Identity Talks

The SailPoint Blog
Improve Process Automation using SailPoint and Amazon EventBridge

These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data ...

Making Identity Secure and Easy with SailPoint for Slack

Technology must be easy. We hear this all the time. And of course, you can’t do business without technology. This is where the two must align but that’s not always an easy thing. The rallying cry from your users is “don’t make me think!” This means that we must adapt the technology experience to the way that users typically think and interact during their everyday lives. Th...

Three Questions With Nicolette Stewart, Associate Manager, Customer Success Management

Meet Nicolette Stewart, Associate Manager, Customer Success Management at SailPoint. Her career journey started back in 2001 where she worked as Provincial Secretary for the Director of the Fraud Unit in the South African Police Force. While that may sound like an unlikely beginning to where she is now, it fed her curiosity in online security safety and how easy it is to fa...

Three Ways Identity Security Protects Critical Infrastructure for Utilities

Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...

The Identity Management Pendulum: Identity Security Mitigates Access Management Risk

It wasn’t so long ago when it was common to think of identity management as a compliance and enablement tool for large enterprises. The market was borne from a compliance standpoint. Since then, SailPoint has led the evolution of identity into what it is today: foundational to securing and enabling today’s digital cloud enterprise. Today, a large part of the world of identi...

Identity Security, A View From the CISO’s Seat

With more than 40 years in IT, about 35 of that in security, Paul de Graaff knows identity inside and out. From implementing a cloud-first strategy to using AI & ML to do more with your program, Paul shares his identity insights in this interview with SailPoint CMO Juliette Rizkallah. Hello everyone, I’m Juliette Rizkallah, and I’m the Chief Marketing Officer for SailPoint...

Why Working from Home Opened a Cybersecurity Pandora’s Box

Working from home means different things to different people. Almost by all, it’s considered a privilege made possible by technology. For some, it’s considered to be a bit of a challenge (at times) if you also have family members working from home or children (in my case, a five-month-old puppy). And for everyone, it’s considered a Pandora’s box for cybersecurity. Pandora’...

The Identity Lightbulb Moment

One of the things I run into a lot when talking with customers and prospects is this notion that identity governance is a project, a point-in-time initiative that fits in between a whole host of other IT priorities meant to support and match the velocity of the business. But let me be clear: identity governance is not and should not be considered a project. It’s a business...

Identity Governance is Business Essential

This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. Join our CEO Mark McClain and CRO Matt Mills as they discuss how the past few months have revealed the critical role identity plays in securing your digital business. Watch the full talk here, including a discussion with a SailPoint custom...

Identity Myth Busting

Raise your hand if you’ve heard one of these phrases recently, nodded your head and thought – “yup, that’s ‘good enough’ for my identity management needs right there.” You’re covered if you have access management. Provisioning is simple, we can do that. With MFA, you’re protected. You don’t need governance, that’s just an audit thing. Well, I hate to be the bearer of b...