• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Government ERP Solutions
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Search and Product Discovery
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Game Engine Software
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • AI-Augmented Code Modernization Tools
      • Virtual Reality Development Software
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Green Software Engineering
      • Event Brokers
      • Application Integration Platforms
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • AI Agent Development Platforms for Software Engineering
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Value Stream Management Platforms
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • API and MCP Testing Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Workload Identity Management

Workload Identity Management Reviews and Ratings

What is Workload Identity Management?

Workload Identity Management represents a critical segment within the broader Identity and Access Management (IAM) market. These solutions manage and secure the identities that organizations assign to workloads (non-human machine entities), such as applications (including AI agents), services, containers, VMs which require authenticated access to target systems. Workload Identity Management solutions deliver visibility into workloads, their identities, accounts and credentials, access policies, and their usage. They help enforce least privilege access and actively monitor for anomalous or risky activity. By continuously discovering workload identities, organizations can accurately inventory and maintain compliance with company policies and standards, as well as securely manage their associated credentials and access policies. These solutions enable organizations to discover, inventory, monitor, manage, and administer workload identities and any associated accounts, credentials, and access policies. The typical users of these solutions include IAM teams, cloud security teams, DevOps, and platform engineering teams responsible for managing non-human identities.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 14 of 14
Sort by
Logo of GitGuardian Platform

GitGuardian Platform

By GitGuardian

4.7
(20 Ratings)

GitGuardian Internal Monitoring helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code configurations.

Its detection engine is trained against more than a billion public GitHub commits every year, and it covers 350+ types of secrets such as API keys, database connection strings, private keys, certificates, and more.

GitGuardian brings security and development teams together with automated remediation playbooks and collaboration features to resolve incidents fast and in full. By pulling developers closer to the remediation process, organizations can achieve higher incident closing rates and shorter fix times.

Widely adopted by developer communities, GitGuardian is used by more than 200 thousand developers.

Show More Details
Logo of NHI Management & Secrets Security

NHI Management & Secrets Security

By Entro Security

4.9
(10 Ratings)

Entro Security is a software designed to secure AI agents, non-human identities (NHIs) and secrets. It provides contextual discovery across the software development lifecycle (SDLC), finding and enriching API keys, tokens, service accounts, AI clients and agents across cloud and on-prem, code, CI/CD, vaults and SaaS. Entro builds an inventory linking each agent, NHI or secret to usage, permissions and an accountable owner. Powered by NHIDR (Non-Human Identity Detection & Response), it monitors activity to identify anomalies and exposures and prioritize response. Built-in remediation campaigns support attestation, rotation and permission right-sizing. Agentic Governance and Administration (AGA) adds visibility and policy controls for agent actions, MCP servers and tool access. The software addresses identity and secret sprawl by helping organizations establish ownership, enforce lifecycle controls, and maintain visibility into machine access across environments.

Show More Details
Logo of Token Security

Token Security

By Token Security

4.7
(8 Ratings)

Token Security provides a comprehensive solution for managing and securing non-human identities. Our platform offers complete discovery and visibility for all types of non-human identities across various environments. Using our advanced AI-based engine, we deliver critical security insights including identity ownership, dependency tracking, usage monitoring, detection of malicious behavior, comprehensive risk analysis, and more. This enables security teams to strengthen identity posture management, proactively enhance threat detection responses, streamline lifecycle management, and remediate risks automatically and more effectively.

Show More Details
Logo of Hush Security Platform

Hush Security Platform

By Hush Security

4.7
(6 Ratings)

Hush Security Platform is a software designed to protect sensitive digital information and assets for businesses by monitoring, analyzing, and managing potential security risks. The software provides features such as automated risk identification, continuous surveillance of digital footprints, and data leakage prevention. It helps organizations discover exposed data, monitor for unauthorized information disclosures, and mitigate exposure by offering recommendations and remediation guidance. Through its threat analysis capabilities and reporting features, the software supports compliance requirements and assists businesses in reducing the risk of data breaches and reputational harm.

Show More Details
Logo of Astrix

Astrix

By Astrix Security

4
(4 Ratings)

Astrix is a software designed to provide security and visibility for third-party integrations and connections within cloud environments. The software automates the detection and monitoring of non-human identities such as APIs, service accounts, and automation bots that interact with business-critical cloud applications. Astrix enables organizations to identify potential vulnerabilities by mapping the external services and connections used in their ecosystem. It supports continuous risk assessment and management by offering detailed insights into permissions, privileges, and data flows associated with these connections. The software addresses the need for enhanced security and governance by helping organizations mitigate risks related to third-party access and automation.

Show More Details
Logo of Saviynt Identity Cloud

Saviynt Identity Cloud

By Saviynt

4.7
(3 Ratings)

Saviynt Identity Cloud is a software that provides identity governance and administration capabilities for organizations. The software enables enterprises to manage user identities, access, and entitlements across cloud, hybrid, and on-premises environments. It offers features including automated provisioning and deprovisioning, access requests, risk-based access reviews, compliance reporting, and integration with a range of applications and systems. The software addresses business challenges related to security, compliance, and risk by ensuring that only authorized users have appropriate access to critical resources and data while supporting regulatory requirements and audit readiness.

Show More Details
Logo of Delinea Platform

Delinea Platform

By Delinea

4
(1 Rating)

Delinea Platform is a software designed to manage and secure privileged access for organizations across hybrid, cloud, and on-premises environments. The software offers centralized control over identities and permissions, enabling users to discover, secure, and manage privileged accounts, credentials, and secrets. Its features include automated password rotation, session monitoring, granular access controls, and policy enforcement to help reduce risk from unauthorized access and cyber threats. The software addresses business challenges related to compliance, operational efficiency, and cybersecurity by simplifying privileged access management and integrating with various IT ecosystems.

Show More Details
Logo of Identity Security Cloud

Identity Security Cloud

By SailPoint

5
(1 Rating)

Identity Security Cloud is a software designed to help organizations manage and secure digital identities across various systems and applications. The software provides automated identity lifecycle management, access controls, and compliance features to enable organizations to streamline user provisioning and deprovisioning, enforce access policies, and monitor user activities. Identity Security Cloud integrates with a range of business applications and infrastructure, supporting secure single sign-on, password management, and risk-based access decisions. The software addresses business requirements for mitigating identity-related security risks, maintaining regulatory compliance, and improving operational efficiency by centralizing identity governance and administration.

Show More Details
Logo of Oasis Security

Oasis Security

By Oasis Security

5
(1 Rating)

Oasis Security is a purpose-built platform for securing non-human identities (NHIs) and AI agents end-to-end across hybrid environments. The platform automatically discovers identities and credentials (including keys, secrets, tokens, and certificates) and enriches that inventory with contextual intelligence around ownership, usage, relationships, and business impact. A policy intelligence layer translates findings into business-relevant risk, surfacing gaps between stated policy and actual access patterns. Oasis enables full lifecycle governance and low-risk remediation through least privilege enforcement, credential rotation, migration, and decommissioning workflows. As organizations scale AI deployments, Oasis supports the path to Agentic Access Management with time-bound, just-in-time, and policy-driven access patterns for AI agents, helping security teams manage the expanding NHI attack surface while maintaining operational agility.

Show More Details
Logo of Silverfort Identity Security Platform

Silverfort Identity Security Platform

By Silverfort

5
(1 Rating)

Silverfort Identity Security Platform is a software designed to provide unified identity protection across enterprise IT environments, including on-premises and cloud resources. The software integrates with existing authentication systems to enable risk-based access policies, multifactor authentication, and continuous monitoring without requiring modifications to endpoints or applications. It helps organizations detect and prevent identity-based threats such as credential theft and lateral movement by extending protection to resources that previously could not be covered by standard identity security solutions, including legacy applications, command-line interfaces, and service accounts. The software addresses the business problem of unauthorized access and identity-related attacks by centralizing visibility and security controls over user authentication and access activities.

Show More Details
Logo of Veza Access Control Platform

Veza Access Control Platform

By Veza

4
(1 Rating)

Veza Access Control Platform is a software designed to enable organizations to manage and secure access rights across cloud and on-premises systems. The software provides features that help identify who has access to data, applications, and infrastructure, allowing for centralized visibility and governance of permissions. It works by mapping identities and permissions, helping organizations understand and control access to sensitive resources while supporting compliance requirements. By offering automated entitlement discovery and management, the software addresses business challenges related to least privilege enforcement, permission sprawl, and security risk reduction.

Show More Details
Logo of Akeyless Identity Security Platform

Akeyless Identity Security Platform

By Akeyless Security

Akeyless Platform is a software designed to manage and secure secrets such as passwords, encryption keys, and certificates across cloud and on-premises environments. The software provides centralized secret storage, access control, and secrets rotation to protect sensitive data and support compliance requirements. It enables organizations to automate authentication and authorization processes, reducing the risks associated with manual key management and unauthorized access. The software integrates with identity management systems and supports multi-cloud and hybrid infrastructures, allowing organizations to unify their security practices for distributed infrastructure. It aims to address the challenge of securing credentials and secrets within modern IT environments.

Be the first to .
Logo of Linx Identity Security and Governance Platform

Linx Identity Security and Governance Platform

By Linx Security

Linx is the AI-Native identity security and governance platform that provides complete visibility and governance over user access across human, non-human, and agentic identities. By aggregating identity data from HR systems, identity providers, and applications, Linx automatically detects security risks like orphaned accounts, excessive privileges, and offboarding gaps while streamlining access management through intelligent automation and remediation. With AI-powered access profiles, just-in-time access policies, continuous monitoring, and automated workflows, Linx helps security and IT teams reduce risk, ensure compliance, and eliminate manual governance tasks, giving you confidence that the right people, services, and agents have the right access at the right time.

Be the first to .
Logo of The Andromeda Platform

The Andromeda Platform

By Andromeda Security

The Andromeda Platform is a software designed to address cybersecurity challenges by providing features for real-time threat detection, analysis, and response automation. The software integrates with various security tools to collect and correlate security information, enabling organizations to monitor digital environments and identify malicious activity. It offers capabilities for security orchestration, facilitating workflow automation across network, endpoint, and cloud landscapes. Users can leverage its investigation tools to determine the scope and impact of incidents, as well as implement remediation actions. The software helps reduce manual workloads associated with security operations and aims to streamline the process of identifying, investigating, and mitigating security threats.

Be the first to .

Top Trending Products

Oasis Security

Popular Product Comparisons

GitGuardian Platform vs NHI Management & Secrets SecurityAstrix vs Identity Security CloudNHI Management & Secrets Security vs Saviynt Identity CloudNHI Management & Secrets Security vs Silverfort Identity Security PlatformAkeyless Identity Security Platform vs NHI Management & Secrets Security

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.