Skip to content
Torii SaaS logo

Torii SaaS

Unclaimed

The governance platform for comprehensive SaaS and identity management.

Visit Website

TL;DR - Torii SaaS

  • Provides unified governance for all SaaS apps and identities, including unsanctioned tools and non-human identities.
  • Continuously discovers, monitors, and manages applications, entitlements, and identities to reduce risk and optimize spend.
  • Automates governance workflows, enforces least privilege, and ensures audit readiness with a comprehensive audit trail.
Pricing: Paid only
Best for: Enterprises & pros
4.5/5 across review platforms

Pros & Cons

Pros

  • Provides comprehensive visibility into both sanctioned and unsanctioned apps and identities.
  • Automates complex governance tasks, reducing manual workload and human error.
  • Offers deep insights into entitlements and non-human identities, which are often blind spots for other tools.
  • Helps reduce SaaS spend and ensures continuous compliance with robust audit capabilities.
  • Integrates data from multiple sources (finance, HR, IT) for a single source of truth.

Cons

  • Requires integration with various internal systems (IdP, HRIS, finance) which may have implementation complexity.
  • The full benefits are realized with continuous monitoring, requiring ongoing engagement with the platform.

Ratings Across the Web

4.5(303 reviews)

Ratings aggregated from independent review platforms. Learn more

Key Features

Continuous SaaS and AI tool discovery across IdP, browser, HRIS, SSO, and financeNon-human identity (NHI) discovery beyond Active Directory and SSOAutomated assignment of owners for non-human identitiesRisk scoring and prioritization for non-human identitiesAutomated least-privilege enforcement for non-human identitiesSecure Browsing extension for detecting and blocking unsanctioned SaaS/AI usageEntitlement mapping and identification of over-privileged access patternsAI-powered governance copilot (Eko) for policy recommendations

Pricing Plans

IGA Identity Governance & Administration

Get A Custom Quote

  • Identity discovery & visibility
  • Granular access controls
  • Automated certifications
  • Separation of Duties (SOD)
  • Audit-ready reporting
  • Identity lifecycle automation

SMP App Discovery, Savings, & Renewals

Get A Custom Quote

  • App discovery & visibility
  • License & renewal workflows
  • Expense & contract integrations
  • Application comparison
  • Renewal forecasting & benchmarks
  • License optimization insights

What is Torii SaaS?

Editorial review
Torii provides a unified governance platform for SaaS applications and identities, addressing the challenges of app sprawl, access drift, and audit complexities. It offers solutions for both SaaS Management (SMP) and Identity Governance and Administration (IGA), enabling organizations to gain total visibility, control, and security over their entire app stack and user access. The platform continuously discovers every application, identity, and access path, including unsanctioned SaaS and AI tools, and non-human identities. By ingesting millions of signals from finance, HR, and IT, Torii creates a single source of truth, allowing for accurate decision-making and automated enforcement of policies. It helps organizations cut costs, automate renewals, manage non-human identities, and ensure continuous compliance. Torii is designed for IT, security, and procurement teams who need to manage their modern work environment effectively, providing deep insights into entitlements, risk scoring for non-human identities, and automated workflows for license reclamation, user offboarding, and blocking risky applications. Its AI assistant, Eko, leverages live discovery data to provide explainable and accurate recommendations for policy building and enforcement.

Reviews

Be the first to review Torii SaaS

Your take helps the next buyer. Verified LinkedIn reviewers get a badge.

Write a review

Best Torii SaaS Alternatives

Top alternatives based on features, pricing, and user needs.

View full list →

Explore More

Torii SaaS FAQ

How does Torii's discovery engine identify unsanctioned SaaS and AI tools that other platforms miss?

Torii employs a multi-source discovery approach that goes beyond traditional methods like IdP or SSO logs. It utilizes browser-first detection via a Secure Browsing extension, MDM-based signals, and integrations with finance and HRIS systems to uncover apps and AI tools adopted directly by users, ensuring comprehensive visibility into shadow IT.

What specific signals contribute to the risk scores assigned to non-human identities (NHIs), and how does Torii use these scores?

Torii's NHI risk scores are derived from multiple signals, including security posture, encryption indicators, vendor health, and incident-related status changes. These scores are used to generate a prioritized list of NHIs requiring attention, with clear reasoning, and tasks are routed to assigned owners for review and resolution.

Can Torii automate the enforcement of least-privilege principles for non-human identities, and how does it maintain this over time?

Yes, Torii automatically enforces least-privilege principles for NHIs by adjusting permissions to the minimum required for each identity. It continuously monitors and enforces these policies, ensuring that no non-human identity retains excessive access over time, thereby reducing risk without manual intervention.

How does Torii's AI assistant, Eko, provide actionable policy recommendations based on live discovery data?

Eko, Torii's governance copilot, analyzes patterns of risky NHI adoption and usage identified through live discovery data. It then suggests specific policies to prevent these risks at their source, providing evidence-based recommendations with drillable data and natural-language explanations for full context and confident approval.

What kind of audit evidence does Torii provide to ensure compliance and audit readiness?

Torii maintains a real-time, tamper-proof ledger that logs every NHI action, policy decision, and access change with timestamps and rationale. This includes who made a change, when it occurred, and what was altered (access, entitlements, policies). This structured evidence can be easily exported for compliance checks, GRC, or SIEM, eliminating the need to reconstruct data from disparate sources.

Source: toriihq.com