[{"_id":"project-settings","settings":{"translateMetaTags":true,"translateAriaLabels":true,"translateTitle":true,"showWidget":false,"isFeedbackEnabled":false,"fv":1,"customWidget":{"theme":"dark","font":"rgb(255, 255, 255)","header":"rgb(0, 0, 0)","background":"rgba(0, 0, 0,0.8)","position":"right","positionVertical":"bottom","border":"","borderRequired":false,"widgetCompact":true,"isWidgetPositionRelative":false},"widgetLanguages":[{"code":"fr","name":"Français"}],"activeLanguages":{"fr":"Français","de":"Deutsch","en-GB":"English (UK)","ja":"日本語","es":"Español","en":"English"},"enabledLanguages":["de","en","en-GB","es","fr","ja"],"debugInfo":false,"displayBranding":false,"displayBrandingName":false,"localizeImages":false,"localizeUrls":false,"localizeImagesLimit":false,"localizeUrlsLimit":false,"localizeAudio":false,"localizeAudioLimit":false,"localizeDates":false,"disabledPages":[],"regexPhrases":[],"allowComplexCssSelectors":false,"blockedClasses":false,"blockedIds":false,"phraseDetection":true,"customDomainSettings":[],"seoSetting":[{"language":"fr","url":"saviynt.com/fr"},{"language":"de","url":"saviynt.com/de"},{"language":"en-GB","url":"saviynt.com/en-gb"},{"language":"ja","url":"saviynt.com/ja"},{"language":"es","url":"saviynt.com/es"},{"language":"en","url":"saviynt.com"}],"translateSource":false,"overage":false,"detectPhraseFromAllLanguage":false,"googleAnalytics":false,"mixpanel":false,"heap":false,"disableDateLocalization":false,"ignoreCurrencyInTranslation":false,"blockedComplexSelectors":[]},"version":17365},{"_id":"en","source":"en","pluralFn":"return n != 1 ? 1 : 0;","pluralForm":2,"dictionary":{},"version":17365},{"_id":"outdated","outdated":{"#Mobile: ":1,"#Soirée RSA de GuidePoint Security":1,"#Saviynt sur place":1,"#La gouvernance de l'IA en action : Équilibrer l'innovation et le risque à l'ère de la GenAI":1,"#Les RSSI qui se sont reconvertis en entrepreneurs et en capital-risqueurs":1,"#FrostRadar™: Workforce Identity and Access Management, 2024":1,"#choix des clients de Gartner Peer Insights pour l'IGA":1,"#Consolidez les fonctions essentielles de sécurité des identités :":1,"#Identité":1,"#and best browser experience, we use cookies to remember and store information about how you use our website. See how we use this information in our":1,"#mmMwWLliI0fiflO&1":1,"#word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word":1,"#4 days ago":1,"#58 k":1,"#droits fins pour les":1,"#droits fins":1,"#There are currently 3 auto-suggested results for certification. Navigate to the results list by pressing the down arrow key or press return to search for all results.":1,"#Identity Security for the AI Age (ISAA) Free Certification | ISAA Credential":1,"#Certification - Saviynt Certified EIM Professional":1,"#\"Platformization and interoperability help teams achieve more precision, more productivity, and effectiveness because they're working together. I see the security industry as a whole making a lot of progress around this in 2026.\"\n—Jeff Margolies, Chief Product & Strategy Officer":1,"#“MCP is the equivalent of HTTPS for our agents. It enables our agents to access any application we want them to without going from AI to human and back to AI. It's just AI to AI.”\n– Jeff Margolies, Chief Product & Strategy Officer, Saviynt":1,"#Identity security is evolving from a perimeter tool into the primary operating system for modern security and resilience.":1,"#Identify the 2026 triple threat of agentic AI risk and governance gaps. Learn how to secure non-human identities and scale AI safely. Read the full report.":1,"#Identity has the potential and duty to become the operating system and resilience mechanism of AI. Its primary function is security, identity also acts as a catalyst for efficiency, accelerating productivity and access more information and systems, especially in the age of AI. – Henrique Teixeira":1,"#Quote: “AI will serve as a driving force for zero-trust architectures, with AI as the connective tissue. The more organizations lean into agentic AI use cases, the more the need to have concepts like just-in-time access and least privilege will become critically important.”\n—David Lee, Field CTO":1,"#quote 4@2x":1,"#The graphic features a light green gradient background with the headline \"Why identity is the foundation for AI\" and a bright green \"Download Article\" button. There is a 3D mockup of the printed report, which shows a man in a suit holding a tablet against a geometric green and white background.":1,"#\"The emergence of MCP as a standard protocol in the agentification of work offers hope to better manage the extended attack surface created by AI. Agents MCPs must be part of identity security to control how agents interact with systems what controls are required.\" Jim Routh, Chief Trust Officer":1,"#AI is both a transformative technology driving automation, modernization, and elevation of security posture and a threat to cybersecurity and IT ecosystems. Identity targeting, attack automation, and building sophisticated kill chains leveraging AI are top threats and will keep getting amplified.":1,"#Saviynt 2026 Identity Security Trends: Why identity is the foundation for AI":1,"#Navigating this triple threat requires a fundamental re-engineering of how we verify and monitor access.":1,"#Saviynt Recognized as a Leader in Frost Radar™: Non-Human Identity Solutions, 2025":1,"#Download Report":1,"#In the AI era, identity isn't just supporting your security strategy; it is the strategy. By integrating non-human identities, unifying visibility, and enforcing adaptive security, organizations can build a system of trust that scales with the speed of innovation.":1,"#The Visibility Gap: Most leaders cannot identify how many autonomous agents are currently active or what data they are accessing.":1,"#The rapid adoption of AI has ended the era of passive identity management. The triple threat of agentic risk, governance deficits, and visibility gaps cannot be solved with legacy tools or human-speed processes.":1,"#Conclusion: From Experimentation to Resilience":1,"#Move identity management from a compliance-focused exercise to a central architectural role that governs all automated and human workflows. Building this foundation is necessary to scale AI innovation without increasing organizational risk.":1,"#Leverage AI tools to address long-standing governance gaps, such as identifying orphaned accounts and classifying complex access patterns.":1,"#AI Cybersecurity Priority Actions":1,"#Organizations that treat identity as infrastructure will scale AI safely; those that treat it as a compliance exercise will struggle to maintain control.":1,"#AI’s ability to correlate massive amounts of data can finally automate the discovery of orphaned accounts and unowned access that have plagued programs for years.":1,"#Identity is no longer just a gatekeeper; it is the strategy that enables safe, efficient AI adoption.":1,"#AI Cybersecurity Key Insights":1,"#Identity is the domain that determines who or what is taking an action and whether that action should be allowed. While AI creates new risks, it is also the only way to provide the scale required to solve the governance problems it has accelerated":1,"#The Governance Deficit: Organizations are struggling to govern machine-speed identities using human-speed manual processes.":1,"#Trend 5: AI Brings Identity to the Center of Cybersecurity":1,"#Prioritize interoperability between security platforms to fulfill the zero-trust requirement of verifying every action across the entire environment.":1,"#To manage agentic AI, implement just-in-time access controls to ensure permissions are active only when necessary.":1,"#Identity is the common layer that connects disparate systems. Shift toward a unified control plane where identity context flows freely into detection and response systems.":1,"#Zero Trust Trend Priority Actions":1,"#Security platforms must work together to consistently govern access decisions and automated workflows, fulfilling the original goal of zero trust: verify everything and assume nothing.":1,"#As organizations adopt agentic AI, the ability to enforce just-in-time access and least privilege becomes essential to maintaining control.":1,"#Important signals are often delayed or lost because a risky access pattern appearing in one system may never reach another.":1,"#Zero Trust Trend Insights":1,"#Most organizations still rely on a collection of tools that lack sufficient context sharing. That may have been manageable when threats moved at human speed, but it becomes a problem when attackers use automation and AI to probe, pivot, and escalate faster than teams can respond. Fragmented security transitions from a manageable liability to a critical risk.":1,"#Agentic Risk: AI agents now act with administrative privileges that often exceed those of their human creators.":1,"#Fragmented security was always a liability, but the speed gap created by AI makes it a crisis.":1,"#Trend 4: Breaking Down Siloes and Moving Toward Zero Trust":1,"#Establish clear ownership over who and what can access sensitive information.":1,"#Enforce least privilege":1,"#Tighten access controls":1,"#Improve identity data hygiene.":1,"#Clean your data. That means:":1,"#Data Security Trend Priority Actions":1,"#Cleaning the environment is no longer optional. This requires revisiting identity metadata, classifying access patterns, and enforcing least privilege with actual rigor.":1,"#When an agent acts, it inherits the permissions of its creator, including both intentional and accidental permissions. This turns every instance of excess privilege into an instant exposure.":1,"#The traditional boundaries of the network have dissolved. We are now managing a “triple threat” of complexity:":1,"#AI is a master of correlation. A file abandoned years ago is no longer buried; it is a single prompt away from being seen by the entire company.":1,"#AI does not distinguish between what it can access and what it should access, making data security a frontline challenge.":1,"#Data Security Trend Insights":1,"#\"Remember those data security and classification projects we abandoned ten years ago? Well, guess what, they will be back with a vengeance,\" says David Lee. \"Why? AI tools are excellent at correlating large amounts of data in a very short amount of time. So, those sensitive files you created four years ago on SharePoint that you forgot about are now accessible by everyone in the company with a simple prompt.\"":1,"#For years, organizations deferred data classification and cleanup because it was slow and easy to deprioritize. AI has changed that calculus by making buried data immediately findable and actionable.":1,"#Trend 3: Data Security Will Return as a Frontline Challenge":1,"#Bring MCP under the same governance disciplines as any privileged access path, including strong authentication, clearly defined scopes, least-privilege enforcement, and continuous monitoring of how agents are using it.":1,"#Treat MCPs as part of the identity surface, not as an application detail.":1,"#MCP & AI Priority Actions":1,"#Most organizations lack visibility into this layer, unable to see which agents are speaking or what permissions they carry.":1,"#In 2026, the reality of the risks hits home. The following identity security trends and predictions outline why identity security is no longer just a support function. It's now the essential foundation for AI growth. We are moving toward a world where non-human identities (NHIs) and autonomous workflows redefine the security stack.":1,"#MCP tokens, credentials, and access rules are becoming primary targets because they enable agents to operate within critical systems at machine speed.":1,"#By removing the person in the middle, we remove the pause where judgment once lived.":1,"#MCP & AI Trend Insights":1,"#In 2026, machine-to-machine dialogues will become the new frontier of risk.":1,"#An MCP connection carries real authority. It allows an agent to retrieve data, trigger workflows, and act inside critical systems without a person in the middle. When those connections are poorly governed, they become high-value access paths. If compromised, they offer attackers a way to influence trusted systems at machine speed and largely out of sight.":1,"#MCP creates a standard way for AI agents to connect directly to applications, tools, and data sources across the enterprise. It plays a role for autonomous systems similar to what APIs once played for cloud platforms. Instead of routing work through a human, MCP allows machines to work with machines.":1,"#Trend 2: MCP Will Accelerate and Secure AI Innovation":1,"#Implement dynamic privilege enforcement and continuous monitoring as baseline requirements for autonomous workflows.":1,"#Centralize lifecycle management to provide a single view of both human and non-human identities.":1,"#Treat identity as infrastructure by integrating NHIs into the core security stack.":1,"#Enterprises rolled out AI faster than any major technology in history. This speed created a dangerous gap between employees adopting autonomous agents and copilots and security teams who lacked the frameworks to govern them.":1,"#AI Identity Priority Actions":1,"#AI identities require the same governance rigor that organizations have spent decades building for human users.":1,"#Teams are being asked to extend governance to autonomous identities that move at machine speed, even as human identity governance remains a work in progress, plagued by manual reviews and entitlement sprawl.":1,"#Dormant machine credentials and unsecured agents give attackers easy access points.":1,"#Attackers use prompt injection and model manipulation to turn agents into insider threats.":1,"#Most organizations can’t say how many agents are running or what decisions they are making.":1,"#AI Identity Trend Insights":1,"#The challenge is that human identity governance itself remains a work in progress. Many teams are still managing manual access reviews, incomplete lifecycle processes, and entitlement sprawl. Now they are being asked to extend governance to identities that move faster, act autonomously, and do not fit frameworks built for people.":1,"#We used to build security around the human person, but a new resident has moved into the network: the AI agent. These non-human identities often operate with elevated administrative privileges - sometimes exceeding the authority of the individuals who created them. Yet, they frequently lack the oversight and lifecycle controls applied to human accounts.":1,"#Trend 1: AI Identities Will Be Targeted":1,"#2026 Identity Security Trends & Predictions":1,"#Saviynt inaugurates its largest global innovation hub in India, to accelerate research and development in AI-driven identity security.":1,"#IDMWorks Identité Happy Hour":1,"#Play Video: Interview with Henrique and Enterprise Strategy Group":1,"#2 days ago":1,"#Displaying 7 of 51 | Display all":1,"#1 day ago":1,"#The Saviynt Identity Cloud, die":1,"#41 apps":1,"#Upcoming Events":1,"#WideField_Horizontal Logo_Without Tagline_Light":1,"#Oracle Identity Manager Service Desk":1,"#WideField Security is focused on helping enterprises detect, remediate, and ...":1,"#WideField Security for Threat Detection and Response":1,"#WideField Security":1,"#alert organizations to SoD violations, and suggest risk mitigation actions.":1,"#secure disparate applications":1,"#we provide visibility to":1,"#Our platform gathers access permissions from across your ecosystem, then correlates data inside the Saviynt Identity Warehouse. With":1,"#Saviynt opens its Dubai HQ and partners with StarLink, accelerating AI-powered identity security and continuous access governance in the Middle East.":1,"#LOS ANGELES, CA, December 2, 2025 - Saviynt, a leader in AI-powered identity security, today announced the opening of its new regional headquarters in Dubai and a strategic partnership with StarLink, one of the Middle East and Africa’s largest specialist cybersecurity distributors. The move comes as organizations across the region rapidly scale cloud and AI initiatives, transforming the identity landscape and intensifying demand for continuous access governance.":1,"#El crecimiento de la computación en la nube y el cambio hacia entornos de trabajo mixtos representan una oportunidad para los ciberatacantes. Los estándares CMMC son fundamentales para el futuro de la seguridad de los datos en el sector público. Es fundamental que los contratistas que trabajan para el sector público se mantengan a la vanguardia y encuentren formas de cumplir con los requisitos. Saviynt Identity Cloud tiene muchas características esenciales para ayudar a estos contratistas a lograr y mantener el cumplimiento del programa CMMC del Departamento de Defensa.":1,"#SichtbarkeitEnd-to-End-Lebenszyklus-Management":1,"#December 11, 2025 at 9:00 AM GMT+9":1,"#Réduisez le coût total de possession":1,"#Amélioration de la conformité et de la préparation à l'audit":1,"#Des économies":1,"#et la désinscription sont plus rapides":1,"#Open Writing Assistant":1,"#Hyper Icon":1,"#July 25, 2025":1,"#LOS ANGELES, February 1, 2024 –":1,"#IBM Beratung IAM Dienstleistungen Seite, um":1,"#62 k":1,"#Als hoch angesehene und bewährte Technologieexperten bringen Elissa und Bobby eine Fülle von Kenntnissen mit, die sich bereits jetzt darin niederschlagen, dass Saviynt das branchenweit höchste Maß an Kundenerfahrung und Gesamtzufriedenheit bietet, während es gleichzeitig mit der Nachfrage unseres Marktes Schritt hält. Wir fühlen uns unglaublich geehrt durch die Anerkennung von Saviynt und die Führungsrolle, die Elissa und Bobby in unseren Beirat einbringen. Die Definition von \"Identität\" hat sich im digitalen Zeitalter radikal erweitert. Die Regelung der Zugriffsrechte für diese Identitäten war noch nie so komplex wie heute. Dennoch ist es für alle Unternehmen von entscheidender Bedeutung, diese zu vereinfachen, zu automatisieren und zu beschleunigen, um ihre Compliance- und Sicherheitsstandards aufrechtzuerhalten. Mit ihrer jahrzehntelangen Erfahrung in der erfolgreichen Bereitstellung dieser Art von Mehrwert für ihre Stakeholder werden Elissa und Bobby eine entscheidende Rolle dabei spielen, dass Saviynt die IGA-Anforderungen unserer Kunden für die nächsten Jahrzehnte zukunftssicher macht. Ich könnte nicht stolzer sein, sie an unserer Seite zu haben, während wir weiter vorankommen\", sagte Amit Saha, CEO von Saviynt.":1,"#Amit Saha, CEO von Saviynt":1,"#November 11, 2025":1,"#Johnathan L.":1,"#rapport de Mordor Intelligence":1,"#à Singapour":1,"#Niedrigere TCO":1,"#Schnelleres Onboarding und Offboarding":1,"#Verbesserte Compliance und Audit-Bereitschaft":1,"#Art Director":1,"#Senior Principal Engineer - Java/Microservices":1,"#Onboarding Sales Enablement Specialist":1,"#Principal Solutions Engineer (PAM)":1,"#New York City Metro":1,"#En tant que cadres technologiques éprouvés et hautement considérés, Elissa et Bobby apportent une richesse de connaissances qui se traduit déjà dans Saviynt exécuter le plus haut niveau de l'industrie de l'expérience client et de la satisfaction globale, tout en s'adaptant à la demande de notre marché. Nous sommes très honorés de la reconnaissance de Saviynt et du leadership qu'Elissa et Bobby apportent à notre conseil d'administration. La définition de l'\"identité\" s'est radicalement élargie à l'ère du numérique. La gestion de l'accès à ces identités n'a jamais été aussi complexe, mais il est essentiel pour toutes les entreprises de la simplifier, de l'automatiser et de l'accélérer afin de maintenir leurs normes de conformité et de sécurité. Avec des décennies de succès dans la fourniture de ce type de valeur à leurs parties prenantes, l'expérience d'Elissa et de Bobby jouera un rôle essentiel dans la capacité de Saviynt à répondre aux besoins de nos clients en matière d'IGA pour les décennies à venir. Je ne saurais être plus fier de les avoir à nos côtés pour aller de l'avant\", a déclaré Amit Saha, PDG de Saviynt.":1,"#le Secure by Design Pledge de la CISA":1,"#autorité de numérotation CVE (CNA)":1,"#Frost Radar™ : Workforce Identité and Access Management 2024":1,"#Every enterprise is different. Large companies often have complex Identity and Access Management (IAM) infrastructures that have been built over time. That’s why, when designing and developing governance and security solutions, it’s imperative to listen to each customer and craft solutions that meet their unique needs.":1,"#Meet Prateek Rohela":1,"#Prateek is a Technical Lead in our Professional Services Department. He has worked at Saviynt since 2018. Based at our headquarters in El Segundo, CA, he collaborates with customers to design and develop governance and security solutions. When Prateek isn’t working, he enjoys team sports, travel and spending time with his dog.":1,"#I joined Saviynt in 2018 as a Software Engineer. Over the last few years, I worked my way up to Senior IAM Engineer. These days my role is Technical Lead, in the Professional Services department. My day starts at around 7:30 or 8 and I work with customers in the financial sector. My team and I collaborate with the customers to understand their use cases, and then we implement solutions. We also support the solutions we have implemented and are always available to address any questions they might have.":1,"#Prateek enjoying Yosemite with some of his friends.":1,"#I graduated from USC in cybersecurity and I was looking for a job in the security field. After graduation, I spent time researching companies. That’s when I came across Saviynt. I thought Saviynt looked like a good company, a leader in the field that could also offer a solid path for professional growth, so I applied for the position. I got an interview and I got the job!":1,"#I love the culture here at Saviynt. People are very friendly, welcoming and supportive. You know you can approach anybody and they will help you if they can.":1,"#Saviynt has helped me to grow professionally. Every day it’s a new challenge. You wake up and you don’t know what kind of questions you’ll receive from customers. You have to be flexible, resourceful, and a good team player. You’re on your toes all day when you’re working and you’re ready to face anything. That prepares you for life as well. I have become mentally stronger because of my experience at Saviynt.":1,"#How has Saviynt impacted your life and your career?":1,"#Saviynt has played an important role in my career. As I mentioned, I always wanted to join a cybersecurity company. Because of the supportive environment and the daily challenges, I have gained valuable experience here.":1,"#What would you say to someone who was thinking of working at Saviynt?":1,"#I would say that the people are really nice. Yes, you will have to work hard, but people are always there to support you. They’re always open to discussions here as well, and your voice gets heard. You will learn a lot if you join Saviynt.":1,"#Compared to my friends at other companies, I have learned more at Saviynt in three years than they have learned in six.":1,"#On the weekends, I play cricket and badminton. I also enjoy spending time with my dog.":1,"#What are you the most proud of in your time working with Saviynt?":1,"#I am really proud of how I have grown. I joined Saviynt right out of college. I was not experienced and had a lot to learn. Luckily, there were people here who helped me as mentors. Now, I have become someone who cares about the company’s success and wants to contribute to it in a meaningful way. So I would say that I literally went from zero to hero.":1,"#What are you most excited about as you look to your future with Saviynt?":1,"#At Saviynt, people care about your professional goals and they know that you want to grow professionally. There is room to move up here. I’m definitely looking for a management role in the future. I am already working towards it and my managers are helping me with my goal. That keeps me motivated.":1,"#Is there anything else you want to share about the Saviynt community?":1,"#I love the Saviynt community. It’s a place where people care about each other and will often do things together outside of the workplace. In fact, most of my friends are from the Saviynt community. The partnership doesn’t end when you leave the office. Even when you’re not at Saviynt, the family is always there. I can always rely on my Saviynt family.":1,"#Prateek in Santa Barbara with his dog.":1,"#prateek-rohela-1":1,"#prateek-rohela-yosemite":1,"#prateek-rohela-2":1,"#prateek-rohela-3":1,"#Meet Prateek Rohela - Prateek collaborates with customers to understand their use cases and implements solutions designed to meet their unique needs.":1,"#reserved.":1,"#rights":1,"#highlighted by Multi Find":1,"#© 2026 Saviynt. All":1,"#Hub":1,"#◀":1,"#FrostRadar™:Workforce Identity and Access Management, 2024":1,"#Call +1 310-641-1664 via Google Voice":1,"#Social Event":1,"#Play Video: Creating a Killer IAM Business Case":1,"#Play Video: IGA PAM Convergence Webinar - Saviynt and CyberRisk Alliance":1,"#Learn how Saviynt's agentic AI and identity security posture management helps organizations stay secure and compliant.":1,"#Donovan S.":1,"#Saviynt MCP Server is in the AWS Marketplace AI Agents and Tools category. Learn how MCP Server helps turn NLP into precise identity actions.":1,"#Gartner Peer Insights Customers' Choice für IGA (Identity Governance & Administration)":1,"#Saviynt betreut inzwischen mehr als 600 Unternehmenskunden weltweit, darunter über 20 Prozent der Fortune-100-Unternehmen. Die Plattform wurde um neue Lösungen für das Management von KI-Agenten, nicht-menschlichen Identitäten, privilegierten Zugriffsrechten und Sicherheits-Posture erweitert. KI-basierte Funktionen steigern die Effizienz bei Prozessen wie Anwendungs-Onboarding, Zugriffsüberprüfungen und Provisionierung erheblich. Zudem wurden Integrationen mit führenden Technologiepartnern wie AWS, CrowdStrike, Zscaler, Wiz und Cyera umgesetzt.":1,"#Starke Marktposition und Investitionsziele":1,"#„Saviynt hat eine der fortschrittlichsten und umfassendsten Plattformen für Identity Security entwickelt – speziell für das KI-Zeitalter“, sagt Ben Pederson, Managing Director bei KKR. „Das Unternehmen definiert neu, wie Organisationen ihre digitalen Ökosysteme absichern. Wir freuen uns darauf, gemeinsam mit Sachin und seinem Team die globale Expansion voranzutreiben, die nächste Generation von KI-Funktionen zu entwickeln und unsere Erfahrung im Bereich Cybersecurity zu nutzen, um Wachstum und Innovation zu beschleunigen.“":1,"#Traditionelle Lösungen für Identity und Access Management wurden für menschliche Nutzer und statische Zugriffsmuster entwickelt. Moderne Unternehmen müssen heute den Zugriff einer wachsenden Bandbreite von Identitäten steuern - von Mitarbeitern und Partnern über Maschinen und Servicekonten bis hin zu KI-Agenten, die kontinuierlich agieren und Entscheidungen in Echtzeit treffen. KI-generierte Identitäten sind die am schnellsten wachsende Kategorie und haben das Potenzial, Arbeitsprozesse und Produktivität grundlegend zu verändern. Identity Security liefert die notwendigen Leitplanken, damit KI echten Mehrwert schafft und Risiken kontrolliert bleiben. Damit wird Identitätsmanagement von einer reinen Sicherheitsfunktion zu einer strategischen Voraussetzung für die Einführung von KI.":1,"#KI verstärkt die Herausforderungen im Identitätsmanagement":1,"#„Dies ist ein entscheidender Moment für Saviynt und die gesamte Branche“, erklärt Sachin Nayyar, Gründer und CEO von Saviynt. „Die Nachfrage nach sicheren und kontrollierten Identitäten war noch nie so groß. Diese Wachstumsfinanzierung gibt uns die Mittel, um sie zu erfüllen. Wir haben uns bewusst für KKR und Sixth Street Growth entschieden, weil sie die strategische Bedeutung von Identität für KI-Initiativen verstehen und über eine lange Erfolgsgeschichte bei der globalen Skalierung von Marktführern verfügen. Gemeinsam wollen wir Innovationen beschleunigen und Identity Security in jedes Unternehmen bringen, das im KI-Zeitalter agiert.“":1,"#Mit der wachsenden Nutzung von Copilots, autonomen Agenten, MCP-Servern und KI-gesteuerten Workflows steigt der Bedarf an einer KI-fähigen Identity-Security-Plattform, die sämtliche Anforderungen rund um Posture, Lifecycle, Zugriff und Privilegien für menschliche und nicht-menschliche Identitäten abdeckt.":1,"#Saviynt bietet eine KI-gestützte Plattform, die den Zugriff für menschliche, nicht-menschliche und KI-basierte Identitäten über Anwendungen, Daten und Infrastruktur hinweg verwaltet und absichert. Durch die Integration von Identity Governance (IGA), Privileged Access Management (PAM), Application Access Governance (AAG), Identity Security Posture Management (ISPM) und Access Gateways schafft Saviynt eine einheitliche Lösung, die Compliance vereinfacht, Risiken reduziert und die Effizienz für Unternehmen steigert, die auf Cloud- und KI-basierte Architekturen umstellen.":1,"#Sixth Street Growth investiert in Technologieunternehmen in der Wachstums- und Spätphase. Die Plattform ist der dedizierte Growth-Investing-Bereich von Sixth Street, einer führenden globalen Investmentgesellschaft mit einem verwalteten Vermögen und zugesagtem Kapital von über 115 Milliarden US-Dollar. Seit ihrer Gründung hat Sixth Street über 10 Milliarden US-Dollar in mehr als 70 Unternehmen im Rahmen ihrer Growth-Strategie investiert. Weitere Informationen und rechtliche Hinweise finden Sie unter":1,"#. Informationen zur Global Atlantic Financial Group finden Sie unter":1,"#) finden Sie unter":1,"#KKR ist eine führende globale Investmentgesellschaft, die alternative Asset-Management-Dienstleistungen sowie Lösungen in den Bereichen Kapitalmärkte und Versicherungen anbietet. Ziel von KKR ist es, attraktive Renditen zu erzielen – durch eine geduldige und disziplinierte Investmentstrategie, den Einsatz erstklassiger Fachkräfte und die Förderung von Wachstum in den Portfoliounternehmen sowie den Communities. KKR verwaltet Fonds, die in Private Equity, Kreditmärkte und Sachwerte investieren, und arbeitet mit strategischen Partnern zusammen, die Hedgefonds managen. Die Versicherungsgesellschaften von KKR bieten unter der Marke Global Atlantic Financial Group Produkte in den Bereichen Altersvorsorge, Lebensversicherung und Rückversicherung an. Hinweise zu den Investitionen von KKR können auch die Aktivitäten der von KKR gesponserten Fonds und Versicherungsgesellschaften umfassen. Weitere Informationen zu KKR & Co. Inc. (NYSE:":1,"#Saviynt bietet eine KI-gestützte Identity-Plattform, die den Zugriff von menschlichen und nicht-menschlichen Identitäten auf Unternehmensanwendungen, Daten und Geschäftsprozesse verwaltet und steuert. Als anerkannter Marktführer im Bereich Identity Security hilft Saviynt Organisationen, Risiken zu reduzieren, Compliance zu vereinfachen und KI- sowie Cloud-Technologien sicher einzusetzen. Zu den Kunden zählen Fortune-500-Unternehmen, Regierungsorganisationen und führende globale Marken. Mehr Informationen:":1,"#Berater: Piper Sandler fungierte als exklusiver Finanzberater für Saviynt, Cooley LLP als Rechtsberater des Unternehmens. Latham & Watkins LLP beriet Carrick Capital Partners. Gibson, Dunn & Crutcher LLP beriet KKR & Co. Inc. Moelis & Co war Finanzberater für Sixth Street Growth, Kirkland & Ellis LLP deren Rechtsberater.":1,"#KKR bringt umfassende Erfahrung im Bereich Cybersecurity mit, einschließlich Investitionen in führende Plattformen wie Darktrace, ReliaQuest und KnowBe4 sowie in Identity-Security-Anbieter wie Ping Identity, ForgeRock und Semperis. Die Investition erfolgt überwiegend aus dem KKR Next Generation Technology Growth Fund III.":1,"#Die neuen Mittel sollen in Forschung und Entwicklung fließen, um die Produktinnovation zu beschleunigen, zusätzliche KI-basierte Werkzeuge und Migrationsmethoden bereitzustellen und die Integration mit Hyperscalern, SaaS-Plattformen und strategischen Partnern zu vertiefen.":1,"#LOS ANGELES / NEW YORK, 10. Dezember 2025 – Saviynt, ein führender Anbieter von Identity-Security-Lösungen, gab heute den Abschluss einer Series-B-Wachstumsfinanzierungsrunde in Höhe von 700 Millionen US-Dollar bei einer Bewertung des Unternehmens von rund 3 Milliarden US-Dollar bekannt. Die Runde wurde von Fonds des globalen Investmenthauses KKR angeführt, mit Beteiligung von Sixth Street Growth und TenEleven sowie zusätzlichem Kapital des bestehenden Series-A-Investors Carrick Capital Partners. Die Beteiligung mehrerer renommierter Investoren unterstreicht die gemeinsame Überzeugung, dass Identity Management die zentrale Infrastruktur für Unternehmen ist, die KI in großem Maßstab einsetzen.":1,"#Asset 58@10x-8":1,"#KKR investiert gemeinsam mit Sixth Street Growth, TenEleven und Carrick Capital Partners":1,"#partnerdeliveryenablement@":1,"#partnerdeliveryenablement@saviynt.com":1,"#Presseinformation":1,"#www.sixthstreet.com/growth":1,"#www.globalatlantic.com":1,"#www.kkr.com":1,"#KKR is a leading global investment firm that offers alternative asset management as well as capital markets and insurance solutions. KKR aims to generate attractive investment returns by following a patient and disciplined investment approach, employing world-class people, and supporting growth in its portfolio companies and communities. KKR sponsors investment funds that invest in private equity, credit and real assets and has strategic partners that manage hedge funds. KKR’s insurance subsidiaries offer retirement, life and reinsurance products under the management of Global Atlantic Financial Group. References to KKR’s investments may include the activities of its sponsored funds and insurance subsidiaries. For additional information about KKR & Co. Inc. (NYSE: KKR), please visit KKR’s website at www.kkr.com. For additional information about Global Atlantic Financial Group, please visit Global Atlantic Financial Group’s website at www.globalatlantic.com.":1,"#media@sixthstreet.com":1,"#media@kkr.com":1,"#Brooke Rustad":1,"#Saviynt@inkhouse.com":1,"#People working on computer":1,"#Identity Security for AI":1,"#AI for Identity Security":1,"#Closing Out 2025: Saviynt's Final Release Brings AI Innovation Full Circle":1,"#Sacramento, CA":1,"#PR@Saviynt.com":1,"#Frost Radar™: Workforce Identity and Access Management, 2024":1,"#Level 24,":1,"#International Tower Three,":1,"#réseau mondial de partenaires":1,"#SaaS-bereitgestellten Cloud PAM":1,"#BeyondTrust is known for its expertise in Privileged Access Management (PAM), ...":1,"#Torch logo":1,"#Torch is an AI-driven IGA automation platform that connects disconnected, ...":1,"#Torch Security":1,"#Non-Human Identity Management":1,"#2025 UNLOCK Roadshow":1,"#Ponemon-Studie":1,"#Leadership Compass for Identity Governance and Administration de":1,"#Forrester Wave(™) : Plateformes d'identité de la main-d'œuvre, Q1 2024":1,"#Identidad Governance & Administration (IGA)":1,"#IBM Consulting IAM Services Seite, um":1,"#IBM Consulting IAM Services Seite":1,"#you with the most relevant":1,"#In order to":1,"#CrowdStrike_Logo_2023_Primary_Black":1,"#If a Severity 1 ticket has been open for more than four (4) hours, Saviynt’s Field Engineering Service can be engaged to provide focused assistance and collaborate with Support organization. This ensures that critical issues are mitigated quickly, minimizing potential business impact.":1},"version":17365}]