Non-human Identity Management Reviews and Ratings

What is Non-human Identity Management?

Non-human identity management (NHIM) refers to the systematic approach of creating, maintaining, and governing digital identities for entities that are not human users within an organization's technology ecosystem. This encompasses a broad spectrum of automated systems, applications, services, devices, and processes that require authenticated access to networks, databases, and other digital resources to perform their designated functions. These identities, often called machine identities, are used to authenticate and authorize automated processes and secure communication across IT environments. They differ from human identities as they aren't tied to a specific person and often don't use traditional authentication methods like passwords or multi-factor authentication (MFA). Instead, they rely on credentials like API keys, certificates, secrets, and tokens. NHIM ensures that these identities are properly governed, have the principle of least privilege, and are continuously monitored to prevent unauthorized access and mitigate security risks. Typical users of NHIM include IT and Security teams, DevOps and Platform Engineering teams and Cloud Architects and Administrators, whose overall goal is to provide the same level of security governance for non-human identities as organizations maintain for their human workforce while supporting the automation and scalability requirements of modern digital infrastructure.

Product Listings

Filter by

Products 1 - 15 of 15

GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. In the market of secrets detection and remediation, its solutions are used by hundreds of thousands of developers in all industries.

GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development, and define and enforce policies consistently and globally across all their systems.

GitGuardian solutions monitor Public Company and Privately Held repositories in real-time, detect secrets, Infrastructure as Code misconfigurations, and alert to allow investigation and quick remediation.

Show More Details

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details

Token Security is a comprehensive solution designed to solve the challenges of managing non-human identities (NHIs) in modern hybrid cloud environments. It offers centralized visibility and granular inventory management, allowing organizations to track and secure service accounts, API keys, and other NHIs. Powered by our proprietary AI engine, Token Security provides a posture management dashboard, automated lifecycle management, and real-time threat detection. Our solution delivers critical insights into risk analysis, ownership, usage, and other critical data, helping teams mitigate risks more effectively. Token Security’s automated remediation workflows enhance operational efficiency, reduce risks, and ensure compliance with industry regulations.

Show More Details

Hush Security delivers a secretless access platform for machine identities. By replacing static secrets with policy-based, just-in-time runtime access, we secure every connection across cloud, on-prem, and hybrid environments. Our technology correlates posture intelligence with live telemetry to prevent credential-based attacks at the source.

Show More Details

Astrix Security is focused on controlling and managing the lifecycle of non-human identities (NHIs) within enterprises. NHIs, such as service accounts, API keys, OAuth apps, and SSH keys, often hold privileged and ungoverned access to enterprise environments, making them a significant security blindspot. Astrix Security addresses this issue by offering a platform that provides continuous discovery, posture management, threat detection, and automatic remediation for NHIs across business and engineering environments. This helps enterprises manage their NHI attack surface and prevent supply chain attacks.

Show More Details

Entro Security's NHI and Secrets Security platform enables the secure management of the lifecycle of Secrets and the Non-Human Identities they create. It assists in developing and enforcing rotation and vaulting policies to minimize time-to-exposure, identifies over-permissive identities to reduce their attack surface, and secures the provisioning and decommissioning workflows for NHIs.

Entro does this by discovering and inventorying over 1000 types of NHIs throughout an organization, tracing their behaviors throughout the environment, and building comprehensive cross-platform historical context.

Entro's NHI Detection & Response capabilities use this information to establish baseline behavioral models for NHIs from historical context, and detects and responds to anomalous behavior in realtime.

Show More Details
Show More Details

Cyera is the data security company that gives businesses deep context on their data, applying correct, continuous controls to assure cyber-resilience and compliance. Cyera takes a data-centric approach to security across your data landscape, empowering security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures.

Cyera overcomes the key challenges security teams face when securing their data. Security teams struggle to understand where they manage their data, what their data represents, and how to remediate exposures to security, privacy, and regulatory requirements. Cyera is the data security platform purpose-built to improve your cyber-resilience, assure compliance, and optimize costs for the cloud era.

Show More Details

Saviynt offers complete visibility and control over both human and machine identities, empowering organizations to enhance their security measures, streamline business processes, and equip every individual, internal or external, with timely access to digital resources. Through seamless integration of identity governance (IGA), application access, cloud security, and privileged account management, Saviynt's Identity Cloud provides converged identity security solutions for large enterprises. Consolidating essential identity security functionalities onto a unified platform, Saviynt's Identity Cloud enables administrators and users to efficiently govern and oversee the expanding array of identities across on-premises, cloud, and hybrid environments.

Show More Details

Silverfort operates as an identity security platform that integrates natively with on-prem and cloud-based IAM directories, infrastructures, and SaaS apps—including Active Directory, Entra ID, Okta, Ping, AWS, and others. It inspects all authentication and access attempts across human users and machine accounts in hybrid environments, enforcing real-time access policies such as MFA, deny, or Just-in-Time access. It extends security controls to systems not traditionally protected, including legacy apps, IT infrastructure, file shares, and command-line interfaces. Silverfort also performs discovery and classification of privileged users, mapping access behavior to enforce least privilege. Its architecture operates at the authentication layer, enabling centralized policy orchestration across environments. This allows organizations to prevent credential compromise, lateral movement, and privilege escalation while maintaining full visibility and control over identity activity.

Show More Details

Veza is the identity security company, helping organizations secure access across the enterprise, including cloud infrastructure, data systems, SaaS apps, and on-prem apps. Powered by the Authorization Graph, Veza’s platform delivers visibility and control of permissions so that organizations finally achieve least privilege. Global enterprises trust Veza for privileged access monitoring, cloud access management, data lake governance, SaaS access security, automated access reviews and access provisioning.

Show More Details

Akeyless provides identity security for the modern enterprise, delivering a unified Secrets & Non-Human Identity platform designed to prevent compromised machine identities and secrets throughout the development and production cycle. With customers that include Fortune 100 companies and industry leaders, Akeyless Security delivers a cloud-native SaaS platform that supports holistic security for all aspects of machine identities, integrating Vaultless Secrets Management with Certificate Lifecycle Management, Next Gen Privileged Access (Secure Remote Access), and Encryption Key Management to manage the lifecycle of machine identities and secrets across cloud and on-prem environments.

Be the first to .

Delinea specializes in the provision of Privileged Access Management (PAM) solutions, catering to the needs of the modern, hybrid enterprise. Delinea's Platform concentrates on offering authorization for varying identities, ensuring controlled access to critical hybrid cloud infrastructure as well as sensitive data. Aiming to bring down risk, guarantee compliance and streamline security within an organization, it prioritizes privileged access as a pivotal part of cyber-security strategies. Delinea's solutions are hinged on the belief that every user should be regarded as a privileged user, and they should be able to enjoy secure, seamless access without excessive complexity. The goal is an increased accessibility of privileged access in a world where organizations are gradually transforming digitally and moving their operations to the cloud. Delinea's approach pinpoints and effectively defines the boundaries of access for an organization.

Be the first to .

SailPoint is a company that focuses on identity security for businesses, with an emphasis on utilizing artificial intelligence and machine learning. The firm automates the supervision and regulation of access, ensuring identities and resources are correctly linked. It offers an identity platform that integrates with pre-existing systems and workflows, offering a comprehensive view into all identities and their access. SailPoint’s identity solution adapts to the size, speed, and environmental needs of enterprises. The company assists enterprises globally to establish a foundation based on identity security.

Be the first to .
Be the first to .