SailPoint

The SailPoint Blog
How we designed a scalable and extensible framework for bringing event-driven integrations to our customers

Event Driven Integration with SailPoint Many modern software architectures are implemented using event-driven programming. An event-driven program is designed to receive and react to events such as user clicks in a UI, object changes in a database, or messages originating from other subsystems in a distributed architecture. A state owner broadcasts predefined events when s...

Three Questions With Nicolette Stewart, Associate Manager, Customer Success Management

Meet Nicolette Stewart, Associate Manager, Customer Success Management at SailPoint. Her career journey started back in 2001 where she worked as Provincial Secretary for the Director of the Fraud Unit in the South African Police Force. While that may sound like an unlikely beginning to where she is now, it fed her curiosity in online security safety and how easy it is to fa...

Three Ways Identity Security Protects Critical Infrastructure for Utilities

Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...

Identity Security, A View From the CISO’s Seat

With more than 40 years in IT, about 35 of that in security, Paul de Graaff knows identity inside and out. From implementing a cloud-first strategy to using AI & ML to do more with your program, Paul shares his identity insights in this interview with SailPoint CMO Juliette Rizkallah. Hello everyone, I’m Juliette Rizkallah, and I’m the Chief Marketing Officer for SailPoint...

Why Working from Home Opened a Cybersecurity Pandora’s Box

Working from home means different things to different people. Almost by all, it’s considered a privilege made possible by technology. For some, it’s considered to be a bit of a challenge (at times) if you also have family members working from home or children (in my case, a five-month-old puppy). And for everyone, it’s considered a Pandora’s box for cybersecurity. Pandora’...

Identity Governance is Business Essential

This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. Join our CEO Mark McClain and CRO Matt Mills as they discuss how the past few months have revealed the critical role identity plays in securing your digital business. Watch the full talk here, including a discussion with a SailPoint custom...

The Changing Landscape of Supply Chain Management in the Wake of COVID-19

The impacts of COVID-19 on business operations and the economy is complex and continuing to evolve. To better understand what we are facing today, we will first look at a few principles and trends from the 1950s and how they are forcing organizations to rethink their operations. We will dive into some of the potential short- and long-term impacts on consumers and the import...