Few companies or IT professionals doubt the value of good identity security. Instead, what they often struggle with is how to implement it effectively. “Executives often say, ‘Where do we start? It’s too much, too big to bite off.’ The scale can feel overwhelming, but breaking it into phases is key,” said Elizabeth Melvin, Senior Product Manager, Identity Access Management...
SailPoint
While bite-sized, chocolatey Hershey Kisses don’t come with identity security, it takes modern and robust identity security to make those Kisses and all those other sweet treats from the Hershey Company. Ensuring the identities of the company’s more than 45,000 users and non-human machine identities is critical for smooth business processes and the overall safety of the com...
Up next in the Navigate Studio in Orlando, SailPoint was joined by Jammin Jablanski, Director of Identity and Access Management at DXC Technology. DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. A lon...
This year at Navigate Orlando, SailPoint sat down with Nickisha Bennett-Burton, Manager of Identity & Access Management at ECU Health. ECU Health is a mission-driven, 1447-bed health system serving more than 1.4 million people in 29 eastern North Carolina counties. Nickisha dove into the details of her team’s identity strategy, including: Why identity security is essen...
The SailPoint crew is ready to dive into hot identity security topics with industry peers at Gartner Identity and Access Management Summit 2024! SailPoint is proud to be a Premier Sponsor at this engaging conference, which aims to help Identity Access Management (IAM) and security leaders navigate implementing and operating scalable IAM infrastructure. When and where? Thi...
The importance of a collaborative ecosystem To thrive in the fast-paced digital world, organizations operate in a networked system to offer the right product and service to the right customers in the right market at the right time. SailPoint understands the importance of this healthy ecosystem and the value it brings to our partners, developers, and customers. At SailPo...
Organizations are concerned about the security of unauthorized system and application access as they transition from legacy systems like on-premises SAP ECC to S/4HANA and SAP cloud applications and ecosystems. Enterprises also may be in search of alternative identity security solutions that can support SAP applications, especially with SAP Identity Management (IdM) moving...
In today’s hyper-connected world, businesses rely on a growing number of non-human accounts—service accounts, bots/RPAs, and other non-human accounts—to drive their operations. But what happens when managing these machine identities becomes more complex than anticipated? A recent survey, sponsored by SailPoint and conducted by Dimensional Research, sheds light on the challe...
As we near the end of 2024, it’s time to think about what the future will bring and take stock of what’s working and what needs attention. At SailPoint, we’re constantly thinking about how to innovate and enhance Identity Security Cloud with new capabilities to deliver what we believe will provide the most value to our customers.Many organizations are facing trends such as ...
To keep organizations running smoothly, IT operations teams must execute many maintenance tasks that require privileged credentials, which unlock access to critical assets. While some ad-hoc tasks require expert knowledge and specialized skills, many involve routine, repetitive, and manual work. The single-team approach to task execution, paired with an ever-growing list of...