SailPoint

The SailPoint Blog
The Future of IAM Is Cloud-Based – Are You Ready?

Authored by David Mattos, Chief Revenue Officer iC Consult/SecureITsource The digitization of organizations is advancing rapidly. Business processes and customer relationships are quickly moving to digital platforms, and managing digital identities is becoming increasingly important. David Mattos, Chief Revenue Officer iC Consult/ SecureITsource, explains why modern cloud-...

Mature Your IGA Solution with a Role-Based Framework

By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...

Can’t Miss Breakout Sessions at Navigate 2022

Authored by Brian Royer Navigate 2022, the must-attend identity security conference of the year, features main stage sessions with representation from SailPoint leadership and guest speakers and more than 40 information-packed breakout sessions live-streamed and made available on-demand. But how will you organize your Navigate agenda? Here are a few of the can’t-miss break...

Cybersecurity in Healthcare: The Value of Leveraging Identity Security to Manage EHR Access

Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...

Fundamentals of Access Certification and Compliance

Authored by Jerry Aubel, Senior Product Manager “Audit time and the living is easy!” I suspect the thought of the following access certification review doesn’t have you whistling down the hall, but it doesn’t have to be a burden. User access certification is a critical process for any enterprise. Automating it can make it easy for Identity teams and the business to meet re...

AI-driven Access Recommendations – Less Certification. More Revocation.

Authored by Tina Duong, Senior Product Manager As Dick Clark once said, “Music is the soundtrack of your life.” Music helps me sit through the horrendous rush hour traffic in Los Angeles. It pumps my friends and me up before a concert or, on my own, allows me to pretend I am starring in a sad music video in the pouring rain. Music calms me when I am taking a long drive alo...

Navigate 2022, Identity Security: Uncompromised, To Kick Off in October

There is enormous potential among global enterprises today as their organization rapidly transform and evolve to take advantage of new business opportunities, emerging technologies, and entirely new ways of working. And because of that, identity security has emerged as the talk of the enterprise security industry. It has become THE foundation for secure digital transformat...

SailPoint Authorized as a CVE Numbering Authority (CNA)

As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...

Women in Identity Security: Adeline Chew

From video game consoles to education platforms, Adeline Chew, Engineering Manager, has had an eventful journey to identity security. In this Women in Identity blog, Adeline details her path to cybersecurity and shares how becoming a manager has been the most significant learning moment for her. How did you come to your identity security career? It has been a very long jo...

The Ah-ha Moment in Identity Security for Healthcare

Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...