Are access reviews a paid product feature?
- Yes, Access Reviews is paid feature. Reach out to your CSM or account executive if you have questions!
Which vendors do you automatically get account access data for?
- Here is a list of the existing account access integrations: Current Access / Account Integrations
Asana |
Task trackers |
Auth0 |
Other |
AWS |
Cloud Services |
Azure |
Cloud Services |
Azure DevOps |
Version control systems |
Bitbucket |
Version control systems |
Calendly |
Other |
ClickUp |
Task trackers |
Cloudflare |
Other |
Crowdstrike |
Endpoint security tools |
Datadog |
Monitoring services |
Dropbox |
Other |
Google Cloud Platform |
Cloud Services |
Github |
Version control systems |
Gitlab |
Version control systems |
Google Workspace |
Identity Providers |
Heroku |
Cloud Providers |
Hubspot |
Customer relationship management platform |
Intercom |
Communication platform |
Jamf |
Mobile device management tools |
Jira |
Task trackers |
Jumpcloud |
Mobile device management tools |
Knowbe4 |
Security awareness training providers |
Linear |
Task trackers |
Monday |
Task trackers |
Mongo Atlas |
Datastore providers |
Netlify |
Cloud Providers |
Notion |
Other |
Office 365 |
Identity Providers |
Okta |
Identity Providers |
OneLogin |
Identity Providers |
Pivotal Tracker |
Task trackers |
Sentry |
Monitoring service |
Shortcut |
Task trackers |
Slack |
Messaging applications |
Snowflake |
Data warehouse providers |
Snyk |
Vulnerability scanners |
Trello |
Task trackers |
VMWare Workspace One |
Mobile device management tools |
Zendesk |
Customer relationship management platform |
My system is not on your integration list, what should I do?
- First, please submit product feedback so that we can evaluate your system for our roadmap!
- Second, check out our existing tools for importing access data
Does Vanta support provisioning, de-provisioning, or modifying user account access?
- No, we do not. Vanta does not currently offer the ability to provision or de-provision access to specific applications due to the write permissions needed to perform such actions, including manipulating user access listings.