across our cloud environment.
Over 300,000 password change/reset calls avoided to the helpdesk annually.
1,000 plus accounts with proper accesses provisioned via automated birthright processes weekly versus 1-2 days of manual provisioning and approvals. With a call center population that churns many people per week, this brings many dollars of efficiency to the operations teams.
Flexibility on terminations to manage accounts and access for target applications based on regulatory or business rules to ensure compliance and avoid fines for non-compliance.
Wiz has saved us a lot of money and headaches. It finds problems we didn't even know we had, like weak passwords and open ports. This helps us fix things before hackers can find them. It's like having a team of security experts working 24/7.
Plus, Wiz can fix some problems itself, saving us time and money. It's a great investment for our business.
Wiz has made our cloud much safer. It helps us find and fix problems quickly, which means we can focus on our core business. It's like having an extra layer of protection for our data and systems.