SHARE
Facebook X Pinterest WhatsApp

Silverfort Adds New Capabilities to Enhance End-to-End Identity Security

Silverfort’s new capabilities, Access Intelligence and Identity Graph and Inventory, aim to enhance end-to-end identity security through a unified solution.

Written By
thumbnail Luis Millares
Luis Millares
Oct 21, 2025
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Silverfort, an identity security provider, has introduced two new capabilities to its platform: Access Intelligence and Identity Graph and Inventory. These additions strengthen the company’s vision of delivering end-to-end identity security for enterprises through a single, unified solution.

Next-gen solution for identity security

According to Silverfort, enterprises face significant security blind spots and visibility gaps caused by identity sprawl — from legacy Active Directory (AD) systems to modern SaaS applications, AI services, and AI agents. 

The new capabilities are designed to address these issues by providing “unmatched observability” into the entire identity fabric, including insights into identity storylines, effective privileges, and actual user access to resources across hybrid environments.

“The evolving threats around AI, non-human identities, and privileged access require a unified platform that can discover, analyze, and protect all identities, everywhere,” said Hed Kovetz, chief executive officer and co-founder of Silverfort. 

“The recent wave of identity security M&A further validates market demand for a unified approach. Between the countless point solutions offered by startups and ad hoc solutions cobbled together through add-ons from legacy vendors, organizations struggle to solve the identity security problem.”

“They spend a lot of resources without getting results. We purpose-built the Silverfort Identity Security Platform to be the next-gen identity security foundational layer that organizations have been looking for, and to solve this problem end-to-end, at scale.” 

Let’s take a closer look at the two new features in depth.

Access Intelligence

Access Intelligence allows IAM teams to understand which users are actually accessing which resources — at enterprise scale — and to minimize unused or unnecessary access permissions. 

The feature maps identity access paths and access activity across both on-premises and cloud environments, helping organizations uncover hidden access paths, enforce least-privilege policies, remove stale resources, and stop threats before they spread. 

Key benefits of Access Intelligence:

  • End-to-end access visibility – See which users access which resources, when, and how. Gain full context into access paths, usage patterns, and protection gaps at a glance. 
  • Actionable Least Privilege intelligence – Identify gaps between granted and actual access to help reduce unused access and achieve compliance.
  • Save costs by identifying unused licenses and apps – Eliminate inefficiencies to cut costs and increase ROI, while simultaneously reducing security risks.

Identity Graph & Inventory 

Silverfort Identity Graph & Inventory enables organizations to understand their hybrid identity fabric by providing dynamic, real-time maps of identities, entitlements, attributes, and relationships.

This new capability gives organizations a unified, centralized view of identities and their relationships across cloud and on-prem, through both visual graphs and exportable tables. This affords organizations the context to understand identities and their attack surface across complex hybrid environments.  

Key benefits of Identity Graph & Inventory:

  • Cross-platform identity storylines – Understand relationships between users, identities, and the resources they have access to by visually mapping all identities tied to a user across different identity providers, applications, and environments.
  • Save time and effort in audits – Gain a single source of truth to meet regulatory and compliance requirements, streamline audits, and enhance IAM and security operations.
  • Faster, smarter investigations – Access data about any user, in any environment, without wasting time switching between IAM silos and analyzing different log files. 
  • Identity-first risk insights – Prioritize and mitigate risks based on the full context of the identity, its relationships, and its effective privileges to understand the real impact on critical resources.

Silverfort said the new capabilities complement existing features already available in its platform, including ITDR, ISPM, MFA, NHI security, privileged access security, AI agent security, and more.

In September, Silverfort published research on identity threats, revealing that while many organizations believe they have strong defenses, most still lack real visibility. Read more about the study and Silverfort’s recommendations for improving identity security.

thumbnail Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

Omega Systems Adds SASE to Security Service Portfolio
Jordan Smith
Oct 20, 2025
Hack The Box Report: Build Cyber Skills, Not Just Compliance
Luis Millares
Oct 17, 2025
SolarWinds Launches AI Agent and Expands AI Features
Jordan Smith
Oct 15, 2025
Check Point & Wiz Partner on Integrated Security Solutions
Jordan Smith
Oct 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.