Torii

Automate SaaS operations with spend control, renewals, and access governance
4.7 
Rating
22 votes
Your vote:
Screenshots
1 / 3
Visit Website
toriihq.com
Loading

Open Torii, connect your SSO and HR system, and watch your software estate surface in minutes. The platform pulls data from identity providers, expense tools, and finance systems to assemble a clean catalog of apps, owners, contracts, and costs. From there, set naming conventions, map apps to cost centers, assign business owners, and publish a requestable catalog with lightweight approvals. Use out-of-the-box workflows to route app requests, capture justifications, and log every decision for audit.

For joiners, movers, and leavers, build role-based access bundles that provision the right tools automatically when HR status changes. Tie steps to groups in Okta or Azure AD, include exceptions (e.g., temporary access), and collect approvals in Slack or email. Add practical actions like creating project spaces, adding users to Slack channels, or granting GitHub repo access. For departures, revoke tokens, disable accounts across all tools, transfer files and calendars, archive seats, and produce a checklist report that proves nothing was missed.

Finance and procurement can centralize renewals and spending without hunting through inboxes or spreadsheets. Import contracts and invoices, align them to usage, and generate a live forecast with alerts at 90/60/30 days. Spot duplicate apps, underused tiers, and idle seats; then launch right-sizing workflows to downgrade, consolidate, or cancel. Track savings from reclamations, push costs to the right departments, and keep budgets accurate with real utilization data. During negotiations, compare historical usage against contracted volumes to strengthen your position.

Security and compliance teams gain continuous oversight. Detect unapproved tools from SSO logs and expense data, flag risky OAuth scopes, and auto-quarantine suspicious connections. Enforce guardrails like MFA required, data residency tags, and mandatory owner assignment before an app is made available. Schedule quarterly access reviews and export evidence for SOC 2, ISO 27001, or SOX. Create automations that respond to anomalies—such as sudden license spikes or unusual login patterns—and prompt owners to review. Give engineering a safe path to trial tools through a gated catalog while preventing shadow IT from spreading.

Review Summary

Features

  • Live usage analytics across all connected apps
  • Cost optimization and right-sizing recommendations
  • Renewal forecasting with configurable alerts
  • Department-level spend mapping and chargebacks
  • Seat utilization insights and license reclamation
  • Peer comparisons on price and adoption
  • Security guardrails and policy rules
  • No-code workflow automation for IT tasks
  • License, contract, and renewal timelines
  • Curated, requestable application directory
  • ML-powered suggestions based on usage patterns
  • Built-in onboarding and offboarding toolkit
  • Contract lifecycle tracking and approvals
  • Unified, role-aware dashboards and reports
  • Granular, role-based access and permissions

How It’s Used

  • IT automates onboarding by role and location with zero-touch provisioning
  • Security runs quarterly access reviews and auto-remediates risky OAuth grants
  • Finance forecasts renewals, right-sizes tiers, and tracks realized savings
  • Procurement consolidates duplicate tools and manages vendor negotiations
  • Managers request apps from a self-serve catalog with policy-backed approvals
  • Engineering trials new tools via gated workflows to prevent shadow IT
  • HR triggers joiner-mover-leaver changes that update access everywhere
  • Compliance exports evidence packs for SOC 2, ISO 27001, and SOX audits

Plans & Pricing

Torii

Custom

Spend mapping Application discovery Subscription discovery Spend monitoring Spend optimization Application rationalization Utilization insights License management workflows Application catalog workflow Contract management workflows Employee lifecycle workflows Security operations workflows

Comments

4.7
Rating
22 votes
5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 stars
0
User

Your vote: