SailPoint

The SailPoint Blog
Smart, Agile, Secure: AI-powered identity security with SailPoint Harbor Pilot

In a time when cyber threats evolve faster than defenses, security leaders are in a constant race to protect their organizations. As the number of users, applications, cloud environments, and regulations continues to grow, staying ahead of security threats can be increasingly difficult if you’re using traditional methods with limited resources. According to the Information ...

SailPoint Non-Employee Risk Management is now FedRAMP authorized

When people think about identity security in government and companies that support the government they usually focus on full-time employees. In the federal space, for every federal employee, there are more than two contractors working alongside them. And every single one of them needs some level of access—whether it’s to sensitive resources, critical IT infrastructure, or c...

SailPoint named Best in KLAS 2025 in Identity Management

SailPoint is proud to announce we’ve been named Best in KLAS 2025 in Identity Management for the second consecutive year! The KLAS award recognizes software and services companies that excel in helping healthcare professionals improve patient care. A Best in KLAS award signifies to the healthcare IT industry the level of commitment and partnership that top vendors should pr...

Identity security: turning overwhelmed into opportunity

Few companies or IT professionals doubt the value of good identity security. Instead, what they often struggle with is how to implement it effectively. “Executives often say, ‘Where do we start? It’s too much, too big to bite off.’ The scale can feel overwhelming, but breaking it into phases is key,” said Elizabeth Melvin, Senior Product Manager, Identity Access Management...

Sweet success: How Hershey modernized its identity security with SailPoint

While bite-sized, chocolatey Hershey Kisses don’t come with identity security, it takes modern and robust identity security to make those Kisses and all those other sweet treats from the Hershey Company. Ensuring the identities of the company’s more than 45,000 users and non-human machine identities is critical for smooth business processes and the overall safety of the com...

Inside the Navigate Studio with DXC Technology

Up next in the Navigate Studio in Orlando, SailPoint was joined by Jammin Jablanski, Director of Identity and Access Management at DXC Technology. DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. A lon...

Inside the Navigate Studio with ECU Health

This year at Navigate Orlando, SailPoint sat down with Nickisha Bennett-Burton, Manager of Identity & Access Management at ECU Health. ECU Health is a mission-driven, 1447-bed health system serving more than 1.4 million people in 29 eastern North Carolina counties. Nickisha dove into the details of her team’s identity strategy, including:  Why identity security is essen...

Connect with SailPoint at Gartner Identity and Access Management US 2024!

The SailPoint crew is ready to dive into hot identity security topics with industry peers at Gartner Identity and Access Management Summit 2024! SailPoint is proud to be a Premier Sponsor at this engaging conference, which aims to help Identity Access Management (IAM) and security leaders navigate implementing and operating scalable IAM infrastructure. When and where? Thi...

Collaboration for the greater good: The SailPoint ecosystem

The importance of a collaborative ecosystem To thrive in the fast-paced digital world, organizations operate in a networked system to offer the right product and service to the right customers in the right market at the right time. SailPoint understands the importance of this healthy ecosystem and the value it brings to our partners, developers, and customers.   At SailPo...

Introducing SailPoint Identity Security for SAP: Solutions for transformation

Organizations are concerned about the security of unauthorized system and application access as they transition from legacy systems like on-premises SAP ECC to S/4HANA and SAP cloud applications and ecosystems. Enterprises also may be in search of alternative identity security solutions that can support SAP applications, especially with SAP Identity Management (IdM) moving...