Sign up now

x

what our customer say about cakewalk.

We created Cakewalk’s Access Management solution together with leading IT & Security teams. Listen to their stories.

Read more
The Challenge

Onboarding at hyper-growth speed

ElevenLabs was onboarding 50 to 60 employees per month. Many of the tools in use did not support SCIM, SSO, or admin APIs. Manual provisioning was time-consuming and error-prone. It also slowed new hires when speed mattered most.

Access processes risked blocking teams

Application ownership sat with many teams, not central IT. Traditional access tools would have forced application owners into complex dashboards and turned IT into a bottleneck. That friction risked pushing teams to bypass the process entirely.

Compliance required accurate access evidence

Audits and compliance frameworks required clear answers to simple questions: who has access, when was it granted, and is it still needed. Reconstructing this data months later was risky and expensive. ElevenLabs wanted access data that was always current and easy to prove.

The Solution

ElevenLabs implemented Cakewalk to automate access management across all applications and make access governance part of everyday work.

Automated provisioning beyond SCIM

Using Agent Cake, ElevenLabs automated onboarding and offboarding even for applications without SCIM or open APIs. Access could now keep pace with hiring, without relying on manual steps or app-by-app work.

Slack-first access workflows

Access requests and approvals happen directly in Slack. Application owners do not need to learn a new system or navigate dashboards. They approve or deny access where they already work.

“Application owners approve access directly in Slack. That’s why it works.”

Central oversight for IT and Security

While day-to-day access decisions stay lightweight, IT and Security teams use Cakewalk’s web app to see all access in one place. This gives them clear visibility, ownership, and audit trails without slowing teams down.

Continuous access tracking for compliance

Cakewalk tracks who has access to which application and how that access is used. This data is always available for access reviews, offboarding, and audits.

“We finally know exactly who has access to what and can prove it.”

"Cakewalk is a huge time saver because it automates access even when apps don’t have SSO or open APIs. In a fast-moving company, processes can’t get in the way of growth."
Hamish Deas
Tech Operations @ ElevenLabs
Industry
SaaS
Certifications
ISO27001
Company size
200+ Employees
Wouter van der Velde
System Administrator, Eye Security
Read more
The Challenge

Manual ticket-based access no longer scaled

Access management relied on tickets and manual approvals. With more than 150 applications in use, IT became a bottleneck. Routine access decisions consumed time that could not keep up with growth.

Shadow IT and offboarding risk increased

As a cloud-first company, teams adopted tools quickly. Applications without SSO were easy to miss, especially during offboarding. This increased the risk of lingering access and security gaps.

Compliance required real-time evidence

Eye Security needed accurate, up-to-date proof of access controls and reviews for ISO 27001. Reconstructing access data during audits was time-consuming and risky.

The Solution

Eye Security adopted Cakewalk to automate access management and shift responsibility closer to the teams using the tools.

Automated access workflows

Cakewalk replaced hundreds of monthly access tickets with automated workflows. Routine access no longer required manual IT intervention.


Distributed access ownership

Access decisions moved from centralized IT to application owners and privileged users. IT retained oversight while teams handled day-to-day approvals.


Full visibility into application usage

Using Cakewalk’s browser extension, Eye Security gained visibility into application usage beyond SSO. Shadow IT could be identified and managed instead of guessed at.


Reliable offboarding across the stack

Cakewalk ensured access removal even for applications without SSO. Offboarding no longer depended on memory or manual checklists.


Real-time compliance integration

Access data and review evidence were synced into Eye Security’s GRC tooling via the Cakewalk Open API. Compliance evidence stayed current by default.

"We almost have as many tools as employees. At that scale, it was just a lot of tickets and figuring out who has or needs access to what."
Wouter van der Velde
System Administrator, Eye Security
Industry
SaaS
Certifications
ISO27001
Company size
200+ Employees
Romain Mekarni
Head of Cybersecurity & IT, Resilience
Read more
The Challenge

Managing access across a massive application landscape

Resilience was running close to 200 applications, including a growing risk of shadow IT. Paying for SSO or SCIM enterprise tiers across the entire stack was not realistic. Many access changes still required manual work.

Centralized approvals without context

Access requests were handled mainly through Jira tickets. IT teams were often asked to approve access without knowing whether it was appropriate. Application ownership was unclear, and managers did not always have the time or clarity to manage access decisions.

Risky onboarding and offboarding

The easy Google Sign-in makes people open many access to applications. Offboarding was difficult to control, increasing the risk of lingering access. Access reviews required manual effort and became a heavy burden during audits.

Compliance pressure with limited resources

Operating in healthcare meant audits were non-negotiable. Resilience needed accurate, up-to-date access data to meet ISO-based requirements, without relying on last-minute spreadsheet work.

The Solution

Resilience evaluated different options acknowledging that access management required a dedicated solution.

With Cakewalk, Resilience implemented a complete Access Management approach across their environment.

Full visibility beyond SSO

Cakewalk gave Resilience real-time visibility into both SSO and non-SSO applications. Browser-based discovery surfaced application usage that identity providers alone could not see.

Clear ownership with shared responsibility

Applications were classified as managed, tracked, or restricted. Clear owners were assigned, with backups to avoid single points of failure. Responsibility moved closer to the teams using the tools, while IT retained oversight.

Slack-based access workflows

Access requests and approvals moved out of Jira and into Slack. Managers and application owners could approve access with context, without navigating complex systems.

Flexible provisioning models

Resilience combined multiple provisioning approaches based on risk and capability:

  • SCIM where available
  • Agent-based provisioning without SCIM
  • Manual owner-driven steps for sensitive systems

Audit-ready access history

Every access grant and removal is logged with full context. IT and security teams can see who approved what, when, and why, without reconstructing data during audits.

"It takes too much effort managing people who are leaving the company. We use around 200 applications, and we need to make sure employees have only the necessary rights."
Romain Mekarni
Head of Cybersecurity & IT, Resilience
Read more
Challenge

Granting employees permission and access to software was a very manual process at Superscript - it was time-consuming and led to Shadow IT.

Solution

Superscript implemented Cakewalk to automate Access Management - cutting their time spent on access control and consolidating their app stack by 25%.

“Feature after feature that Cakewalk rolls out makes it so much easier. Knowing that we can keep our apps secure is essential, and Cakewalk helps us achieve this.”
Mustafah Farah & Annabel Mekelenkamp
IT Technician & Operations Director at Superscript
Read more
Challenge

Manual access management created risk

Before Cakewalk, access management was handled manually. Tracking which employee had access to which application was time consuming and prone to mistakes. Human error became a real concern as the company grew.

ISO 27001 raised the bar

As an ISO 27001 certified company, Heyflow needed an audit-proof access process. Manual workflows made it hard to demonstrate compliance with confidence, especially under audit scrutiny.

Offboarding lacked certainty

Employee offboarding was a major weak point. Access removal was handled manually, with no reliable way to confirm that all access had been removed. This created lingering risk and low confidence in the process.

Solution

Heyflow implemented Cakewalk to centralise access data and replace manual workflows with a clear, auditable process.

One place to see all access

Cakewalk gave Heyflow a complete overview of access across applications. It became easy to see which employee had access to which tool and who owned each application.

Audit-ready access management

With all access data tracked in Cakewalk, Heyflow could meet ISO requirements without last-minute preparation. Evidence of access controls was always available.

“Cakewalk gives me the confidence that we are meeting the requirements stated by the ISO certification.”

Reliable offboarding

Cakewalk significantly improved offboarding. Access removal no longer relied on manual checks or assumptions. The process became consistent and verifiable.

“I regularly share my product requests with the Cakewalk team, and I can see that some of these requests are implemented within a few weeks or months.”
Onur Kutlu
Head of Finance at Heyflow

In the news

High Performer
"Absolutely game changing for JML management"
Easiest Setup
“Cakewalk helps us to run employees access from one simple place”
Easiest to do business with
"Easy. Super reliable. Love it."
Fastest Implementation
"Effortless UX, super valuable!"
Best support
"Best product for fast-moving tech companies"

Get going with Cakewalk - it’s a piece of cake.

Consolidate all accesses, apps and AI agents
Fully automate workflows with Agent Cake
Get guidance based on insights, reducing your attack surface
RBAC, auto provisioning, automated audits and more
Superpower your existing IdP
Get going in minutes