No more typing reviews! Try our Samantha, our new voice AI agent.

Aembit vs Astrix comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Aembit
Ranking in Non-Human Identity Management (NHIM)
11th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
Astrix
Ranking in Non-Human Identity Management (NHIM)
3rd
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
Threat Intelligence Platforms (TIP) (26th)
 

Mindshare comparison

As of May 2026, in the Non-Human Identity Management (NHIM) category, the mindshare of Aembit is 2.7%, up from 2.1% compared to the previous year. The mindshare of Astrix is 12.3%, down from 18.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Non-Human Identity Management (NHIM) Mindshare Distribution
ProductMindshare (%)
Astrix12.3%
Aembit2.7%
Other85.0%
Non-Human Identity Management (NHIM)
 

Featured Reviews

Use Aembit?
Leave a review
Ahamed Shadhir - PeerSpot reviewer
System Engineer at a healthcare company with 11-50 employees
Automated SaaS access governance has reduced OAuth risks and improves audit readiness
The best features are deep OAuth app visibility, real-time risk detection, automated remediation, risk scoring and prioritization, and SaaS-to-SaaS threat detection. The real-time risk detection and alerts have benefited us the most. Astrix continuously monitors connections and third-party apps, flagging high-risk applications automatically when risky permission, suspicious behavior, or unusual access patterns are detected. This helped us considerably. Since deploying Astrix, we've seen a 42% reduction in high-risk third-party OAuth apps, a 65% reduction in dormant SaaS integration, faster vendor offboarding from days to an hour, and improved audit readiness. The faster offboarding has been transformative. Before Astrix, offboarding was mostly manual and checklist-driven. When an employee or vendor left, we would disable their primary account, remove them from groups, manually review shared drives, and try to identify third-party apps they had authorized. After Astrix, it is centralized, automated, and immediate.
report
Use our free recommendation engine to learn which Non-Human Identity Management (NHIM) solutions are best for your needs.
892,678 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Healthcare Company
19%
Financial Services Firm
10%
University
9%
Outsourcing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Astrix?
Setup costs are reasonable compared to enterprise CASB solutions, and licensing scales predictably with users.
What needs improvement with Astrix?
I would like to see advanced reporting exports, expanded integration ecosystems, enhanced real-time remediation workflows, and more granular SaaS risk scoring customization. Expanded integration in...
What is your primary use case for Astrix?
My primary use case for Astrix is SaaS to SaaS access governance and third-party app risk management, especially for OAuth connected applications across Google Workspace and Microsoft 365. The most...
 

Comparisons

 

Overview

Find out what your peers are saying about One Identity, Astrix Security, Entro Security and others in Non-Human Identity Management (NHIM). Updated: May 2026.
892,678 professionals have used our research since 2012.