Authored by David Mattos, Chief Revenue Officer iC Consult/SecureITsource The digitization of organizations is advancing rapidly. Business processes and customer relationships are quickly moving to digital platforms, and managing digital identities is becoming increasingly important. David Mattos, Chief Revenue Officer iC Consult/ SecureITsource, explains why modern cloud-...
SailPoint
By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...
Authored by Brian Royer Navigate 2022, the must-attend identity security conference of the year, features main stage sessions with representation from SailPoint leadership and guest speakers and more than 40 information-packed breakout sessions live-streamed and made available on-demand. But how will you organize your Navigate agenda? Here are a few of the can’t-miss break...
Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...
Authored by Jerry Aubel, Senior Product Manager “Audit time and the living is easy!” I suspect the thought of the following access certification review doesn’t have you whistling down the hall, but it doesn’t have to be a burden. User access certification is a critical process for any enterprise. Automating it can make it easy for Identity teams and the business to meet re...
Authored by Tina Duong, Senior Product Manager As Dick Clark once said, “Music is the soundtrack of your life.” Music helps me sit through the horrendous rush hour traffic in Los Angeles. It pumps my friends and me up before a concert or, on my own, allows me to pretend I am starring in a sad music video in the pouring rain. Music calms me when I am taking a long drive alo...
There is enormous potential among global enterprises today as their organization rapidly transform and evolve to take advantage of new business opportunities, emerging technologies, and entirely new ways of working. And because of that, identity security has emerged as the talk of the enterprise security industry. It has become THE foundation for secure digital transformat...
As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...
From video game consoles to education platforms, Adeline Chew, Engineering Manager, has had an eventful journey to identity security. In this Women in Identity blog, Adeline details her path to cybersecurity and shares how becoming a manager has been the most significant learning moment for her. How did you come to your identity security career? It has been a very long jo...
Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...