Try our new research platform with insights from 80,000+ expert users

BloodHound Enterprise vs Saviynt comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BloodHound Enterprise
Ranking in Identity Threat Detection and Response (ITDR)
7th
Average Rating
8.0
Reviews Sentiment
6.2
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Saviynt
Ranking in Identity Threat Detection and Response (ITDR)
8th
Average Rating
7.4
Reviews Sentiment
6.7
Number of Reviews
24
Ranking in other categories
User Provisioning Software (4th), Identity Management (IM) (5th), Privileged Access Management (PAM) (10th), Identity and Access Management (3rd)
 

Mindshare comparison

As of May 2025, in the Identity Threat Detection and Response (ITDR) category, the mindshare of BloodHound Enterprise is 6.2%, up from 5.0% compared to the previous year. The mindshare of Saviynt is 1.9%, up from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Threat Detection and Response (ITDR)
 

Featured Reviews

Hasan Abufreiha - PeerSpot reviewer
Has significantly influenced our security strategy as it helps us plan attacks and take initial steps in compromising networks
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT team to handle. If you're already familiar with the field, learning to use BloodHound Enterprise shouldn't be too tricky as the UI is user-friendly and the features are straightforward. I'd rate my overall experience around an eight, mainly due to occasional performance issues and deeper operational concerns. However, in terms of features, UI, and ease of use, it's top-notch.
VinayM - PeerSpot reviewer
Used for IAM, IGA, MFA, SSO, and access management
The technical support team's response time could be improved. After the implementation, Saviynt should provide good support to their customers. While migrating from legacy applications to the cloud, Saviynt has many bugs. The lift and shift are not very seamless. There are a lot of customizations to be done and some development is required. From the migration point of view, the solution is a little buggy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The custom Cypress queries in BloodHound Enterprise is the most valuable feature."
"The most valuable aspect of Saviynt is its market acceptance."
"This product works well out of the box and if you don’t want to do a lot of configuration then this is the best tool."
"Saviynt has better integration with enterprise systems like SAP, Microsoft, Adobe, and AWS."
"The product is flexible to use."
"Considering the initial cost and the basic features, this is a good solution that provides integration with both on-premise and cloud applications."
"Saviynt risk-based access requests and intelligent access controls have made a significant impact on our company."
"One of the tool's advantages is its user-friendly interface, making it easier to manipulate from a GUI perspective. The graphical user interface for users and administrators is straightforward. While it may require more configuration initially, once set up, it becomes more accessible and easier to use."
"The feature that we use the most is the global, third-party user management."
 

Cons

"A few months ago, there was a problem with the digesters having trouble importing data from the normal digesters, a significant issue that needed attention."
"According to feedback I've received, some users prefer SailPoint over Saviynt in real complex environments. SailPoint has its provisioning platform. Complex integrations may pose challenges in scenarios like a large bank with thousands of users, making SailPoint a preferred choice for some."
"Considering the shortcomings of the tool, I would say that the training part of the product needs improvement."
"In terms of improvement, it's really just a matter of them getting more mature. It's a relatively new solution and they probably need to streamline a few of the processes as they mature. But there are not too many problems."
"The product can improve the customer support offered to users since it is an area with shortcomings."
"Saviynt cannot customize based on customer needs."
"The custom application integration is a little complex, and this tool doesn't provide so many plugins or additional applications."
"UI and support could be improved. The frequent updates and version changes can be disruptive for large organizations. Not every month, a large organization can go with the changes. Saviynt needs to consider this carefully."
"The solution does not work very well as the number of users increases."
 

Pricing and Cost Advice

Information not available
"The price of the license for this product is quite expensive."
"The pricing is comparable to Azure Entra ID. Kind of the same"
"If you need to make any changes then there are additional fees."
"The product is less expensive than one of the competitors."
"Saviynt's pricing is reasonable."
"We are not into the licensing part. The clients take care of the licensing part."
"If you are investing in securing your data and avoiding any non-compliance issues, then yes, it is certainly recommended. To put it plainly, if you're willing to pay fines and aren't concerned about the misuse of data, then there might not be a problem. However, if you intend to safeguard the data of your employees, vendors, and customers, it becomes crucial. In this context, managing data security requires preventive and detective measures, such as enforcing segregation of duties and regularly reviewing permissions. Throughout an individual's life cycle within an organization or customer life cycle, various access permissions are granted. Without taking action on these permissions, there is a risk of exposure later on. If individuals retain access after leaving the organization, it poses a serious security threat. Implementing solutions like Saviynt can address these challenges, ensuring continuous access review, generating reports, alerts, and identifying potential risks."
"Saviynt has a competitive price."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
850,076 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
11%
Manufacturing Company
9%
Retailer
7%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with BloodHound Enterprise?
I don't have any specific improvements in mind, as I haven't encountered any significant issues with BloodHound Enterprise. However, a few months ago, there was a problem with the digesters having ...
What is your primary use case for BloodHound Enterprise?
I mainly use BloodHound Enterprise for internal architecture planning, audits, and daily general testing engagements.
What advice do you have for others considering BloodHound Enterprise?
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT ...
What do you like most about Saviynt?
It is very easy to use. It addresses most of the trends in identity governance and risk management.
What is your experience regarding pricing and costs for Saviynt?
Saviynt is very affordable compared to its competitors. It is cloud-based, making it significantly cheaper than on-premises solutions. This cost-effectiveness aligns well with the Saudi market, whe...
What needs improvement with Saviynt?
We are in the deployment stage, so it's too early to determine specific improvement areas. However, bringing more people on the ground could enhance Saviynt's market presence. While Saviynt has pot...
 

Overview

 

Sample Customers

Information Not Available
Shell, McKesson, Kimberly-Clark, Ingram Micro, Intermountain Health Care, Forterra, CoreLogic
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: April 2025.
850,076 professionals have used our research since 2012.