SailPoint

The SailPoint Blog
Gain value on day 1: AI-derived decision support for your identity security program

Authored by Kelly Grizzle, Distinguished Engineer The digital landscape is changing quickly. The number of apps in use by the average enterprise increased by 20% in 2020, according to a recent Netskope threat report. Organizations with 500-2,000 employees now use approximately 700 cloud apps monthly. Data shows us that security teams manage access to hundreds of applicatio...

6 key highlights from iD.gov Identity Governance Summit

On-demand sessions discussing the state of government identity security Government agencies need to automate and modernize identity security programs and processes to keep up with today’s accelerating modern digital age. The recent iD.gov virtual summit covers quality identity security content from federal, defense, state, and local public sector leaders. Discover how to ...

Key takeaways from the state of identity security 2023: a spotlight on healthcare

This week, SailPoint released a new report titled The State of Identity Security 2023: A Spotlight on Healthcare. The report examines what identity security looks like in the healthcare industry today, particularly in the face of continuing challenges, including chronic staffing shortages, the ongoing increase in malicious cyberattacks against providers, and the growing num...

The identity security journey

Authored by Jaishree Subramania, Vice President of Product Marketing In my last blog, we looked at the four major elements defining the future of identity security – derived from our 2022 Horizons of Identity Security research study. While it may take some time to reach different aspects of this future, we do know that all companies are on a journey to get there – even tho...

Partner of the year awards

Authored by Dave Schwartz, Global Head of Partners Faster. Tougher. Together. These three words sum up SailPoint’s Partner ecosystem. We are working to provide faster time to value, encouraging each other to stay tough as we grow and leaning in with our partners that address our customers’ most challenging problems. Driving change takes time, effort, and collaboration. T...

Upping Your identity security game in 2023

It’s a new year, a time to reset and evaluate if we are taking steps to reach our goals. We commonly think about new year’s resolutions and goals from an individual standpoint, but companies can have them too. A reoccurring goal we’ve heard from organizations is to reevaluate and improve their security posture. Nowadays, lousy security is bad business. There are many reaso...

Essentials of Joiner-Mover-Leaver Functions

Authored by Jerry Aubel, Senior Product Marketing Manager Imagine this – You’re attending the Identity Security equivalent of the Oscars. Anticipation is palpable as the host begins to announce the winner of the coveted “Identity Process of the Year” award…and the winner is Joiner-Mover-Leaver! Perhaps that’s a geek pipedream. But even if joiner-mover-leaver (JML) policie...

2022’s Best (Blog) Hits

It’s that time of year: time for reflection and goal setting. Some big things happened in 2022! We learned a lot and continued to refine our products to help us protect enterprises for the future. In case you missed one (or more), check out our top-performing blogs and take an insight or two to help you strengthen your security program in 2023 and beyond. 1. Welcome to ...

Vodafone Turkey Strengthens Their IAM Program with SailPoint

Authored by Nataliia Gnatiienko, Customer Marketing Manager Vodafone operates mobile and fixed networks in 21 countries and partners with mobile networks in 48 more. As of June 2022, the company had over 300 million mobile customers, more than 28 million fixed broadband customers, and 22 million TV customers. Vodafone is a world leader in the Internet of Things (IoT), conn...

The Future of Identity Security: Four Major Elements

Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...