Amy Lemen

The SailPoint Blog
Connectivity: The secret weapon to identity security success

Understanding and satisfying identity security requirements is about helping organizations not only secure access to environments, but also realize business value as quickly as possible. And the first step is to secure access to applications. When organizations don’t apply core identity security principles – such as access requests, access approvals, certifications, and in...

File Access Manager 8.3 Expands Reach to Include Data Privacy Governance for Unstructured Data

Today’s enterprises are facing a “perfect storm” when it comes to data privacy. Longstanding regulations like GDPR, the California Consumer Privacy Act (CCPA), and others are now imposing stricter compliance requirements around the handling of Personally Identifiable Information (PII). At the same time, the current processes required to handle these privacy-related request...