Try our new research platform with insights from 80,000+ expert users

Adaptive Shield vs Saviynt comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Adaptive Shield
Ranking in Identity Threat Detection and Response (ITDR)
22nd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
SaaS Security Posture Management (SSPM) (4th)
Saviynt
Ranking in Identity Threat Detection and Response (ITDR)
10th
Average Rating
7.4
Reviews Sentiment
6.3
Number of Reviews
26
Ranking in other categories
User Provisioning Software (3rd), Identity Management (IM) (7th), Privileged Access Management (PAM) (12th), Identity and Access Management (3rd)
 

Mindshare comparison

As of October 2025, in the Identity Threat Detection and Response (ITDR) category, the mindshare of Adaptive Shield is 1.0%, up from 0.4% compared to the previous year. The mindshare of Saviynt is 2.4%, up from 1.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Threat Detection and Response (ITDR) Market Share Distribution
ProductMarket Share (%)
Saviynt2.4%
Adaptive Shield1.0%
Other96.6%
Identity Threat Detection and Response (ITDR)
 

Featured Reviews

Asaf Rozenblum - PeerSpot reviewer
Provides not only visibility but also remediation information and is helpful in working with people who are not in security-oriented roles
For compliance security checks, it identifies and tells you about a specific compliance, but it would be better if they also attach a link to the rule of the compliance they are referring to. That will be a lot more clear. You won't have to leave the platform every time to find information on the web. They do have a lot of things that keep you inside the app and give you clarity, but there are a couple of little things that got missed. One feature about which I have talked to them multiple times is related to being able to rescan or do a recheck on a specific security issue. Currently, when you fix something and you want to check if it is fixed, you need to power off the integration and then power it on. If there is a clickable button that can re-scan and do a single check or even the whole security check, without powering off and powering on, it will be easier and more efficient.
Suresh Kumar Subramaniyan - PeerSpot reviewer
Has delivered strong identity automation while support response could be faster
With either SailPoint or Saviynt, I utilize this product, as do some of my clients, with AWS as a main cloud provider. We are not using AWS; we were using only Saviynt. We never used AWS because we don't have any customers for AWS. Saviynt likely uses an AWS server for their database, though I'm not certain how they utilize AWS services. The cloud-native capabilities of Saviynt contribute to enhanced cloud security as they are operating a cloud-based solution. Saviynt's capabilities for automating user provisioning and access are excellent, and their IGA functionality is perfect. The specific details about their IGA capability show excellence in terms of automated onboarding, off-boarding process, and JML processes, making it a strong solution in this market. I rate Saviynt 8 out of 10.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The security checks are valuable because you need to understand what can be improved. There is a remediation tab inside the security check, So, you don't need to go and search how to fix those things. It gives you step-by-step information for all different apps, which is a really strong feature."
"Saviynt risk-based access requests and intelligent access controls have made a significant impact on our company."
"It's easy to manage and easy to use; a simple tool for end-users."
"The workflow in Saviynt is easier compared to other tools. It's pretty straightforward."
"This product works well out of the box and if you don’t want to do a lot of configuration then this is the best tool."
"The feature that we use the most is the global, third-party user management."
"Saviynt is superior because it is user-friendly, and their fundamental phenomena are no-code, low-code, which means no customization is needed for the implementation part."
"The repository has many features where you can define primary and secondary owners."
"It is a flexible tool because it works on JSON."
 

Cons

"One feature about which I have talked to them multiple times is related to being able to rescan or do a recheck on a specific security issue. Currently, when you fix something and you want to check if it is fixed, you need to power off the integration and then power it on. If there is a clickable button that can re-scan and do a single check or even the whole security check, without powering off and powering on, it will be easier and more efficient."
"The main difficulty was the integration process itself. But we were able to kind of work through it and fix it. We tried integrating with our HR system and other IBM solutions, like Microsoft Identity Management."
"According to feedback I've received, some users prefer SailPoint over Saviynt in real complex environments. SailPoint has its provisioning platform. Complex integrations may pose challenges in scenarios like a large bank with thousands of users, making SailPoint a preferred choice for some."
"The solution does not work very well as the number of users increases."
"The biggest drawback is that for every change you want to make, you have to go back to them and ask for it."
"It should support more customizations. In SailPoint, we can do many customizations, but we are not able to do that in Saviynt. For workflows and other things, we can only use what is already in place. Saviynt has a lot of scope for improvement on the customization part."
"UI and support could be improved. The frequent updates and version changes can be disruptive for large organizations. Not every month, a large organization can go with the changes. Saviynt needs to consider this carefully."
"In terms of improvement, it's really just a matter of them getting more mature. It's a relatively new solution and they probably need to streamline a few of the processes as they mature. But there are not too many problems."
"The company needs to do more to establish standard practices within the product itself that are common in the industry."
 

Pricing and Cost Advice

"I'm not sure about the pricing, but it is worth it."
"The price of the license for this product is quite expensive."
"Saviynt has a competitive price."
"Saviynt's pricing is acceptable and licensing costs are yearly."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"If you need to make any changes then there are additional fees."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"The product is less expensive than one of the competitors."
"We are not into the licensing part. The clients take care of the licensing part."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
869,160 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Manufacturing Company
8%
Real Estate/Law Firm
6%
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise5
Large Enterprise15
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
Compared to other vendors, Saviynt's Privileged Access Management feature is not complete. They have an inbuilt PAM solution, but they are not capable of handling all PAM solutions because they hav...
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: October 2025.
869,160 professionals have used our research since 2012.